๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Strategic security for IP networks

โœ Scribed by Helen Meyer


Publisher
Elsevier Science
Year
1996
Tongue
English
Weight
110 KB
Volume
15
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.

โœฆ Synopsis


software to counter the new ones. Viruses fall into two main categories: boot-sector infectors and file infectors.

Anti-virus software products generally offer scanning and trapping to protect both servers and workstations. They scan files and look for strings or signatures relating to known viruses. To be effective, a virus scanner must know every virus string, therefore you must make frequent updates to the pattern database to support detection of new viruses. Trapping offers interdiction of unknown or mutated viruses that the scanner doesn't detect. LAN, November 1996,~~. 101-106.


๐Ÿ“œ SIMILAR VOLUMES


Strategic security for IP networks
โœ Marcus J. Ranum ๐Ÿ“‚ Article ๐Ÿ“… 1997 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 658 KB
Securing IP networks
โœ Sindhu Xirasagar; Masoud Mojtahed ๐Ÿ“‚ Article ๐Ÿ“… 2010 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 357 KB

Security 13 eliminating the collateral damage of P2P applications. However, this won't address the vulnerability of files held on laptops or homeworkers' PCs used beyond the organisation's boundaries. For the time being, your best defence in these circumstances is education about the dangers. But we

Security in IP Networks
โœ Paul McDermott ๐Ÿ“‚ Article ๐Ÿ“… 2000 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 151 KB
Securing IP networks, part I
โœ Sindhu Xirasagar; Masoud Mojtahed ๐Ÿ“‚ Article ๐Ÿ“… 2009 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 365 KB
A secure dynamic IP configuration scheme
โœ Uttam Ghosh; Raja Datta ๐Ÿ“‚ Article ๐Ÿ“… 2011 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 757 KB

Secure dynamic IP addressing is a prime requirement for unicast communication between authorized hosts in mobile ad hoc networks (MANETs). Recently, several approaches have been proposed for dynamic addressing scheme. However, most of the approaches rely on broadcasting for address solicitation and/