Xem 1-20 trên 287 kết quả Securities software
  • Network Security & Preventing HackerContent: What do a Malicious Hacker Do?, Level of Hacker, Gathering Information of Hacker, Trojan and Backdoor, Sniffers, Firewall and IDS, Countermeasure. Network Security: Software firewall: ISA Server, anti-virus (McAfee, TrendMicro, Norton Antivirus, Symantec) Hardware Firewall: Checkpoint, PIX, Fortinet, Crossbeam, Watchguard, Sonic Walls

    ppt96p 0985448637 08-09-2010 229 123   Download

  • Software security is gaining momentum as security professionals realize that computer security is really all about making software behave. The publication of Building Secure Software in 2001 (Viega and McGraw) unleashed a number of related books that have crystallized software security as a critical field. Already, security professionals, software developers, and business leaders are resonating with the message and asking for more.

    pdf597p vinhnghi 26-08-2009 88 12   Download

  • When I began writing this book, the first question I asked myself was how to install Linux on a server, and be sure that no one from the outside, or inside, could access it without authorization. Then I wondered if any method similar to the one on windows exists to improve the computer’s performance. Subsequently, I began a search on the Internet and read several books to get the most information on security and performance for my server. After many years of research and studies I had finally found the answer to my questions.

    pdf433p tailieuvip13 25-07-2012 47 8   Download

  • Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology.

    pdf0p canon90 25-03-2013 27 4   Download

  • Whether you are an experienced Security or System Administrator or a Newbie to the industry, you will learn how to use native, "out-of-the-box", operating system capabilities to secure your UNIX environment. No need for third-party software or freeware tools to be and stay secure! This book will help you ensure that your system is protected from unauthorized users and conduct intrusion traces to identify the intruders if this does occur. It provides you with practical information to use of the native OS security capabilities without the need for a third party security software application....

    pdf44p samsung_12 07-05-2013 15 3   Download

  • This handbook is designed to help you find ways to protect your Windows XP/Vista/7 PC and ensure your data is safe. I get countless emails from site visitors who ask about the best antivirus software, firewall program, backup utilities etc. and there are often questions like this in the forums. I set up PCs for companies, friends, and family; the advice I give in this manual is what I use when building any PC. My tips are tried and tested and have left hundreds of people satisfied with the way their computer works. I hope you too can follow these instructions...

    pdf36p namde04 04-05-2013 22 2   Download

  • Chapter 30 - Security engineering. In this chapter, the learning objectives are: To introduce issues that must be considered in the specification and design of secure software; to discuss security risk management and the derivation of security requirements from a risk analysis; to describe good design practice for secure systems development; to explain the notion of system survivability and to introduce a method of survivability analysis.

    ppt38p luimotbuoc_3 03-11-2016 0 0   Download

  • The Check Point Next Generation suite of products provides the tools necessary for easy development and deployment of enterprise security solutions. Check Point VPN-1/FireWall-1 has been beating out its competitors for years, and the Next Generation software continues to improve the look, feel, and ease of use of this software. Most notably, there is a new security dashboard that gives security administrators a more detailed view of the Security Policy and management objects in one window.The user interface is easy to comprehend and provides optimal functionality all in one place....

    pdf657p mylinh 11-08-2009 274 99   Download

  • Chris Butler (CISSP, JNCIS-FWV, JNCIA-SSL, CCSE, IAM/IEM) is a Senior Solutions Architect with Intellitactics. Chris has more than a dozen years of experience in the networking and security fields. He is a veteran of the United States Navy, where he worked in the cryptography field. Chris has designed, implemented, and supported some of the largest networks in the country for large insurance companies, investment firms, software companies, service providers, and pharmaceutical companies. He has also provided network and security consulting services for numerous...

    pdf243p vusuakhonghat 28-05-2009 186 90   Download

  • In addition to an explosion of touch points, we are faced with an infinitively complex and rapidly changing web of networks, applications, systems, client software, and service providers. Under these circumstances, absolute security cannot be guaranteed since it’s impossible to test the security implications of every configuration combination of hardware and software under every set of conditions.

    pdf786p maiphuong 11-08-2009 141 84   Download

  • Cloud Computing: Implementation, Management, and Security provides an understanding of what cloud computing really means, explores how disruptive it may become in the future, and examines its advantages and disadvantages. It gives business executives the knowledge necessary to make informed, educated decisions regarding cloud initiatives. The authors first discuss the evolution of computing from a historical perspective, focusing primarily on advances that led to the development of cloud computing.

    pdf340p ken333 07-06-2012 177 84   Download

  • This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls. It illustrates the benefits of security controls, the major techniques or approaches for each control, and important related considerations. 1

    pdf0p batrinh 07-08-2009 155 73   Download

  • Trong đó / (root của filesystem) chứa các thư mục khác và trong các thư mục này chứa các loại software, công cụ, thông tin, cấu hình... cho cả một *nix system Hacking Security Sites part 17

    pdf6p alocanhsat113 16-09-2010 68 27   Download

  • Security has become a major concern for every network administrator. Nearly every day we are bombarded with news articles describing yet another high-profile company that has fallen prey to a network-based attack. To fill in the occasional gap, we hear about new viruses that have been found “in the wild” or about additional software vulnerabilities that someone has figured out how to exploit for personal gain. The network security field has not always been this crazy. Most of us can remember a time when securing a network environment was a far easier task.

    pdf623p minhdau77 16-08-2012 60 24   Download

  • This book may not be duplicated in any way without the express written consent of the publisher, except in the form of brief excerpts or quotations for the purposes of review. The information contained herein is for the personal use of the reader and may not be incorporated in any commercial programs, other books, databases, or any kind of software without written consent of the publisher. Making copies of this book or any portion for any purpose other than your own is a violation of United States copyright laws....

    pdf292p thutrang 27-08-2009 78 23   Download

  • The book is, therefore, a survey of these issues in four parts. In the four chapters of Section I: Security through Moral and Ethical Education, we focus on moral and ethics education and also discuss related issues of security, privacy, and anonymity as they affect the creation of a strong ethical framework for decision making.

    pdf387p dieutan 17-05-2010 69 21   Download

  • The open source security position challenges the failing status quo. Increasing security issues underline the fact that the proprietary "hide-the-code" approach is not working.

    pdf14p phongthinh 06-08-2009 111 15   Download

  • "Secure Router Configuration - IOS 15.1" aims at providing network security engineers with the knowledge and skills needed to secure Cisco IOS router based networks. Readers of this book will be able to secure the network environment using existing Cisco IOS Software features, as well as install and configure components of the Cisco IOS Software, such as zone-based policy firewall and Cisco IOS Intrusion Prevention System (IPS).

    pdf248p samsung_12 07-05-2013 64 14   Download

  • CIS provides benchmarks, scoring tools, software, data, information, suggestions, ideas, and other services and materials from the CIS website or elsewhere (“Products”) as a public service to Internet users worldwide. Recommendations contained in the Products (“Recommendations”) result from a consensus-building process that involves many security experts and are generally generic in nature. The Recommendations are intended to provide helpful information to organizations attempting to evaluate or improve the security of their networks, systems and devices.

    pdf56p chanhamara02 03-11-2009 110 12   Download

  • The Secure Shell It is a protocol not a product Software based approach to network security Encrypts the data sent between the computers Client/Server architecture Comes with all Linux distribution, Mac OS X, AIX, Sun Solaris, OpenBSD and other Unix variants Ported to other operating systems, such as Windows, Palm OS, Amiga, etc. Other clients, such as, scp, sftp, etc. are also available Replacement for telnet, rlogin, rsh, rcp, ftp, etc.

    pdf84p trung254 04-11-2012 41 10   Download

Đồng bộ tài khoản