Skip to Content
Wireless and Mobile Device Security, 2nd Edition
book

Wireless and Mobile Device Security, 2nd Edition

by Jim Doherty
March 2021
Intermediate to advanced content levelIntermediate to advanced
400 pages
14h 24m
English
Jones & Bartlett Learning
Content preview from Wireless and Mobile Device Security, 2nd Edition

Network Utilities

Network utilities are software programs and scripts designed to analyze or configure various aspects of computer networks. Many of these programs are Unix based and are run through command line interface (CLI) screens, but there are many commercial programs that package one or more for popular operating systems. The most commonly used network utilities are as follows:

  • Ping—This is used to check for network connectivity and to determine whether a host can be reached over the network. Ping can also be used to measure the round-trip delay between hosts on a wired or wireless network.
  • Traceroute and tracert—These Unix/Linux and Windows utilities, respectively, are used to trace the path taken between hosts on different subnets ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless and Mobile Device Security

Wireless and Mobile Device Security

Jim Doherty
Mobile Security and Privacy

Mobile Security and Privacy

Man Ho Au, Raymond Choo

Publisher Resources

ISBN: 9781284211733