 |
|
 Mobile and Wireless Network Security and Privacy
Currently the mobile wireless technology is experiencing rapid
growth. However the major challenge for deployment of this technology
with its special characteristics is securing the existing and future
vulnerabilities. Major security and privacy issues for standard wireless
networks include the authentication of wireless clients and... |  |  Document Security: Protecting Physical and Electronic Content
Several electronic layers exist in most documents, a fact overlooked
by many writers. Probing these sublayers often reveals information
not intended for release by the author. Documents in electronic formats
create a “palimpsest” that even semiskilled investigators can probe for
sensitive data.
Palimpsest seems... |  |  Network Defense: Perimeter Defense Mechanisms
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |
|
|
|
|
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 |