Study & Analysis of Security Attributes in Windows Operating Systems
Abstract
Keywords
Full Text:
PDFReferences
Harsh Vikram Singh, A. K. Singh, and Anand Mohan, “Minimizing Security Threats in Multimedia Systems”, Proc. of 2nd IEEE International Conference on Distributed Framework for Multimedia Applications, pp. 1-5, Penang, Malaysia, 2006.
Available: http://technet.microsoft.com/en-s/library
K. Sangani, “Review - living with windows vista,” IEEE Engineering & Technology, pp. 52 – 54, Vol.1, Aug. 2006.
L.N. Kumar and C Douligeris, “Demand and service matching at heavy loads: a dynamic bandwidth control mechanism for DQDB MANs,” IEEE Transactions on Communications, pp. 1485-1495, Vol. 44, 1996.
S.S. Kohali et al. “The impact of wireless LAN security on performance of different Windows operating systems,” Proc. of IEEE Symposium on Computers and Communications-2008, pp. 260- 264, July 2008.
D.R. Hayes, D.R. and S. Qureshi, “A framework for computer forensics investigations involving Microsoft Vista” IEEE Long Island Systems, Applications and Technology Conference, pp. 1-8, May 2008.
http: www.technet.microsoft.com/en-us/library/cc507844.aspx
S. Al-Khayatt et al. “A study of encrypted, tunneling models in virtual private networks,” Proc of IEEE International Conference on Information Technology: Coding and Computing, pp.139 – 143, April 2002.
Routing and Remote Access Service (Remote Access), Windows Server 2003 Networking Recipes ,Chapter 4, pp. 141-189, Springer publication, 2006.
Kyle Schurman, Hard HAT AREA, “X-ray Vision: Virus Penetration,” Computer Power User Artical.
S. Narayan et. al. “The Influence of Wireless 802.11g LAN Encryption Methods on Throughput and Round Trip Time for Various Windows Operating Systems,” 6th IEEE Annual Conference on Communication Networks and Services Research Conference - 2008, pp.171-175, May 2008.
Internet Authentication Service, Windows Server 2003 Networking Recipes, Chapter 6, pp. 243-287, Springer publication, 2006.
J. Nam et. al. “Load modulation power amplifier with lumped-element combiner for IEEE 802.11b/g WLAN applications,” Electronics Letters, pp. 24-50, Vol. 42, January 2006.
K. Sangani, “Lucky seven?” IEEE Engineering & Technology, pp. 32-33, Vol. 4, March 2009.
DOI: http://dx.doi.org/10.36039/AA032011009
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.