Xem 1-20 trên 608 kết quả Security practices
  • Network System Administrators operate in a high-stress environment, where the competitive demands of the business often run counter to textbook “best practices”. Design and planning lead times can be nonexistent and deployed systems are subject to constant end-runs; but at the end of the day, you, as the Administrator, are held accountable if things go wrong.You need help and a fail-safe checklist that guarantee that you’ve configured your network professionally and responsibly.You need to “CYA”....

    pdf337p tailieuvip13 19-07-2012 44 10   Download

  • During the last three decades, public academic research in cryptography has exploded. While classical cryptography has been long used by ordinary people, computer cryptography was the exclusive domain of the world’s militaries since the World War II. Today, state-of the-art computer cryptography is practiced outside the secured walls of the military agencies. The laypersons can now employ security practices that can protect against the most powerful adversaries.

    pdf256p qsczaxewd 25-09-2012 25 9   Download

  • Considering these attack vulnerabilities and scenarios it is clear that the typical BCS is not a desirable target. System resources are limited (storage space, CPU power, common OS and software packages, etc.), and valuable information is limited to the BCS system itself (configuration data, router tables) but no financial or personal information.

    pdf6p khongmuonnghe 04-01-2013 39 9   Download

  • The Cisco® Networking Academy® course on CCNA® Security provides a next step for students who want to expand their CCNA-level skill set to prepare for a career in network security. The CCNA Security course also prepares students for the Implementing Cisco IOS® Network Security (IINS) certification exam (640-553), which leads to the CCNA Security certification. The CCNA Security Lab Manual provides you with all 11 labs from the course designed as hands-on practice to master the knowledge and skills needed to prepare for entry-level security specialist careers....

    pdf294p lvtcit 13-06-2012 222 91   Download

  • "Network and system security" provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.

    pdf405p vtva001 24-09-2010 227 73   Download

  • With an expanded discussion of network protocols and 45 completely new scenarios, this extensively revised second edition of the best-selling Practical Packet Analysis will teach you how to make sense of your PCAP data. You'll find new sections on troubleshooting slow networks and packet analysis for security to help you better understand how modern exploits and malware behave at the packet level. Add to this a thorough introduction to the TCP/IP network stack and you're on your way to packet analysis proficiency. ...

    pdf188p ken333 06-07-2012 57 31   Download

  • Network security spans a large number of disciplines, ranging from management and policy topics to operating system kernel fundamentals. Historically, the coverage of these and the other network security areas was presented in multiple, specialized publications or given a high-level treatment that was not suited to the practitioner. Network Security Bible approaches network security from the view of the individual who wants to learn and apply the associated network security best practices without having to sort through a myriad of extraneous material from multiple sources.

    pdf697p vinhnghi 17-08-2009 110 30   Download

  • William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security.

    pdf531p cuong4012 22-02-2013 68 23   Download

  • Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you'll want this book beside you every step of the way....

    pdf204p luvpuca 01-04-2011 75 19   Download

  • Tham khảo tài liệu 'practice exam', công nghệ thông tin phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf18p thuxuan 07-08-2009 55 15   Download

  • You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure.

    pdf336p titatu_123 01-03-2013 39 15   Download

  • Practical Digital Wireless Signals Do you need to know what signal type to select for a wireless application? Quickly develop a useful expertise in digital modulation with this practical guide, based on the author’s experience of over 30 years in industrial design. You will understand the physical meaning behind the mathematics of wireless signals and learn the intricacies and tradeoffs in signal selection and design.

    pdf0p aries23 29-09-2012 35 13   Download

  • This limited edition of VoIP Security For Dummies shows how risks are identified, analyzed, managed, and minimized in your converged voice and data networks. Find out how security best practices can make your VoIP network as secure as a traditional telephone network.

    pdf68p rose_12 04-12-2012 30 13   Download

  • .Advance Praise for Pricing, Risk, and Performance Measurement in Practice “The book represents a fresh and innovative departure from ‘traditional’ approaches to modelling of securities data. Subsequently, it also presents much more flexible ways to analyze and process the data. Even if you are not involved with re-architecting an organization’s master data handling, there are numerous ideas, principles, and nuggets that make it a worthwhile read.” –Dr.

    pdf398p camchuong_1 04-12-2012 50 12   Download

  • The purpose of this book is to answer those questions, from the point of view of people who want to use Java, but want to do so reliably, securely and safely. That makes this book different from much recent writing on Java, which focuses, perfectly legitimately, on how a Java system can be broken into and how to avoid those dangers. On the contrary, this book focuses on how Java can be made secure and how to exploit its strengths. The goal is to provide practical help to the various groups involved in making a Java-based application or Web site into an industrial-strength commercial proposit.

    pdf702p bluesky_12 25-12-2012 35 12   Download

  • This second edition of Network security hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending and incident response.

    pdf480p trac2_123 11-04-2013 33 12   Download

  • Security+ FastPass is the streamlined tool you need to bone up for the Security+ exam[SYO-101]. The enclosed CD lets you practice, practice, practice, andyou’ll keep the book—packed with concise, objective-focused coverageand review questions—at your side until the minute you sit down to take thetest.

    pdf222p muathu_102 28-01-2013 36 11   Download

  • Now an even more versatile learning resource, this edition adds skill objectives at the beginning of each chapter. Sobell assumes no prior Linux knowledge. He starts at the beginning and walks you through every topic and task that matters, using easy-to-understand examples.

    pdf1321p stingdau_123 26-01-2013 37 10   Download

  • The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can’t explain why. This book will help you to break free from the so-called "best practices" argument by articulating risk exposures in business terms.

    pdf354p hoa_can 05-02-2013 36 10   Download

  • This book is a practical guide to JBoss Seam, a framework aimed at enhancing the development of Java EE applications. The goal of the book is to get you up to speed with Seam as quickly as possible by introducing the core Seam framework and key additional features, following a practical, projects-oriented approach.

    pdf240p tailieuvip13 25-07-2012 40 9   Download

Đồng bộ tài khoản