A typical DMZ and firewall securing private network against hackers 

A typical DMZ and firewall securing private network against hackers 

Source publication
Article
Full-text available
Due to proliferation on the usage of mobile computing devices such as mobile phones, smart phones, Tablet PCs and Portable Digital Assistant (PDA) in Nigeria and world over, it is expected that these light-weight, powerful, low-cost computing devices will pave way for data-driven applications in mobile environments. These portal mobile devices can...

Similar publications

Research
Full-text available
Due to proliferation on the usage of mobile computing devices such as mobile phones, smart phones, Tablet PCs and Portable Digital Assistant (PDA) in Nigeria and world over, it is expected that these lightweight , powerful, low-cost computing devices will pave way for data-driven applications in mobile environments. These portal mobile devices can...
Article
Full-text available
The goal of this study is to develop a blended learning in at-home and in-school education of information ethics using tablet PCs and to evaluate the effectiveness of the lesson. Information technology such as the internet and smart phones in society has been progressing speedily. On the other hand, the negative effects of information technology, s...
Conference Paper
Full-text available
Today cell phones are turning into a basic part for human-life in their day-to-day activities. According to recent studies it was mentioned that Mobile Cloud Computing (MCC) will be incorporated by most of the corporate and tele-communication sectors to meet their business requirements effectively. In MCC, the mobile devices will interact with the...