Tasks:
• How would the operations of packet filtering and
encryption be used:
Preventing the spread of malicious code
Preventing intrusion attacks
Deliverables and format:
Submit your answer in a Microsoft Word document
Font: Arial; 10
Line Spacing: Double
Assigned and Due Date:
Assigned: Week 6
Due: Week 8
Wednesday, January 28, 2009
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment