TITLE

Storming the Firewall Wirelessly

AUTHOR(S)
Smith, Brad
PUB. DATE
September 2001
SOURCE
Wireless Week;9/3/2001, Vol. 7 Issue 36, p22
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Focuses on security solutions that will help traveling employees enter their corporate networks using wireless devices. Importance of wireless communication to business expansion; Information on such security products; Various comments on the matter.
ACCESSION #
5335936

 

Related Articles

  • HACKING INN. Lewis, Peter // Fortune International (Europe);1/26/2004, Vol. 149 Issue 1, p26 

    Reports on security deficiencies in protecting computers from being hacked in hotel environments. Vulnerability of the computers of business travelers linked through hotel Internet connections; How hackers can break into the computers; Advice about protecting computers linked to public networks.

  • HACKING INN. Lewis, Peter // Fortune;1/26/2004, Vol. 149 Issue 2, p46 

    Reports on security deficiencies in protecting computers from being hacked in hotel environments. Vulnerability of the computers of business travelers linked through hotel Internet connections; How hackers can break into the computers; Advice about protecting computers linked to public networks....

  • Safety net. Frary, Mark // Business Travel World;Sep2003, p45 

    Focuses on the security concerns over the use of the Internet or wireless systems by business travelers to access their corporate networks. Findings of the 2002 Wireless Security Survey, which explored the security risks of wireless access points that are operating in London, England; Terms...

  • Security Tips for Business Travelers.  // Professional Safety;May2014, Vol. 59 Issue 5, p72 

    The article offers computer security advice for business travelers, including the use of security software, backing up of data, and clearing personal information when using public computers.

  • Intrusion Prevention Systems. Sequeira, Dinesh // Business Communications Review;Mar2003, Vol. 33 Issue 3, p36 

    Focuses on the concept of intrusion detection systems (IDS) in the U.S. Importance of the system for network security; Role of IDS in identifying security threats; Advantages of anomaly detection. INSET: Seven Key Definitions.

  • SAFE! (FOR NOW). Henricks, Mark // Entrepreneur;Mar2003, Vol. 31 Issue 3, p34 

    Focuses on the reliability of Wi-Fi Protected Access (WPA) in ensuring the security of Wi-Fi networks. Capacity of WPA to stiffen encryption to block hackers from reading intercepted messages; Authentication and encryption capacity of WPA; Need to replace Wi-Fi card.

  • EYES WIDE OPEN. McKenna, Ted // Telecommunications - Americas Edition;Sep2002, Vol. 36 Issue 10, p19 

    Reports the cyberspace security among carriers and customers in the U.S. Threat of hack site on information in telecom networks; Impact of the denial-of-service attack on the SS7 network and telecom protocols on the service disruption of the La Guardia airport; Implication of cyberspace...

  • Security. Gilmer, Brad // Broadcast Engineering;Aug2002, Vol. 44 Issue 8, p34 

    Focuses on steps to keep networks secure while still taking advantage of the benefits of networking. Avoidance of connections to the Internet; Use of antivirus protection; Computer firewalls; Checking of software updates frequently.

  • Rethinking network security. Vasan, Robin // Network World;9/2/2002, Vol. 19 Issue 35, p37 

    Focuses on computer network security. Evolution of computer networks; Traffic running across corporate local area networks; Layers of computer infrastructure.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics