Network information

Xem 1-20 trên 1788 kết quả Network information
  • Tiến hành bảo mật vật lý cho Computer là một trong những vấn đề cần quan tâm nhất. Tại bất kỳ hệ thống thông tin nao, từ cá nhân (PC) cho đến Doanh Nghiệp (Enterprise), việc bảo mật vật lý đều được đánh giá cao, xem nhẹ khâu này, việc đầu tư vào các thiết bị bảo mật đắt tiền (như Firewall cứng..) hoặc các chương trình an toàn máy tính khác (phần mềm bảo mật..) dường như không còn mấy ý nghĩa, vì chỉ mang tính hình thức.. ...

    pdf20p thanhnga 10-06-2009 360 108   Download

  • A comprehensive yet comprehensible and witty guide to the latest advances in computer network security protocols. The author team includes Charlie Kaufman, currently chief security architect for Lotus Notes, and formerly Network Security Architect at Digital Equipment Corporation;

    pdf3673p muathu_102 28-01-2013 181 50   Download

  • What is telecommunications? This word is derived from the Greek word, "tele", which means, "far off"; and the Latin word, "communicate", which means, "to share". Hence Telecommunication is distance communication. The true nature of telecommunications is the passing of information to one or more others in any form that may be used.

    ppt51p thanhsondtvt_06 16-04-2010 95 37   Download

  • William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security.

    pdf531p cuong4012 22-02-2013 83 29   Download

  • OSI, TCP/IP model o IP, TCP packet architecture o Protocols: HTTP, DNS… Network devices, router, switch, firewall, … Wireless network: AP, wave,… Overview of network security o o o o o o o Definitions Tasks of Network Security Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork Security 3 .OSI model 4 .TCP/IP model 5 .

    pdf49p muathu_102 28-01-2013 63 19   Download

  • Computer Network Security: Theory and Practice introduces to the reader a complete and concise view of network security. It provides in-depth theoretical coverage of recent advancements and practical solutions to network security threats. This book can be used for a one-semester network security course for graduate and upper-level undergraduate students, as well as a reference for IT professionals.

    pdf0p muathu_102 28-01-2013 35 10   Download

  • Tham khảo sách 'cwnatmcertified wireless network administratorofficial study guideendorsed by the wireless lan associationindustry approved!tmexam pw0-100objective-by-objective coverage of the cwna certification examvendor-neutral wireless network trainin', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf390p muathu_102 28-01-2013 33 8   Download

  • A modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991. But however widespread networks have become, managing a network and getting it to perform well can still be a problem. Managing NFS and NIS, in a new edition based on Solaris 8, is a guide to two tools that are absolutely essential to distributed computing environments: the Network Filesystem (NFS) and the Network Information System (formerly called the "yellow pages" or YP).The Network Filesystem, developed by Sun Microsystems, is...

    pdf409p ken333 14-06-2012 65 7   Download

  • Up to this point we have seen: Classical Crypto Symmetric Crypto Asymmetric Crypto These systems have focused on issues of confidentiality: Ensuring that an adversary cannot infer the original plaintext message, or cannot learn any information about the original plaintext from the ciphertext. In today’s lecture we will put a more formal framework around the notion of what information is, and use this to provide a definition of security from an information-theoretic point of view.

    ppt24p muathu_102 28-01-2013 33 4   Download

  • Following a brief introduction and overview, early chapters cover the basic algebraic relationships of entropy, relative entropy and mutual information, AEP, entropy rates of stochastics processes and data compression, duality of data compression and the growth rate of wealth. Later chapters explore Kolmogorov complexity, channel capacity, differential entropy, the capacity of the fundamental Gaussian channel, the relationship between information theory and statistics, rate distortion and network information theories.

    pdf0p hiepkhach_1006 10-09-2013 35 4   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Pedestrian tracking with an infrared sensor using road network information

    pdf68p sting06 16-02-2012 18 3   Download

  • NETWORK INFORMATION SECURITY VIETNAM – NIS.COM.VN Giả mạo địa chỉ IP (Fake IP) Thế nào là Fake IP: Fake IP là việc truy cập vào Website (hoặc nguồn tài nguyên Web nào đó nào đó) gián tiếp thông qua một Proxy (Máy chủ Proxy). Như vậy điều quan trọng, bạn phải hiểu Proxy là gì Proxy: Chỉ một hệ thống Computer hoặc một Router tách biệt kết nối, giữa người gửi (Sender) và người nhận (Receiver).

    pdf13p tengteng14 21-12-2011 34 2   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article The Waterfilling Game-Theoretical Framework for Distributed Wireless Network Information Flow

    pdf13p dauphong15 16-02-2012 24 2   Download

  • Chapter 2 - How business communicates. The main contents of this chapter include all of the following: 21st-Century business directions, formal communication networks, informal communication networks, communicating externally.

    ppt22p nhanmotchut_2 19-10-2016 5 2   Download

  • Lecture Business communication design - Chapter 2: How business communicates. The main contents of this chapter include all of the following: 21st-Century business directions, formal communication networks, informal communication networks, communicating externally.

    ppt22p nomoney2 10-02-2017 2 1   Download

  • Four laws, two each from the natural sciences and the social sciences, have formed the basis for the development of digital wireless communication networks. This essay describes their interaction, as well as their logical support for spread - spectrum multiple - access techniques.

    pdf426p phongthinh 04-08-2009 315 194   Download

  • Web Server Internet Information Service (IIS): Là một bộ, bao gồm nhiều gói dịch vụ khác nhau: Web Server, FTP Server, Network News Server (NNTP), Mail Server (SMTP). 1.1. Cài đặt IIS. B1.Chọn ‘Start\Control Panel\Add or Remote Programs’ B2.Chọn nút ‘Add/Remove Windows Components’ B3.Chọn ‘Application Server’, chọn nút ‘Details’. Khoa Công nghệ Thông tin – Đại học Khoa học tự nhiên Bộ môn Mạng máy tính và Viễn thông B4.Check vào mục ‘Internet Information Service(IIS)’, chọn nút ‘OK’. ...

    pdf9p sonpham 15-12-2009 313 156   Download

  • Tham khảo sách 'ccna: cisco certified network associate study guide - fourth edition', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf652p minhtuan 10-08-2009 345 146   Download

  • When the concept of a network without wires was first suggested more than two decades ago, it sparked the imagination of scientists, product vendors, and users around the globe eager for the convenience and flexibility of a free roaming connection. Unfortunately, as the variety of wireless solutions began to emerge, anticipation turned to disappointment.The first wave of solutions proved inadequate for the networking, portability, and security needs of a changing IT environment.

    pdf513p maiphuong 11-08-2009 352 135   Download

  • Network Security & Preventing HackerContent: What do a Malicious Hacker Do?, Level of Hacker, Gathering Information of Hacker, Trojan and Backdoor, Sniffers, Firewall and IDS, Countermeasure. Network Security: Software firewall: ISA Server, anti-virus (McAfee, TrendMicro, Norton Antivirus, Symantec) Hardware Firewall: Checkpoint, PIX, Fortinet, Crossbeam, Watchguard, Sonic Walls

    ppt96p 0985448637 08-09-2010 240 126   Download


Đồng bộ tài khoản