Xem 1-20 trên 1380 kết quả System security
  • "Network and system security" provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.

    pdf405p vtva001 24-09-2010 227 73   Download

  • Lesson LPI 202 Chapter 4 "Advancer Linux Netword Administration System Security" give you the knowledge: Ipchains and Iptables, Configuring a router, Securing FPT Servers,... With the specialized technology your information, this is a useful reference.

    ppt63p thetam263 28-03-2016 3 2   Download

  • Content in lecture Information systems security include: General security concepts, identifying potential risks, infrastructure and connectivity, monitoring activity and intrusion detection, implementing and maintaining a secure network, securing the network and environment, cryptography basics - methods and standards, security policies and procedures, security administration.

    ppt8p kiepnaybinhyen_02 25-12-2015 6 1   Download

  • After studying this chapter you should be able to differentiate among various systems’ security threats: Privilege escalation, virus, Worm, Trojan, Spyware, Spam, Adware, Rootkits, Botnets, Logic bomb,... For further information, inviting you to refer lecture.

    ppt80p kiepnaybinhyen_02 25-12-2015 6 1   Download

  • After studying chapter 4 you should be able to: Describe the basic IEEE 802.11 wireless security protections; define the vulnerabilities of open system authentication, WEP, and device authentication; describe the WPA and WPA2 personal security models; explain how enterprises can implement wireless security.

    ppt55p kiepnaybinhyen_02 25-12-2015 5 3   Download

  • After studying this chapter you should be able to: Define privilege audits, describe how usage audits can protect security, list the methodologies used for monitoring to detect security-related anomalies, describe the different monitoring tools.

    ppt46p kiepnaybinhyen_02 25-12-2015 7 2   Download

  • Review Cryptography & Network Security - Nguyen Cao Dat Introduction(OSI Security Architecture, Security Attack, Security mechanism, Security service,...), Basics of Cryptography, Network Security Applications, System Security.

    pdf48p cocacola_17 09-12-2015 12 1   Download

  • Operating System: Chapter 11 - Case Study 2 - Windows 2000 presents about History of windows 2000, Programming windows 2000, System structure, Processes and threads in windows 2000, Memory management, Input/output in windows 2000, The windows 2000 file system, Security in windows 2000, Caching in windows 2000.

    ppt46p cocacola_17 12-12-2015 4 1   Download

  • The content in chapter 1: Understanding information security, understanding the goals of information security, comprehending the security process, authentication issues to consider, distinguishing between security topologies.

    ppt60p kiepnaybinhyen_02 25-12-2015 3 1   Download

  • Objectives in chapter 3: Explain how to harden operating systems, list ways to prevent attacks through a Web browser, define SQL injection and explain how to protect against it, explain how to protect systems from communications-based attacks, describe various software security applications.

    ppt64p kiepnaybinhyen_02 25-12-2015 3 1   Download

  • The content chapter 5 include: Access control models, authentication models, logging procedures, conducting security audits, redundancy planning, disaster recovery procedures, organizational policies.

    ppt64p kiepnaybinhyen_02 25-12-2015 7 1   Download

  • In this section we are going to cover some of the key aspects that need to be addressed in order to have a secure web server using IIS. It is important to note that a system is only as secure as its weakest link and therefore any web server must be built on a secure and hardened Windows 2000 system. Securing Windows 2000 is not covered in this section but has been covered in a previous module. So before you install IIS make sure that you spend the time to properly harden your base operating system. Once you have a secure operating system configured, you...

    pdf30p huyhoang 07-08-2009 253 79   Download

  • A great resource covering Ubuntu from A to Z without all the extra fluff" -- Ryan Troy, administrator, Ubuntuforums.org. Read by over 500,000 people, Ubuntu Pocket Guide and Reference is the world's most popular Ubuntu book. Written by award-winning expert Keir Thomas, it will quickly transform you into a power user. In its clear and concise pages, you'll learn step-by-step about installation, the Ubuntu desktop, the tricks and techniques of efficient day-to-day usage, the command-line, software management, and, finally, system security.

    pdf170p trung254 22-07-2012 49 16   Download

  • This manual is an effort to assist law enforcement agencies and other computer crime investigators by providing a resource guide compiled from the vast pool of information on the Internet. This manual is not intended to replace any formal training or education. This manual should be used as a supplemental guide to reference too. It was not my intention to compile this manual to provide a specific solution for investigators. This was intended to provide a general overview, which would assist in helping to developing a solution. This solution does not have to be hardware or software based.

    pdf325p ptng13 16-05-2012 36 8   Download

  • Tham khảo sách 'security assessment case studies for implementing the nsa iam', công nghệ thông tin, kỹ thuật lập trình phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf465p tailieuvip13 19-07-2012 27 5   Download

  • This document provides details about how security technology and features are implemented within the iOS platform. It will also help organizations combine iOS platform security technology and features with their own policies and procedures to meet their specific security needs.

    pdf33p tu_tai_linh 17-05-2014 21 5   Download

  • Lecture Operating System: Chapter 11 - Windows 2000 presented History of windows 2000, Programming windows 2000, System structure, Processes and threads in windows 2000, Memory management, Input/output in windows 2000, the windows 2000 file system, Security in windows 2000, Caching in windows 2000.

    ppt46p talata_1 22-09-2014 26 5   Download

  • Web now widely used by business, government, individuals but Internet & Web are vulnerable have a variety of threats integrity confidentiality denial of service authentication need added security mechanisms

    ppt24p muathu_102 28-01-2013 28 4   Download

  • Lecture Operating System: Chapter 09 - Security presented The security environment, Basics of cryptography, User authentication, Attacks from inside the system, Attacks from outside the system, Protection mechanisms, Trusted systems.

    ppt56p talata_1 22-09-2014 29 4   Download

  • Lecture Operating System: Chapter 10 - Unix and Linux presented History of unix, Overview of unix, Processes in unix, Memory management in unix, Input/output in unix, The unix file system, Security in unix.

    ppt40p talata_1 22-09-2014 17 4   Download

Đồng bộ tài khoản