Dissertations / Theses on the topic 'Firewalls'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Firewalls.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Verwoerd, Theuns Willem. "Stateful distributed firewalls." Thesis, University of Canterbury. Computer Science and Software Engineering, 2001. http://hdl.handle.net/10092/9620.
Full textBonnevier, Jani, and Sebastian Heimlén. "The Role of Firewalls in Network Security : A Prestudy for Firewall Threat Modeling." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-232067.
Full textSchreiber, Alexander. "Firewalls - Brandmauer oder Feuermelder ?" Universitätsbibliothek Chemnitz, 1999. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199900516.
Full textHearn, Kay, and n/a. "Sniffer Packets & Firewalls." University of Canberra. n/a, 2008. http://erl.canberra.edu.au./public/adt-AUC20081217.153550.
Full textNguyen, Vu. "Class firewalls in Java." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0021/MQ48439.pdf.
Full textNguyen, Vu Carleton University Dissertation Computer Science. "Class firewalls in Java." Ottawa, 1999.
Find full textPrasetijo, Agung Budi. "Application-level proxy firewalls." Thesis, Queensland University of Technology, 2001.
Find full textHöfler, Torsten, Christian Burkert, and Martin Telzer. "Comparative Firewall Study." Thesis, Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200401485.
Full textHarris, B. A. "Firewalls and virtual private networks." Thesis, University of Canterbury. Computer Science, 1998. http://hdl.handle.net/10092/8413.
Full textRangarajan, Vinod K. (Vinod Kashyap) 1975. "End-to-end connectivity across firewalls." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47623.
Full textGasant, Mogamad Yaqeen. "Firewall information and security visualization : improving the usage and adoption of modern network firewalls by novice users." Master's thesis, University of Cape Town, 2007. http://hdl.handle.net/11427/6398.
Full textHorowitz, Eduardo. "Estudo sobre a extração de políticas de firewall e uma proposta de metodologia." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2007. http://hdl.handle.net/10183/12075.
Full textRaja, Fahimeh. "Towards improving the usability of personal firewalls." Thesis, University of British Columbia, 2011. http://hdl.handle.net/2429/31028.
Full textSailou, Lionel. "Network firewalls dynamic performance evaluation and formalisation." Thesis, Edinburgh Napier University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.506321.
Full textNalla, Vipan Reddy R. "Anonymity and covert channels in mix-firewalls." [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0007303.
Full textElnerud, Albin. "Comparison of hardware firewalls in a network environment." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-35608.
Full textBhattacharya, Hrishikesh. "On the Modular Verification and Design of Firewalls." Thesis, The University of Texas at Austin, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3572873.
Full textJoyner, William L. "Design of a load-balancing architecture for parallel firewalls." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA362273.
Full textAHMAD, MUHAMMAD ZEESHAN. "Comparative Analysis of Iptables and Shorewall." Thesis, Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-6181.
Full textRumelioglu, Sertac. "Evaluation of Embedded Firewall System." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FRumelioglu.pdf.
Full textAsarcıklı, Şükran Tuğlular Tuğkan. "Firewall monitoring using intrusion detection systems/." [s.l.]: [s.n.], 2005. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000390.pdf.
Full textGiannakou, Anna. "Self-adaptable Security Monitoring for IaaS Cloud Environments." Thesis, Rennes, INSA, 2017. http://www.theses.fr/2017ISAR0021/document.
Full textFarley, Ryan Joseph. "Parallel firewall designs for high-speed networks /." Electronic thesis, 2005. http://etd.wfu.edu/theses/available/etd-12142005-194043/.
Full textSulaman, Sardar Muhammad. "An Analysis and Comparison of The Security Features of Firewalls and IDSs." Thesis, Linköpings universitet, Institutionen för systemteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-72934.
Full textAl-saqaf, Walid. "Breaking digital firewalls : analyzing internet censorship and circumvention in the arab world." Doctoral thesis, Örebro universitet, Institutionen för humaniora, utbildnings- och samhällsvetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-34596.
Full textSavacool, Richard. "Firewall resistance to metaferography in network communications /." Online version of thesis, 2010. http://hdl.handle.net/1850/12272.
Full textGivens, Mark Allen. "Modeling and analyzing intrusion attempts to a comuter network operating in a defense-in-depth posture /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FGivens.pdf.
Full textJunior, José Mauricio Bonifacio. "Sistema de Segurança Distribuído: Integração de Firewalls com Sistemas de Detecção de Intrusão." Universidade de São Paulo, 1998. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-15032018-140823/.
Full textGonsales, Panes Guilherme [UNESP]. "Firewall Dinâmico: uma implementação cliente/servidor." Universidade Estadual Paulista (UNESP), 2011. http://hdl.handle.net/11449/89341.
Full textJESUS, Y. K. F. "Análise e Detecção de Inconsistências em Políticas de Segurança - Um Estudo Prático com Firewalls." Universidade Federal do Espírito Santo, 2016. http://repositorio.ufes.br/handle/10/9822.
Full textSpohn, Marco Aurelio. "Desenvolvimento e análise de desempenho de um 'packet/session filter'." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 1997. http://hdl.handle.net/10183/17970.
Full textHudson, Tina M., and Cathy Galyon-Keramidas. "Leaping over Firewalls! Identifying and Overcoming Barriers with School Districts to Promote Collaboration with Technology." Digital Commons @ East Tennessee State University, 2017. https://dc.etsu.edu/etsu-works/4000.
Full textAtkins, William Dee. "Design and implementation of a hardened distributed network endpoint security system for improving the security of internet protocol-based networks." Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.umr.edu/thesis/pdf/Final_Thesis_09007dcc8031d3b0.pdf.
Full textNelson, Timothy. "Margrave: An Improved Analyzer for Access-Control and Configuration Policies." Digital WPI, 2010. https://digitalcommons.wpi.edu/etd-theses/203.
Full textFelker, Keith A. "Security and efficiency concerns with distributed collaborative networking environments /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FFelker.pdf.
Full textGonsales, Panes Guilherme. "Firewall Dinâmico : uma implementação cliente/servidor /." São José do Rio Preto : [s.n.], 2011. http://hdl.handle.net/11449/89341.
Full textNelson, Tim. "First-Order Models for Configuration Analysis." Digital WPI, 2013. https://digitalcommons.wpi.edu/etd-dissertations/452.
Full textMalmgren, Andreas, and Simon Persson. "A comparative study of Palo Alto Networks and Juniper Networks next-generation firewalls for a small enterprise network." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-31767.
Full textSnyder, Walter C. "Evaluating the effectiveness of packet filter firewall applications in a "dual stack" Internet Protocol environment /." Online version of thesis, 2010. http://hdl.handle.net/1850/12263.
Full textFelker, Keith A. "Security and efficiency concerns with distributed collaborative networking environments." Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/852.
Full textTang, Jin. "Mobile IPv4 Secure Access to Home Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11536.
Full textCoetzee, Dirk. "Visualisation of PF firewall logs using open source." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018552.
Full textGivens, Mark Allen. "Modeling and analyzing intrusion attempts to a computer network operating in a defense-in-depth posture." Thesis, View thesis View thesis via DTIC web site, 2004. http://handle.dtic.mil/100.2/ADA427180.
Full textMarjanovic, Uros. "Exploration of a method for constructing an industrial ethernet with ethernet enabled devices in an industrial environment using a Cisco adaptive security appliance /." View online, 2009. http://repository.eiu.edu/theses/docs/32211131565124.pdf.
Full textBjörn, Johan. "Extending a Platform for IT-Security Exercises." Thesis, Linköpings universitet, Institutionen för systemteknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-68883.
Full textQuispe, Ordoñez Christian Isaac. "Diseño e implementación de un balanceador de carga para la optimización de los recursos de protección en una red Enterprise mediante un banco de Firewalls N: 1 controlado vía SDN." Pontificia Universidad Católica del Perú, 2019. http://hdl.handle.net/20.500.12404/15579.
Full textWagner, Oto. "Problematika firewallů." Master's thesis, Vysoká škola ekonomická v Praze, 2007. http://www.nusl.cz/ntk/nusl-2124.
Full textKugler, Zdeněk. "Proxy firewall." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218057.
Full textSapia, Helton Molina. "Apoio à tradução da política de segurança para regras de firewall utilizando uma linguagem de modelagem visual : SPML2 /." São José do Rio Preto, 2016. http://hdl.handle.net/11449/140298.
Full textInam, ul Haq Muhammad. "The major security challenges to cloud computing." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-17235.
Full text