首页 | 本学科首页   官方微博 | 高级检索  
     


Giga Security
Authors:Jon David
Affiliation:
Available online 17 December 2002.
Abstract:The flow of information, within organizations, between networks, and from single users to other individuals and networks, is commonly at rates that only a few years ago were dreams. Earlier methods for the detection and prevention of malicious activities are anywhere from inefficient to unworkable with transmissions at the giga speeds that are prevalent today. This writing sets forth the problems and threats associated with these new high speed transmissions, and presents methodologies and systems for treating them.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号