intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Access control and security

Xem 1-20 trên 171 kết quả Access control and security
  • Part 1 book "Computer security - Principles and practice" includes content: Reader’s and instructor’s guide, overview, cryptographic tools, user authentication, access control, database and cloud security, malicious software, denial of service attacks, intrusion detection, firewalls and intrusion prevention systems, buffer overflow, software security.

    pdf436p muasambanhan10 11-04-2024 4 1   Download

  • Ebook "The web application hackers handbook - Discovering and exploiting security flaws" includes content: Web application (In)security, core defense mechanisms, web application technologies, mapping the application, bypassing client side controls, attacking authentication, attacking session management, attacking access controls, injecting code, exploiting path traversal,... and other contents.

    pdf771p longtimenosee08 31-03-2024 2 1   Download

  • CCSP SECUR Exam Certification Guide is a complete study tool for the CCSP SECUR exam, enabling you to assess your knowledge, identify areas to concentrate your study, and master key concepts to help you succeed on the exams and in your daily job. The book is filled with features that help you master the skills needed to secure Cisco IOS Router networks. This book was developed in cooperation with the Cisco Internet Learning Solutions Group. Cisco Press books are the only self-study books authorized by Cisco for CCSP exam preparation.

    pdf505p longtimenosee08 31-03-2024 3 1   Download

  • Part 2 book "It governance - A managers guide to data security" includes content: Network security management and media handling, exchanges of information, electronic commerce services, E-mail and internet use, access control, network access control, operating system access control, application access control and teleworking, systems acquisition, development and maintenance,.... and other contents.

    pdf180p longtimenosee08 31-03-2024 5 1   Download

  • Ebook Hacking exposed: Linux security secrets solutions - Part 2 includes contents: Chapter 8 elevating user privileges; chapter 9 password cracking; chapter 10 how hackers maintain access; chapter 11 mail and ftp security; chapter 12 web servers and dynamic content; chapter 13 access control and firewalls; appendixe a keeping your programs current; appendixe b turning off unneeded services; appendixe c online resources; appendixe d case studies.

    pdf316p longtimenosee05 31-03-2024 1 0   Download

  • In this book, we cover a wide variety of technologies and show you how to configure those technologies specifically for use in the JBoss Application Server. Naturally, this can’t be done in a vacuum, so we provide simple examples that illustrate the technology and then walk you through the steps necessary to configure things such as deployment descriptors, access control, and encryption. Our intent isn’t to describe every nuance of any particular technology. For that, we recommend that you read books particular to those technologies (and we provide references at the end of most chapters).

    pdf496p longtimenosee05 31-03-2024 0 0   Download

  • Ebook Lift in action: The simply functional web framework for scala – Part 2 includes contents: Chapter 6 common tasks with lift webkit; chapter 7 sitemap and access control; chapter 8 HTTP in lift; chapter 9 AJAX, wiring, and comet; chapter 10 persistence with mapper; chapter 11 persistence with record; chapter 12 localization; chapter 13 distributed messaging and java enterprise integration; chapter 14 application testing; chapter 15 deployment and scaling.

    pdf299p longtimenosee05 31-03-2024 0 0   Download

  • Ebook The SSCP prep guide: Mastering the seven key areas of system security - Part 1 includes contents: Chapter 1 the journey toward information security: an overview; chapter 2 domain 1: access controls; chapter 3 domain 2: administration; chapter 4 domain 3: auditing and monitoring.

    pdf235p longtimenosee05 31-03-2024 1 0   Download

  • In ebook Operating systems and middleware: Supporting controlled interaction – Part 2, the following content will be discussed: Chapter 7 processes and protection; chapter 8 files and other persistent storage; chapter 9 networking; chapter 10 messaging, rpc, and web services; chapter 11 security, chapter 12 stacks.

    pdf275p longtimenosee05 31-03-2024 1 0   Download

  • Ebook PCI compliance: Understand implement effective PCI data security standard compliance - Part 1 includes contents: Chapter 1: about PCI and this book; chapter 2: introduction to fraud, ID theft, and regulatory mandates; chapter 3: why PCI is important; chapter 4: building & maintaining a secure network; chapter 5: protect cardholder data; chapter 6: logging access & events chapter; chapter 7: strong access control.

    pdf188p longtimenosee05 31-03-2024 1 0   Download

  • Ebook Physical logical security convergence: Powered by enterprise security management - Part 2 includes contents: Chapter 8 the new security model: the trusted enterprise; chapter 9 ESM architecture; chapter 10 log collection; chapter 11 real-time event correlation, analysis, and response; chapter 12 event storage and forensic analysis; chapter 13 bridging the chinese wall; chapter 14 physical and logical access; chapter 15 intelligent video analytics; chapter 16 environmental sensors; chapter 17 protecting critical infrastructure: process control and SCADA; chapter 18 final thoughts.

    pdf342p longtimenosee05 31-03-2024 0 0   Download

  • Secure data management in decentralized systems presents a collection of essays, covering a wide range of today's active areas closely related to database security organized as follows. In Part I, We review classical work in database security, and report their recent advances and necessary extensions. In Part 11, We shift our focus to security of the Extensible Markup Language (XML) and other new data models. The need for cross-domain resource and information sharing dramatically changes the approaches to access control.

    pdf461p longtimenosee05 31-03-2024 5 0   Download

  • Ebook "Strategies for achieving food security in Central Asia" summarises the presentations of a NATO Advanced Training Course addressing the issue of food security in Central Asia. The book is divided into two sections. The first provides an overview of the existing aspects of food security in participating Central Asian countries. The emphasis here is on food safety, control and access and includes background information on the relevant food industries.

    pdf167p coduathanh1122 27-03-2024 1 1   Download

  • Ebook The web application hacker’s handbook: Discovering and exploiting security flaws - Part 1 includes contents: Chapter 1: web application (in)security, chapter 2: core defense mechanisms, chapter 3: web application technologies, chapter 4: mapping the application, chapter 5: bypassing client-side controls, chapter 6: attacking authentication, chapter 7: attacking session management, chapter 8: attacking access controls, chapter 9: injecting code.

    pdf367p haojiubujain010 14-12-2023 3 2   Download

  • Part 1 book "Information security management handbook" includes content: Access control systems and methodology; telecommunications, network, and internet security; information security management.

    pdf1619p haojiubujain09 21-11-2023 4 3   Download

  • Firewalls are one of the main components used in securing a network infrastructure, and having an indepth understanding of how these devices function is paramount to maintaining a secure network. This book was written to provide an understanding of the functionality of the Firewall Services Module (FWSM), from both a hardware and software perspective and to be a practical design guide with configuration examples for the design, implementation, operation, and management of FWSM in various deployment scenarios.

    pdf519p haojiubujain09 30-11-2023 7 4   Download

  • Ebook "Field guide to hadoop" includes content: Core technologies, database and data management, serialization, management and monitoring, analytic helpers, data transfer, security, access control, and auditing, cloud computing and virtualization.

    pdf132p haojiubujain07 20-09-2023 5 3   Download

  • Continued part 1, part 2 of ebook "Rational cybersecurity for business: The security leaders’ guide to business alignment" provides readers with contents including: establish a control baseline; simplify and rationalize it and security; control access with minimal drag on the business; institute resilience through detection, response, and recovery; create your rational cybersecurity success plan;...

    pdf171p tieulangtran 28-09-2023 3 3   Download

  • Ebook "Security concepts" includes contents: Metadata, security properties, security models, security concepts, economics of security, adversary modeling, threat modeling, physical security, hardware security, distributed systems, identification and authentication, authorization - access control, secure system administration, logging, reporting, abuse detection, abuse response, forensics, privacy, intrusion response, network security, email security, web security, software security, human factors and usability, attack patterns, trust and personnel security, cryptography, randomness and unpr...

    pdf246p haojiubujain06 05-09-2023 3 2   Download

  • Ebook Security in distributed, grid, mobile, and pervasive computing: Part 2 includes contents: Chapter 10 state-of-the-art security in grid computing; chapter 11 unifying grid and organizational security mechanisms; chapter 12 grid security architecture: requirements, fundamentals, standards and models; chapter 13 a trust-based access control management framework for a secure grid environment; chapter 14 distributed computing grids — safety and security; chapter 15 security solutions for pervasive healthcare; chapter 16 wireless sensor network security: a survey.

    pdf219p haojiubujain06 05-09-2023 2 2   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2