![](images/graphics/blank.gif)
Advanced network security
-
The rapid growth of electronic communication means that issues in information security are of increasing practical importance. Messages exchanged over worldwide publicly accessible computer networks must be kept confidential and protected against manipulation. Electronic business requires digital signatures that are valid in law, and secure payment protocols. Modern cryptography provides solutions to all these problems. This book originates from courses given for students in computer science at the Georg-Simon-Ohm University of Applied Sciences, Nurnberg.
372p
zizaybay1103
29-05-2024
5
2
Download
-
Ebook "Risk management of water supply and sanitation systems" is based on the discussions and papers prepared for the NATO Advanced Research Workshop that took place in Ohrid, Macedonia under the auspices of the NATO Security Through Science Programme and addressed problems Risk management of water supply and sanitation systems impaired by operational failures, natural disasters and war conflicts.
324p
giangdongdinh
28-05-2024
3
1
Download
-
Work in type systems for programming languages now touches many parts of computer science, from language design and implementation to software engineering, network security, databases, and analysis of concurrent and distributed systems. The aim of this book, together with its predecessor, Types and Programming Languages is to offer a comprehensive and accessible introduction to the area’s central ideas, results, and techniques.
589p
longtimenosee08
31-03-2024
2
1
Download
-
Network security is a very complex business. The Cisco PIX Firewall performs some very specific functions as part of the security process. It is very important to be familiar with many networking and network security concepts before you undertake the CSPFA certification. This book is designed for security professionals or networking professionals who are interested in beginning the security certification process.
605p
longtimenosee08
31-03-2024
5
1
Download
-
This second edition of Hacking: The Art of Exploitation makes the world of hacking more accessible by providing the complete picture—from programming to machine code to exploitation. In addition, this edition features a bootable LiveCD based on Ubuntu Linux that can be used in any computer with an x86 processor, without modifying the computer’s existing OS. Ebook Hacking: the art of exploitation (2nd edition): Part 2 includes contents: 0x500: Shellcode, 0x600: Countermeasures, 0x700: Cryptology, 0x800: Conclusion.
198p
longtimenosee05
31-03-2024
3
0
Download
-
Ebook Flash professional CS5 advanced for windows and macintosh: Part 1 includes contents: Chapter 1 building complexity, chapter 2 working with video, chapter 3 getting a handle on actionscript, chapter 4 advanced buttons and event handling, chapter 5 controlling multiple timelines, chapter 6 managing external communication.
243p
longtimenosee05
31-03-2024
0
0
Download
-
Ebook Flash professional CS5 advanced for windows and macintosh: Part 1 includes contents: Chapter 7 controlling and displaying graphics, chapter 8 controlling sound, chapter 9 controlling information flow, chapter 10 controlling text, chapter 11 manipulating information, chapter 12 managing content and troubleshooting.
286p
longtimenosee05
31-03-2024
4
0
Download
-
Ebook Nokia security solutions handbook: Part 2 includes contents: Chapter 6 configuring the check point firewall, chapter 7 system monitoring, chapter 8 advanced system administration, chapter 9 advanced routing configuration, chapter 10 high availability, appendix b additional packages.
257p
longtimenosee05
31-03-2024
2
0
Download
-
Secure data management in decentralized systems presents a collection of essays, covering a wide range of today's active areas closely related to database security organized as follows. In Part I, We review classical work in database security, and report their recent advances and necessary extensions. In Part 11, We shift our focus to security of the Extensible Markup Language (XML) and other new data models. The need for cross-domain resource and information sharing dramatically changes the approaches to access control.
461p
longtimenosee05
31-03-2024
8
0
Download
-
Ebook Content delivery networks - Web switching for security, availability and speed: Part 1 includes content: Chapter 1 introduction to content networking; chapter 2 ethernet; chapter 3 advanced ethernet topics; chapter 4 HTTP and the World Wide Web; chapter 5 SSL; chapter 6 DNS and content networking.
207p
longtimenosee03
22-02-2024
5
2
Download
-
Ebook BCMSN exam certification guide (Second edition): Part 2 includes content: Chapter 11 protecting the spanning tree protocol topology, chapter 12 advanced spanning tree protocol, chapter 13 multilayer switching, chapter 14 router redundancy and load balancing, chapter 15 multicast, chapter 16 quality of service overview, chapter 17 diffserv qos configuration, chapter 18 ip telephony, chapter 19 securing switch access, chapter 20 securing with VLANs, chapter 21 scenarios for final preparation.
336p
longtimenosee03
22-02-2024
5
2
Download
-
Ebook Configuring Juniper Networks NetScreen & SSG Firewalls: Part 1 includes content: Chapter 1: networking, security, and the firewall, chapter 2: dissecting the juniper firewall, chapter 3: deploying juniper firewalls, chapter 4: policy configuration, chapter 5: advanced policy configuration, chapter 6: user authentication, chapter 7: routing.
413p
longtimenosee03
22-02-2024
3
2
Download
-
First book to deliver an in-depth look at the SonicWALL firewall product line. This book covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls. Includes advanced troubleshooting techniques and the SonicWALL Security Manager.
530p
longtimenosee03
22-02-2024
3
2
Download
-
Ebook Configuring NetScreen Firewalls: Part 1 includes content: Chapter 1 networking, security, and the firewall, chapter 2 dissecting the netscreen firewall, chapter 3 deploying netscreen firewalls, chapter 4 policy configuration, chapter 5 advanced policy configuration, chapter 6 user authentication, chapter 7 routing, chapter 8 address translation.
385p
longtimenosee03
22-02-2024
4
1
Download
-
Ebook Networking with Microsoft Windows Vista: Your guide to easy & secure Windows Vista networking - Part 1 includes content: Chapter 1 understanding ethernet networking, chapter 2 understanding wireless networking, chapter 3 configuring your router, chapter 4 putting your network together, chapter 5 working with vista’s basic network tools and tasks, chapter 6 managing network connections, chapter 7 managing wireless network connections, chapter 8 accessing and sharing network resources, chapter 9 setting up vista as a digital media hub, chapter 10 taking advantage of your network, chapte...
295p
longtimenosee03
22-02-2024
8
2
Download
-
Ebook Advanced penetration testing: Hacking the world’s most secure networks includes contents: Chapter 1: medical records (in)security, chapter 2: stealing research, chapter 3: twenty-first century heist, chapter 4: pharma karma, chapter 5: guns and ammo, chapter 6: criminal intelligence, chapter 7: war games, chapter 8: hack journalists, chapter 9: northern exposure.
269p
haojiubujain010
14-12-2023
10
3
Download
-
Ebook Google hacking for penetration testers: Part 1 includes contents: Chapter 1 Google searching basics, chapter 2 advanced operators, chapter 3 Google hacking basics, chapter 4 preassessment, chapter 5 network mapping, chapter 6 locating exploits and finding targets, chapter 7 ten simple security searches that work.
245p
haojiubujain010
14-12-2023
4
1
Download
-
Continued part 1, part 2 of ebook "Linux Mint essentials: A practical guide to Linux Mint for the novice to the professional" provides readers with contents including: chapter 7 - enjoying multimedia on mint; chapter 8 - managing users and permissions; chapter 9 - connecting to networks; chapter 10 - securing Linux Mint; chapter 11 - advanced administration techniques; chapter 12 - troubleshooting Linux Mint;...
173p
tieulangtran
28-09-2023
8
3
Download
-
Ebook Advances in enterprise information technology security provides a broad working knowledge of all the major security issues affecting today’s enterprise IT activities. Multiple techniques, strategies, and applications are thoroughly examined, presenting the tools to address opportunities in the field.It is an all-in-one reference for IT managers, network administrators, researchers, and students
389p
haojiubujain06
05-09-2023
6
3
Download
-
The first Annual Working Conference of WG11.4 of the International Federation for Information Processing (IFIP), focuses on various state-of-the-art concepts in the field of Network and Distributed Systems Security. Our society is rapidly evolving and irreversibly set on a course governed by electronic interactions. We have seen the birth of email in the early seventies, and are now facing new challenging applications such as e-commerce, e-government, . . . .
218p
haojiubujain06
05-09-2023
4
3
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)