Listing 1 - 10 of 407 << page
of 41
>>
Sort by

Book
Voice over IP security
Author:
ISBN: 9781587054693 1587054698 Year: 2009 Publisher: Indianapolis, Ind.: Cisco Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Periodical
International journal of network security & its applications.
Author:
ISSN: 09749330 Year: 2009 Publisher: [Madras, India] : Academy and Industry Research Collaboration Center (AIRCC)

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
2009 International Conference on Network and Service Security : 24-26 June 2009.
Author:
Year: 2009 Publisher: New York : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cryptography is commonly used to provide link-layer message authentication in wireless sensor networks. However, keys are susceptible to compromise and introduce management requirements. Avoiding keys can therefore deliver security and management bene?ts. Our paper introduces and discusses the feasibility of RTTMAP, a protocol that uses radio frequency ranging for message authentication. RTTMAP uses secure round-trip-time with hash functions to determine the minimum distance of a transmitter. Transmissions from outside of a de?ned radius are rejected without requiring keys. We provide our motivation, an evaluation of our ?ndings and continuing research challenges. We ?nd RTTMAP offers higher security, costs about twice the energy of keyed message authentication but complicates MAC protocol selection.

Network access control for dummies®
Authors: --- ---
ISBN: 9780470501344 0470501340 Year: 2009 Publisher: Hoboken, New Jersey : Wiley Publishing, Inc.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Network access control (NAC) is how you manage network securitywhen your employees, partners, and guests need to access yournetwork using laptops and mobile devices. Network Access ControlFor Dummies is where you learn how NAC works, how to implementa program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in yourenvironment, identify and apply NAC standards, and extend NAC forgreater network security. Along the way you'll becomefamiliar with what NAC is (and what it isn't) as well as thekey business drivers for deploying NAC. Learn the steps of a


Book
TSA's role in general aviation security
Author:
Year: 2009 Publisher: Washington, DC : Dept. of Homeland Security, Office of Inspector General,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Project delays prevent EPA from implementing an agency-wide information security vulnerability management program : audit report.
Authors: ---
Year: 2009 Publisher: [Washington, D.C.] : U.S. Environmental Protection Agency, Office of Inspector General,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Periodical
International Conference on e-Business and Information System Security : [proceedings].
Authors: --- --- ---
ISSN: 21615977 Year: 2009 Publisher: Piscataway, NJ : Institute of Electrical and Electronic Engineers

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
The Mac hacker's handbook
Authors: ---
ISBN: 9786612114397 9781282114395 1282114395 9780470481479 0470481471 Year: 2009 Publisher: Indianapolis, Ind. : Wiley Pub.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system-and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard's security defenses, what attacks aren't, and how to best handle those


Book
2009 Proceedings of the 1st International Workshop on Security and Communication Networks
Authors: ---
ISBN: 1612841686 8299710510 9788299710510 Year: 2009 Publisher: [Place of publication not identified] I E E E

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Audit of the information technology security controls of the U.S. Office of Personnel Management's enterprise human resources integration data warehouse : FY 2009.
Author:
Year: 2009 Publisher: Washington, DC : U.S. Office of Personnel Management, Office of the Inspector General, Office of Audits,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 407 << page
of 41
>>
Sort by