Our space
Would you like to react to this message? Create an account in a few clicks or log in to continue.
Clock
May 2024
MonTueWedThuFriSatSun
  12345
6789101112
13141516171819
20212223242526
2728293031  

Calendar Calendar

Pollock

Bibliography

Go down

Bibliography Empty Bibliography

Post  Ruth Fdez Mon Oct 31, 2011 11:27 am

Topic: Mobile Networking
Subtopic: Networking Security



1)Bibliography

Bahadur, C. W. (2011). Microsoft TechNet. Recuperado el 31 de October de 2011, de Wireless Networking Security : http://technet.microsoft.com/en-us/library/bb457019.aspx

Quote:
“Many security problems can be traced back to the end user in wired networks. Wireless networks are no exception, and it is typically the IT department's responsibility to protect the end user.” (Bahadur, 2011)

Abstract:
Microsoft is committed to inform users about the problems of wireless networks as well as their safety and methods to prevent problems that arise when using these networks.

2)Bibliography
University, C. M. (22 de June de 2001). Software Enginner Institute. Recuperado el 31 de October de 2011, de Home Networking Security: http://www.cert.org/tech_tips/home_networks.html

Quote:
“A protocol is a well-defined specification that allows computers to communicate across a network. In a way, protocols define the "grammar" that computers can use to "talk" to each other.” (University, 2001)

Abstract:
This paper reports the normal users and those using a mobile phone to connect to internet on the risks and precautions concerning connecting to the internet from a modem or from wireless networks.

3)Bibliography
Cox, J. (24 de October de 2011). ComputerWorld. Recuperado el 31 de October de 2011, de Meru software applies corporate Wi-Fi security to private devices: http://www.computerworld.com/s/article/9221183/Meru_software_applies_corporate_Wi_Fi_security_to_private_devices?taxonomyId=142

Quote:
“The new release of Meru's network operating system, System Director 5.0, can detect and identify a range of unified communications servers, such as Microsoft's Lync 2010, which combine services such as IP-based voice communications, IM, and audio, video and Web conferencing.” (Cox, 2011)

Abstract:
This article discusses the different devices used to connect to wireless networks with which you can have a secure connection

4)Bibliography:
Kaminsky, A. (2011, August 29 ). WiseGeek. Retrieved October 31, 2011 from What is Network Security?: http://www.wisegeek.com/what-is-network-security.htm


Quote:
“A systems administrator will also build a secure firewall for the network, which may include an encryption layer and sentinel software that automatically repels an unauthorized program from gaining access.” (Kaminsky, 2011)

Abstract:
This article is about the importance of knowing the threats as well as practical solutions to protect against possible risks which you will find on the networks.
Ruth Fdez
Ruth Fdez

Posts : 15
Join date : 2011-08-16
Location : In my world

Support sheet
Support Support:
Bibliography Left_bar_bleue15/200Bibliography Empty_bar_bleue  (15/200)
User type: 0

Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum