This preview shows page 1. Sign up to view the full content.
Unformatted text preview: TakenMcKee 5. Spam filters, what are they and how do they work Taken . .OBryant 6. Viruses, worms, Trojan horseshow do they differ, how are they detected. Taken. .Nishanth 7. Comparison of Firewire and USB Taken Tuladhar 8. Security in wireless networks Taken Morshed 9. Comparison of IPv4 and IPv6 10. others to be added later....
View Full Document
This note was uploaded on 02/10/2012 for the course CSC 411 taught by Professor Simmons during the Spring '08 term at S. Alabama.
- Spring '08