Clock
December 2018
MonTueWedThuFriSatSun
     12
3456789
10111213141516
17181920212223
24252627282930
31      

Calendar Calendar

Pollock

Bibliography

Go down

Bibliography

Post  Ruth Fdez on Mon Oct 31, 2011 11:27 am

Topic: Mobile Networking
Subtopic: Networking Security



1)Bibliography

Bahadur, C. W. (2011). Microsoft TechNet. Recuperado el 31 de October de 2011, de Wireless Networking Security : http://technet.microsoft.com/en-us/library/bb457019.aspx

Quote:
“Many security problems can be traced back to the end user in wired networks. Wireless networks are no exception, and it is typically the IT department's responsibility to protect the end user.” (Bahadur, 2011)

Abstract:
Microsoft is committed to inform users about the problems of wireless networks as well as their safety and methods to prevent problems that arise when using these networks.

2)Bibliography
University, C. M. (22 de June de 2001). Software Enginner Institute. Recuperado el 31 de October de 2011, de Home Networking Security: http://www.cert.org/tech_tips/home_networks.html

Quote:
“A protocol is a well-defined specification that allows computers to communicate across a network. In a way, protocols define the "grammar" that computers can use to "talk" to each other.” (University, 2001)

Abstract:
This paper reports the normal users and those using a mobile phone to connect to internet on the risks and precautions concerning connecting to the internet from a modem or from wireless networks.

3)Bibliography
Cox, J. (24 de October de 2011). ComputerWorld. Recuperado el 31 de October de 2011, de Meru software applies corporate Wi-Fi security to private devices: http://www.computerworld.com/s/article/9221183/Meru_software_applies_corporate_Wi_Fi_security_to_private_devices?taxonomyId=142

Quote:
“The new release of Meru's network operating system, System Director 5.0, can detect and identify a range of unified communications servers, such as Microsoft's Lync 2010, which combine services such as IP-based voice communications, IM, and audio, video and Web conferencing.” (Cox, 2011)

Abstract:
This article discusses the different devices used to connect to wireless networks with which you can have a secure connection

4)Bibliography:
Kaminsky, A. (2011, August 29 ). WiseGeek. Retrieved October 31, 2011 from What is Network Security?: http://www.wisegeek.com/what-is-network-security.htm


Quote:
“A systems administrator will also build a secure firewall for the network, which may include an encryption layer and sentinel software that automatically repels an unauthorized program from gaining access.” (Kaminsky, 2011)

Abstract:
This article is about the importance of knowing the threats as well as practical solutions to protect against possible risks which you will find on the networks.
avatar
Ruth Fdez

Posts : 15
Join date : 2011-08-16
Location : In my world

Support sheet
Support Support:
15/200  (15/200)
User type: 0

Back to top Go down

Back to top


 
Permissions in this forum:
You cannot reply to topics in this forum