ارسل ملاحظاتك

ارسل ملاحظاتك لنا







Security Threats to Wireless Networks and Modern Methods of Information Security

المصدر: المجلة العربية للعلوم ونشر الأبحاث
الناشر: المركز القومي للبحوث بغزة
المؤلف الرئيسي: Seleman, Yasser A. (Author)
المجلد/العدد: مج2, ع3‪
محكمة: نعم
الدولة: فلسطين
التاريخ الميلادي: 2016
الشهر: أبريل‪
الصفحات: 91 - 96
DOI: 10.12816/0025309
ISSN: 2518-5780
رقم MD: 777013
نوع المحتوى: بحوث ومقالات
اللغة: الإنجليزية
قواعد المعلومات: HumanIndex
مواضيع:
كلمات المؤلف المفتاحية:
Language is between computers connected via the network | in order to exchange information | If we define the language of the Protocol technology | we say that a formal description of the bodies messages and rules that must be followed on two computers to exchange those messages
رابط المحتوى:
صورة الغلاف QR قانون

عدد مرات التحميل

82

حفظ في:
LEADER 02377nam a22002297a 4500
001 0156551
024 |3 10.12816/0025309 
041 |a eng 
044 |b فلسطين 
100 |9 411310  |a Seleman, Yasser A.  |e Author 
245 |a Security Threats to Wireless Networks and Modern Methods of Information Security 
260 |b المركز القومي للبحوث بغزة  |c 2016  |g أبريل‪ 
300 |a 91 - 96 
336 |a بحوث ومقالات  |b Article 
520 |b Network is a technology used to connect computers and devices together. They allow people the ability to move easily and stay in touch while roaming the Internet in the coverage area. This increases efficiency by allowing data entry and access to the site. Comparing wireless networks wired networks in terms of cost, we find that wired networks are more expensive due to the cost of the network connections of electricity and running and add computers and change their positions to suit the network supply. \\ As a result, the use of widespread wireless networks. But there are security gaps in these networks may cause problems for users Security holes intended problem or weakness in the wireless network system may make it easier for hackers to penetrate and steal sensitive data and causing material losses to individuals and companies. \\ Knowing security holes and contributes significantly to the wireless network is immune from attempts to infiltrate and penetration design 
653 |a الشبكات اللاسلكية‪  |a أمن المعلومات‪ 
692 |b Language is between computers connected via the network  |b in order to exchange information  |b If we define the language of the Protocol technology  |b we say that a formal description of the bodies messages and rules that must be followed on two computers to exchange those messages 
773 |4 العلوم الإنسانية ، متعددة التخصصات  |4 العلوم الاجتماعية ، متعددة التخصصات  |6 Humanities, Multidisciplinary  |6 Social Sciences, Interdisciplinary  |c 007  |e Arab Journal of Sciences and Research Publishing  |f Al-Mağallaẗ al-ʿarabiyyaẗ li-l-ʿulūm wa-našr abḥāṯ  |l 003  |m مج2, ع3‪  |o 1564  |s المجلة العربية للعلوم ونشر الأبحاث  |v 002  |x 2518-5780 
856 |u 1564-002-003-007.pdf 
930 |d y  |p y  |q y 
995 |a HumanIndex 
999 |c 777013  |d 777013 

عناصر مشابهة