๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Securing IP networks

โœ Scribed by Sindhu Xirasagar; Masoud Mojtahed


Publisher
Elsevier Science
Year
2010
Tongue
English
Weight
357 KB
Volume
2010
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.

โœฆ Synopsis


Security 13 eliminating the collateral damage of P2P applications. However, this won't address the vulnerability of files held on laptops or homeworkers' PCs used beyond the organisation's boundaries. For the time being, your best defence in these circumstances is education about the dangers. But we all know how effective that is.

References


๐Ÿ“œ SIMILAR VOLUMES


Securing IP networks, part I
โœ Sindhu Xirasagar; Masoud Mojtahed ๐Ÿ“‚ Article ๐Ÿ“… 2009 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 365 KB
Security in IP Networks
โœ Paul McDermott ๐Ÿ“‚ Article ๐Ÿ“… 2000 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 151 KB
Strategic security for IP networks
โœ Helen Meyer ๐Ÿ“‚ Article ๐Ÿ“… 1996 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 110 KB

software to counter the new ones. Viruses fall into two main categories: boot-sector infectors and file infectors. Anti-virus software products generally offer scanning and trapping to protect both servers and workstations. They scan files and look for strings or signatures relating to known viruse

Strategic security for IP networks
โœ Marcus J. Ranum ๐Ÿ“‚ Article ๐Ÿ“… 1997 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 658 KB