International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-1  ( Jan, 2024 )
Past issues
  1. Volume-11,Issue-12  ( Dec, 2023 )
  2. Volume-11,Issue-11  ( Nov, 2023 )
  3. Volume-11,Issue-10  ( Oct, 2023 )
  4. Volume-11,Issue-9  ( Sep, 2023 )
  5. Volume-11,Issue-8  ( Aug, 2023 )
  6. Volume-11,Issue-7  ( Jul, 2023 )
  7. Volume-11,Issue-6  ( Jun, 2023 )
  8. Volume-11,Issue-5  ( May, 2023 )
  9. Volume-11,Issue-4  ( Apr, 2023 )
  10. Volume-11,Issue-3  ( Mar, 2023 )

Statistics report
Apr. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 133
Paper Published : 1552
No. of Authors : 4025
  Journal Paper


Paper Title :
Analysis For Exploring The Scope Of Network Security Techniques In Different Era: A Study

Author :Manjiri N. Muley

Article Citation :Manjiri N. Muley , (2015 ) " Analysis For Exploring The Scope Of Network Security Techniques In Different Era: A Study " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 33-36, Volume-3,Issue-12

Abstract : Network security consists of the provisions and policies embraced by a network administrator to preclude and monitored unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password. In this research paper researcher discuss on different security issues and techniques which will help to improve the security in various era of the world. Keywords- Network Security Techniques, Security Issues, Firewall With Types, Network Types.

Type : Research paper

Published : Volume-3,Issue-12


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-3440   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 92
| Published on 2015-12-15
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY