Security Engineering: Difference between revisions

From
Jump to navigation Jump to search
No edit summary
(added link to Virtual Private Networks)
Line 18: Line 18:
*[[Biometry]]
*[[Biometry]]
*[[Network Attack & Defense]] (Introduction, Defense against Network Attacks, Trojans, Viruses, Intrusion Detection, chkrootkit, Nessus)
*[[Network Attack & Defense]] (Introduction, Defense against Network Attacks, Trojans, Viruses, Intrusion Detection, chkrootkit, Nessus)


* [[Virtual Private Networks]] (not part of seminar, but on toppic)

Revision as of 18:03, 25 October 2004

Abstract: As a user of the Internet, you are fortunate to be tied into the world's greatest communication and information exchange - but not without a price. As a result of this connection, your computer, your organization's network, and everywhere the network reaches are all vulnerable to potentially disastrous infiltration by hackers. [W. Cheswick. Firewalls and Internet Security]