Article Fingerprint
ReserarchID
CSTNWSB83M1
Computer security is one of the most expected factor in the current & future industry. Nowadays computers are available in all places from home to big organization where they are all connected to networks. Hence the risk of data security is high whereas many algorithms are emerging according to the needs of various categories of people. Still we can see the security threats. In this paper I am going to present the threat attacks and the mechanisms that were used to secure data.
C. Sridevi. 2018. \u201cA Survey on Network Security\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 17 (GJCST Volume 17 Issue E5): .
Crossref Journal DOI 10.17406/gjcst
Print ISSN 0975-4350
e-ISSN 0975-4172
Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.
Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.
Total Score: 101
Country: India
Subject: Global Journal of Computer Science and Technology - E: Network, Web & Security
Authors: C. Sridevi (PhD/Dr. count: 0)
View Count (all-time): 267
Total Views (Real + Logic): 5841
Total Downloads (simulated): 1601
Publish Date: 2018 01, Fri
Monthly Totals (Real + Logic):
This paper attempted to assess the attitudes of students in
Advances in technology have created the potential for a new
Inclusion has become a priority on the global educational agenda,
Computer security is one of the most expected factor in the current & future industry. Nowadays computers are available in all places from home to big organization where they are all connected to networks. Hence the risk of data security is high whereas many algorithms are emerging according to the needs of various categories of people. Still we can see the security threats. In this paper I am going to present the threat attacks and the mechanisms that were used to secure data.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.