Thư viện An ninh - Bảo mật

Hiện tượng tấn công hệ thống CNTT trên thế giới ngày càng xuất hiện thường xuyên hơn. An ninh mạng và bảo mật hệ thống trở thành nhiệm vụ quan trọng của bộ phận CNTT trong mỗi tổ chức. Các vấn đề về an ninh mạng và bảo mật thông tin là chủ đề không thể thiếu khi thiết kế và xây dựng một hệ thống CNTT. Các chuyên gia về an ninh & bảo mật không ngừng công bố các kỹ thuật, công cụ và biện pháp nhằm bảo mật thông tin, an ninh hệ thống và chống lại các phương thức tấn công của Hacker. Các chủ đề về an ninh & bảo mật phổ biến như: an ninh mạng/hệ thống Firewall-VPN-IPS-NAC-SSL, bảo vệ khôi phục dữ liệu, an toàn thông tin Password-Credit Card,... Tham khảo nguồn tài liệu, sách, giáo trình, bài giảng và các giải pháp an ninh bảo mật để đảm bảo cho hệ thống và thông tin của bạn an toàn.
Hiển thị 1-10 trên 493 kết quả
  • The topic discussed in this chapter are: Security threats in mobile devices environment, cryptography, what is cryptology? terminology, another way to represent the concept of cryptography, goals of the adversary, cryptanalysis, language redundancy and cryptanalysis,...

     dien_vi01 21-11-2018 0 0   Download

  • This is the last part of the course. The main concepts that are discussed in this part are: Tools and techniques to protect data during the transmission over the Internet, Sobig F. worm, grappling Hook attack, Morris Internet worm, Overview of the Internet security protocols such as https and ssh.

     dien_vi01 21-11-2018 3 0   Download

  • The topic discussed in this chapter are: Secure Socket Layer (SSL), three SSL-specific protocols that use the SSL Record Protocol, integrating SSL/TLS with HTTP => HTTPS, HTTPS and SSH. This chapter you would be able to present an understanding of how web security is achieved through different protocols; you would be able demonstrate knowledge about SSH, HTTPS, TLS etc.

     dien_vi01 21-11-2018 0 0   Download

  • The topic discussed in this chapter are email security, pretty good privacy, secure/multipurpose internet mail extensions (S/MIME). In this chapter you would be able to present an understanding of how to secure email over the internet, you would be able demonstrate knowledge about PGP and its operation.

     dien_vi01 21-11-2018 0 0   Download

  • In this chapter: We will talk about what Internet security is and how to ensure security while browsing through the internet, we will also see what spyware are and how do they look like, we will also discuss few methods that can be used to avoid spywares, we will also see a couple of examples of phishing on the internet.

     dien_vi01 21-11-2018 0 0   Download

  • In this chapter we will continue our discussion on SET and explore the following; payment processing in SET: purchase request, payment authorization, payment capture. The learning objectives for this chapter include: You would be able to present an understanding of transaction that is carried out over the internet, you would be able demonstrate knowledge about different entities and their role in a SET and how the actual payment is processed in SET.

     dien_vi01 21-11-2018 0 0   Download

  • The learning objectives for this chapter include: You would be able to present an understanding of transaction that is carried out over the internet, you would be able demonstrate knowledge about different entities and their role in a SET.

     dien_vi01 21-11-2018 0 0   Download

  • This chapter we will continue our discussion on authentication applications and more precisely we will talk about kerberos in detail. kerberos versions, threats and vulnerabilities will also be discussed.

     dien_vi01 21-11-2018 0 0   Download

  • In this chapter: We will continue our discussion on Needham-Schroeder Protocol and will see how does it work, digital signature standard (DSS) and digital signature algorithm (DSA) will be discussed, we will talk about authentication applications, and will study kerberos which is an authentication service developed at MIT.

     dien_vi01 21-11-2018 0 0   Download

  • In previous lecture we explored the limitations of the centralized key distribution and have explored key distribution in a decentralized fashion. We discussed in detail, how message authentication could be achieved. There are several functions and protocols used for message authentication. This chapter you would be able to present an understanding of the higher level message authentication mechanism, demonstrate knowledge about different protocols used for message authentication.

     dien_vi01 21-11-2018 2 0   Download

Đồng bộ tài khoản