intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Device security

Xem 1-20 trên 318 kết quả Device security
  • Body worn cameras (BWC) are mobile audio and video capture devices that can be secured to clothing allowing the wearer to record some of what they see and hear. This technology is being introduced in a range of healthcare settings as part of larger violence reduction strategies aimed at reducing incidents of aggression and violence on inpatient wards, however limited evidence exists to understand if this technology achieves such goals.

    pdf18p vishanshan 27-06-2024 2 1   Download

  • In this study, Lanthanum molybdate (La2MoO6) is chosen as an ideal host lattice due to its remarkable attributes, including heightened chemical stability, crystallinity, and excellent quantum efficiency

    pdf14p visergeyne 18-06-2024 1 0   Download

  • In recent years, we have experienced rapid and beneficial development of IoT solutions throughout all aspects of life. In addition to the apparent advantages, the increased number and variety of devices have resulted in more security issues.

    pdf13p viamancio 04-06-2024 0 0   Download

  • When devices connecting to the Internet, one of the most problem occurred is security. There are many researchers focusing on this problem so far. Diffie-Hellman type key exchange protocols have a certain role in information security applications. This article proposes to perform encryption using pseudo-random strings to prevent unwanted attacks.

    pdf7p vijaychest 16-05-2024 3 1   Download

  • Countries worldwide are recently interested in economic efficiency in line with protecting environmental protection. Generally, optimization of cetane number, expanding fuel sources, and producing clean fuels with less pollution at the development trend in diesel fuel. Faced with that situation, global energy security is one of the top goals worldwide that can be ensured by diversifying energy resources parallel with minimizing fossil energy dependence.

    pdf9p visergey 02-04-2024 2 0   Download

  • The research paper delves into the intricate realm of IoT device security, unravelling the multifaceted risks and presenting a nuanced exploration of mitigation strategies. A comprehensive literature review unveils common security threads and the current state of IoT security measures. The subsequent analysis identifies security risks, including unauthorized access, encryption lapses, authentication weaknesses, physical vulnerabilities, and privacy concerns.

    pdf6p visergey 02-04-2024 6 0   Download

  • CCNA Security Official Exam Certification Guide is an excellent self-study resource for the Cisco IINS (640-553) exam. Passing the IINS exam validates the knowledge and skills required to successfully secure Cisco network devices. Gaining certification in Cisco technology is key to the continuing educational development of today’s networking professional. Through certification programs, Cisco validates the skills and expertise required to effectively manage the modern enterprise network.

    pdf776p longtimenosee08 31-03-2024 2 1   Download

  • CCNA Wireless Official Exam Certification Guide is an excellent self-study resource for the Cisco IUWNE (640-721) exam. Passing the IUWNE exam validates the knowledge and skills required to successfully secure Cisco network devices. Gaining certification in Cisco technology is key to the continuing educational development of today’s networking professional. Through certification programs, Cisco validates the skills and expertise required to effectively manage the modern enterprise network.

    pdf505p longtimenosee08 31-03-2024 1 1   Download

  • Ebook Hardware hacking: Have fun while voiding your warranty – Part 2 includes contents: Chapter 8 hack your atari 5200 and 8-bit computer, chapter 9 hacking the playstation, chapter 10 wireless 802.11 hacks, chapter 11 hacking the ipod, chapter 12 can you hear me now? Nokia 6210 mobile phone modifications, chapter 13 upgrading memory on palm devices, chapter 14 operating systems overview, chapter 15 coding 101.

    pdf292p longtimenosee05 31-03-2024 1 0   Download

  • Ebook How to cheat at securing a wireless network - Part 1 includes contents: Chapter 1: introduction to wireless: from past to present, chapter 2: wireless security, chapter 3: dangers of wireless devices in the workplace, chapter 4: WLAN rogue access point detection and mitigation, chapter 5: wireless LAN VLANs, chapter 6: designing a wireless network, chapter 7: wireless network architecture and design.

    pdf286p longtimenosee05 31-03-2024 3 0   Download

  • Ebook Network performance and security: Testing and analyzing using open source and low-cost tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network.

    pdf362p longtimenosee05 31-03-2024 2 0   Download

  • Ebook Penetration tester’s: Open source toolkit – Part 1 includes contents: Chapter 1 reconnaissance, chapter 2 enumeration and scanning, chapter 3 introduction to testing databases, chapter 4 web server & web application testing, chapter 5 wireless penetration testing using auditor, chapter 6 network devices.

    pdf389p longtimenosee05 31-03-2024 1 0   Download

  • Ebook Penetration tester’s: Open source toolkit (Volume 2) – Part 2 includes contents: Chapter 6 network devices, chapter 7 customizing BackTrack 2, chapter 8 forensic discovery and analysis using backtrack, chapter 9 building penetration test labs.

    pdf246p longtimenosee05 31-03-2024 0 0   Download

  • In "Penetration testing essentials", the following content will be discussed: Chapter 1 introduction to penetration testing, chapter 2 introduction to operating systems and networking, chapter 3 introduction to cryptography, chapter 4 outlining the pen testing methodology, chapter 5 gathering intelligence, chapter 6 scanning and enumeration, chapter 7 conducting vulnerability scanning, chapter 8 cracking passwords, chapter 9 retaining access with backdoors and malware, chapter 10 reporting, chapter 11 working with defensive and detection systems, chapter 12 covering your tracks and evading ...

    pdf287p longtimenosee05 31-03-2024 2 0   Download

  • Supply chain management played a critical role in the electric power industrial chain optimization. The paper notes that in order to increase transparency and efficiency of settlements for electric energy, the introduction of intelligent metering systems is necessary. In order to achieve efficiency, transparency, data security and reduce transaction costs abroad, blockchain technologies that have both positive and negative characteristics have begun to be actively introduced.

    pdf6p longtimenosee04 06-03-2024 8 0   Download

  • First book to deliver an in-depth look at the SonicWALL firewall product line. This book covers all of the aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls. Includes advanced troubleshooting techniques and the SonicWALL Security Manager.

    pdf530p longtimenosee03 22-02-2024 3 2   Download

  • Ebook Personal networks: Wireless networking for personal devices includes content: Chapter 1 the vision of personal networks, chapter 2 personal networks user requirements, chapter 3 trends in personal networks, chapter 4 the personal network architecture, chapter 5 cluster formation and routing, chapter 6 inter-cluster tunneling and routing, chapter 7 foreign communication, chapter 8 personal network application support systems, chapter 9 personal network security, chapter 10 personal network federations, chapter 11 personal network prototypes, chapter 12 the future of personal networks.

    pdf230p longtimenosee03 22-02-2024 5 2   Download

  • This book is about the latest topics in home networking, such as the use cases, various networking technologies, security, service discovery, media formats and description, media distribution, security, digital rights management, and the role of sensor technologies in the home environment. Because each topic can easily expand into a book of its own and it is difficult to have in-depth knowledge in all of these domains, we chose to invite the various experts in the fields to contribute their thoughts.

    pdf239p longtimenosee03 22-02-2024 3 2   Download

  • Ebook CEHv9 Certified Ethical Hacker Version 9 (Study guide): Part 2 includes contents: Chapter 11: denial of service, chapter 12: session hijacking, chapter 13: web servers and applications, chapter 14: SQL injection, chapter 15: hacking wi-fi and bluetooth, chapter 16: mobile device security, chapter 17: evasion, chapter 18: cloud technologies and security, chapter 19: physical security.

    pdf342p haojiubujain010 14-12-2023 5 1   Download

  • Ebook Hacking exposed Linux: Linux security secrets & solutions (Third edition) – Part 1 includes contents: Chapter 1 applying security, Chapter 2 applying interactive controls, Chapter 3 applying process controls, Chapter 4 local access control, Chapter 5 data networks security, Chapter 6 unconventional data attack vectors, chapter 7 voice over IP, chapter 8 wireless networks, chapter 9 input/output devices, chapter 10 RFID radio frequency identification, chapter 11 emanation attacks, chapter 12 trusted computing.

    pdf397p haojiubujain010 14-12-2023 7 2   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2