intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Security communication

Xem 1-20 trên 706 kết quả Security communication
  • The study was carried out on the basis of work with grant of the RFBR No. 19-010-00040 “Interaction between the real and virtual sectors of the economy in order to increase their efficiency and ensure a balance of interests between business, society and the state”. This paper proposed to introduce integrated indicators of the effect of digitalization.

    pdf9p longtimenosee09 08-04-2024 2 2   Download

  • Part 1 book "It governance - A managers guide to data security" includes content: Why is information security necessary the combined code; the turnbull report and sarbanes–oxley; organizing information security; information security policy and scope; the risk assessment and statement of applicability; external parties; asset management; human resources security, physical and environmental security, equipment security, communications and operations management, controls against malicious software (malware) and back-ups.

    pdf205p longtimenosee08 31-03-2024 0 0   Download

  • Ebook How to cheat at deploying securing RFID: Part 2 includes contents: Chapter 7 Performing Site Analysis; Chapter 8 Performing Installation; Chapter 9 Working with RFID peripherals; Chapter 10 Monitoring and Troubleshooting RFID Systems; Chapter 11 Threat and Target Identifi cation; Chapter 12 RFID Attacks: Tag Encoding Attacks; Chapter 13 RFID Attacks: Tag Application Attacks; Chapter 14 RFID Attacks: Securing Communications Using RFID Middleware; Chapter 15 RFID Security: Attacking the Backend; Chapter 16 Management of RFID Security.

    pdf197p longtimenosee05 31-03-2024 0 0   Download

  • Ebook Flash professional CS5 advanced for windows and macintosh: Part 1 includes contents: Chapter 1 building complexity, chapter 2 working with video, chapter 3 getting a handle on actionscript, chapter 4 advanced buttons and event handling, chapter 5 controlling multiple timelines, chapter 6 managing external communication.

    pdf243p longtimenosee05 31-03-2024 0 0   Download

  • Ebook The SSCP prep guide: Mastering the seven key areas of system security - Part 2 includes contents: Chapter 5 domain 4: risk, response, and recovery; chapter 6 domain 5: cryptography; chapter 7 domain 6: data communications; chapter 8 domain 7: malicious code; appendix a glossary; appendix b testing tools; appendix c references for further study; appendix d answers to sample questions.

    pdf296p longtimenosee05 31-03-2024 0 0   Download

  • Ebook Firewalls and internet security (Second edition): Part 2 includes content: Chapter 9 kinds of firewalls, chapter 10 filtering services, chapter 11 firewall engineering, chapter 12 tunneling and VPNs, chapter 13 network layout, chapter 14 safe hosts in a hostile environment, chapter 15 intrusion detection, chapter 16 an evening with berferd, chapter 17 the taking of clark, chapter 18 secure communications over insecure networks, chapter 19 where do we go from here?, appendix a an introduction to cryptography, appendix b keeping up.

    pdf263p longtimenosee03 22-02-2024 3 2   Download

  • This book is not designed to be a general networking topics book; although, it can be used for that purpose. This book is intended to tremendously increase your knowledge level with regards to OSPF. Personnel responsible for understanding OSPF should read this book. You might need to understand OSPF because you are a programmer, network manager, network engineer, studying for certification, and so on.

    pdf768p longtimenosee03 22-02-2024 6 2   Download

  • Ebook Personal networks: Wireless networking for personal devices includes content: Chapter 1 the vision of personal networks, chapter 2 personal networks user requirements, chapter 3 trends in personal networks, chapter 4 the personal network architecture, chapter 5 cluster formation and routing, chapter 6 inter-cluster tunneling and routing, chapter 7 foreign communication, chapter 8 personal network application support systems, chapter 9 personal network security, chapter 10 personal network federations, chapter 11 personal network prototypes, chapter 12 the future of personal networks.

    pdf230p longtimenosee03 22-02-2024 3 2   Download

  • Ebook "Food security in Australia: Challenges and prospects for the future" considers the ability and capacity of the food supply system in Australia to provide food security for the ever-increasing domestic and international population in the face of growing challenges in production, resource supply and failures within the food system itself. Although Australia is a net food exporting country, domestic food insecurity exists and will increase as food prices rise in the coming decades.

    pdf483p nhanphanguyet 28-01-2024 2 2   Download

  • Ebook Brute force cracking the data encryption standard includes contents: Working Late, Keeping Secrets, Data Encryption Standard, Key Length, Discovery, RSA Crypto Challenges, Congress Takes Note, Supercomputer, Organizing DESCHALL, Needle in a Haystack, Spreading the Word, The Race Is On, Clients, Architecture, Progress, Trouble, Milestones, Gateways, Network, Download, Short Circuit, DESCHALL Community, Proposal,…

    pdf283p haojiubujain010 14-12-2023 4 1   Download

  • Ebook Cisco NAC Appliance - Enforcing Host Security with Clean Access contains 6 parts, includes: Part I: The host security landscape; Part II: The Blueprint: Designing a Cisco NAC Appliance Solution; Part III: The Foundation: Building a Host Security Policy; Part IV: Cisco NAC Appliance Configuration; Part V: Cisco NAC Appliance Deployment Best Practices; Part VI: Cisco NAC Appliance Monitoring and Troubleshooting; Appendix: Sample user community deployment messaging material.

    pdf571p haojiubujain09 30-11-2023 4 4   Download

  • Part 2 book "Managing breeds for a secure future - Strategies for breeders and breed associations" includes content: Selection and mating strategies, cryopreservation, external factors affecting breeds, associations – principles, associations – details, competitive shows, registry, monitoring the breed census, breeder responsibilities to the breed and breed community.

    pdf143p oursky09 08-11-2023 3 2   Download

  • Continued part 1, part 2 of ebook "The internet supply chain: Impact on accounting and logistics" provides readers with contents including: the changing responsibilities of senior management in a modern firm; one of the big challenges with electronic commerce; getting our company ready for shifts in market power; the real revolution in computers and communications is in logistics; operational risk with supply chain: privacy and security;...

    pdf150p mocthanhdao0210 19-11-2023 4 1   Download

  • Ebook Practical VoIP Security: Part 1 includes contents: Chapter 1 Introduction to VoIP Security; Chapter 2 Asterisk Configuration and Features; Chapter 3 The Hardware Infrastructure; Chapter 4 PSTN Architecture; Chapter 5 H.323 Architecture; Chapter 6 SIP Architecture; Chapter 7 Other VoIP Communication Architectures; Chapter 8 Support Protocols; Chapter 9 Threats to VoIP Communications Systems.

    pdf290p haojiubujain06 23-10-2023 4 3   Download

  • Ebook Practical VoIP Security: Part 2 includes contents: Chapter 10 Validate Existing Security Infrastructure; Chapter 11 Confirm User Identity; Chapter 12 Active Security Monitoring; Chapter 13 Logically Segregate Network Traffic; Chapter 14 IETF Encryption Solutions for VoIP; Chapter 15 Regulatory Compliance; Chapter 16 The IP Multimedia Subsystem: True Converged Communications; Chapter 17 Recommendations.

    pdf302p haojiubujain06 23-10-2023 5 3   Download

  • Ebook "Mobile developers guide to the galaxy" includes content: Prologue, conceptional design for mobile, blackberry java apps, windows phone & windows rt, going cross platform, mobile sites & web technologies, mobile analytics, implementing rich media, implementing location based services, near field communication, implementing haptic vibration, implementing augmented reality, application security,...and other contents.

    pdf256p haojiubujain07 20-09-2023 4 2   Download

  • Ebook "Introduction to communication electronic warfare systems" includes content: Communication electronic warfare systems, electromagnetic signal propagation, noise and interference, radio communication technologies, system engineering, electronic support, electronic attack, antennas, receivers, signal processing, direction finding position fixing techniques, hyperbolic position fixing techniques, exciters and power amplifiers,... and other contents.

    pdf285p haojiubujain07 20-09-2023 4 2   Download

  • Health insurance is one of the most important social policies, with humanitarian significance and profound community sharing, which is highly valued by the Party and State in the Social Security policy system.

    pdf4p vipierre 02-10-2023 2 2   Download

  • Ebook "RFID security" includes content: What is RFID, RFID uses, threat and target identification, RFID attacks - Tag encoding attacks; RFID attacks - Tag application attacks; RFID attacks - Securing communications using, RFID middleware; RFID security - Attacking the backend, management of RFID security.... and other contents.

    pdf266p haojiubujain07 20-09-2023 4 2   Download

  • Continued part 1, part 2 of ebook "A graduate course in applied cryptography" develops the concepts of public-key encryption and digital signatures, which allow Alice and Bob to communicate securely, without having a pre-shared secret key. About cryptographic protocols, such as protocols for user identification, key exchange, zero knowledge, and secure computation.

    pdf489p tieulangtran 28-09-2023 4 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2