O'Reilly logo

Endpoint Security by Mark S. Kadrich - CISSP

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Foreword

1 Encarta World English Dictionary © 1999 Microsoft Corporation. All rights reserved. Developed for Microsoft by Bloomsbury Publishing Plc.

Chapter 1

1 www.opengroup.org/projects/jericho/

2 Evolution Data Optimized, a wireless radio broadband protocol used over CDMA (Code Division Multiple Access) cellular phone networks

3 Mary Jo Foley, Microsoft Watch, 4/27/2004

4 Linux vs. Windows Viruses, The Register, 10/6/2003

5 www.symantec.com/avcenter/defs.download.html

6 SANS NewsBites Vol. 8 Num. 94

7 www.leunig.de/_en/_news/prs/2002_02_eps/eps_mfot.htm

8 www.blackhat.com/html/bh-usa-04/bh-usa-04-speakers.html, “Tracking Prey in the Cyberforest,” Potter and Wotring

9 Blackberry pips Palm to top spot, Vnunet, May 5, 2005

10 www.symbian.com/security/index.html ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required