Security Issues of Firewall
Abstract
References
Kahate, A. Cryptography and Network Security. ISBN-13: 978-0-07-064823-4, ISBN-10:0-07-64823-9, McGraw Hill Higher Education.
Forouzan, B. A., & Mukhopadhyay, D. Cryptography and Network Security. ISBN-13:978-0- 07-70208-0, ISBN-10: 0-07- 070208-X, Mc Graw Hill Higher Education.
Stallings, W. Cryptography and Network Security Principles and Practices. ISBN-978-81-775-8774-6.
Tanenbaum, A. S., Watherall, D. J. Computer Networks. ISBN- 13: 978-0132126953, ISBN-10: 0132126958, 5th Edition, Paperback, 2010, pp: 34-39.
Rathod, R.H., & Deshmukh, Prof. V.M. (2013). Role of Distributed Firewalls in Local Network for Data Security. International Journal of Computer Science and Applications, Vol. 6, No. 2, Apr 2013, ISSN: 0974-011 (open access), pp: 360- 364.Retrieved from official website: www.researchpublications.org
Zeng-gang, X., & Xue-min, Z. (2010). Research and Design on distributed Firewall based on LAN. Computer and Automation Engineering (ICCAE), 2010, E-ISBN: 978-1-4244-5586-7, Print ISBN: 978-1-4244-5585-0, INSPEC Accession Number: 11259785, DOI: 10.1109/ICCAE.2010.5451596, Publisher: IEEE, Singapore, pp: 517-520
Patel, H. B., Patel, R. S., & Patel, J. A. (2011). Approach of Data Security in Local Network using Distributed Firewalls. International Journal of P2P Network Trends and Technology(IJPTT), Vol. 1 Issue 3- 2011, ISSN: 2249-2615, pp: 26-29. Retrieved from: http://www.internationaljournalssrg.org
Avolio, F. Firewalls and Internet Security, the Second Hundred (Internet) Years. The Internet Protocol Journal, Vol. 2, No. 2.Retrieved from official website of CISCO: http://www.cisco.com/web/about/ac123/ac147/ac174/ac200/about_cisco_ipj_archive_article09186a00800c85ae.html
Sahare, S., Joshi, M., & Gehlot, M. (2012). A Survey Paper: Data Security in Local Networks Using Distributed Firewalls.International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 9 Sep 2012, ISSN: 0975-3397, pp: 1617-1622.
Gaud, J.V., & Bartere, M.M. (2014). Data Security Based on LAN Using Distributed Firewall. International Journal of Computer Science and Mobile Computing (IJCSMC), Vol. 3, Issue. 3, March 2014, ISSN pp: 386-391.Retrieved from IJCSMC official website:www.ijcsmc.com
Bhovare, S. R., & Chaudhari, B. K. (2014). A Survey on Data Security Provided in Local Network Using Distributed Firewall. International Journal of Research in Advent Technology, Vol. 2, No. 4, April 2014, E-ISSN: 2321-9637, pp: 169-171.
Warade, S. J., Tijare, P. A., & Sawalkar, S. N. (2014). Data Security in Local Network using Distributed Firewall: A Review. International Journal of Computer Applications (0975-8887), National Conference on Emerging Trends in Computer Technology (NCETCT-2014), pp: 19-21.
(2009) Wikipedia. [Online]. Available:https://en.wikipedia.org/wiki/Distributed_firewall.
S. Tom. Networking defined & Hyperlinked. [Online]. Available:www.linktionary.com/c/circ_firewall.html
Marcus J. Ranum (1997). [Online]. Available:www.ranum.com/security/computer_security/archives/ internet-attacks.pdf
Security Attacks. [Online]. Available: http://www.comptechdoc.org/independent/security/recommendatio ns/secattacks.html
DOI: https://doi.org/10.23956/ijarcsse/V7I4/0208
Refbacks
- There are currently no refbacks.