Verified Document

Network Security The Practice Of Term Paper

In addition, firewalls serve an essential role in securing networks against outside intrusions. The research also indicates that anti-virus software, encryption software and biometrics allow organizations to secure networks in a more comprehensive manner. There are also specific strategies and technologies that should be considered if an organization chooses to use a wireless network.

References

Davis J.P.(2006) Telecommute Safely: Use Internet Technology to Keep Cost Down. Contributors: - author. Journal Title: Journal of Accountancy. Volume: 202. Issue: 2. Publication Year: 2006. Page Number: 39+.

Hoover M. (2005) Network Security: The New Perimeter; Security Threats Can No Longer Be Contained in the DMZ. How Do You Protect Every Resource, and Every User's Traffic, No Matter Where it's Coming From?. Business Communications Review. Volume: 35(7)....

Parts of this document are hidden

View Full Document
svg-one

Page Number: 40+.
Intel Glossary. Retrieved November 7, 2007 at http://www.intel.com/products/glossary/body.htm

Karygiannis T. & Owens L., 2002. Wireless Network security. National Institute of Standards in technology. Retrieved November 7, 2007 at http://csrc.nist.gov/publications/nistpubs/800-48/NIST_SP_800-48.pdf

Olzak Tom. May 2006. Strengthen Data Protection with Network Access Controls.

Retrieved November 7, 2007 at http://www.windowsecurity.com/uplarticle/NetworkSecurity/Network_Access_Controls.pdf

Security recommendations for a VPN. Microsoft. Retrieved November 7, 2007 at http://www.microsoft.com/technet/isa/2004/help/fw_VPNIntro.mspx?mfr=true

Stallings W. (2006). Cryptography and Network Security. Prentice Hall College.

Vacca, J.R. (2006) Guide to Wireless Network Security. Springer: New York.

Sources used in this document:
References

Davis J.P.(2006) Telecommute Safely: Use Internet Technology to Keep Cost Down. Contributors: - author. Journal Title: Journal of Accountancy. Volume: 202. Issue: 2. Publication Year: 2006. Page Number: 39+.

Hoover M. (2005) Network Security: The New Perimeter; Security Threats Can No Longer Be Contained in the DMZ. How Do You Protect Every Resource, and Every User's Traffic, No Matter Where it's Coming From?. Business Communications Review. Volume: 35(7). Page Number: 40+.

Intel Glossary. Retrieved November 7, 2007 at http://www.intel.com/products/glossary/body.htm

Karygiannis T. & Owens L., 2002. Wireless Network security. National Institute of Standards in technology. Retrieved November 7, 2007 at http://csrc.nist.gov/publications/nistpubs/800-48/NIST_SP_800-48.pdf
Retrieved November 7, 2007 at http://www.windowsecurity.com/uplarticle/NetworkSecurity/Network_Access_Controls.pdf
Security recommendations for a VPN. Microsoft. Retrieved November 7, 2007 at http://www.microsoft.com/technet/isa/2004/help/fw_VPNIntro.mspx?mfr=true
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now