Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Inactivation Of Soybean Peroxidase During Sodium Azide Oxidation: A Comparative Study, Mohamed Yehia Zakaria Aboul Eish Jan 1998

Inactivation Of Soybean Peroxidase During Sodium Azide Oxidation: A Comparative Study, Mohamed Yehia Zakaria Aboul Eish

Dissertations and Theses @ UNI

Azide ion is a mechanism-based inactivator of a number of peroxidases. However, there are often variations in the manner in which inactivation occurs. Soybean Peroxidase (SBP) is found in the plant's seed coat. Unlike many other peroxidases, a single enzyme rather than several isozymes are produced thus making more simple the purification and characterization of the enzyme. In this research it was shown that, as with other peroxidases, SBP is inactivated by azide during turnover. During azide oxidation SBP forms a ferrous-NO intermediate. In this respect, SBP is similar to the lignin peroxidases from Phanerochaete chrysosporium which also form ferrous-NO …


Network Security: An Evaluation Of Security Policies And Firewall Implementations, Melanie L. Abbas Jan 1998

Network Security: An Evaluation Of Security Policies And Firewall Implementations, Melanie L. Abbas

Dissertations and Theses @ UNI

This paper begins focusing on network security issues. The areas of physical security, access security, and connection security are explored. Connection security provides the biggest need for improvement in the entire security field. This type of security is managed best with firewall implementations. Various firewall models are discussed.

Software evaluations were performed on three different commercial Internet security tools. The software was compared on the basis of ease of installation, functionality, level of security provided, and output available. In summary, the value of the firewall is dependent on the need to implement a firewall in an organization.

However, a security …