Advances in Enterprise Information Technology Security provides a broad working knowledge of all the major security issues affecting today's enterprise IT activities. The chapters in this Premier Reference Source are written by some of the world's leading researchers and practitioners in the filed of IT security. There are no simple and complete answers to the issues of security; therefore, multiple techniques, strategies, and applications are thoroughly examined. This reference work presents the tools to address opportunities in the field, and is an all-in-one reference for IT managers, network administrators, researchers, and students.Vigilance is particularly recommended when using a Bluetooth wireless keypad: keyboarded codes, in particular ... It consists to send spama#39;s on the screen ofbistandard GSM-Bluetooth mobile phones that are in range of the spammer. ... By this means, the hacker gets the coordinates of the serv ice prov ider and the login/password that a victim close from him has just ... FUTURE TRENDS ac 802.11 technology: The 802.1 1 technology is now mature and its variant 802.1 lg with 54 Mbpsanbsp;...
|Title||:||Advances in enterprise information technology security|
|Author||:||Djamel Khadraoui, Francine Herrmann|
|Publisher||:||Igi Global - 2007|