1 |
Group Telemetry Analysis Using the World Wide WebKalibjian, Jeffrey R. 10 1900 (has links)
International Telemetering Conference Proceedings / October 28-31, 1996 / Town and Country Hotel and Convention Center, San Diego, California / Today it is not uncommon to have large contractor teams involved in the design and
deployment of even small satellite systems. The larger (and more geographically remote)
the team members, the more difficult it becomes to efficiently manage the disbursement of
telemetry data for evaluation and analysis. Further complications are introduced if some of
the telemetry data is sensitive. An application is described which can facilitate telemetry
data sharing utilizing the National Information Infrastructure (Internet).
|
2 |
Storage Systems and Security Challenges in Telemetry Post Processing EnvironmentsKalibjian, Jeff 10 1900 (has links)
ITC/USA 2008 Conference Proceedings / The Forty-Fourth Annual International Telemetering Conference and Technical Exhibition / October 27-30, 2008 / Town and Country Resort & Convention Center, San Diego, California / A common concern in telemetry post-processing environments is adequate disk storage capacity to house captured and post-processed telemetry data. In today's network environments there are many storage solutions that can be deployed to address storage needs. Recent trends in storage systems reveal movement to implement security services in storage systems. After reviewing storage options appropriate for telemetry post-processing environments; the security services such systems typically offer will also be discussed and contrasted with other third party security services that might be implemented directly on top of a networked storage system.
|
3 |
Odposlech moderních šifrovaných protokolů / Interception of Modern Encrypted ProtocolsMarček, Ján January 2012 (has links)
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.
|
Page generated in 0.0818 seconds