Ipv6 security considerations

Xem 1-3 trên 3 kết quả Ipv6 security considerations
  • This book is a straightforward discussion of the concepts, principles, and processes of Internet Protocol version 6 (IPv6) and how it is supported by the Microsoft Windows Server 2008 and Windows Vista operating systems. Note that this book does not contain programming code-level details of the IPv6 protocol for Windows Server 2008 and Windows Vista, such as structures, tables, buffers, or coding logic. These details are highly guarded Microsoft intellectual property that is of interest only to a relative handful of software developers.

    pdf600p ltvtrinh 24-09-2012 47 28   Download

  • Ensure that system and network administrators are trained and capable. Security testing must be performed by capable and trained staff. Often, individuals recruited for this task are already involved in system administration. While system administration is an increasingly complex task, the numbers of trained system administrators generally has not kept pace with the increase in computing systems.

    pdf41p cao_can 02-01-2013 22 4   Download

  • Key planning considerations for federal agencies include recognizing that the transition is already under way, because IPv6-capable software and equipment already exists in agency networks. Other important agency planning considerations include developing inventories and assessing risks; creating business cases that identify organizational needs and goals; establishing policies and enforcement mechanisms; determining costs; and identifying timelines and methods for transition.

    pdf41p bin_pham 05-02-2013 22 5   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản