Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "e57fddc6-b2bc-4526-820a-943f71f59ddf"}, "_deposit": {"id": "4157", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4157"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4157", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Implementation of Personal Firewalls for Handheld Devices", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "The Internet has made large amounts ofinformation available to the average computeruser at home, in business and in education. Formany people, having access to this informationis no longer just an advantage, it is essential. Yetconnecting a private network to the Internet canexpose critical or confidential data to maliciousattack from anywhere in the world. Firewallscan protect both individual computers andcorporate networks from hostile intrusion fromthe Internet, but must be understood to be usedcorrectly. A personal firewall is an applicationwhich controls network traffic to and from acomputer, permitting or denyingcommunications based on a security policy.Personal firewalls are typically designed forend-users. Personal Firewall is able to controlnetwork traffic by prompting the user. Personalfirewalls may also provide some levels ofintrusion detection, allow the software toterminate or block connectivity where it suspectsan intrusion is being attempted. This paper isproposed to implement personal firewall used inlaptops, personal computers and PersonalDigital Assistants (PDA) for personal use."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-08-06"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "55296.pdf", "filesize": [{"value": "431 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 431000.0, "url": {"url": "https://meral.edu.mm/record/4157/files/55296.pdf"}, "version_id": "10686bf3-c8ae-48d4-8be1-b072fa72a159"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Wady, Nwe"}, {"subitem_authors_fullname": "Wai, Khaing Khaing"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2009-12-30"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1855"}, "item_title": "Implementation of Personal Firewalls for Handheld Devices", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004157", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-08-06"}, "publish_date": "2019-08-06", "publish_status": "0", "recid": "4157", "relation": {}, "relation_version_is_last": true, "title": ["Implementation of Personal Firewalls for Handheld Devices"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Implementation of Personal Firewalls for Handheld Devices

http://hdl.handle.net/20.500.12678/0000004157
http://hdl.handle.net/20.500.12678/0000004157
ad8f35b2-cadb-4eab-ab8c-b4783dd4d31c
e57fddc6-b2bc-4526-820a-943f71f59ddf
None
Preview
Name / File License Actions
55296.pdf 55296.pdf (431 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 14:14:48.106361
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL