Securing IP networks
โ Scribed by Sindhu Xirasagar; Masoud Mojtahed
- Publisher
- Elsevier Science
- Year
- 2010
- Tongue
- English
- Weight
- 357 KB
- Volume
- 2010
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
โฆ Synopsis
Security 13 eliminating the collateral damage of P2P applications. However, this won't address the vulnerability of files held on laptops or homeworkers' PCs used beyond the organisation's boundaries. For the time being, your best defence in these circumstances is education about the dangers. But we all know how effective that is.
References
๐ SIMILAR VOLUMES
software to counter the new ones. Viruses fall into two main categories: boot-sector infectors and file infectors. Anti-virus software products generally offer scanning and trapping to protect both servers and workstations. They scan files and look for strings or signatures relating to known viruse