intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Network control

Xem 1-20 trên 1279 kết quả Network control
  • Principles of SPC Exchanges presents the following content: Functions of SPC Exchanges; Computer Software for Electronic Exchanges; Stored Program Control - Control Structure; Signalling for Telephone Networks; Basics of Telecommunication Traffic Theory.

    pdf57p trangthang229 17-04-2024 4 0   Download

  • This article focuses on researching the development of a monitoring and control system for various environmental parameters based on the Internet of Things (IoT) to assist farmers in increasing crop yield in tea nurseries in certain areas of Thai Nguyen province.

    pdf10p gaupanda024 04-04-2024 1 1   Download

  • Ebook "The ethical hack - A framework for business value penetration testing" includes content: Getting started, setting the stage, the framework, information security models, information security program, the business perspective, planning for a controlled attack, preparing for a hack, enumeration, vulnerability analysis, exploitation, the deliverable, integrating the results.

    pdf331p longtimenosee08 31-03-2024 0 0   Download

  • CCSP SECUR Exam Certification Guide is a complete study tool for the CCSP SECUR exam, enabling you to assess your knowledge, identify areas to concentrate your study, and master key concepts to help you succeed on the exams and in your daily job. The book is filled with features that help you master the skills needed to secure Cisco IOS Router networks. This book was developed in cooperation with the Cisco Internet Learning Solutions Group. Cisco Press books are the only self-study books authorized by Cisco for CCSP exam preparation.

    pdf505p longtimenosee08 31-03-2024 1 0   Download

  • Part 1 book "It governance - A managers guide to data security" includes content: Why is information security necessary the combined code; the turnbull report and sarbanes–oxley; organizing information security; information security policy and scope; the risk assessment and statement of applicability; external parties; asset management; human resources security, physical and environmental security, equipment security, communications and operations management, controls against malicious software (malware) and back-ups.

    pdf205p longtimenosee08 31-03-2024 0 0   Download

  • Part 2 book "It governance - A managers guide to data security" includes content: Network security management and media handling, exchanges of information, electronic commerce services, E-mail and internet use, access control, network access control, operating system access control, application access control and teleworking, systems acquisition, development and maintenance,.... and other contents.

    pdf180p longtimenosee08 31-03-2024 3 0   Download

  • Ebook Hacking exposed: Linux security secrets solutions - Part 2 includes contents: Chapter 8 elevating user privileges; chapter 9 password cracking; chapter 10 how hackers maintain access; chapter 11 mail and ftp security; chapter 12 web servers and dynamic content; chapter 13 access control and firewalls; appendixe a keeping your programs current; appendixe b turning off unneeded services; appendixe c online resources; appendixe d case studies.

    pdf316p longtimenosee05 31-03-2024 1 0   Download

  • The goal of this book is to share the art of hacking with everyone. Understanding hacking techniques is often difficult, since it requires both breadth and depth of knowledge. Many hacking texts seem esoteric and confusing because of just a few gaps in this prerequisite education. Ebook Hacking: the art of exploitation (2nd edition): Part 1 includes contents: 0x100: Introduction, 0x200: Programming, 0x300: Exploitation, 0x400: Networking.

    pdf290p longtimenosee05 31-03-2024 0 0   Download

  • In this book, we cover a wide variety of technologies and show you how to configure those technologies specifically for use in the JBoss Application Server. Naturally, this can’t be done in a vacuum, so we provide simple examples that illustrate the technology and then walk you through the steps necessary to configure things such as deployment descriptors, access control, and encryption. Our intent isn’t to describe every nuance of any particular technology. For that, we recommend that you read books particular to those technologies (and we provide references at the end of most chapters).

    pdf496p longtimenosee05 31-03-2024 0 0   Download

  • Ebook Lift in action: The simply functional web framework for scala – Part 2 includes contents: Chapter 6 common tasks with lift webkit; chapter 7 sitemap and access control; chapter 8 HTTP in lift; chapter 9 AJAX, wiring, and comet; chapter 10 persistence with mapper; chapter 11 persistence with record; chapter 12 localization; chapter 13 distributed messaging and java enterprise integration; chapter 14 application testing; chapter 15 deployment and scaling.

    pdf299p longtimenosee05 31-03-2024 0 0   Download

  • Ebook Flash professional CS5 advanced for windows and macintosh: Part 1 includes contents: Chapter 1 building complexity, chapter 2 working with video, chapter 3 getting a handle on actionscript, chapter 4 advanced buttons and event handling, chapter 5 controlling multiple timelines, chapter 6 managing external communication.

    pdf243p longtimenosee05 31-03-2024 0 0   Download

  • Ebook Flash professional CS5 advanced for windows and macintosh: Part 1 includes contents: Chapter 7 controlling and displaying graphics, chapter 8 controlling sound, chapter 9 controlling information flow, chapter 10 controlling text, chapter 11 manipulating information, chapter 12 managing content and troubleshooting.

    pdf286p longtimenosee05 31-03-2024 3 0   Download

  • Ebook The SSCP prep guide: Mastering the seven key areas of system security - Part 1 includes contents: Chapter 1 the journey toward information security: an overview; chapter 2 domain 1: access controls; chapter 3 domain 2: administration; chapter 4 domain 3: auditing and monitoring.

    pdf235p longtimenosee05 31-03-2024 0 0   Download

  • In ebook Operating systems and middleware: Supporting controlled interaction – Part 2, the following content will be discussed: Chapter 7 processes and protection; chapter 8 files and other persistent storage; chapter 9 networking; chapter 10 messaging, rpc, and web services; chapter 11 security, chapter 12 stacks.

    pdf275p longtimenosee05 31-03-2024 1 0   Download

  • Ebook PCI compliance: Understand implement effective PCI data security standard compliance - Part 1 includes contents: Chapter 1: about PCI and this book; chapter 2: introduction to fraud, ID theft, and regulatory mandates; chapter 3: why PCI is important; chapter 4: building & maintaining a secure network; chapter 5: protect cardholder data; chapter 6: logging access & events chapter; chapter 7: strong access control.

    pdf188p longtimenosee05 31-03-2024 0 0   Download

  • Ebook Physical logical security convergence: Powered by enterprise security management - Part 2 includes contents: Chapter 8 the new security model: the trusted enterprise; chapter 9 ESM architecture; chapter 10 log collection; chapter 11 real-time event correlation, analysis, and response; chapter 12 event storage and forensic analysis; chapter 13 bridging the chinese wall; chapter 14 physical and logical access; chapter 15 intelligent video analytics; chapter 16 environmental sensors; chapter 17 protecting critical infrastructure: process control and SCADA; chapter 18 final thoughts.

    pdf342p longtimenosee05 31-03-2024 0 0   Download

  • Secure data management in decentralized systems presents a collection of essays, covering a wide range of today's active areas closely related to database security organized as follows. In Part I, We review classical work in database security, and report their recent advances and necessary extensions. In Part 11, We shift our focus to security of the Extensible Markup Language (XML) and other new data models. The need for cross-domain resource and information sharing dramatically changes the approaches to access control.

    pdf461p longtimenosee05 31-03-2024 2 0   Download

  • The novelty that this paper identifies relates to the reduction of cost volatility in the global supply chain. This novelty is further seen in the proposition that blockchain can achieve this objective. Blockchain’s distributed ledger framework achieves improved inventory control, improved demand forecasting, and more efficient just-in-time productivity as factors to reduce cost-loading in the global supply chain.

    pdf10p longtimenosee06 27-03-2024 2 2   Download

  • Long-term care facilities (LTCF) are potential reservoirs for methicillin-resistant Staphylococcus aureus (MRSA), control of which may reduce MRSA transmission and infection elsewhere in the healthcare system. Whole-genome sequencing (WGS) has been used successfully to understand MRSA epidemiology and transmission in hospitals and has the potential to identify transmission between these and LTCF.

    pdf9p vioraclene 31-03-2024 3 2   Download

  • Part 1 book " Process intensification in chemical engineering - Design optimization and control" includes content: Introduction, fundamentals of process intensification - A process systems engineering view, systematic synthesis of intensified distillation systems, process intensification in heat and mass exchanger networks, heat integrated intensified distillation processes.

    pdf139p muasambanhan09 16-03-2024 2 1   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2