Security and the enterprise network

被引:0
|
作者
Banes, David [1 ]
机构
[1] 3Com's Premises Distribution Div, Hemel Hempstead, United Kingdom
关键词
2;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:198 / 206
相关论文
共 50 条
  • [1] Enterprise network security - A new approach
    Skudrna V.J.
    Lou T.M.
    Journal of Network and Systems Management, 1999, 7 (1) : 5 - 8
  • [2] Construction of enterprise network of high security
    Wang, Lin'ge
    Wang, Yu
    2007 International Symposium on Computer Science & Technology, Proceedings, 2007, : 1171 - 1173
  • [3] Computer network security for the radiology enterprise
    Eng, J
    RADIOLOGY, 2001, 220 (02) : 303 - 309
  • [4] Research on Comprehensive Enterprise Network Security
    Li, Wenzheng
    Zhu, Hongdan
    PROCEEDINGS OF 2021 IEEE 11TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2021), 2021, : 204 - 209
  • [5] Mobile Security Solution for Enterprise Network
    Kravets, Alla G.
    Ngoc Duong Bui
    Al-Ashval, Mohammed
    KNOWLEDGE-BASED SOFTWARE ENGINEERING, JCKBSE 2014, 2014, 466 : 371 - 382
  • [6] Network Security Design for Manufacturing Enterprise
    He, Jiangmin
    Yao, Rihuang
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS, ROBOTICS AND AUTOMATION (ICMRA 2015), 2015, 15 : 1015 - 1020
  • [7] VPN Enterprise Network Construction Based on Security
    Zhou, Jinyi
    PROCEEDINGS OF THE 2016 5TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS AND COMPUTER SCIENCE, 2016, 80 : 704 - 707
  • [8] Towards Policy Unification for Enterprise Network Security
    Yakasai, Sadiq T.
    Zheng, Fu-Chun
    Guy, Chris G.
    2017 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (IEEE NETSOFT), 2017,
  • [9] Protecting against threats to enterprise network security
    Department of Accounting and Information Technology, York College, City University of New York, United States
    Software World, 2006, 2 (14-15):
  • [10] A risk assessment model for enterprise network security
    Yang, Fu-Hong
    Chi, Chi-Hung
    Liu, Lin
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 293 - 301