Listing 1 - 10 of 407 | << page >> |
Sort by
|
Choose an application
Internet telephony --- Security measures --- Security measures. --- Internet telephony - Security measures
Choose an application
Choose an application
Cryptography is commonly used to provide link-layer message authentication in wireless sensor networks. However, keys are susceptible to compromise and introduce management requirements. Avoiding keys can therefore deliver security and management bene?ts. Our paper introduces and discusses the feasibility of RTTMAP, a protocol that uses radio frequency ranging for message authentication. RTTMAP uses secure round-trip-time with hash functions to determine the minimum distance of a transmitter. Transmissions from outside of a de?ned radius are rejected without requiring keys. We provide our motivation, an evaluation of our ?ndings and continuing research challenges. We ?nd RTTMAP offers higher security, costs about twice the energy of keyed message authentication but complicates MAC protocol selection.
Choose an application
Network access control (NAC) is how you manage network securitywhen your employees, partners, and guests need to access yournetwork using laptops and mobile devices. Network Access ControlFor Dummies is where you learn how NAC works, how to implementa program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in yourenvironment, identify and apply NAC standards, and extend NAC forgreater network security. Along the way you'll becomefamiliar with what NAC is (and what it isn't) as well as thekey business drivers for deploying NAC. Learn the steps of a
Choose an application
Airports --- Aeronautics, Commercial --- Security measures --- United States. --- Security measures.
Choose an application
Computer security --- Computer networks --- Security measures --- United States. --- Security measures.
Choose an application
Electronic commerce --- Data protection --- Data protection. --- Security measures --- Security measures.
Choose an application
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system-and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard's security defenses, what attacks aren't, and how to best handle those
Macintosh (Computer) --- Computer security. --- Security measures. --- Mac OS --- Security measures.
Choose an application
Choose an application
Listing 1 - 10 of 407 | << page >> |
Sort by
|