Xem 1-20 trên 290 kết quả Secure platform
  • This is paper are the more or less raw results of the trial and error natural process of hacking a system. As the initial idea was not to made it public, I did not take care of the “feel and look” and I wrote as a simple reminder to me of what attack vectors where tried and its time-line. As the R+D work increased, what where simple annotations begun to look interesting, maybe for readers other than me. At the end I got what I was looking for: a way to hack the tested system, but then I realize that what was more interesting –at...

    pdf219p hidiefei 17-05-2012 47 12   Download

  • Tham khảo tài liệu 'the mcafee network security platform: bridging network and system security', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf0p khongmuonnghe 04-01-2013 20 2   Download

  • hree different artists from different part of the world sharing same platform on Artflow, showcasing their creative abilities to the world. It is always my pleasure to welcome you to another edition of this Magazine. We are here to show our support.......................................................... WWW.ARTFLOWMAGAZINE.COM Leisa O’Brien was born in a small town of Bundaberg, Australia and working predominantly in acrylics now. Her love of art is only matched by her drive to educate others about painting and right-brained thinking.

    pdf1p mymi0809 24-01-2013 23 2   Download

  • Maximum Security, provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems.

    pdf670p gaconht 01-07-2012 113 31   Download

  • THE Java™ Web Services Tutorial is a guide to developing Web applications with the Java Web Services Developer Pack (Java WSDP). The Java WSDP is an all-in-one download containing key technologies to simplify building of Web services using the Java 2 Platform. This tutorial requires a full installation (Typical, not Custom) of the Java WSDP, v1.6 with the Sun Java System Application Server Platform Edition 8.1 2005Q2 UR2 (hereafter called the Application Server). Here we cover all the things you need to know to make the best use of this tutorial....

    pdf463p ptng13 16-05-2012 66 24   Download

  • WLAN technologies are becoming increasingly popular, and promise to be the platform for many future applications: Home Entertainment Networking Example WLAN/WPAN Technologies: IEEE 802.11

    ppt34p muathu_102 28-01-2013 49 20   Download

  • Threats and Mitigation Conventional Cryptography and Kerberos Public Key Cryptography and SSL Windows Security 101: Basics Windows Security 102: Impersonation and Delegation Code Access Security Part 1, Policy Code Access Security Part 2, Enforcement Securing Web Applications Securing Web Services Securing System.Runtime.Remoting Securing COM+ Dumb Code: avoid writing code with silly security holes

    pdf368p goldit 09-10-2010 81 19   Download

  • We live in an era of unimaginably rapidly advancing and amazing technologies that enable instantaneous flow of information – anytime, anywhere. The convergence of computers and networks has been the key force behind the development of these awesome technologies. Increasing use of systems..

    pdf900p quanght_cntt 06-12-2012 53 14   Download

  • During the last year there has hardly been an issue of a computer or business magazine not flooded with buzzwords like “e-commerce,” Internet, Web, or security. E-commerce (electronic commerce) is a result of moving the economy to a new medium, namely the computer network. For the most part, interconnected networks all over the world use a common set of protocols (i.e., TCP/IP), thus making up the Internet.

    pdf432p ptng13 16-05-2012 38 13   Download

  • It is becoming clearer every year that workstations require as much comprehensive IT security attention as servers – particularly as the popularity of mobile workstations (laptops) continues to rise. Microsoft has advanced several technologies in Windows Vista to increase workstation security. This white paper introduces eight such technologies: • User Account Control • IE7 Protected Mode • Service Hardening • Windows Resource Protection • Windows Defender • TPM and BitLocker • Network Access Protection • PatchGuard and Driver Signing (64-bit platform)...

    pdf10p emilynguyen 06-08-2009 98 10   Download

  • Platform Builder provides you with several different vertical device configurations ranging from a Residential Gateway that features only the kernel functionality to a Media Appliance configuration that includes many graphical features and many applications.

    pdf32p thuxuan 07-08-2009 57 10   Download

  • The purpose of this exercise is to guide you through the high-level steps of creating and configuring a platform, then building an operating system Image. You will be introduced to common tasks that you will use to develop, test, and export your platform and applications. You will run the operating system image on the new hardware Emulator, familiarizing yourself with the steps of downloading an image to the Emulator for Windows CE.

    pdf7p thuxuan 07-08-2009 44 6   Download

  • The Threat Analyzer is used for the analysis of the alerts detected by your McAfee® Network Security Platform [formerly McAfee® IntruShield® ] Sensors as well as those processed by an integrated Host Intrusion Prevention Server. The Threat Analyzer works in conjunction with the policies applied to your McAfee® Network Security Sensor and Host Intrusion Prevention Sensors. For more information on policies, see IPS Configuration Guide.

    pdf123p cao_can 02-01-2013 24 5   Download

  • With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You’ll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker’s opportunity to compromise your app and steal user data.

    pdf112p hoa_can 29-01-2013 12 5   Download

  • What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms. Designed to be browsed, Security Power Tools offers.

    pdf858p titatu_123 01-03-2013 31 5   Download

  • This document provides details about how security technology and features are implemented within the iOS platform. It will also help organizations combine iOS platform security technology and features with their own policies and procedures to meet their specific security needs.

    pdf33p tu_tai_linh 17-05-2014 21 5   Download

  • The Messages from McAfee feature enables you to view any product or security-related messages from McAfee. The messages can be related to operating system patches, signature set release, Manager software update, and so on. The Manager checks McAfee's Update Server for such messages every 15 minutes and displays messages that are relevant to the version of Manager and signature set that you are using. This feature ensures that all relevant messages from McAfee® Network Security Platform [formerly McAfee® InruShield® ] support team reach you on time.

    pdf32p cao_can 02-01-2013 28 4   Download

  • Trend Micro has taken the multilayered security approach to the next level of sophistication with its Trend Micro Threat Management Services network security "overwatch" service. Threat Management Services provides an additional security layer that greatly strengthens an organization's security infrastructure by monitoring the network for active infections that have successfully infiltrated. Once the threat discovery occurs, in real time, the network overwatch layer intercepts the attack and performs automated containment and remediation.

    pdf8p khongmuonnghe 04-01-2013 38 4   Download

  • It is availiable free on a variety of platforms. Based on well known algorithms. Wide range of applicability Not developed or controlled by governmental or standards organizations

    ppt26p muathu_102 28-01-2013 23 4   Download

  • This volume reflects the work of the Trans-Tasman Maritime Security Project, which comprises a group of Australian and New Zealand scholars with back- grounds in international law, international relations and maritime security. Our aim has been to identify the issues that particularly affect Australia and New Zealand’s maritime security and to undertake research that evaluates those issues from legal and political perspectives, and propose methods for improving mari- time security in the two countries.

    pdf304p lyly_5 25-03-2013 17 4   Download

Đồng bộ tài khoản