Vulnerability analysis on the network security by using Nessus
Exploitation by attackers whose have breached the network security of some of the world's most venerable institutions and organization had become increased every year including in Faculty of Infon11ation Technology and Multimedia (FTivIM). Kolej Universiti Teknology Tun Huessein Onn (KUiT...
Saved in:
Main Author: | Hamid Ali, Firkhan Ali |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2004
|
Subjects: | |
Online Access: | http://eprints.uthm.edu.my/7646/1/24p%20FIRKHAN%20ALI%20HAMID%20ALI.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Analysis and implementation of security algorithms for wireless communications
by: Hassan Ali, Abdinasir
Published: (2010) -
Development of security in wireless network using IPv6
by: Jayapal, Vikneswary
Published: (2009) -
Secure open wireless LAN using point to point protocol
by: Guay, Wei Lin
Published: (2007) -
Bluetooth vulnerabilities on smart phones running in ios and android operating system
by: Fatani, Tariq Abdulaziz D.,
Published: (2013) -
Secure routing using frequency hopping in wireless sensor network
by: Raja Mohd. Radzi, Raja Zahilah
Published: (2007)