An MMO Based Approach to Detect and Prevent Intrusion

Provided by: International Journal of Computer Applications
Topic: Security
Format: PDF
Due to quick advances in network and communication engineering, fast development of open source Internet network tools and technologies, per hour ratio of the exchange of privacy or confidentiality of the data in the form simple or complex files over the network, the government's planning or any confidential amendment information, or any other important evidence of the agreement or deal If all these has been attacked or stolen by the malicious as a intention of tampering, will results catastrophic penalty for the society.

Find By Topic