An alternative approach to identifying stolen network clients using DHCP /

Computer theft is a mounting problem despite prevention strategies already in place. The marketplace currently offers post-theft solutions but most depend on software in place on the stolen item. This is a critical vulnerability as it places the theft recovery technology in the hands of the thief. =...

Full description

Bibliographic Details
Main Author: Roy, Christian, 1977-
Format: Others
Language:en
Published: McGill University 2005
Subjects:
Online Access:http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98783