Xem 1-20 trên 1242 kết quả The system security
  • "Network and system security" provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more.

    pdf405p vtva001 24-09-2010 227 73   Download

  • Lesson LPI 202 Chapter 4 "Advancer Linux Netword Administration System Security" give you the knowledge: Ipchains and Iptables, Configuring a router, Securing FPT Servers,... With the specialized technology your information, this is a useful reference.

    ppt63p thetam263 28-03-2016 3 2   Download

  • Content in lecture Information systems security include: General security concepts, identifying potential risks, infrastructure and connectivity, monitoring activity and intrusion detection, implementing and maintaining a secure network, securing the network and environment, cryptography basics - methods and standards, security policies and procedures, security administration.

    ppt8p kiepnaybinhyen_02 25-12-2015 6 1   Download

  • Kernel Concepts The two different types of Linux kernel are: A: Monolithic A monolithic kernel is one which has support for all hardware, network, and filesystem compiled into a single image file. B: Modular A modular kernel is one which has some drivers compiled as object files, which the kernel can load and remove on demand. Loadable modules are kept in /lib/modules. The advantage of a modular kernel is that it doesn’t always need to be recompiled when hardware is added or replaced on the system.

    pdf150p lehungk44f4 10-09-2012 38 10   Download

  • This manual is an effort to assist law enforcement agencies and other computer crime investigators by providing a resource guide compiled from the vast pool of information on the Internet. This manual is not intended to replace any formal training or education. This manual should be used as a supplemental guide to reference too. It was not my intention to compile this manual to provide a specific solution for investigators. This was intended to provide a general overview, which would assist in helping to developing a solution. This solution does not have to be hardware or software based.

    pdf325p ptng13 16-05-2012 36 8   Download

  • Tham khảo sách 'security assessment case studies for implementing the nsa iam', công nghệ thông tin, kỹ thuật lập trình phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf465p tailieuvip13 19-07-2012 27 5   Download

  • Lecture Operating System: Chapter 09 - Security presented The security environment, Basics of cryptography, User authentication, Attacks from inside the system, Attacks from outside the system, Protection mechanisms, Trusted systems.

    ppt56p talata_1 22-09-2014 29 4   Download

  • After studying chapter 4 you should be able to: Describe the basic IEEE 802.11 wireless security protections; define the vulnerabilities of open system authentication, WEP, and device authentication; describe the WPA and WPA2 personal security models; explain how enterprises can implement wireless security.

    ppt55p kiepnaybinhyen_02 25-12-2015 5 3   Download

  • Tham khảo tài liệu 'the mcafee network security platform: bridging network and system security', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf0p khongmuonnghe 04-01-2013 20 2   Download

  • The Proliferation Security Initiative (PSI) is a cooperative effort to prevent or at least inhibit the spread of weapons of mass destruction (WMD), their delivery systems, and related materials to or from states or non-state actors whose possession of such items would be a serious threat to global or regional security. Currently, 93 countries

    pdf0p trinhosieupham 05-02-2013 12 2   Download

  • After studying this chapter you should be able to: Define privilege audits, describe how usage audits can protect security, list the methodologies used for monitoring to detect security-related anomalies, describe the different monitoring tools.

    ppt46p kiepnaybinhyen_02 25-12-2015 7 2   Download

  • Secure DBMS design presents about Secure mechanisms (Requirements, Basic Principles), The system R authorization model (The system R authorization model, Implement model), Secure DBMS architectures, Commercial products

    ppt41p cocacola_17 11-12-2015 8 1   Download

  • Operating System: Chapter 11 - Case Study 2 - Windows 2000 presents about History of windows 2000, Programming windows 2000, System structure, Processes and threads in windows 2000, Memory management, Input/output in windows 2000, The windows 2000 file system, Security in windows 2000, Caching in windows 2000.

    ppt46p cocacola_17 12-12-2015 4 1   Download

  • Operating System: Chapter 9 - Security provides about The security environment, Basics of cryptography, User authentication, Attacks from inside the system, Attacks from outside the system, Protection mechanisms, Trusted systems.

    ppt56p cocacola_17 12-12-2015 7 1   Download

  • The content in chapter 1: Understanding information security, understanding the goals of information security, comprehending the security process, authentication issues to consider, distinguishing between security topologies.

    ppt60p kiepnaybinhyen_02 25-12-2015 3 1   Download

  • The content chapter 5 (part 1) include: Preparing for cryptographic attacks, cryptography standards and protocols, key management and key life cycle, introduction of PKI, trust models, PKI management.

    ppt81p kiepnaybinhyen_02 25-12-2015 5 1   Download

  • The content chapter 5 include: Access control models, authentication models, logging procedures, conducting security audits, redundancy planning, disaster recovery procedures, organizational policies.

    ppt64p kiepnaybinhyen_02 25-12-2015 7 1   Download

  • The contents are presented in chapter 7: Define authentication, authentication credentials, authentication models, authentication servers, extended authentication protocols, Virtual Private Network (VPN). Inviting you to refer.

    ppt54p kiepnaybinhyen_02 25-12-2015 7 1   Download

  • After studying chapter 9 you should be able to: Define risk and risk management, describe the components of risk management, list and describe vulnerability scanning tools, define penetration testing.

    ppt43p kiepnaybinhyen_02 25-12-2015 6 1   Download

  • This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors in the CCNA Security course as part of an official Cisco Networking Academy Program. Network attacks have resulted in the loss of sensitive data and significant network downtime. When a network or the resources in it are inaccessible, worker productivity can suffer, and business income may be lost. Attackers have developed many tools over the......

    pdf283p hiennxuan 22-10-2010 300 106   Download

Đồng bộ tài khoản