Xem 1-20 trên 157 kết quả Secure vpn
  • Tham khảo sách 'cisco secure vpn version 5.1', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf139p batrinh 10-08-2009 53 14   Download

  • What is a VPN? Cisco Documentation on VPN • A VPN is a Virtual Private Network • Now, as more and more companies need access for remote users, mobile users or remote offices, your current architecture can be augmented with a VPN • A Virtual Private Network is a network that’s created by encryption (Tunneling) across another unsecured medium, like the Internet • What is great about Cisco and VPN’s is that all Cisco devices can be configured as a VPN enabled device solely by the IOS feature set itself. There is a concentrator series, but...

    pdf21p phongthinh 07-08-2009 496 172   Download

  • Tham khảo sách 'cisco secure vpn (csvpn®) 9e0-121 - version 6.0', công nghệ thông tin, chứng chỉ quốc tế phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf108p halanh 15-08-2009 92 34   Download

  • CCSP Cisco Secure VPN Exam Certification Guide is a comprehensive study tool that enables you to master the concepts and technologies required for success on the CSVPN exam. Each chapter of the CCSP Cisco Secure VPN Exam Certification Guide tests your knowledge of the exam subjects through sections that detail exam topics to master and areas that highlight essential subjects for quick reference and review.

    pdf50p ken333 28-06-2012 58 8   Download

  • Tham khảo tài liệu 'upgrading secureclient to endpoint security vpn r75 on r70.40 security management', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf31p hoangtumayman 26-09-2011 26 5   Download

  • Tham khảo tài liệu 'endpoint security vpn r75 user guide', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf13p hoangtumayman 26-09-2011 33 4   Download

  • Tham khảo tài liệu 'endpoint security vpn r75 administration guide', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf108p hoangtumayman 26-09-2011 25 3   Download

  • Tham khảo tài liệu 'upgrading secureclient to endpoint security vpn r75 on ngx r65 smartcenter server', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf34p hoangtumayman 26-09-2011 23 3   Download

  • Tham khảo tài liệu 'upgrading secureclient to endpoint security vpn r75 on r71 security management', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf31p hoangtumayman 26-09-2011 31 3   Download

  • The Installation Process Important - To install a Remote Access client on any version of Windows, you need Administrator permissions. Consult with your system administrator. To install a Remote Access client: 1. Log in to Windows with a user name that has Administrator permissions. 2. Get the installation package from your system administrator, and double-click the installation package. 3. Follow the installation wizard. Note - On Windows Vista and Windows 7, there may be a prompt to allow access, depending on the UAC settings....

    pdf16p hoangtumayman 20-08-2012 25 3   Download

  • Tham khảo tài liệu 'remote access clients e75.20 upgrading from secureclient/securemote ngx on r71 or r75 security management', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf27p hoangtumayman 20-08-2012 24 3   Download

  • As surprising as it sounds, there are still people out there who use well-known exploits, such as war dialing, to gain unauthorized access. This term became popular with the film War Games and refers to a technique that involves the exploitation of an organization’s telephone, dial, and private branch exchange (PBX) systems to penetrate internal network and computing resources. All the attacker has to do is find a user within the organization with an open connection through a modem unknown to the IT staff or a modem that has minimal or, at worst, no security services enabled.

    pdf38p cao_can 02-01-2013 15 3   Download

  • Remote Access Clients provide a simple and secure way for endpoints to connect remotely to corporate resources over the Internet, through a VPN tunnel. Check Point offers 3 enterprise-grade flavors of Remote Access to fit a wide variety of organizational needs. The clients offered in this release are: Endpoint Security VPN - Incorporates Remote Access VPN with Desktop Security in a single client. It is recommended for managed endpoints that require a simple and transparent remote access experience together with desktop firewall rules....

    pdf26p hoangtumayman 20-08-2012 25 2   Download

  • Tham khảo tài liệu 'remote access clients e75.20 upgrading from secureclient/securemote ngx on r70.40 security management', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf26p hoangtumayman 20-08-2012 27 2   Download

  • Tham khảo sách 'hacking in a foreign language: a network security guide to russia', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf0p cao_can 02-01-2013 21 2   Download

  • Even though PEMis a landmark protocol in the development of secure messag- ing, and is also generally considered to be of sound technical design [29], it did not catch on. This was mainly due to two reasons. First, the message syntax that PEM describes was incompatible with the widely successful MIME message syntax that emerged at the same time [29, p. 156]. Secondly, the public-key management de- scribed by PEM restricted the Certificate structure [9, p. 51]. Namely, it required a top-down Certificate Authority (CA) approach.

    pdf99p cao_can 02-01-2013 22 2   Download

  • If we lived in a static world, developing effective solutions for known attacks might be achievable over time. However, in today's complex cyber business environment, there is no static state. Too often, attackers are ahead of the curve, continually innovating effective attack strategies and schemes, while security professionals and enterprise IT continue to struggle to keep pace with malicious developments. Today's enterprise threat environment has evolved and exploded into an assortment of blended attack vectors that effectively work in concert to breach existing security defenses.

    pdf20p khongmuonnghe 04-01-2013 22 2   Download

  • Security professionals understand that these gaps exist and represent risks for them. In IDC's 2008 Enterprise Security Survey, only 46% of surveyed participants said that they were very confident or extremely confident of their existing enterprise security. IDC believes that this finding demonstrates a noticeable level of management uncertainty and a lack of confidence in existing security systems. The source of this lack of confidence is largely due to the understanding that existing infrastructures do have security gaps.

    pdf28p khongmuonnghe 04-01-2013 27 2   Download

  • This document serves as a design guide for those intending to deploy a site-to-site VPN based on IP Security (IPsec). The designs presented in this document focus on Cisco IOS VPN router platforms. The primary topology described in this document is a hub-and-spoke design, where the primary enterprise resources are located in a large central site, with a number of smaller sites or branch offices connected directly to the central site over a VPN. A high-level diagram of this topology is shown in Figure 1....

    pdf56p batoan 10-08-2009 292 126   Download

  • OpenVPN is an open source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It uses a custom security protocol[2] that utilizes SSL/TLS for key exchange. It is capable of traversing network address translators (NATs) and firewalls. It was written by James Yonan and is published under the GNU General Public License (GPL)

    pdf36p good_life 17-11-2009 196 101   Download

Đồng bộ tài khoản