Description: 基于对等访问控制的安全接入基础结构规范,国家无线网络安全标准草案,捷通公司递交,这是相干内容的说明。-based on the access control and other security access infrastructure standardized, national wireless network security standards Bill Chatong firms to submit, it is coherent content of the note. Platform: |
Size: 1910577 |
Author:songyubo |
Hits:
Description: Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll want this book beside you every step of the way.-Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in Theor y and practice of wireless security, dispelling some of the myths along the way. In do ing so, they provide you with the technical grounding r equired to think about how the rest of the book ap plies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--ba sed systems. you ll want this book beside you every step of the way. Platform: |
Size: 835584 |
Author:秦 |
Hits:
Description: 基于对等访问控制的安全接入基础结构规范,国家无线网络安全标准草案,捷通公司递交,这是相干内容的说明。-based on the access control and other security access infrastructure standardized, national wireless network security standards Bill Chatong firms to submit, it is coherent content of the note. Platform: |
Size: 1909760 |
Author:songyubo |
Hits:
Description: 热插拔设备现在是一个巨大威胁的IT安全。 In this article, we will try to develop a user-mode application to detect device change on the system, ie plug-in a USB drive, iPod, USB wireless network card, etc. The program can also disable any newly plugged devices.在本文中,我们将尝试建立一个用户模式应用检测设备变化的系统,即插件USB驱动器, iPod的USB接口无线网络卡等程序还可以禁用任何新插入设备。 We will get a basic idea on how this works and talk about its limitations at the end of this article.我们将得到一个基本的想法就如何实现这一工程,谈论它的局限性在本月底的文章。
-Hot-pluggable device is now a huge threat to IT security. In this article, we will try to develop a user-mode application to detect device change on the system, ie plug-in a USB drive, iPod, USB wireless network card, etc. The program can also disable any newly plugged devices. In this article, we will attempt to establish a user-mode application of the system changes in test equipment, that is, plug USB drives, iPod Platform: |
Size: 332800 |
Author:mm |
Hits:
Description: BackTrack关于WEP无线网络安全检测方案的使用说明,可以帮助你了解无线网络安全相关知识,并深入了解Backtrack平台的WEP专题使用方法-Backtrack about WEP Wireless Network Security Detect the use of programs that can help you know the wireless network security-related knowledge and insight into backtrack platform to use WEP topic Platform: |
Size: 8854528 |
Author:zhanguoce |
Hits:
Description: 基于无线传感器网络的一种安全路由协议
针对无线传感器网络(WSN)中路由协议的安全隐患,提出了一种安全的路由协议.该路由协
议在传统的定向扩散协议基础上增加安全机制,把整个路由过程分为路由建立和路由更新2个阶段,并对其安
全性进行分析.通过在路由建立阶段使用小区密钥和通信密钥,能为网络选择安全的路由;路由更新能在出
现路由故障时重新建立路由,进一步提高了无线传感器网络的路由安全性能.
-Wireless sensor networks based on a secure routing protocol for wireless sensor network (WSN) routing protocol in the security risk, a routing protocol security. The routing protocol in the traditional orientation to increase the proliferation of agreements based on the security mechanism, the entire routing process is divided into routing updates and routing to establish two stages, and its security analysis. Routing through the cell-key establishment phase and communication using the key security options for network routing routing update to routing in the event of failure to re-establish routing to further improve the routing of wireless sensor network security . Platform: |
Size: 522240 |
Author:池尚琨 |
Hits:
Description: Wireless Sensor Networks are wireless networks where every nodes recolects surrounding information. WSNs have several aplications such as militar survival, traffic control, building security, scientific research in other planets, etc. This project presents a communication protocol for wireless sensor networks based on the ant colony optimization metaheuristic, which uses artificial ant agents that recolects data from all sensor nodes of the network. Every ants fuzes data from a node and sends it to every other sensor and then to the base station. All ants look for a way to go where there is an energy eficient path. Platform: |
Size: 60416 |
Author:rodrigo |
Hits:
Description: O Reilly出版的有关802.11无线网络安全方面的权威著作,是研究无线网络安全技术人员重要的参考书籍-Reilly published on 802.11 wireless network security authority of the book is to study the wireless network security and technical personnel an important reference book Platform: |
Size: 835584 |
Author:matt |
Hits:
Description: Managing Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions. Platform: |
Size: 5405696 |
Author:kinomira |
Hits:
Description: 本文是一篇关于传感器网络安全的综述,详细地从各个层介绍了它的研究情况。-Wireless sensor networks(WSNs) use small nodes with constrained capabilities to sense,collect,and disseminate information in many types of applications.As sensor networks
become wide-spread,security issues become a central concern,
especially in mission-criticaltasks.In this paper,we identify
the
threats and vulnerabilities to WSNs and summarize the defense
methods based on the networking protocol layer analys is ?rst.Then we give a holistic overview of security issues.These issues are divided into seven categories:cryptography,keymanage-
ment,attack detections and preventions,securer outing,secure
location security,secure data fusion,and other security
issues.
Along the way we analyze thead vantages and disadvantages of
current secure schemes in each category.Inaddition,we also summarize the techniques and methods used in these categories,and point out the open research issues and directions in each
area. Platform: |
Size: 348160 |
Author:马宁 |
Hits:
Description: 无线广域网、无线城域网、无线局域网、无线个域网、无线体域网等无线网络
的基本特点,然后从无线网络的开放性、移动性、动态变化以及传输信号的不稳定性和终端设备等方面比较
了无线网络安全和有线网络安全的区别,最后提出并详细解释了解决无线网络安全问题的一般思路。-This article firstly introduces basic characteristics of various wireless networks, such as wireless
wide area network, wireless metropolitan area network, wireless local area network, wireless personal area network,
and wireless body area network. Next, the comparisons of wireless network security and wired network security are
presented in terms of openness, mobility, dynamic topology generation, signal channel instability, and properties of
terminal devices. Finally, a general research method for solving security problems in wireless networks is proposed
and explained in details.
Platform: |
Size: 1179648 |
Author:song |
Hits:
Description: 传感器网络安全现状、面临的安全挑战及其需要解决的安全问题。-The current situations of sensor network security, the security challenges and the security problems were pre-
sented. Platform: |
Size: 290816 |
Author:song |
Hits: