Network attack center

Xem 1-4 trên 4 kết quả Network attack center
  • This document describes how to more securely install, configure, and administer the Microsoft Exchange Server and associated clients. The focus of these documents is Exchange Server 5.0 and 5.5, the Exchange Client, and the Outlook 97 and Outlook 98 clients. Please note that discussions regarding Exchange Server 5.5 assume service pack 1 (or later) has been installed. Exchange 2000 and Outlook 2000 guidance is under development.

    pdf62p mylinh 11-08-2009 125 12   Download

  • Enterprise data centers contain the assets, applications, and data that are often targeted by electronic attacks. Endpoints such as data center servers are key objectives of malicious attacks and must be protected. The number of reported attacks, including those that affect data centers, continues to grow exponentially every year (CERT/CC Statistics 1988-2002, CSI/FBI 2001). Attacks against server farms can result in lost business for e-commerce and business-to-business applications, and the theft of confidential or proprietary information.

    pdf304p duypha 11-08-2009 95 9   Download

  • While it is important for network administrators to secure any host connected to the Internet, they must give name servers special consideration due to the important role they play. The purpose of this document is to outline some common steps that can be taken to secure an Internet Name Server from various types of attacks. Run a new version of your name server software As with any piece of software, name server software evolves with each release. Virtually all older name servers have widely known vulnerabilities that can be exploited.

    pdf19p doiroimavanchuadc 06-02-2013 17 2   Download

  • HackNotes Windows Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques used by criminals to break into computer networks. Understand how the attacks work, then learn how to access and strengthen your Windows systems through a series of tested and trusted anti-hacking methods, bulletproof best practices, and system-level techniques. Use the unique Reference Center in the middle of the book to access key information, including common port numbers, system commands, reference links, the top security assessment and hacker tools, and more....

    pdf289p ken333 14-06-2012 39 7   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản