Xem 1-20 trên 6126 kết quả Secure
  • LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple. Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff package). By using those attack tools, a hacker can defeat the security myth of a switch, which incorrectly states that sniffing and packet interception are impossible with a switch.

    pdf361p vusuakhonghat 28-05-2009 524 250   Download

  • Windows Firewall with Advanced Security trên Windows Server 2008 là một sự kết hợp giữa personal firewall (host firewall) và Ipsec,cho phép bạn cấu hình để lọc các kết nối vào và ra trên hệ thống. Không giống như những firewall ở các phiên bản Windows trước chỉ sử dụng Windows Firewall trong Control Panel để thực hiện các thao tác cấu hình ở mức độ giới hạn. Trong Windows Server 2008 bổ sung một thành phần mới có tên gọi là Windows Firewall with Advance Security. ...

    pdf19p minhqui710 10-09-2010 325 180   Download

  • Microsoft Internet Security and Acceleration Sever (ISA Server) là phần mềm share internet của hãng phần mềm nổi tiếng Microsoft, là bản nâng cấp duy nhất (tính đến thời điểm này) từ phần mềm MS Proxy Server 2.0. Có thể nói đây là một phần mềm share internet khá hiệu quả, ổn định, dễ cấu hình, firewall tốt, nhiều tính năng cho phép bạn cấu hình sao cho tương thích với mạng LAN của bạn.

    pdf31p trannhu 05-08-2009 468 168   Download

  • Chuẩn bị - Logon vào với Administrator, tạo user có tên là u1, đặt password là u1 - Logoff Administrator , Logon u1 - Logoff u1, Logon Administrator, Khởi động Vào menu Start, Program, Administrator Tools, Local Security Policy hoặc vào Start, Run, secpol.msc Cửa sổ trên giống một phần của cửa sổ Group Policy Object Editor (gpedit.msc) ở mục Computer Configuration ,Windows Settings, Security Settings cho nên ta có thể dùng gpedit.msc để xác định local Security Policy. ...

    pdf11p ht09dng 08-08-2010 427 141   Download

  • This book was written to give the reader a well-rounded understanding of wireless network security. It looks at wireless from multiple perspectives, ranging from auditor, to security architect, to hacker. This wide scope benefits anyone who has to administer, secure, hack, or participate on a wireless network. Going through this book, the reader will see that it tackles the risk of wireless from many angles. It goes from a policy level to mitigate certain risks that wireless brings. It talks about the most cost-effective solutions to deploy wireless across a large enterprise.

    pdf353p daokim 04-08-2009 221 132   Download

  • Network Security & Preventing HackerContent: What do a Malicious Hacker Do?, Level of Hacker, Gathering Information of Hacker, Trojan and Backdoor, Sniffers, Firewall and IDS, Countermeasure. Network Security: Software firewall: ISA Server, anti-virus (McAfee, TrendMicro, Norton Antivirus, Symantec) Hardware Firewall: Checkpoint, PIX, Fortinet, Crossbeam, Watchguard, Sonic Walls

    ppt96p 0985448637 08-09-2010 229 123   Download

  • A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide.

    pdf458p xabenglengkeng 26-05-2009 283 117   Download

  • Phần mềm Kaspersky Internet Security (KIS) là một giải pháp tổng hợp hoàn thiện bảo vệ máy tính của bạn tránh khỏi những hiểm họa Internet thường gặp nhất, bao gồm virus, sự tấn công của hacker, adware (phần mềm quảng cáo), spam(thư rác) hay spyware. Ngày này, những mối nguy hiểm rình rập PC đã xuất hiện với số lượng nhiều và rất đa dạng. Tội phạm số trên Internet đã được tổ chức tốt hơn và bắt đầu tấn công PC một cách chuyên nghiệp hơn.

    pdf14p luavitradong 15-05-2010 309 113   Download

  • Solve Two of the Toughest Problems When Preparing for the Stockbroker’s Exam Those wishing to become licensed as stockbrokers must pass the series 7 examination. This exam, known officially as the General Securities Registered Representative Examination, is very rigorous. Traditionally, students without a financial background have a difficult time with the mathematical calculations peculiar to the world of stocks, bonds, and options. Many are also relatively unfa- miliar with proper use of the calculator and thus are dou- bly hampered in their efforts to become registered.

    pdf225p duypha 15-07-2009 238 108   Download

  • Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is one of the least secure forms of security.Many laptop computers have wireless cards pre-installed. The ability to enter a network while mobile has great benefits. However, wireless networking is prone to some security issues. Crackers have found wireless networks relatively easy to break into, and even use wireless technology to crack into wired networks......

    ppt41p 260786 25-11-2009 190 107   Download

  • This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Security course as part of an official Cisco Networking Academy Program. Network attacks have resulted in the loss of sensitive data and significant network downtime. When a network or the resources in it are inaccessible, worker productivity can suffer, and business income may be lost. Attackers have developed many tools over the......

    pdf283p hiennxuan 22-10-2010 300 106   Download

  • Mod_security là một opensource web application firewall được Ivan Ristic phát triển dành cho Apache Web Server. Ivan Ristic là tác giả quyển sách.Ông là một người có rất nhiều kinh nghiệm trong bảo vệ Apache Web Server. Ông đã có nhiều thời gian nghiên cứu Web Application Security, Web Intrusion Detection, và Security Patterns.

    doc12p astronaut 11-02-2012 245 102   Download

  • The Check Point Next Generation suite of products provides the tools necessary for easy development and deployment of enterprise security solutions. Check Point VPN-1/FireWall-1 has been beating out its competitors for years, and the Next Generation software continues to improve the look, feel, and ease of use of this software. Most notably, there is a new security dashboard that gives security administrators a more detailed view of the Security Policy and management objects in one window.The user interface is easy to comprehend and provides optimal functionality all in one place....

    pdf657p mylinh 11-08-2009 274 99   Download

  • Tài liệu tham khảo chuyên ngành quản trị mạng - Wireless LAN Security.

    pdf38p ngqcaovinh 09-12-2010 188 93   Download

  • The Cisco® Networking Academy® course on CCNA® Security provides a next step for students who want to expand their CCNA-level skill set to prepare for a career in network security. The CCNA Security course also prepares students for the Implementing Cisco IOS® Network Security (IINS) certification exam (640-553), which leads to the CCNA Security certification. The CCNA Security Lab Manual provides you with all 11 labs from the course designed as hands-on practice to master the knowledge and skills needed to prepare for entry-level security specialist careers....

    pdf294p lvtcit 13-06-2012 222 91   Download

  • Chris Butler (CISSP, JNCIS-FWV, JNCIA-SSL, CCSE, IAM/IEM) is a Senior Solutions Architect with Intellitactics. Chris has more than a dozen years of experience in the networking and security fields. He is a veteran of the United States Navy, where he worked in the cryptography field. Chris has designed, implemented, and supported some of the largest networks in the country for large insurance companies, investment firms, software companies, service providers, and pharmaceutical companies. He has also provided network and security consulting services for numerous...

    pdf243p vusuakhonghat 28-05-2009 185 90   Download

  • Ebook "Network security technologies" presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. This text is unique in that it classifies technologies as basic, enhanced, integrated, and architectural as a means of associating their functional complexities, providing added insight into their interrelationships. It introduces and details security components and their relationships to each other.

    pdf267p thutrang 17-08-2009 172 85   Download

  • In an age when our society relies so heavily on electronic communication, the need for information security is imperative. Given the value and confidential nature of the information that exists on today’s networks, CIOs are finding that an investment in security is not only extremely beneficial but also absolutely necessary. Corporations are realizing the need to create and enforce an information security policy.

    pdf658p mylinh 11-08-2009 184 84   Download

  • In addition to an explosion of touch points, we are faced with an infinitively complex and rapidly changing web of networks, applications, systems, client software, and service providers. Under these circumstances, absolute security cannot be guaranteed since it’s impossible to test the security implications of every configuration combination of hardware and software under every set of conditions.

    pdf786p maiphuong 11-08-2009 141 84   Download

  • Internetworking security has become a very big issue in recent months. Companies who went through corporate life thinking, “it will never happen to me” suddenly found themselves the victim of some sort of attack on their network. High profile companies are most certainly a bigger target for several reasons, including the notoriety the hacker receives for damaging their network or Web site, and the amount of financial damage that can be done by bringing down a successful e-commerce site. Recent attacks easily racked up 100 million dollars in damage....

    pdf529p maiphuong 11-08-2009 322 84   Download

Đồng bộ tài khoản