Back to Search Start Over

Undocumented Network Hides Vulnerabilities.

Authors :
Thurman, Mathias
Source :
Computerworld. 7/30/2001, Vol. 35 Issue 31, p46. 1p.
Publication Year :
2001

Abstract

Presents an article on information technology (IT) management. Methods used in creating a network diagram of his company's IT infrastructure; Comparison between Remote Authentication Dial-In User Service and Lightweight Directory Access Protocol to authenticate remote virtual private network users; Benefits of using Nessus, a free Internet port-scanning tool.

Details

Language :
English
ISSN :
00104841
Volume :
35
Issue :
31
Database :
Academic Search Index
Journal :
Computerworld
Publication Type :
Periodical
Accession number :
4974085