Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Protecting wireless networks aka wireless hacking
Hacking, Tracking, and Baiting Surveillance, Wardriving and Honeypot Technologies Larry Korba Institute for Information Technology National Research Council.
Hacking, Tracking, and Baiting Surveillance, Wardriving and Honeypot Technologies