Security data

Xem 1-20 trên 648 kết quả Security data
  • Tham khảo sách 'security log management', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf349p thutrang 18-08-2009 160 68   Download

  • Several other mail transfer agents are available to replace sendmail. Two popular aternatives are Qmail (www.qmail.org) by David Bernstein, and Postfix (www.postfix.org) by Wietse Venema. Both of these MTAs were designed and written from the ground up with security and performance in mind. It is beyond the scope of this guide to give details on installing and configuring either of these alternatives, but a wealth of information is available on the Internet.

    pdf62p vuthuong 08-08-2009 141 65   Download

  • Welcome to the Oracle Database Advanced Security Administrator's Guide for the 10g Release 1 (10.1) of Oracle Advanced Security. Oracle Advanced Security contains a comprehensive suite of security features that protect enterprise networks and securely extend them to the Internet. It provides a single source of integration with multiple network encryption and authentication solutions, single sign-on services, and security protocols. The Oracle Database Advanced Security Administrator's Guide describes how to implement, configure and administer Oracle Advanced Security....

    pdf518p vitconxinhdep 30-07-2009 190 52   Download

  • This publication provides solution guidelines for enterprises implementing Data Centers with Cisco devices. The intended audiences for this design guide include network architects, network managers, and others concerned with the implementation of secure Data Center solutions, including: • Cisco sales and support engineers • Cisco partners • Cisco customers

    pdf130p kieuoanh 11-08-2009 107 32   Download

  • This Solution Reference Network Design (SRND) provides design and implementation recommendations fo r deploying security services in the data center. This document discusses security topologies that include both appliance and integrated devices. This publication provides solution guidelines for enterprises implementing Data Centers with Cisco devices.

    pdf128p kieuoanh 11-08-2009 164 28   Download

  • Once your computer is connected to the internet, it’s also connected to millions of other connected computers, which could, in turn, allow attackers to connect to your computer. Information flows from the internet to your home network by first coming into your modem, then to your router, which most people have, and finally to your computer. Because your modem doesn’t have security settings, it’s crucial to secure your router—the first securable device that receives information from the internet.

    pdf8p khongmuonnghe 04-01-2013 23 4   Download

  • Taking the network scenario of Figure 1, there will be web interfaces (routers and serv- ers), BACnet/IP controllers (connected to interesting devices that are network accessible), and operator workstations that may have vulnerable OS as well as configuration files and other interesting data and resources. The following table is adapted from a Drexel report on network security [Eisenstein et al., 2003a] and lists known IT threats to a BACnet network connected to the public Internet.

    pdf8p khongmuonnghe 04-01-2013 27 3   Download

  • An Overview of Cloud Security and Privacy includes about Cloud services delivery model, Impact of cloud computing on the governance structure of IT organizations, Companies are still afraid to use clouds, Taxonomy of Fear, Attacker Capability, Infrastructure Security, Data Security and Storage.

    ppt46p cocacola_17 11-12-2015 8 3   Download

  • New, multilayered security architectures are raising the bar in demonstrating "best efforts" to protect enterprises from attacks. These new approaches to enterprise security are now demonstrating their enhanced overall effectiveness when compared with existing and earlier enterprise security architectures. In the new and enhanced security architecture, the existing in-line threat detection forms the first layer and the overwatch component forms the second layer.

    pdf5p khongmuonnghe 04-01-2013 19 2   Download

  • Research in Cloud Computing provides about The Network Level, The Network Level - Mitigation, Local Host Security, Data Security and Storage, Auditing, monitoring and risk management, Privacy breaches, responsible for protecting privacy.

    ppt26p cocacola_17 11-12-2015 14 1   Download

  • Module 9 - Creating a security design for data. In this module, you will learn how to determine threats and analyze risks to data in an organization. You will learn how to design an access control model for files and folders in order to protect data that is stored on network servers. You will also learn about considerations for encrypting and managing data.

    ppt16p nomoney2 10-02-2017 1 1   Download

  • Module 10 - Creating a security design for data transmission. In this module, you will learn how to determine threats and analyze risks to data transmission in an organization. You will also learn how to design security for various types of data transmission, including traffic on local area networks (LANs), wide area networks (WANs), Virtual Private Networks (VPNs), wireless networks, and the Internet.

    ppt18p nomoney2 10-02-2017 3 1   Download

  • Module 5: Configuring and managing file systems. The following topics are covered in this module: Working with file systems, managing data compression, securing data by using EFS. At the end of this module, you will be able to configure and manage file systems. This includes: Configuring disk compression, securing files by using EFS.

    ppt21p nomoney2 10-02-2017 2 1   Download

  • Network Security & Preventing HackerContent: What do a Malicious Hacker Do?, Level of Hacker, Gathering Information of Hacker, Trojan and Backdoor, Sniffers, Firewall and IDS, Countermeasure. Network Security: Software firewall: ISA Server, anti-virus (McAfee, TrendMicro, Norton Antivirus, Symantec) Hardware Firewall: Checkpoint, PIX, Fortinet, Crossbeam, Watchguard, Sonic Walls

    ppt96p 0985448637 08-09-2010 232 124   Download

  • This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Security course as part of an official Cisco Networking Academy Program. Network attacks have resulted in the loss of sensitive data and significant network downtime. When a network or the resources in it are inaccessible, worker productivity can suffer, and business income may be lost. Attackers have developed many tools over the......

    pdf283p hiennxuan 22-10-2010 315 107   Download

  • Chris Butler (CISSP, JNCIS-FWV, JNCIA-SSL, CCSE, IAM/IEM) is a Senior Solutions Architect with Intellitactics. Chris has more than a dozen years of experience in the networking and security fields. He is a veteran of the United States Navy, where he worked in the cryptography field. Chris has designed, implemented, and supported some of the largest networks in the country for large insurance companies, investment firms, software companies, service providers, and pharmaceutical companies. He has also provided network and security consulting services for numerous...

    pdf243p vusuakhonghat 28-05-2009 193 90   Download

  • This Solution Reference Network Design (SRND) provides a description of the design issues related to optimizing server and application environments. Server farms are built to provide a highly available, scalable infrastructure that on which applications ru . As enterprises grow, so do their application needs which implies that more and more expenditures are allotted for additional application-specific softwar and server requirements. This increase in bottom line expenses heightens the sensitivity to overall retur on investments.

    pdf94p kieuoanh 11-08-2009 179 55   Download

  • Clusters define a collection of servers that operate as if they were a single machine. The primary purpose of high availability (HA) clusters is to provide uninterrupted access to data, even if a server loses network or storage connectivity, or fails completely, or if the application running on the server fails. HA clusters are mainly used for e-mail and database servers, and for file sharing. In their most basic implementation, HA clusters consist of two server machines (referred to as “nodes”) that “share” common storage.

    pdf222p batoan 11-08-2009 123 54   Download

  • Tham khảo sách 'data center networking: integrating security, load balancing, and ssl services using service modules', công nghệ thông tin, quản trị mạng phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf108p kieuoanh 11-08-2009 153 44   Download

  • Good administrators must know their competition. In this module we will explore some of the different way unauthorized access occurs and the security implications that open certain doors to attack. This is by no means an exhaustive examination and a great administrator must continue to perform reseach to keep apprised of new techniques as they are develpoped.

    pdf471p thutrang 17-08-2009 100 30   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản