Showing 1 - 10 of 40
Persistent link: https://www.econbiz.de/10001807988
Persistent link: https://www.econbiz.de/10000741338
Persistent link: https://www.econbiz.de/10000698136
Persistent link: https://www.econbiz.de/10000706102
Persistent link: https://www.econbiz.de/10000728399
Persistent link: https://www.econbiz.de/10003355987
Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the … ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP … poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man …
Persistent link: https://www.econbiz.de/10008837552
The purpose of this paper is to present some basic aspects of the virtual companies, structured as networks for value creation. Actually, we focus on temporary networks of independent companies, i.e. suppliers, customers, even some rivals, which are linked by information technology to share...
Persistent link: https://www.econbiz.de/10005030139
economy is taking shape, one based on Information Technology and computer networks, one where the Internet plays an essential …
Persistent link: https://www.econbiz.de/10008837563
A very good method that can be used to protect a private network is the implementation of a firewall between Internet … and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at … a certification authority. Secure data transport over the Internet is done by using encryption methods. …
Persistent link: https://www.econbiz.de/10009416286