ELCA

Displaying 1-2 of 2 results

  • White Papers // Sep 2009

    Application Security

    All are living in an age in which companies have to open up their IT infrastructure to employees, customers, suppliers and partners. Being able to access certain information on the Internet in real time has become the norm. In this context, application security has become a strategic area for companies...

    Provided By ELCA

  • White Papers // Jun 2009

    A Wireless Intrusion Detection System Based on Open-Source Software

    The use of wireless networks is growing constantly, not only for public internet access in urban areas, but also to connect computer equipment where wired networks would be impractical. But wireless networks are vulnerable to numerous forms of attack, from breach of confidentiality to denial of service. Since more and...

    Provided By ELCA

  • White Papers // Jun 2009

    A Wireless Intrusion Detection System Based on Open-Source Software

    The use of wireless networks is growing constantly, not only for public internet access in urban areas, but also to connect computer equipment where wired networks would be impractical. But wireless networks are vulnerable to numerous forms of attack, from breach of confidentiality to denial of service. Since more and...

    Provided By ELCA

  • White Papers // Sep 2009

    Application Security

    All are living in an age in which companies have to open up their IT infrastructure to employees, customers, suppliers and partners. Being able to access certain information on the Internet in real time has become the norm. In this context, application security has become a strategic area for companies...

    Provided By ELCA