Centralized security manager
Today's increasing demand of network connectivity exposes most users to security intrusive cyber crimes. To counteract such deeds, several security measures were created such as firewalls and various types of intrusion detection systems (IDS). There are two general types of intrusion detection...
Saved in:
Main Authors: | Adriano, Adrian Joseph A., Sanchez, Nathanielle L., Trogo, Jethro S., Villamayor, Ryan Dexter M. |
---|---|
Format: | text |
Language: | English |
Published: |
Animo Repository
2004
|
Subjects: | |
Online Access: | https://animorepository.dlsu.edu.ph/etd_bachelors/14227 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | De La Salle University |
Language: | English |
Similar Items
-
PC-based home security and monitoring system via internet and via internet-capable mobile phone
by: Narvaez, Francis B., et al.
Published: (2006) -
Software-based unified security switch
by: Cagampan, Dennis H., et al.
Published: (2009) -
Implementation and modification of a lightweight authentication and key management scheme for wireless sensor networks (AKMS 2.0)
by: Cruz, Jolson Eric, et al.
Published: (2022) -
Secure audio-CAPTCHA authentication method for visually impaired
by: Li, Longhua
Published: (2015) -
Information Security Governance
by: Von Solms, Sebastiaan H., et al.
Published: (2017)