搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: Avishai Wool
DOI:
关键词:
摘要: … least one firewall, and often many more. However, the protection that these firewalls provide is … Therefore, testing, auditing, or reverse-engineering existing firewall configurations should …
,2008, 引用: 0
GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit"),2003, 引用: 0
,2004, 引用: 48
usenix conference on hot topics in security,2009, 引用: 5
,2014, 引用: 2
usenix large installation systems administration conference,2010, 引用: 178
usenix large installation systems administration conference,2005, 引用: 11
Journal of Convergence Information Technology,2008, 引用: 6
LISA'08 Proceedings of the 22nd conference on Large installation system administration conference,2008, 引用: 5
,2007, 引用: 34