Vulnerability analysis on the network security by using Nessus
Exploitation by attackers whose have breached the network security of some of the world's most venerable institutions and organization had become increased every year including in Faculty of Infon11ation Technology and Multimedia (FTivIM). Kolej Universiti Teknology Tun Huessein Onn (KUiT...
Saved in:
主要作者: | Hamid Ali, Firkhan Ali |
---|---|
格式: | Thesis |
語言: | English |
出版: |
2004
|
主題: | |
在線閱讀: | http://eprints.uthm.edu.my/7646/1/24p%20FIRKHAN%20ALI%20HAMID%20ALI.pdf |
標簽: |
添加標簽
沒有標簽, 成為第一個標記此記錄!
|
相似書籍
-
Analysis and implementation of security algorithms for wireless communications
由: Hassan Ali, Abdinasir
出版: (2010) -
Development of security in wireless network using IPv6
由: Jayapal, Vikneswary
出版: (2009) -
Secure open wireless LAN using point to point protocol
由: Guay, Wei Lin
出版: (2007) -
Bluetooth vulnerabilities on smart phones running in ios and android operating system
由: Fatani, Tariq Abdulaziz D.,
出版: (2013) -
Secure routing using frequency hopping in wireless sensor network
由: Raja Mohd. Radzi, Raja Zahilah
出版: (2007)