VoIP Articles -
New to VoIP? VoIP Articles will help you understand what's important in VoIP.
|
InfoSec Directory
If you are searching for Network Security, look no further
than the InfoSec Directory on IT-Observer, where you will
find the latest whitepapers and articles on Network Security.
Network Security Wireless Encryption
5 Most Recent Articles
Passive Visual Fingerprinting of Network Attack Tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attackers as well as the identifiable characteristics of the tools themselves.
Added: Friday, 24 June 2005
|
How Secure are current mobile operating systems
Mobile devices are becoming ever more capable and are able to open up a broader range of applications in professional environments due to their increasing functionalities. Personal Digital Assistants (PDAs) and Smartphones allow users to access sensitive personal data at any time and any place, making it possible to increase productivity.
Added: Friday, 24 June 2005
|
Setting Up And Using Bluetooth Hardware With Development Tools
The purpose of this document is to describe how to set up the Bluetooth testing environment for the C++ emulators of Software Development Kits (SDK), such as the Series 60 SDK 2.1 and the Series 80 Developer Platform 2.0 SDK. Software and hardware requirements are included, as well as a description of the major differences between the testing environment and the real-world device environment, which must be taken into consideration when testing Bluetooth applications.
Added: Friday, 24 June 2005
|
The Battle Against Phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misguide) users.
Added: Friday, 27 May 2005
|
Toward SSL Integration in SIM SmartCards
The convergence between wired and wireless communications networks has led to define architectures integrating both networks. For that, there has been extensive standardization and development of new generation mobile systems, especially GSM and GPRS.
Added: Friday, 27 May 2005
|
|
Saturday, November 26, 2005
Network Security
· |
How Your ISP Protects You? |
· |
Analyzing Worms using Compression |
· |
Security: Forget the Sheep, Mind the Bears! |
· |
CIOs nervous about IP network security |
Wireless Security
Press Releases
|