Results 161 to 170 of about 79,557 (216)

In Response. [PDF]

open access: yesAnesth Analg
Feinstein M   +3 more
europepmc   +1 more source
Some of the next articles are maybe not open access.

Related searches:

Firewalls

2022
Welcome to our book on Firewalls! As technology continues to evolve, it has become increasingly important for individuals and organizations to protect their networks and data from unauthorized access and malicious attacks. This is where firewalls come in - they serve as a critical component of network security by filtering and monitoring incoming and ...
Bharat S. Rawal   +2 more
  +4 more sources

Unclothed Firewalls

Everything about Gravity, 2016
We have previously argued that fluctuations of the Hawking emission rate can cause a black hole event horizon to fluctuate inside the location of a putative firewall, rendering the firewall naked. This assumes that the firewall is located near where the horizon would be expected based on the past evolution of the spacetime.
Pisin Chen   +4 more
openaire   +1 more source

Firewall

2013
Firewall is a critical technology in protecting enterprise network systems and individual hosts. Firewalls can be implemented through a specific software application or as a dedicated appliance. Depending on the security policies in an organization, several firewall implementation architectures are available, each with its advantages and disadvantages.
openaire   +2 more sources

The firewall behind the firewall

Computers & Security, 1998
openaire   +1 more source

Firewall

2019
Frank Rennie, Keith Smyth
openaire   +2 more sources

Home - About - Disclaimer - Privacy