Xem 1-20 trên 632 kết quả Data security
  • Database System: Chapter 11 - Database Security An Introduction presents about Introduction to Database Security Issues (DB security is a broad area, Threats to databases, Fundamental data security requirements), Discretionary Access Control, Mandatory Access Control.

    ppt53p cocacola_17 10-12-2015 6 1   Download

  • Network Security & Preventing HackerContent: What do a Malicious Hacker Do?, Level of Hacker, Gathering Information of Hacker, Trojan and Backdoor, Sniffers, Firewall and IDS, Countermeasure. Network Security: Software firewall: ISA Server, anti-virus (McAfee, TrendMicro, Norton Antivirus, Symantec) Hardware Firewall: Checkpoint, PIX, Fortinet, Crossbeam, Watchguard, Sonic Walls

    ppt96p 0985448637 08-09-2010 229 123   Download

  • Tham khảo sách 'security log management', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf349p thutrang 18-08-2009 158 68   Download

  • Several other mail transfer agents are available to replace sendmail. Two popular aternatives are Qmail (www.qmail.org) by David Bernstein, and Postfix (www.postfix.org) by Wietse Venema. Both of these MTAs were designed and written from the ground up with security and performance in mind. It is beyond the scope of this guide to give details on installing and configuring either of these alternatives, but a wealth of information is available on the Internet.

    pdf62p vuthuong 08-08-2009 139 65   Download

  • Good administrators must know their competition. In this module we will explore some of the different way unauthorized access occurs and the security implications that open certain doors to attack. This is by no means an exhaustive examination and a great administrator must continue to perform reseach to keep apprised of new techniques as they are develpoped.

    pdf471p thutrang 17-08-2009 96 30   Download

  • Part 2 of ebook "Oxford English for Infomation Technology" presents topics as: Computing support, data security 1, data security 2, the ex-hacker, software engineering, people in computing, recent developments in IT, the future of IT,... Inviting you to refer.

    pdf107p nganga_09 22-10-2015 22 8   Download

  • Taking the network scenario of Figure 1, there will be web interfaces (routers and serv- ers), BACnet/IP controllers (connected to interesting devices that are network accessible), and operator workstations that may have vulnerable OS as well as configuration files and other interesting data and resources. The following table is adapted from a Drexel report on network security [Eisenstein et al., 2003a] and lists known IT threats to a BACnet network connected to the public Internet.

    pdf8p khongmuonnghe 04-01-2013 24 3   Download

  • New, multilayered security architectures are raising the bar in demonstrating "best efforts" to protect enterprises from attacks. These new approaches to enterprise security are now demonstrating their enhanced overall effectiveness when compared with existing and earlier enterprise security architectures. In the new and enhanced security architecture, the existing in-line threat detection forms the first layer and the overwatch component forms the second layer.

    pdf5p khongmuonnghe 04-01-2013 18 2   Download

  • An Overview of Cloud Security and Privacy includes about Cloud services delivery model, Impact of cloud computing on the governance structure of IT organizations, Companies are still afraid to use clouds, Taxonomy of Fear, Attacker Capability, Infrastructure Security, Data Security and Storage.

    ppt46p cocacola_17 11-12-2015 5 2   Download

  • Research in Cloud Computing provides about The Network Level, The Network Level - Mitigation, Local Host Security, Data Security and Storage, Auditing, monitoring and risk management, Privacy breaches, responsible for protecting privacy.

    ppt26p cocacola_17 11-12-2015 7 1   Download

  • This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Security course as part of an official Cisco Networking Academy Program. Network attacks have resulted in the loss of sensitive data and significant network downtime. When a network or the resources in it are inaccessible, worker productivity can suffer, and business income may be lost. Attackers have developed many tools over the......

    pdf283p hiennxuan 22-10-2010 300 106   Download

  • Chris Butler (CISSP, JNCIS-FWV, JNCIA-SSL, CCSE, IAM/IEM) is a Senior Solutions Architect with Intellitactics. Chris has more than a dozen years of experience in the networking and security fields. He is a veteran of the United States Navy, where he worked in the cryptography field. Chris has designed, implemented, and supported some of the largest networks in the country for large insurance companies, investment firms, software companies, service providers, and pharmaceutical companies. He has also provided network and security consulting services for numerous...

    pdf243p vusuakhonghat 28-05-2009 185 90   Download

  • This Solution Reference Network Design (SRND) provides a description of the design issues related to optimizing server and application environments. Server farms are built to provide a highly available, scalable infrastructure that on which applications ru . As enterprises grow, so do their application needs which implies that more and more expenditures are allotted for additional application-specific softwar and server requirements. This increase in bottom line expenses heightens the sensitivity to overall retur on investments.

    pdf94p kieuoanh 11-08-2009 177 55   Download

  • Clusters define a collection of servers that operate as if they were a single machine. The primary purpose of high availability (HA) clusters is to provide uninterrupted access to data, even if a server loses network or storage connectivity, or fails completely, or if the application running on the server fails. HA clusters are mainly used for e-mail and database servers, and for file sharing. In their most basic implementation, HA clusters consist of two server machines (referred to as “nodes”) that “share” common storage.

    pdf222p batoan 11-08-2009 120 54   Download

  • Welcome to the Oracle Database Advanced Security Administrator's Guide for the 10g Release 1 (10.1) of Oracle Advanced Security. Oracle Advanced Security contains a comprehensive suite of security features that protect enterprise networks and securely extend them to the Internet. It provides a single source of integration with multiple network encryption and authentication solutions, single sign-on services, and security protocols. The Oracle Database Advanced Security Administrator's Guide describes how to implement, configure and administer Oracle Advanced Security....

    pdf518p vitconxinhdep 30-07-2009 183 51   Download

  • Tham khảo sách 'data center networking: integrating security, load balancing, and ssl services using service modules', công nghệ thông tin, quản trị mạng phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf108p kieuoanh 11-08-2009 149 44   Download

  • This publication provides solution guidelines for enterprises implementing Data Centers with Cisco devices. The intended audiences for this design guide include network architects, network managers, and others concerned with the implementation of secure Data Center solutions, including: • Cisco sales and support engineers • Cisco partners • Cisco customers

    pdf130p kieuoanh 11-08-2009 104 32   Download

  • This Solution Reference Network Design (SRND) provides design and implementation recommendations fo r deploying security services in the data center. This document discusses security topologies that include both appliance and integrated devices. This publication provides solution guidelines for enterprises implementing Data Centers with Cisco devices.

    pdf128p kieuoanh 11-08-2009 155 28   Download

  • The expansion and popularity of the Internet, along with the addition of wireless data functionality to wireless networks, has also contributed greatly to the growth of the wireless industry. In fact, the anticipated consumer demand for high bandwidth wireless data is commonly seen as the driving force behind current network upgrades and expansions. The number and types of companies aggressively investing in wireless technologies illustrate the importance of wireless data.

    pdf234p ken333 14-06-2012 54 23   Download

  • This book is for SQL Server administrators, developers, and consultants who want to secure their SQL Server database with cutting edge techniques for data and code encryption, user authentication and authorization, protection against brute force attacks, denial-of-service attacks, and SQL Injection, securing business intelligence, and more. Working knowledge of SQL Server is expected.

    pdf322p titatu_123 01-03-2013 51 19   Download

Đồng bộ tài khoản