Xem 1-20 trên 1812 kết quả It security
  • Chris Butler (CISSP, JNCIS-FWV, JNCIA-SSL, CCSE, IAM/IEM) is a Senior Solutions Architect with Intellitactics. Chris has more than a dozen years of experience in the networking and security fields. He is a veteran of the United States Navy, where he worked in the cryptography field. Chris has designed, implemented, and supported some of the largest networks in the country for large insurance companies, investment firms, software companies, service providers, and pharmaceutical companies. He has also provided network and security consulting services for numerous...

    pdf243p vusuakhonghat 28-05-2009 185 90   Download

  • A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide.

    pdf458p xabenglengkeng 26-05-2009 283 117   Download

  • It is becoming clearer every year that workstations require as much comprehensive IT security attention as servers – particularly as the popularity of mobile workstations (laptops) continues to rise. Microsoft has advanced several technologies in Windows Vista to increase workstation security. This white paper introduces eight such technologies: • User Account Control • IE7 Protected Mode • Service Hardening • Windows Resource Protection • Windows Defender • TPM and BitLocker • Network Access Protection • PatchGuard and Driver Signing (64-bit platform)...

    pdf10p emilynguyen 06-08-2009 98 10   Download

  • For many organizations their dependence on information systems, both within the company and networked up and down their supply chain, is now business critical. Any sustained loss of availability of these systems would threaten the very existence of the business. Security is a holistic issue. Vulnerabilities in physical, personnel and electronic security all need to be addressed with equal commitment. Too many businesses still focus on physical security without sustaining even basic precautions in personnel and electronic security....

    pdf257p orchid_1 28-09-2012 52 6   Download

  • The CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the fastest-growing fields in IT. Security threats are increasing in number and severity, and the gap between the need for security professionals and qualified IT personnel is the largest of any IT specialty, according to a 2008 CompTIA study. Even in a troubled economy, most businesses plan to maintain or increase their investment in security.

    pdf325p muathu_102 28-01-2013 24 4   Download

  • LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple. Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff package). By using those attack tools, a hacker can defeat the security myth of a switch, which incorrectly states that sniffing and packet interception are impossible with a switch.

    pdf361p vusuakhonghat 28-05-2009 524 250   Download

  • This book was written to give the reader a well-rounded understanding of wireless network security. It looks at wireless from multiple perspectives, ranging from auditor, to security architect, to hacker. This wide scope benefits anyone who has to administer, secure, hack, or participate on a wireless network. Going through this book, the reader will see that it tackles the risk of wireless from many angles. It goes from a policy level to mitigate certain risks that wireless brings. It talks about the most cost-effective solutions to deploy wireless across a large enterprise.

    pdf353p daokim 04-08-2009 221 132   Download

  • Solve Two of the Toughest Problems When Preparing for the Stockbroker’s Exam Those wishing to become licensed as stockbrokers must pass the series 7 examination. This exam, known officially as the General Securities Registered Representative Examination, is very rigorous. Traditionally, students without a financial background have a difficult time with the mathematical calculations peculiar to the world of stocks, bonds, and options. Many are also relatively unfa- miliar with proper use of the calculator and thus are dou- bly hampered in their efforts to become registered.

    pdf225p duypha 15-07-2009 238 108   Download

  • This book is a desktop quick reference for the Java 2 Micro Edition (J2ME ). It is intended for Java programmers writing applications for devices with limited memory resources and processor power, such as cell...

    pdf486p stumble 25-05-2009 260 107   Download

  • This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Security course as part of an official Cisco Networking Academy Program. Network attacks have resulted in the loss of sensitive data and significant network downtime. When a network or the resources in it are inaccessible, worker productivity can suffer, and business income may be lost. Attackers have developed many tools over the......

    pdf283p hiennxuan 22-10-2010 299 106   Download

  • The Check Point Next Generation suite of products provides the tools necessary for easy development and deployment of enterprise security solutions. Check Point VPN-1/FireWall-1 has been beating out its competitors for years, and the Next Generation software continues to improve the look, feel, and ease of use of this software. Most notably, there is a new security dashboard that gives security administrators a more detailed view of the Security Policy and management objects in one window.The user interface is easy to comprehend and provides optimal functionality all in one place....

    pdf657p mylinh 11-08-2009 274 99   Download

  • Ebook "Network security technologies" presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. This text is unique in that it classifies technologies as basic, enhanced, integrated, and architectural as a means of associating their functional complexities, providing added insight into their interrelationships. It introduces and details security components and their relationships to each other.

    pdf267p thutrang 17-08-2009 172 85   Download

  • In an age when our society relies so heavily on electronic communication, the need for information security is imperative. Given the value and confidential nature of the information that exists on today’s networks, CIOs are finding that an investment in security is not only extremely beneficial but also absolutely necessary. Corporations are realizing the need to create and enforce an information security policy.

    pdf658p mylinh 11-08-2009 184 84   Download

  • In addition to an explosion of touch points, we are faced with an infinitively complex and rapidly changing web of networks, applications, systems, client software, and service providers. Under these circumstances, absolute security cannot be guaranteed since it’s impossible to test the security implications of every configuration combination of hardware and software under every set of conditions.

    pdf786p maiphuong 11-08-2009 141 84   Download

  • Internetworking security has become a very big issue in recent months. Companies who went through corporate life thinking, “it will never happen to me” suddenly found themselves the victim of some sort of attack on their network. High profile companies are most certainly a bigger target for several reasons, including the notoriety the hacker receives for damaging their network or Web site, and the amount of financial damage that can be done by bringing down a successful e-commerce site. Recent attacks easily racked up 100 million dollars in damage....

    pdf529p maiphuong 11-08-2009 322 84   Download

  • The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the strongest possible starting point, no matter what your endeavor. Network Security Foundations provides essential knowledge about the principles and techniques used to protect computers and networks from hackers, viruses, and other threats.

    pdf333p ken333 14-06-2012 310 84   Download

  • In this section we are going to cover some of the key aspects that need to be addressed in order to have a secure web server using IIS. It is important to note that a system is only as secure as its weakest link and therefore any web server must be built on a secure and hardened Windows 2000 system. Securing Windows 2000 is not covered in this section but has been covered in a previous module. So before you install IIS make sure that you spend the time to properly harden your base operating system. Once you have a secure operating system configured, you...

    pdf30p huyhoang 07-08-2009 252 79   Download

  • This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls. It illustrates the benefits of security controls, the major techniques or approaches for each control, and important related considerations. 1

    pdf0p batrinh 07-08-2009 154 73   Download

  • "Network and system security" provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.

    pdf405p vtva001 24-09-2010 227 73   Download

  • Hello, in this module we are going to discuss wireless networking. Specifically, we'll take a look at how wireless technology works, how it is commonly deployed, and the security issues associated with using it. Because wireless communications can penetrate opaque objects such as buildings, the risk of someone accessing a private network increases markedly. With wireless, an attacker does not need to gain access to physical cables or jacks, but only needs to have an antenna and be within range of the transmissions....

    pdf40p huyhoang 07-08-2009 144 71   Download

Đồng bộ tài khoản