International Journal of Advance Computational Engineering and Networking (IJACEN)
.
current issues
Volume-8,Issue-7  ( Jul, 2020 )
Past issues
  1. Volume-8,Issue-6  ( Jun, 2020 )
  2. Volume-8,Issue-5  ( May, 2020 )
  3. Volume-8,Issue-4  ( Apr, 2020 )
  4. Volume-8,Issue-3  ( Mar, 2020 )
  5. Volume-8,Issue-2  ( Feb, 2020 )
  6. Volume-8,Issue-1  ( Jan, 2020 )
  7. Volume-7,Issue-12  ( Dec, 2019 )
  8. Volume-7,Issue-11  ( Nov, 2019 )
  9. Volume-7, Issue-10  ( Oct, 2019 )
  10. Volume-7, Issue-9  ( Sep, 2019 )

Statistics report
Sep. 2020
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 90
Paper Published : 1248
No. of Authors : 3136
  Journal Paper

Paper Title
Analysis For Exploring The Scope Of Network Security Techniques In Different Era: A Study

Abstract
Network security consists of the provisions and policies embraced by a network administrator to preclude and monitored unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password. In this research paper researcher discuss on different security issues and techniques which will help to improve the security in various era of the world. Keywords- Network Security Techniques, Security Issues, Firewall With Types, Network Types.


Author - Manjiri N. Muley

| PDF |
Viewed - 84
| Published on 2015-12-15
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY