Essays about: "Firewall technology and its applications"

Found 4 essays containing the words Firewall technology and its applications.

  1. 1. Virtual Firewalling For Migrating Virtual Machines In Cloud Computing

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Mahwish Anwar; [2013]
    Keywords : virtual machine; migration; firewall;

    Abstract : Context. Cloud Computing (CC) uses virtualization to provide computing resources on demand via Internet. Small and large organizations benefit from CC because of reduced operating costs and increase in business agility. READ MORE

  2. 2. Network Capability Analysis and Related Implementations Improvements Recommendations

    University essay from Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)

    Author : Mujahid Tabassum; Khamees Elkhateeb; [2009]
    Keywords : Virtual Private Network; Wireless LANs; Physical Security; Firewall; Access and Authentication; Disaster Recovery Plan;

    Abstract : The networking field has become a core component for any company. All of the businesses rely on the networking industry, due its vastness and significance. READ MORE

  3. 3. Performance evaluation of explicitsignaling for NAT traversal in peer topeer communication with emphasis onP2P-TVJawad Hussain

    University essay from

    Author : Jawad Hussain; [2009]
    Keywords : ;

    Abstract : Peer-to-Peer (P2P) networks have become increasingly popular and have become a very successful networking paradigm. Presently P2P network boostup by P2P file sharing programs such as Napster, KaZaA, TV broadcasting etc. READ MORE

  4. 4. A comparative firewall study in terms of performance, security and configuration

    University essay from Institutionen för ekonomi och it

    Author : Carl Niklasson; Christian Lindström; [2008]
    Keywords : Mjukvara; Hårdvara; Cisco; IDS; Brandväggar datasäkerhet ; Programvara; IT-säkerhet; Maskinvara;

    Abstract : The goal of this report is to investigate firewalls from both the software and the hardware architecture on their security, functionality, effectives and how the configuration works. The test will consist of scans from Nessus and Nmap which both scans for information and vulnerabilities on the target device. READ MORE