×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [sniffer slide]
Chapter 4 Network Vulnerabilities and Attacks. Cyberwar and Cyberterrorism "Titan Rain" - Attacks on US gov't and military computers from China breached
221 views
Re-thinking how we live, work and play to make Scotland more resilient to environmental change, especially climate change
213 views
Chapter 5 Hacking Unix Last modified 2-27-09. Vulnerability Mapping Listing aspects of the target system and associated vulnerabilities –Online vulnerabilities
222 views
Media Streaming Performance in a Portable Wireless Classroom Network Presenter: Jean Cao Supervisor: Carey Williamson TRLabs & Dept. of Computer Science
215 views
Jigsaw: Solving the Puzzle of Enterprise 802.11 Analysis Yu-Chung Cheng John Bellardo, Peter Benko, Alex C. Snoeren, Geoff Voelker, Stefan Savage
212 views
Log Analysis and Intrusion Detection By Srikrishna Gudavalli Venkata Naga Vamsi Krishna Ravi Kiran Yellepeddy
226 views
Technologies to Enhance Traffic Safety Robin D. Smith Presiding Judge City of Midland, Texas
217 views