Buscar
Mostrando ítems 1-6 de 6
Implementing DNSSEC under the .pr ccTLD
(Polytechnic University of Puerto Rico, 2013)
When the Internet was developed it was
not designed with security in consideration. It
currently relies on the Domain Name System
protocol for name resolution which is home to
many types of exploits. The Internet ...
Unified Threat Management
(Polytechnic University of Puerto Rico, 2018)
Unified Threat Management (UTM) is an information security term that refers to a security appliance as a combination of hardware, software and networking technologies in which the primary function is to integrate increased ...
Introduction to Forensics and the use of the Helix free Forensic Tool
(Polytechnic University of Puerto Rico, 2012)
Abstract - This paper was created to complement a helix tutorial that was created as an introduction into the world of forensics. For someone who would like to get started practicing computer forensics it might be a little ...
Tutorials of how to use Metasploit, Nessus and Nmap
(Polytechnic University of Puerto Rico, 2012)
Abstract - This paper is in support of three newly created tutorials, focused on different Security and Penetration testing tools. The tutorials have been selected to cover three different areas in the security and penetration ...
Centralized Device Independent Software Architecture for the Internet of Things
(Polytechnic University of Puerto Rico, 2015)
The Internet of Things (IoT) is growing
stronger every year, as developers we need to get
ready for the challenges ahead of us. It is getting
hard for software developers to have a starting point
for implementing new ...
Computer Forensic Laboratory for the Polytechnic University of Puerto Rico
(Polytechnic University of Puerto Rico, 2011)
Abstract ⎯ Computer Forensic is the discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is ...