Bibliography
Page 1 of 1
Bibliography
Topic: Mobile Networking
Subtopic: Networking Security
1)Bibliography
Bahadur, C. W. (2011). Microsoft TechNet. Recuperado el 31 de October de 2011, de Wireless Networking Security : http://technet.microsoft.com/en-us/library/bb457019.aspx
Quote:
“Many security problems can be traced back to the end user in wired networks. Wireless networks are no exception, and it is typically the IT department's responsibility to protect the end user.” (Bahadur, 2011)
Abstract:
Microsoft is committed to inform users about the problems of wireless networks as well as their safety and methods to prevent problems that arise when using these networks.
2)Bibliography
University, C. M. (22 de June de 2001). Software Enginner Institute. Recuperado el 31 de October de 2011, de Home Networking Security: http://www.cert.org/tech_tips/home_networks.html
Quote:
“A protocol is a well-defined specification that allows computers to communicate across a network. In a way, protocols define the "grammar" that computers can use to "talk" to each other.” (University, 2001)
Abstract:
This paper reports the normal users and those using a mobile phone to connect to internet on the risks and precautions concerning connecting to the internet from a modem or from wireless networks.
3)Bibliography
Cox, J. (24 de October de 2011). ComputerWorld. Recuperado el 31 de October de 2011, de Meru software applies corporate Wi-Fi security to private devices: http://www.computerworld.com/s/article/9221183/Meru_software_applies_corporate_Wi_Fi_security_to_private_devices?taxonomyId=142
Quote:
“The new release of Meru's network operating system, System Director 5.0, can detect and identify a range of unified communications servers, such as Microsoft's Lync 2010, which combine services such as IP-based voice communications, IM, and audio, video and Web conferencing.” (Cox, 2011)
Abstract:
This article discusses the different devices used to connect to wireless networks with which you can have a secure connection
4)Bibliography:
Kaminsky, A. (2011, August 29 ). WiseGeek. Retrieved October 31, 2011 from What is Network Security?: http://www.wisegeek.com/what-is-network-security.htm
Quote:
“A systems administrator will also build a secure firewall for the network, which may include an encryption layer and sentinel software that automatically repels an unauthorized program from gaining access.” (Kaminsky, 2011)
Abstract:
This article is about the importance of knowing the threats as well as practical solutions to protect against possible risks which you will find on the networks.
Subtopic: Networking Security
1)Bibliography
Bahadur, C. W. (2011). Microsoft TechNet. Recuperado el 31 de October de 2011, de Wireless Networking Security : http://technet.microsoft.com/en-us/library/bb457019.aspx
Quote:
“Many security problems can be traced back to the end user in wired networks. Wireless networks are no exception, and it is typically the IT department's responsibility to protect the end user.” (Bahadur, 2011)
Abstract:
Microsoft is committed to inform users about the problems of wireless networks as well as their safety and methods to prevent problems that arise when using these networks.
2)Bibliography
University, C. M. (22 de June de 2001). Software Enginner Institute. Recuperado el 31 de October de 2011, de Home Networking Security: http://www.cert.org/tech_tips/home_networks.html
Quote:
“A protocol is a well-defined specification that allows computers to communicate across a network. In a way, protocols define the "grammar" that computers can use to "talk" to each other.” (University, 2001)
Abstract:
This paper reports the normal users and those using a mobile phone to connect to internet on the risks and precautions concerning connecting to the internet from a modem or from wireless networks.
3)Bibliography
Cox, J. (24 de October de 2011). ComputerWorld. Recuperado el 31 de October de 2011, de Meru software applies corporate Wi-Fi security to private devices: http://www.computerworld.com/s/article/9221183/Meru_software_applies_corporate_Wi_Fi_security_to_private_devices?taxonomyId=142
Quote:
“The new release of Meru's network operating system, System Director 5.0, can detect and identify a range of unified communications servers, such as Microsoft's Lync 2010, which combine services such as IP-based voice communications, IM, and audio, video and Web conferencing.” (Cox, 2011)
Abstract:
This article discusses the different devices used to connect to wireless networks with which you can have a secure connection
4)Bibliography:
Kaminsky, A. (2011, August 29 ). WiseGeek. Retrieved October 31, 2011 from What is Network Security?: http://www.wisegeek.com/what-is-network-security.htm
Quote:
“A systems administrator will also build a secure firewall for the network, which may include an encryption layer and sentinel software that automatically repels an unauthorized program from gaining access.” (Kaminsky, 2011)
Abstract:
This article is about the importance of knowing the threats as well as practical solutions to protect against possible risks which you will find on the networks.
Ruth Fdez- Posts : 15
Join date : 2011-08-16
Location : In my world
Support sheet
Support:
(15/200)
User type: 0
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum