Entry Cart-Mitchell:1992:BIF from opencomp.bib
Last update: Wed Nov 9 16:25:04 MST 2011
Top |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Cart-Mitchell:1992:BIF,
author = "Smoot Cart-Mitchell and John S. Quarterman",
title = "{Building Internet Firewalls}",
journal = j-UNIX-WORLD,
volume = "9",
number = "2",
pages = "93--??",
month = feb,
year = "1992",
ISSN = "0739-5922",
bibdate = "Sat Jan 27 06:20:21 MST 1996",
abstract = "An Internet connection gives you access to the world's
biggest computer network and the potential security
threats that come with it. This tutorial shows you how
to insulate your system from intruders",
acknowledgement = ack-nhfb,
}
Related entries
- access,
8(11)123,
9(3)59,
11(9)95,
11(12)75,
12(2)15,
12(2)90,
12(4)57
- biggest,
8(9)79,
12(4)44
- building,
8(10)70,
9(4)47,
12(10)72
- come,
8(10)54,
8(12)15,
9(7)61,
9(9)77,
9(9)81,
9(10)73,
9(10)89,
9(11)99,
10(3)57,
10(3)111,
11(10)62,
12(1)63,
12(4)67
- computer,
8(9)52,
8(9)72,
8(10)60,
9(1)55,
9(3)34,
9(4)69,
9(7)55,
9(8)62,
9(9)81,
10(1)57,
11(9)42,
11(10)74,
11(11)77,
11(11)113,
12(1)112,
12(2)15,
12(2)70,
12(3)32,
12(7)44,
12(7)44-1,
12(12)27
- connection,
8(11)77,
9(4)91,
11(9)113,
11(10)62,
11(10)83,
11(10)113,
12(2)93
- firewall,
11(9)95,
11(10)62,
11(10)83,
12(5)61,
12(5)88
- give,
9(2)61,
9(2)67,
9(3)59,
9(4)91,
9(8)85,
9(9)85,
9(10)73,
10(1)46,
10(2)90,
10(3)109,
12(3)50,
12(8)60
- how,
8(9)52,
8(9)72,
8(9)91,
8(9)113,
8(10)79,
8(10)85,
8(10)111,
8(11)123,
8(12)60,
8(12)95,
9(3)85,
9(4)59,
9(4)91,
9(7)117,
9(8)85,
9(10)73,
10(2)47,
10(2)53,
10(3)57,
10(3)101,
11(9)56,
11(9)120,
11(10)29,
11(10)99,
11(10)105,
11(11)21,
11(11)42,
11(11)81,
11(12)29,
12(1)40,
12(3)42,
12(3)50,
12(3)73,
12(5)19,
12(5)30,
12(5)50,
12(5)61,
12(5)88,
12(5)92,
12(6)38,
12(11)37,
12(11)74
- Internet,
8(9)79,
9(4)91,
9(9)99,
10(3)61,
11(9)95,
11(10)21,
11(10)62,
11(10)74,
11(11)35,
11(11)113,
12(1)50,
12(2)15,
12(2)52,
12(2)70,
12(2)87,
12(2)90,
12(3)15,
12(3)112,
12(4)15,
12(5)61,
12(5)94,
12(6)89,
12(11)51,
12(11)74
- intruders,
12(5)88
- it,
8(12)95,
9(2)46,
11(9)42,
12(5)55,
12(5)68
- network,
8(9)79,
8(10)41,
8(10)70,
8(11)123,
8(12)60,
9(1)103,
9(3)41,
9(4)65,
9(8)43,
9(10)97,
9(11)81,
9(11)93,
10(3)101,
11(9)31,
11(9)74,
11(10)62,
11(10)74,
11(10)83,
11(10)87,
11(11)113,
11(12)69,
11(12)99,
11(12)100,
11(12)102,
11(12)104,
12(1)100,
12(2)27,
12(4)63,
12(4)67,
12(5)68,
12(5)88,
12(6)15,
12(6)51,
12(6)54,
12(7)44,
12(7)44-1,
12(9)49,
12(10)72
- potential,
9(2)46,
12(7)15
- security,
9(1)103,
9(3)85,
9(4)59,
9(8)85,
9(10)73,
11(10)21,
11(12)75,
12(5)92
- show,
8(12)51,
8(12)95,
10(3)94,
11(10)35,
12(3)65
- tutorial,
8(12)95,
9(1)103,
9(3)85,
10(1)70-1,
10(2)62-1
- world,
8(9)79,
8(11)77,
9(3)34,
9(10)55,
10(3)61,
11(9)93,
11(10)99,
12(3)94,
12(5)27,
12(9)53,
12(11)51