<<< Smart Phone Vulnerabilities, cont. | Index | Requirements for Network Forensics, cont. >>> |
Choke points exist in traditional networks, e.g. a firewall...
...with Wi-Fi -- multiple hotspots, and more hotspots...
<<< Smart Phone Vulnerabilities, cont. | Index | Requirements for Network Forensics, cont. >>> |