intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Advanced network security

Xem 1-20 trên 127 kết quả Advanced network security
  • The rapid growth of electronic communication means that issues in information security are of increasing practical importance. Messages exchanged over worldwide publicly accessible computer networks must be kept confidential and protected against manipulation. Electronic business requires digital signatures that are valid in law, and secure payment protocols. Modern cryptography provides solutions to all these problems. This book originates from courses given for students in computer science at the Georg-Simon-Ohm University of Applied Sciences, Nurnberg.

    pdf372p zizaybay1103 29-05-2024 5 2   Download

  • Ebook "Risk management of water supply and sanitation systems" is based on the discussions and papers prepared for the NATO Advanced Research Workshop that took place in Ohrid, Macedonia under the auspices of the NATO Security Through Science Programme and addressed problems Risk management of water supply and sanitation systems impaired by operational failures, natural disasters and war conflicts.

    pdf324p giangdongdinh 28-05-2024 3 1   Download

  • Work in type systems for programming languages now touches many parts of computer science, from language design and implementation to software engineering, network security, databases, and analysis of concurrent and distributed systems. The aim of this book, together with its predecessor, Types and Programming Languages is to offer a comprehensive and accessible introduction to the area’s central ideas, results, and techniques.

    pdf589p longtimenosee08 31-03-2024 2 1   Download

  • Network security is a very complex business. The Cisco PIX Firewall performs some very specific functions as part of the security process. It is very important to be familiar with many networking and network security concepts before you undertake the CSPFA certification. This book is designed for security professionals or networking professionals who are interested in beginning the security certification process.

    pdf605p longtimenosee08 31-03-2024 5 1   Download

  • This second edition of Hacking: The Art of Exploitation makes the world of hacking more accessible by providing the complete picture—from programming to machine code to exploitation. In addition, this edition features a bootable LiveCD based on Ubuntu Linux that can be used in any computer with an x86 processor, without modifying the computer’s existing OS. Ebook Hacking: the art of exploitation (2nd edition): Part 2 includes contents: 0x500: Shellcode, 0x600: Countermeasures, 0x700: Cryptology, 0x800: Conclusion.

    pdf198p longtimenosee05 31-03-2024 3 0   Download

  • Ebook Flash professional CS5 advanced for windows and macintosh: Part 1 includes contents: Chapter 1 building complexity, chapter 2 working with video, chapter 3 getting a handle on actionscript, chapter 4 advanced buttons and event handling, chapter 5 controlling multiple timelines, chapter 6 managing external communication.

    pdf243p longtimenosee05 31-03-2024 0 0   Download

  • Ebook Flash professional CS5 advanced for windows and macintosh: Part 1 includes contents: Chapter 7 controlling and displaying graphics, chapter 8 controlling sound, chapter 9 controlling information flow, chapter 10 controlling text, chapter 11 manipulating information, chapter 12 managing content and troubleshooting.

    pdf286p longtimenosee05 31-03-2024 4 0   Download

  • Ebook Nokia security solutions handbook: Part 2 includes contents: Chapter 6 configuring the check point firewall, chapter 7 system monitoring, chapter 8 advanced system administration, chapter 9 advanced routing configuration, chapter 10 high availability, appendix b additional packages.

    pdf257p longtimenosee05 31-03-2024 2 0   Download

  • Secure data management in decentralized systems presents a collection of essays, covering a wide range of today's active areas closely related to database security organized as follows. In Part I, We review classical work in database security, and report their recent advances and necessary extensions. In Part 11, We shift our focus to security of the Extensible Markup Language (XML) and other new data models. The need for cross-domain resource and information sharing dramatically changes the approaches to access control.

    pdf461p longtimenosee05 31-03-2024 8 0   Download

  • Ebook Content delivery networks - Web switching for security, availability and speed: Part 1 includes content: Chapter 1 introduction to content networking; chapter 2 ethernet; chapter 3 advanced ethernet topics; chapter 4 HTTP and the World Wide Web; chapter 5 SSL; chapter 6 DNS and content networking.

    pdf207p longtimenosee03 22-02-2024 5 2   Download

  • Ebook BCMSN exam certification guide (Second edition): Part 2 includes content: Chapter 11 protecting the spanning tree protocol topology, chapter 12 advanced spanning tree protocol, chapter 13 multilayer switching, chapter 14 router redundancy and load balancing, chapter 15 multicast, chapter 16 quality of service overview, chapter 17 diffserv qos configuration, chapter 18 ip telephony, chapter 19 securing switch access, chapter 20 securing with VLANs, chapter 21 scenarios for final preparation.

    pdf336p longtimenosee03 22-02-2024 5 2   Download

  • Ebook Configuring Juniper Networks NetScreen & SSG Firewalls: Part 1 includes content: Chapter 1: networking, security, and the firewall, chapter 2: dissecting the juniper firewall, chapter 3: deploying juniper firewalls, chapter 4: policy configuration, chapter 5: advanced policy configuration, chapter 6: user authentication, chapter 7: routing.

    pdf413p longtimenosee03 22-02-2024 3 2   Download

  • First book to deliver an in-depth look at the SonicWALL firewall product line. This book covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls. Includes advanced troubleshooting techniques and the SonicWALL Security Manager.

    pdf530p longtimenosee03 22-02-2024 3 2   Download

  • Ebook Configuring NetScreen Firewalls: Part 1 includes content: Chapter 1 networking, security, and the firewall, chapter 2 dissecting the netscreen firewall, chapter 3 deploying netscreen firewalls, chapter 4 policy configuration, chapter 5 advanced policy configuration, chapter 6 user authentication, chapter 7 routing, chapter 8 address translation.

    pdf385p longtimenosee03 22-02-2024 4 1   Download

  • Ebook Networking with Microsoft Windows Vista: Your guide to easy & secure Windows Vista networking - Part 1 includes content: Chapter 1 understanding ethernet networking, chapter 2 understanding wireless networking, chapter 3 configuring your router, chapter 4 putting your network together, chapter 5 working with vista’s basic network tools and tasks, chapter 6 managing network connections, chapter 7 managing wireless network connections, chapter 8 accessing and sharing network resources, chapter 9 setting up vista as a digital media hub, chapter 10 taking advantage of your network, chapte...

    pdf295p longtimenosee03 22-02-2024 8 2   Download

  • Ebook Advanced penetration testing: Hacking the world’s most secure networks includes contents: Chapter 1: medical records (in)security, chapter 2: stealing research, chapter 3: twenty-first century heist, chapter 4: pharma karma, chapter 5: guns and ammo, chapter 6: criminal intelligence, chapter 7: war games, chapter 8: hack journalists, chapter 9: northern exposure.

    pdf269p haojiubujain010 14-12-2023 10 3   Download

  • Ebook Google hacking for penetration testers: Part 1 includes contents: Chapter 1 Google searching basics, chapter 2 advanced operators, chapter 3 Google hacking basics, chapter 4 preassessment, chapter 5 network mapping, chapter 6 locating exploits and finding targets, chapter 7 ten simple security searches that work.

    pdf245p haojiubujain010 14-12-2023 4 1   Download

  • Continued part 1, part 2 of ebook "Linux Mint essentials: A practical guide to Linux Mint for the novice to the professional" provides readers with contents including: chapter 7 - enjoying multimedia on mint; chapter 8 - managing users and permissions; chapter 9 - connecting to networks; chapter 10 - securing Linux Mint; chapter 11 - advanced administration techniques; chapter 12 - troubleshooting Linux Mint;...

    pdf173p tieulangtran 28-09-2023 8 3   Download

  • Ebook Advances in enterprise information technology security provides a broad working knowledge of all the major security issues affecting today’s enterprise IT activities. Multiple techniques, strategies, and applications are thoroughly examined, presenting the tools to address opportunities in the field.It is an all-in-one reference for IT managers, network administrators, researchers, and students

    pdf389p haojiubujain06 05-09-2023 6 3   Download

  • The first Annual Working Conference of WG11.4 of the International Federation for Information Processing (IFIP), focuses on various state-of-the-art concepts in the field of Network and Distributed Systems Security. Our society is rapidly evolving and irreversibly set on a course governed by electronic interactions. We have seen the birth of email in the early seventies, and are now facing new challenging applications such as e-commerce, e-government, . . . .

    pdf218p haojiubujain06 05-09-2023 4 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
320 tài liệu
1224 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2