Computer network security

Xem 1-20 trên 555 kết quả Computer network security
  • A comprehensive yet comprehensible and witty guide to the latest advances in computer network security protocols. The author team includes Charlie Kaufman, currently chief security architect for Lotus Notes, and formerly Network Security Architect at Digital Equipment Corporation;

    pdf3673p muathu_102 28-01-2013 166 45   Download

  • Network Security & Preventing HackerContent: What do a Malicious Hacker Do?, Level of Hacker, Gathering Information of Hacker, Trojan and Backdoor, Sniffers, Firewall and IDS, Countermeasure. Network Security: Software firewall: ISA Server, anti-virus (McAfee, TrendMicro, Norton Antivirus, Symantec) Hardware Firewall: Checkpoint, PIX, Fortinet, Crossbeam, Watchguard, Sonic Walls

    ppt96p 0985448637 08-09-2010 229 123   Download

  • The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the strongest possible starting point, no matter what your endeavor. Network Security Foundations provides essential knowledge about the principles and techniques used to protect computers and networks from hackers, viruses, and other threats.

    pdf333p ken333 14-06-2012 310 84   Download

  • MCSE Core Required Exams in a Nutshell MCSE Core Elective Exams in a Nutshell MCSA on Windows Server 2003 Core Exams in a Nutshell Security Warrior Network Security Assessment Internet Core Protocols: The Definitive Guide TCP/IP Network Administration 802.11 Wireless Networks: The Definitive Guide PC Hardware in a Nutshell Linux in a Nutshell Windows Vista in a Nutshell Unix in a Nutshell’Reilly brings diverse innovators together to nurture the ideas that spark revolutionary industries.

    pdf813p luvpuca 01-04-2011 129 52   Download

  • Tham khảo bài thuyết trình 'computer networking: a top down approach featuring the internet - chapter 8 network security', công nghệ thông tin, quản trị mạng phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    ppt86p lovewateruni 10-08-2012 92 33   Download

  • Describe security vulnerability testing, detection, and auditing tools useful in the Cisco network security environment

    ppt20p nguyenthucanh 03-05-2010 103 24   Download

  • William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security.

    pdf531p cuong4012 22-02-2013 67 23   Download

  • Today's networks incorporate more security features than ever before, yet hacking grows more common and more severe. Technology alone is not the answer. You need the knowledge to select and deploy the technology effectively, and the guidance of experts to develop a comprehensive plan that keeps your organization two steps ahead of mischief and thievery. Active Defense: A Comprehensive Guide to Network Security gives you precisely the knowledge and expertise you're looking for. You'll work smarter by day, and sleep easier by night....

    pdf374p thutrang 18-08-2009 155 21   Download

  • OSI, TCP/IP model o IP, TCP packet architecture o Protocols: HTTP, DNS… Network devices, router, switch, firewall, … Wireless network: AP, wave,… Overview of network security o o o o o o o Definitions Tasks of Network Security Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork Security 3 .OSI model 4 .TCP/IP model 5 .

    pdf49p muathu_102 28-01-2013 51 18   Download

  • Computer Networking: A Top-Down Approach (6th Edition) introduce about computer networks and the internet, application layer, transport layer, the network layer, the link layer: links, access networks, and lan, wireless and mobile networks, multimedia networking, security in computer networks, network management.

    pdf889p hoconganh_9x 23-09-2014 49 16   Download

  • Managing Cisco Network Security, offers updated and revised information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats.

    pdf50p ken333 28-06-2012 72 12   Download

  • The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it can be used programmatically or from the command line to secure most TCP-based network protocols.

    pdf338p titatu_123 01-03-2013 43 10   Download

  • Computer Network Security: Theory and Practice introduces to the reader a complete and concise view of network security. It provides in-depth theoretical coverage of recent advancements and practical solutions to network security threats. This book can be used for a one-semester network security course for graduate and upper-level undergraduate students, as well as a reference for IT professionals.

    pdf0p muathu_102 28-01-2013 31 9   Download

  • (BQ) Data Communications and Computer Networks: A Business User's Approach will give you the thorough understanding you need of basic features, operations, and limitations of ifferent types of computer networks. This book offers full coverage of wireless technologies, industry convergence, compression techniques, network security, LAN technologies, VoIP, and error detection and correction.

    pdf445p hoangnhat2112 02-03-2015 17 5   Download

  • Tham khảo tài liệu 'network security room form one per room', công nghệ thông tin, quản trị mạng phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf1p trungha 28-08-2009 46 3   Download

  • What is the challenge with converged network security? Finding the right partners to deliver a secure, reliable, converged voice and data network infrastructure — without limiting your flexibility to grow your business and extend the reach of your network — is the key. Converged network security isn’t something to be added after the fact — the need to protect your mission-critical communications systems and business applications should be considered from the very start of your converged network planning.

    pdf52p rose_12 04-12-2012 41 3   Download

  • Tham khảo tài liệu 'network security user form one per user', công nghệ thông tin, quản trị mạng phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf1p trungha 28-08-2009 49 2   Download

  • The OSI Reference Model is useful because it gives some commonly used terminology, though it might mislead you into thinking that there is only one way to construct a network. The reference model was designed by an organization known as the International Standards Organiza- tion (ISO). The ISO decided it would be a good idea to standardize computer networking. Since that was too big a task for a single committee, they decided to subdivide the problem among several committees. They somewhat arbitrarily chose seven, each responsible for one layer.

    pdf130p cao_can 02-01-2013 29 2   Download

  • (BQ) Appropriate for undergraduate and graduate level courses in Cryptography and Computer security. Best-selling author and two-time winner of the TEXTY award for the best Computer Science and Engineering text, William Stallings provides a practical survey of both the principles and practice of cryptography and network security. This text, which won the 1999 TAA Award for the best computer science and engineering textbook of the year, has been completely updated to reflect the latest developments in the field.

    pdf562p levuphongqn 18-08-2015 18 2   Download

  • ALOT of the material in these slides and in this lecture is NOT in the book. This book does a good job of presenting most of the material needed for the security+ exam. However the info in chapter 8 is a little thin… so play close note to the slides. Perhaps I provide a little too much depth for the security+ exam… but it’s well worth doing the extra learning… especially if you want to take the CISSP or really understand networks and network security concepts to be USEFUL in real life!

    ppt119p doilan 25-01-2013 23 1   Download

Đồng bộ tài khoản