• January 02, 2006 02 Jan'06

    OSI: Securing the Stack, Layer 5 -- session hijacking

    To help secure your systems against session hijacking, this tip walks you through the steps hackers use to hijack active sessions and take over your network. You'll also learn how to detect and prevent session hijacking attacks, a major security ...  Continue Reading

  • January 02, 2006 02 Jan'06

    Free RSS readers: What you need to know

    Do you RSS? If "Really Simple Syndication" is foreign to you, this tip will bring you up to speed by introducing how the increasingly popular news-feed technology works and how you can use it to keep yourself informed.  Continue Reading

  • January 02, 2006 02 Jan'06

    IPSec Authentication and Authorization Models - Chapter 4 of IPSec VPN Design

    IPSec VPN Design by Vijay Bollapragada, Mohamed Khalid and Scott Wainner presents a detailed examination of the design aspects of IPSec protocols that enable secure VPN communication. Divided into three parts, the book provides a solid ...  Continue Reading

  • January 01, 2006 01 Jan'06

    802.11 Learning Guide

    802.11 is perhaps the fastest-changing network protocol around. We've gathered a wealth of information to get you up-to-speed quickly on the various specifications. Learn about all the 802.11 wireless LAN (WLAN) specifications in this learning guide.  Continue Reading

-ADS BY GOOGLE

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close