Third party security audit procedure for network environment
Defending one's systems and networks is an arduous task since computing systems are vulnerable to unauthorized access. Most organizations and companies rely totally on firewalls for network security. Support of firewall installations requires a firewall and network environment audit that is gov...
Saved in:
Main Authors: | Bin Baharin, K.N., Din, N.Md., Jamaludin, Md.Z., Tahir, N.Md. |
---|---|
Format: | |
Published: |
2018
|
Online Access: | http://dspace.uniten.edu.my/jspui/handle/123456789/7208 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Third party security audit procedure for network environment
by: Bin Baharin, K.N., et al.
Published: (2017) -
Secured network authentication using biometrics application
by: Laili, M.H., et al.
Published: (2018) -
Secured network authentication using biometrics application
by: Laili, M.H., et al.
Published: (2017) -
Diffserv-aware GMPLS in IP/WDM admission control with fuzzy logic
by: Din, N.Md.
Published: (2018) -
Bandwidth sharing scheme in DiffServ-aware MPLS networks
by: Din, N.Md., et al.
Published: (2018)