Vulnerability analysis on the network security by using Nessus
Exploitation by attackers whose have breached the network security of some of the world's most venerable institutions and organization had become increased every year including in Faculty of Infon11ation Technology and Multimedia (FTivIM). Kolej Universiti Teknology Tun Huessein Onn (KUiT...
Saved in:
主要作者: | Hamid Ali, Firkhan Ali |
---|---|
格式: | Thesis |
语言: | English |
出版: |
2004
|
主题: | |
在线阅读: | http://eprints.uthm.edu.my/7646/1/24p%20FIRKHAN%20ALI%20HAMID%20ALI.pdf |
标签: |
添加标签
没有标签, 成为第一个标记此记录!
|
相似书籍
-
Analysis and implementation of security algorithms for wireless communications
由: Hassan Ali, Abdinasir
出版: (2010) -
Development of security in wireless network using IPv6
由: Jayapal, Vikneswary
出版: (2009) -
Secure open wireless LAN using point to point protocol
由: Guay, Wei Lin
出版: (2007) -
Bluetooth vulnerabilities on smart phones running in ios and android operating system
由: Fatani, Tariq Abdulaziz D.,
出版: (2013) -
Secure routing using frequency hopping in wireless sensor network
由: Raja Mohd. Radzi, Raja Zahilah
出版: (2007)