TITLE

¿Sus activos tecnologicos le están costando?

PUB. DATE
October 2004
SOURCE
Entrepreneur Mexico;oct2004, Vol. 12 Issue 10, p136
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
No abstract available.
ACCESSION #
22990394

 

Related Articles

  • New spec plugs LAN security gap. Duffy, Jim; Fontana, John // Network World;08/23/99, Vol. 16 Issue 34, p1 

    Focuses on the proposed Extensible Authentication Protocol Over Ethernet network standard supported by a group of computer vendors to help protect enterprise networks of companies from internal attack. Authentication of users on local area networks under the proposal; Mechanism in which...

  • THE NAMESPACE OPTION. Tsirigotis, Panos // Communications News;May2007, Vol. 44 Issue 5, p14 

    The article examines nameplace technology, a virtual layer in information storage infrastructure which decouples the relationship between a directory and its physical location in the computer system, allowing system users easier access. The namespace technologies for Windows and UNIX operating...

  • A SURVEY ON AUTHENTICATION AND KEY AGREEMENT PROTOCOLS IN HETEROGENEOUS NETWORKS. Aiash, Mahdi; Mapp, Glenford; Lasebae, Aboubaker // International Journal of Network Security & Its Applications;Jul2012, Vol. 4 Issue 4, p199 

    Unlike current closed systems such as 2nd and 3rd generations where the core network is controlled by a sole network operator, multiple network operators will coexist and manage the core network in Next Generation Networks (NGNs). This open architecture and the collaboration between different...

  • Challenge Handshake Authentication Protocol.  // Network Dictionary;2007, p94 

    A definition of the term "Challenge Handshake Authentication Protocol" (CHAP) is presented. It refers to a protocol used to periodically verify the identity of the peer using a three-way handshake and is done upon establishment of the initial link and may be repeated any time after establishing...

  • Protocols Guide: TCP/IP Protocols: Application Layer Protocols: RMON: Remote Monitoring MIBs (RMON1 and RMON2).  // Network Protocols Handbook;2007, p26 

    Information on Remote Monitoring (RMON) Management Information Base (MIB) versions 1 and 2 from the fourth edition of the "Network Protocols Handbook," is presented. RMON is a standard monitoring specification that enables various network monitors and console systems to exchange...

  • Completing The Secure Application Access Puzzle. Piscitello, David // Business Communications Review;Jul2005, Vol. 35 Issue 7, p46 

    The article reports that workforce mobility is a relatively recent phenomenon, but the phrase itself has already become a tired one. Equally tired are the IT staffs of large organizations that are still struggling to deliver mobility in a secure way, using virtual private networks based on...

  • Performance Evaluation of Mobile Ad Hoc Network Routing Protocols under Black Hole Attack. Singh, Harmandeep; Singh, Gurpreet; Singh, Manpreet // International Journal of Computer Applications;Mar2012, Vol. 42, p1 

    There are several routing protocols that have been proposed for the possible deployment of MANETs in many fields like military, government and commercial applications. While the routing aspects of MANETs are already well understood but the research activities about the security in MANETs are...

  • Striking a balance. Schwartz, Susana // Telecom Asia;Oct2009 Supplement, Vol. 20, p8 

    The article focuses on the need for service providers to think of the vulnerabilities of network-to-enterprise connections which could offset flexibility and productivity. It states that Session Initiation Protocol (SIP) has proven to be vulnerable to enterprises and their service providers. It...

  • IOMEGA UNVEILS "OFFICESCREEN" SMB-FOCUSED MANAGED SECURITY.  // Computer Security Update;Dec2006, p7 

    The article focuses on the OfficeScreen managed security solutions offered by San Jose, California-based Iomega Corp. for small and medium businesses (SMBs). Iomega's OfficeScreen suite of SMB-focused managed security solutions incorporates security appliances from Juniper Networks Inc. and...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics