![](images/graphics/blank.gif)
Physical security
-
By the time you finish this book, you’ll know how to: Work with the JUNOS network operating system; Set up and configure a Juniper router; Connect, manage, and trouble shoot routers and other Juniper appliances; Make your network more efficient; Configure JUNOS default security features as well as restricted physical access to protect routers; Solve hardware, software, interface, and router problems; Integrate JUNOS with other systems.
410p
zizaybay1104
29-05-2024
2
1
Download
-
Ebook Probabilistic & statistical methods in cryptology presents the following content: Chapter 1 classical polyalphabetic substitution ciphers; chapter 2 rsa and probabilistic prime number tests; chapter 3 factorization with quantum computers: shor’s algorithm; chapter 4 physical random-number generators; chapter 5 pseudo-random number generators; chapter 6 an information theory primer; chapter 7 tests for (pseudo-)random number generators; chapter 8 diffie-hellman key exchange; chapter 9 differential cryptanalysis; chapter 10 semantic security; chapter 11 algorithmic complexity; chapter 1...
159p
zizaybay1103
29-05-2024
2
2
Download
-
Many times, security professionals need a reference for reviewing, developing, and implementing a security policy architecture. This text will walk the reader through the process for an effective policy architecture for a small, medium, or large enterprise. Whether the reader is a novice or an experienced security professional, this text will give examples and hints on how to review an existing security policy architecture and develop it from scratch.
360p
zizaybay1103
29-05-2024
2
2
Download
-
Part 2 book "Computer security - Principles and practice" includes content: Operating system security, human resources security, security auditing, legal and ethical aspects, internet security protocols and standards, symmetric encryption and message confidentiality, trusted computing and multilevel security, it security management and risk assessment, physical and infrastructure security, it security controls, plans, and procedures,... and other contents.
402p
muasambanhan10
11-04-2024
2
1
Download
-
This paper reviews the challenges in implementing Industry 4.0. The literatures found in this paper mainly from Google Scholar, Science Direct and Emerald. In short, the challenges can be imparted into seven major categories. There are data management and Integration, knowledgedriven, process, security, capital, workforce, and education.
8p
longtimenosee09
08-04-2024
6
0
Download
-
The research paper delves into the intricate realm of IoT device security, unravelling the multifaceted risks and presenting a nuanced exploration of mitigation strategies. A comprehensive literature review unveils common security threads and the current state of IoT security measures. The subsequent analysis identifies security risks, including unauthorized access, encryption lapses, authentication weaknesses, physical vulnerabilities, and privacy concerns.
6p
visergey
02-04-2024
6
0
Download
-
Ebook It governance - A managers guide to data security and ISO 2700/ISO 27002 (4th edition): Part 1
Part 1 book "It governance - A managers guide to data security" includes content: Why is information security necessary the combined code; the turnbull report and sarbanes–oxley; organizing information security; information security policy and scope; the risk assessment and statement of applicability; external parties; asset management; human resources security, physical and environmental security, equipment security, communications and operations management, controls against malicious software (malware) and back-ups.
205p
longtimenosee08
31-03-2024
2
1
Download
-
Ebook Hacking exposed: Linux security secrets solutions - Part 1 includes contents: Chapter 1 linux security overview; chapter 2 proactive measures and recovering from a break-in; chapter 3 mapping your machine and network getting in from the outside; chapter 4 social engineering, trojans, and other hacker trickery; chapter 5 physical attacks; chapter 6 attacking over the network; chapter 7 abusing the network itself.
268p
longtimenosee05
31-03-2024
4
0
Download
-
Ebook How to cheat at deploying securing RFID: Part 1 includes contents: Chapter 1 Physics, Math, and RFID: Mind the Gap; Chapter 2 The Physics of RFID; Chapter 3 Working with RFID Tags; Chapter 4 Working with Interrogation Zones; Chapter 5 Working with Regulations and Standards; Chapter 6 Selecting the RFID System Design.
165p
longtimenosee05
31-03-2024
2
0
Download
-
Ebook Maximum linux security (2nd edition): Part 1 includes contents: Chapter 1 introducing Linux security, chapter 2 physical security, chapter 3 installation issues, chapter 4 basic Linux system administration, chapter 5 password attacks, chapter 6 data attacks, chapter 7 malicious code, chapter 8 sniffers and electronic eavesdropping, chapter 9 scanners, chapter 10 spoofing.
367p
longtimenosee05
31-03-2024
2
0
Download
-
Ebook Physical logical security convergence: Powered by enterprise security management - Part 1 includes contents: Chapter 1 introduction; chapter 2 the evolution of physical security; chapter 3 security convergence: what is it anyway?; chapter 4 the challenges surrounding security convergence; chapter 5 IT governance and enterprise security policy; chapter 6 the evolution of global security solutions; chapter 7 positioning security: politics, industry, and business value.
251p
longtimenosee05
31-03-2024
5
0
Download
-
Ebook Physical logical security convergence: Powered by enterprise security management - Part 2 includes contents: Chapter 8 the new security model: the trusted enterprise; chapter 9 ESM architecture; chapter 10 log collection; chapter 11 real-time event correlation, analysis, and response; chapter 12 event storage and forensic analysis; chapter 13 bridging the chinese wall; chapter 14 physical and logical access; chapter 15 intelligent video analytics; chapter 16 environmental sensors; chapter 17 protecting critical infrastructure: process control and SCADA; chapter 18 final thoughts.
342p
longtimenosee05
31-03-2024
0
0
Download
-
In the current momentum of economic development, insurance increasingly demonstrates its essential role in socio-economic life. The critical part of insurance is financial service and social security mechanisms in the national economy. The life insurance product is a necessary product with both mental and physical value. Therefore, understanding life insurance’s meaning and benefits help customers have a positive outlook on life. Thus, the paper objective determines the factors affecting the decision to purchase life insurance products in Vietnam.
10p
longtimenosee07
29-03-2024
6
1
Download
-
The main food problems in the context of realizing strong food security include increasingly scarce availability, increasingly difficult food affordability, both physically and economically. Food security are increasingly worrying because of the increasing number of problems related to food safety. From this problem, there is a tendency for the food situation, especially in international markets, which is increasingly unpredictable and increasingly unstable.
5p
longtimenosee04
06-03-2024
5
1
Download
-
Ebook "Nuclear science and safety in Europe (NATO security through science series)" contains a selection of invited talks at the ARW. They are grouped in two chapters, one on results of theoretical and experimental studies of nuclear forces (strong interaction physics), and the other on their possible applications. Here, of particular interest is the coverage of the recent developments in the construction of safe sub-critical (assemblies) reactors.
289p
manmanthanhla0201
26-02-2024
2
1
Download
-
Part 1 book "Canine enrichment for the real world - Making it a part of your dog’s daily life" includes content: Enrichment then and now, the elements of enrichment, agency, physical exercise; safety and security; instinctual behaviors; foraging; social interactions; mental stimulation.
142p
muasambanhan04
11-01-2024
2
1
Download
-
Ebook CEHv9 Certified Ethical Hacker Version 9 (Study guide): Part 2 includes contents: Chapter 11: denial of service, chapter 12: session hijacking, chapter 13: web servers and applications, chapter 14: SQL injection, chapter 15: hacking wi-fi and bluetooth, chapter 16: mobile device security, chapter 17: evasion, chapter 18: cloud technologies and security, chapter 19: physical security.
342p
haojiubujain010
14-12-2023
5
1
Download
-
Ebook Hacking for dummies - Part 1 includes contents: Chapter 1: introduction to ethical hacking, chapter 2: cracking the hacker mindset, chapter 3: developing your ethical hacking plan, chapter 4: hacking methodology, chapter 5: social engineering, chapter 6: physical security, chapter 7: passwords, chapter 8: war dialing, chapter 9: network infrastructure, chapter 10: wireless LANs.
187p
haojiubujain010
14-12-2023
7
3
Download
-
Ebook Hacking for dummies Part 2 includes contents: Chapter 11: windows, chapter 12: Linux, chapter 13: novell netware, chapter 14: malware, chapter 15: messaging systems, chapter 16: web applications, chapter 17: reporting your results, chapter 18: plugging security holes, chapter 19: managing security changes, chapter 20: ten tips for getting upper management buy-in, chapter 21: ten deadly mistakes.
200p
haojiubujain010
14-12-2023
4
2
Download
-
Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 2 includes contents: Chapter 8 achieving stealth and maintaining presence, chapter 9 hacking SQL server, chapter 10 hacking Microsoft client apps, chapter 11 physical attacks, chapter 12 windows security features and tools, chapter a windows security checklist, chapter b about the companion website.
230p
haojiubujain010
14-12-2023
10
1
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)