Academic literature on the topic 'Firewall Policy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Firewall Policy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Firewall Policy"

1

Hakani, Dhwani, and Palvinder Singh Mann. "Memory management of firewall filtering rules using modified tree rule approach." International Journal of Informatics and Communication Technology (IJ-ICT) 14, no. 1 (2025): 141. https://doi.org/10.11591/ijict.v14i1.pp141-152.

Full text
Abstract:
<p>Firewalls are essential for safety and are used for protecting a great deal of private networks. A firewall’s goal is to examine every incoming and outgoing data before granting access. A notable kind of conventional firewall is the rule-based firewall. However, when it comes to job performance, traditional listed-rule firewalls are limited, and they become useless when utilized with some networks that have extremely big firewall rule sets. This study proposes a model firewall architecture called “TreeRule Firewall,” which has benefits and functions effectively in large-scale networks
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Sachin. "To Design and Implementation of Framework for Firewall Policy with Minimum Rule Set." International Journal of Advance Research and Innovation 2, no. 4 (2014): 17–26. http://dx.doi.org/10.51976/ijari.241404.

Full text
Abstract:
Firewall is a most crucial element to implement security policies in a network and also crucial to success of network rather say to success of an organization. Despite of its important in any network it has many problems and one of them is increasing number of rules in firewall’s rule set. Since in today’s environment, enterprises looking to provide strongest security to their users and also want to secure their data at maximum level and hence they have increased rules in firewall’s rule set. However increasing number of rules in firewall rule set is not an efficient way to provide maximum sec
APA, Harvard, Vancouver, ISO, and other styles
3

Jha, Ashutosh Chandra. "Automated Firewall Policy Generation with Reinforcement Learning." International journal of IoT 5, no. 1 (2025): 190–211. https://doi.org/10.55640/ijiot-05-01-10.

Full text
Abstract:
Network security would be incomplete without firewalls that control traffic flow through rule-based policies. The manual way to configure and manage firewall rules, however, is prone to various pitfalls; rules tend to become overly complex, human error occurs, and cyber threats continue to evolve. This work investigates the reinforcement learning (RL) - driven method for firewall policy generation, utilizing RL as an automated means for policy generation to increase adaptability and reduce administrative overhead. The proposed system utilizes RL agents that learn an optimal policy from real-ti
APA, Harvard, Vancouver, ISO, and other styles
4

Dhwani, Hakani, and Singh Mann Palvinder. "Memory management of firewall filtering rules using modified tree rule approach." International Journal of Informatics and Communication Technology 14, no. 1 (2025): 141–52. https://doi.org/10.11591/ijict.v14i1.pp141-152.

Full text
Abstract:
Firewalls are essential for safety and are used for protecting a great deal of private networks. A firewall’s goal is to examine every incoming and outgoing data before granting access. A notable kind of conventional firewall is the rule-based firewall. However, when it comes to job performance, traditional listed-rule firewalls are limited, and they become useless when utilized with some networks that have extremely big firewall rule sets. This study proposes a model firewall architecture called “TreeRule Firewall,” which has benefits and functions effectively in large-scale
APA, Harvard, Vancouver, ISO, and other styles
5

Lindqvist, Janne, Essi Vehmersalo, Miika Komu, and Jukka Manner. "Enterprise Network Packet Filtering for Mobile Cryptographic Identities." International Journal of Handheld Computing Research 1, no. 1 (2010): 79–94. http://dx.doi.org/10.4018/jhcr.2010090905.

Full text
Abstract:
Firewalls are an essential component of the Internet and enterprise network security policy enforcement today. The configurations of enterprise firewalls are typically rather static. Even if client’s IP addresses can be dynamically added to the packet filtering rules, the services allowed through the firewall are commonly still fixed. In this paper, we present a transparent firewall configuration solution based on mobile cryptographic identifiers of Host Identity Protocol (HIP). HIP allows a client to protect the data transfer with IPsec ESP, and supports dynamic address changes for mobile cli
APA, Harvard, Vancouver, ISO, and other styles
6

Telkar, Prajwal S., and Dr Kiran V. "Implementation of Threat policies and Routing process in Firepower Threat Defense." Journal of University of Shanghai for Science and Technology 23, no. 06 (2021): 833–39. http://dx.doi.org/10.51201/jusst/21/05344.

Full text
Abstract:
A firewall is a guard of the network which inspects the packets based on the rules adopted to be executed in the threat environment. This is used to block the flow of undesirable content, forbids unauthorized remote access, and impedes immoral contents, assures security based on protocol and IP address, insulates seamless activity in Enterprise networks, shields conversation and coordination contents and thus this cybersecurity tool secures the system when administering on the internet with humongous amount of malicious data threatening the performance and data of the network structure. Cisco’
APA, Harvard, Vancouver, ISO, and other styles
7

Altamezvi, Alnuman Mohammed Abubaker, Abdulwahed Omran E. Alalwani, and Ashour Alsllami. "Comparing Context Based Access Control to Zone-based Policy Firewalls." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 1215–22. http://dx.doi.org/10.22214/ijraset.2022.44006.

Full text
Abstract:
Abstract: This paper will be introducing a comparative study on the choices between two best classical software firewalls one is Context Based Access Control (CBAC) and Zone Based firewall (ZBF). Both of them may deliver a stateful inspection of TCP, UDP and/or ICMP control packets. Through this study, two type of networks were designed one used the CBAC firewall and the other works with a zone based firewall. The result obtained showed that ZBF has several feature which are not available in CBAC. Furthermore, ZBF deals with the security zones the traffic will be dynamically inspected as it pa
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, A. X., and M. G. Gouda. "Firewall Policy Queries." IEEE Transactions on Parallel and Distributed Systems 20, no. 6 (2009): 766–77. http://dx.doi.org/10.1109/tpds.2008.263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dr. Parvathi S, Raj shekhar Singh, Simpal Kumari, and Sudhanshu Kumar. "Dynamic AI-Augmented Firewall for Real-Time Threat Mitigation." International Research Journal on Advanced Engineering Hub (IRJAEH) 3, no. 03 (2025): 353–57. https://doi.org/10.47392/irjaeh.2025.0049.

Full text
Abstract:
Firewalls are an integral part of network protection against intrusions, their traditional approaches of sticking to static rules have rendered firewalls ineffective when countering sophisticated cyber threats. In this project, a Dynamic AI-Augmented Firewall will be developed which uses artificial intelligence augmented firewall for the proactive detection and response to cyber threats thereby undertaking network protection and security better than traditional firewalls. To accomplish the objectives stated above, the study will develop an AI-enabled anomaly detection system that will constant
APA, Harvard, Vancouver, ISO, and other styles
10

Chu, Jie, and Zhao Li. "Design and Implementation of the Firewall Policy Audit Based on Improved Policy Tree." Applied Mechanics and Materials 736 (March 2015): 179–82. http://dx.doi.org/10.4028/www.scientific.net/amm.736.179.

Full text
Abstract:
Firewall plays an important role in today's network security, and its rule configuration is reasonable or not directly related to the security of network environment. With the increasing size of the network, firewall configurations are becoming increasingly complex, and the firewall policy audit should be born in order to better play the protective properties of the firewall. Firstly, this paper studies the relationship between firewall rules in detail, analyzes some common types of rules abnormal of audit programs and reviews existing policies. Next, this paper proposes a improved audit progr
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Firewall Policy"

1

Tapdiya, Ashish. "Firewall policy optimization and management." Winston-Salem, NC : Wake Forest University, 2008. http://dspace.zsr.wfu.edu/jspui/handle/10339/37458.

Full text
Abstract:
Thesis (M.S.)--Wake Forest University. Dept. of Computer Science, 2008.<br>Title from electronic thesis title page. Thesis advisor: Errin W. Fulp. Vita. Includes bibliographical references (p. 53-54).
APA, Harvard, Vancouver, ISO, and other styles
2

Horowitz, Eduardo. "Estudo sobre a extração de políticas de firewall e uma proposta de metodologia." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2007. http://hdl.handle.net/10183/12075.

Full text
Abstract:
Com o aumento das ameaças na Internet, firewalls tornaram-se mecanismos de defesa cada vez mais utilizados. No entanto, sua configuração é notadamente complexa, podendo resultar em erros. Vários estudos foram realizados com o intuito de resolver tais problemas, mas a grande maioria deles se concentrou em trabalhar diretamente no nível de configuração, o que possui limitações. O presente trabalho investiga maneiras de extrair políticas em mais alto nível a partir de regras de firewall em baixo nível, o que é mais intuitivo. A fim de extrair as políticas reais a partir de regras de firewall, o p
APA, Harvard, Vancouver, ISO, and other styles
3

PITSCHEIDER, CHRISTIAN. "Distributed Security Policy Analysis." Doctoral thesis, Politecnico di Torino, 2016. http://hdl.handle.net/11583/2644186.

Full text
Abstract:
Computer networks have become an important part of modern society, and computer network security is crucial for their correct and continuous operation. The security aspects of computer networks are defined by network security policies. The term policy, in general, is defined as ``a definite goal, course or method of action to guide and determine present and future decisions''. In the context of computer networks, a policy is ``a set of rules to administer, manage, and control access to network resources''. Network security policies are enforced by special network appliances, so called securi
APA, Harvard, Vancouver, ISO, and other styles
4

El-Moussa, Fadi Ali. "An integrated active network approach to the provision of intrusion detection, network access policy and firewall functionality." Thesis, University of Salford, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.401982.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kourtesis, Marios. "Creating a Secure Server Architecture and Policy for Linux-based Systems." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-41007.

Full text
Abstract:
Creating and maintaining servers for hosting services in a secure and reliable way is an important but complex and time-consuming task. Misconfiguration and lack of server maintenance can potentially make the system vulnerable. Hackers can exploit these vul­nerabilities in order to penetrate into the system internals and cause damage. Having a standard architecture/configuration supporting the needed services saves time and re­sources while it reduces security risks. A server architecture protected by a security policy can secure the integrity and quality of the overall services. This research
APA, Harvard, Vancouver, ISO, and other styles
6

Penz, Leandro Lisboa. "Coherence in distributed packet filters." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2008. http://hdl.handle.net/10183/22813.

Full text
Abstract:
Redes de computadores estão sob constante ameaça, ainda mais quando conectadas à Internet. Para reduzir o risco, dispositivos de segurança como o filtro de pacotes são usados. Uma primeira camada de segurança, o filtro de pacotes é responsável pelo bloqueio do tráfego indesejado em posições chave da rede. Os pacotes que devem ser permitidos ou bloqueados pelo filtro são definidos através de um conjunto de regras programadas pelo administrador da rede. Essas regras tem duas partes: a seleção e a ação. Conforme cresce a rede e o número de serviços, a quantidade de regras tende a aumentar. Passad
APA, Harvard, Vancouver, ISO, and other styles
7

Raheem, Muhammad. "Mitigation of inter-domain Policy Violations at Internet eXchange Points." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-247908.

Full text
Abstract:
Economic incentives and the need to efficiently deliver Internet have led to the growth of Internet eXchange Points (IXPs), i.e., the interconnection networks through which a multitude of possibly competing network entities connect to each other with the goal of exchanging traffic. At IXPs, the exchange of traffic between two or more member networks is dictated by the Border gateway Protocol (BGP), i.e., the inter-domain routing protocol used by network operators to exchange reachability information about IP prefix destinations. There is a common “honest-closed-world” assumption at IXPs that t
APA, Harvard, Vancouver, ISO, and other styles
8

Konstantaras, Dimitrios, and Mustafa Tahir. "Securing Network Connected Applications with Proposed Security Models." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2022.

Full text
Abstract:
<p>In today’s society, serious organizations need protection against both internal and external attacks. There are many different technologies available that organizations can incorporate into their organization in order to enhance security for their networking applications. Unfortunately, security is way to often considered as an afterthought and therefore implemented as an external part of the applications. This is usually performed by introducing general security models and technologies.</p><p>However, an already developed, well structured and considered security approach – with proper impl
APA, Harvard, Vancouver, ISO, and other styles
9

Casalino, Matteo Maria. "Approches pour la gestion de configurations de sécurité dans les systèmes d'information distribués." Phd thesis, Université Claude Bernard - Lyon I, 2014. http://tel.archives-ouvertes.fr/tel-01058803.

Full text
Abstract:
La sécurité des services informatiques d'aujourd'hui dépend significativement de la bonne configuration des systèmes qui sont de plus en plus distribués. Au même temps, la gestion des configurations de sécurité est encore fortement basée sur des activités humaines, qui sont coûteuses et sujettes à erreurs. Au cours de la dernière décennie, il a été reporté à plusieurs reprises qu'une partie significative des incidents de sécurité et des pertes de données a été causée par des configurations incorrectes des systèmes. Pour résoudre ce problème, plusieurs techniques ont été proposées pour automati
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Ying-ta, and 陳盈達. "Internet Firewall Policy Verification System." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/34626331685126079736.

Full text
Abstract:
碩士<br>逢甲大學<br>資訊工程所<br>94<br>Firewalls are core elements in network security. They are responsible for protecting inside network elements to against outside attacks. The composing, order, and allocation of the access control list in the firewall should be exhaustively considered and planned to avoid the rule anomaly caused by the leak of the network security. Therefore, the allocation and composing of rules in firewalls becomes a very hard task, especially in the environment of multi-firewalls. Since the firewalls may configure by different managers, the network managers can not know the effec
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Firewall Policy"

1

Mankell, Henning. Firewall. Blackstone Audio, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mankell, Henning. Firewall. New Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

National Institute of Standards and Technology. NIST SP 800-41 Guidelines on Firewalls and Firewall Policy: NiST SP 800-41. Createspace Independent Publishing Platform, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wack, John. Guidelines on Firewalls and Firewall Policy: Recommendation of the National Institute of Standards and Technology. United States Government Printing Office, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Griffiths, James. Great Firewall of China: How to Build and Control an Alternative Version of the Internet. Zed Books, Limited, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Griffiths, James. Great Firewall of China: How to Build and Control an Alternative Version of the Internet. Zed Books, Limited, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Griffiths, James. Great Firewall of China: How to Build and Control an Alternative Version of the Internet. Zed Books, Limited, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Griffiths, James. Great Firewall of China: How to Build and Control an Alternative Version of the Internet. Zed Books, Limited, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Griffiths, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Griffith, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Firewall Policy"

1

Al-Shaer, Ehab. "Classification and Discovery of Firewalls Policy Anomalies." In Automated Firewall Analytics. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-10371-6_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Caldeira, Filipe, and Edmundo Monteiro. "A policy-based approach to firewall management." In IFIP Advances in Information and Communication Technology. Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35620-4_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yin, Yi, Yuichiro Tateiwa, Yun Wang, Yoshiaki Katayama, and Naohisa Takahashi. "Inconsistency Analysis of Time-Based Security Policy and Firewall Policy." In Formal Methods and Software Engineering. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68690-5_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Weiping, Wenhui Chen, Zhepeng Li, and Huaping Chen. "Comparison Model and Algorithm for Distributed Firewall Policy." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/978-3-540-37275-2_67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Solanki, Vijender Kumar, Kumar Pal Singh, M. Venkatesan, and Sudhanshu Raghuwanshi. "Securing Networks Using Situation-Based Firewall Policy Computations." In Intelligent Computing, Networking, and Informatics. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1665-0_105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fadwa, Bezzazi, Mohammed El Marraki, and Ali Kartit. "Enhanced Algorithm for Type II Firewall Policy Deployment." In Lecture Notes in Electrical Engineering. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30298-0_53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Maddumala, Mahesh Nath, and Vijay Kumar. "Dynamic Firewall Policy Management Framework for Private Cloud." In Proceedings of International Symposium on Sensor Networks, Systems and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75683-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sveda, Miroslav, Ondrej Rysavy, Gayan de Silva, Petr Matousek, and Jaroslav Rab. "Static Analysis of Routing and Firewall Policy Configurations." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25206-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bandara, Arosha K., Antonis Kakas, Emil C. Lupu, and Alessandra Russo. "Using Argumentation Logic for Firewall Policy Specification and Analysis." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11907466_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Abedin, Muhammad, Syeda Nessa, Latifur Khan, and Bhavani Thuraisingham. "Detection and Resolution of Anomalies in Firewall Policy Rules." In Data and Applications Security XX. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11805588_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Firewall Policy"

1

Shruthikaa, S., P. Thanushree, and Gunavathie. "SDN based Firewall with Real Time Policy Updates." In 2025 International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2025. https://doi.org/10.1109/iciccs65191.2025.10984995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Huang, Tianrui, Lina You, Nishui Cai, and Ting Huang. "Large Language Model Firewall for AIGC Protection with Intelligent Detection Policy." In 2024 2nd International Conference On Mobile Internet, Cloud Computing and Information Security (MICCIS). IEEE, 2024. http://dx.doi.org/10.1109/miccis63508.2024.00047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ranathunga, Dinesha, Matthew Roughan, Phil Kernick, and Nick Falkner. "Malachite: Firewall policy comparison." In 2016 IEEE Symposium on Computers and Communication (ISCC). IEEE, 2016. http://dx.doi.org/10.1109/iscc.2016.7543759.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jeffrey, Alan, and Taghrid Samak. "Model Checking Firewall Policy Configurations." In 2009 IEEE International Symposium on Policies for Distributed Systems and Networks - POLICY. IEEE, 2009. http://dx.doi.org/10.1109/policy.2009.32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yin, Yi, Xiaodong Xu, Yoshiaki Katayama, and Naohisa Takahashi. "Inconsistency Detection System for Security Policy and Firewall Policy." In 2010 First International Conference on Networking and Computing (ICNC). IEEE, 2010. http://dx.doi.org/10.1109/ic-nc.2010.45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yin, Yi, Yuichiro Tateiwa, Guoqiang Zhang, and Yun Wang. "Consistency Decision Between IPv6 Firewall Policy and Security Policy." In 2021 4th International Conference on Information Communication and Signal Processing (ICICSP). IEEE, 2021. http://dx.doi.org/10.1109/icicsp54369.2021.9611983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Haining, Omar Chowdhury, Jing Chen, Ninghui Li, and Robert Proctor. "Towards quantification of firewall policy complexity." In HotSoS '15: Symposium and Bootcamp on the Science of Security. ACM, 2015. http://dx.doi.org/10.1145/2746194.2746212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Parmar, P. N., Priya Rajagopal, and Ravi Sahita. "Protocol decode based stateful firewall policy definition language." In Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004. IEEE, 2004. http://dx.doi.org/10.1109/policy.2004.1309169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

El-Atawy, Adel, Taghrid Samak, Zein Wali, et al. "An Automated Framework for Validating Firewall Policy Enforcement." In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07). IEEE, 2007. http://dx.doi.org/10.1109/policy.2007.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wei, Lingbo, Chi Zhang, Yanmin Gong, Yuguang Fang, and Kefei Chen. "A Firewall of Two Clouds: Preserving Outsourced Firewall Policy Confidentiality with Heterogeneity." In GLOBECOM 2016 - 2016 IEEE Global Communications Conference. IEEE, 2016. http://dx.doi.org/10.1109/glocom.2016.7841497.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Firewall Policy"

1

Wack, John, Ken Cutler, and Jamie Pole. Guidelines on firewalls and firewall policy :. National Institute of Standards and Technology, 2002. http://dx.doi.org/10.6028/nist.sp.800-41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Scarfone, K. A., and P. Hoffman. Guidelines on firewalls and firewall policy. National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.sp.800-41r1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!