Basic security
-
Lecture "On safety and security of information systems: Cryptography" provide students with knowledge about: Basic terminology of cryptography; History of cryptography; Symmetric cipher;... Please refer to the detailed content of the lecture!
56p hoabingan205 12-12-2022 10 5 Download
-
Cuốn "Các chương trình mẫu .NET (Visual Basic .NET, ASP.NET, .NET Framework, Data Access, Security, Networking)" giới thiệu tới người đọc các kiến thức về windows forms, security, kết hợp nhiều phần, file, web development, web services, các chủ đề cao cấp, xử lý dữ liệu. Sách gồm có 10 chủ đề lớn, phần 1 ebook sau đây gồm có các nội dung sau: Windows form, security, kết hợp nhiều phần, file, web development, web services, language. Mời các bạn cùng tham khảo để biết thêm các nội dung chi tiết.
361p runordie6 06-08-2022 27 7 Download
-
Nối tiếp các nội dung phần 1, phần 2 cuốn "Các chương trình mẫu .NET (Visual Basic .NET, ASP.NET, .NET Framework, Data Access, Security, Networking)" gồm có những nội dung chính sau: Các chủ đề cao cấp, xử lý dữ liệu, Microsoft .Net framework. Mời các bạn cùng tham khảo để biết thêm các nội dung chi tiết.
542p runordie6 06-08-2022 11 7 Download
-
In this paper, we firstly state the secure three-vector product computation problem and develop protocols called tree-vector products to solve this problem. Our protocols are developed based on some basic protocols and their security properties is validated base on the composition theorem for the semi-honest model [9]. We then use the proposed protocols to address a focus problem of privacy preserving multivariate classification.
9p tamynhan8 04-11-2020 11 2 Download
-
Bài giảng "Mật mã học: Tổng quan về mật mã học" cung cấp cho người học các kiến thức: Introduction, information security and cryptography, cryptographic goals, one-way functions, basic terminology and concepts,... Mời các bạn cùng tham khảo.
41p abcxyz123_10 07-06-2020 26 4 Download
-
The present study is based on the information about corporate reporting parameter and their standardized functionality procedure and distinctive perception about corporate disclosure is mandatory to understand the basic requirement of each and every person associated with investment.
7p guineverehuynh 20-06-2020 16 5 Download
-
Tài liệu Visual Basic 2008 và lập trình trực quan: Phần 2 trình bày các nội dung về ứng dụng Dental Payment, ứng dụng Car Payment Calculator, ứng dụng Class Average, ứng dụng Interest Calculator, nâng cấp ứng dụng Wage Calculator, ưng dụng Shipping Time,... Mời các bạn cùng tham khảo.
182p vizeus 07-03-2019 72 15 Download
-
Based on analysis of a number of theoretical issues about the role of social security for SP and assessing the situation on the role of social security in Vietnam SP in recent years, the thesis proposed solutions to promote basic the role of social security in our country for the current SP.
27p change05 08-06-2016 71 7 Download
-
This chapter summarize the operation of Ethernet as defined for 100/1000 Mbps LANs in the IEEE 802.3 standard. Explain the functions that enable a switch to forward Ethernet frames in a LAN. Configure a switch for operation in a network designed to support voice, video, and data transmissions. Configure basic security on a switch that will operate in a network designed to support voice, video, and data transmissions.
163p youcanletgo_01 04-01-2016 61 5 Download
-
Describe the components and operations of basic wireless LAN topologies. Describe the components and operations of basic wireless LAN security. Configure and verify basic wireless LAN access. Configure and troubleshoot wireless client access.
97p youcanletgo_01 04-01-2016 55 6 Download
-
In this chapter, you will learn to: Identify security threats to enterprise networks. Describe methods to mitigate security threats to enterprise networks. Configure basic router security. Disable unused router services and interfaces. Use the Cisco SDM one-step lockdown feature. Manage files and software images with the Cisco IOS Integrated File System (IFS).
157p youcanletgo_01 04-01-2016 46 5 Download
-
Learning objectives of this chapter include: Identify the devices and protocols used in a small network; explain how a small network serves as the basis of larger networks; explain the need for basic security measures on network devices; identify security vulnerabilities and general mitigation techniques;...
55p youcanletgo_01 29-12-2015 66 4 Download
-
In this chapter: Explain the basic concepts of a switched environment, configure initial settings on a Cisco switch, configure switch ports to meet network requirements, configure the management switch virtual interface, describe basic security attacks in a switched environment, describe security best practices in a switched environment, configure the port security feature to restrict network access.
52p youcanletgo_01 29-12-2015 89 6 Download
-
This chapter summarize the operation of Ethernet as defined for 100/1000 Mbps LANs in the IEEE 802.3 standard; explain the functions that enable a switch to forward Ethernet frames in a LAN; configure a switch for operation in a network designed to support voice, video, and data transmissions.
29p youcanletgo_01 29-12-2015 52 3 Download
-
Lecture Operating System: Chapter 09 - Security presented The security environment, Basics of cryptography, User authentication, Attacks from inside the system, Attacks from outside the system, Protection mechanisms, Trusted systems.
56p talata_1 22-09-2014 90 7 Download
-
Like paper-based signatures, digital signatures intend to respect a number of security assumptions. Methods of digital signature apposed by a single user have been defined and are widely used. But is it sufficient? What if a legal document requires witnesses and notarization, or a contract needs the signatures of several officers?This paper will first show the basics to understand digital signatures and how the a security properties of integrity, authentication, and non-repudiation are respected.
11p dunglh2013 02-04-2014 58 2 Download
-
PHP-Developer since the late 1920s I 2009 I tried out about 10(!!) different PHP Frameworks: Akelos PHP Framework Cake PHP Codeigniter Kahona Recess Solar Symfony1 Wombat Yii Zend Framework Database Access Objects (DAO), Query Builder, AR I Migration system to step up and down your migrations I Easy Console Applications I Routing you always wanted to have I Flexibility with Widgets (= View Helpers++) I Expandable with Extensions / Wrappers for 3rd party libs I Highly secure I Scaffolding...
42p nguyenvanhabk 22-06-2013 93 10 Download
-
Limit network traffic to increase network performance. For example, if corporate policy does not allow video traffic on the network, ACLs that block video traffic could be configured and applied. This would greatly reduce the network load and increase network performance. 2. Provide traffic flow control. ACLs can restrict the delivery of routing updates. If updates are not required because of network conditions, bandwidth is preserved. 3. Provide a basic level of security for network access.
67p mrdvad11 12-03-2013 145 55 Download
-
We have covered basic cryptographic tools that will be useful for building things. But, before you can build, you need to know the structural weaknesses of your tools… We will now talk about these weaknesses… and the subjects of cryptanalysis and protocol failures DES: Internet Challenges and EFF Multiple DES and Meet in the Middle attack RSA: Low Exponent Attacks Protocol Failures… Be careful, here be dragons! Hash Functions: Birthday Attacks and Implications
26p muathu_102 28-01-2013 75 3 Download
-
Basic Identification Port Scanning OS fingerprinting & Application scanning Advanced Identification Stealth operations Inline systems detection Security policy bypassing Fragmentation tricks ISN prediction & Spoofing
55p muathu_102 28-01-2013 66 4 Download