intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Secure computer and network systems

Xem 1-20 trên 305 kết quả Secure computer and network systems
  • Part 2 of ebook "Software engineering, artificial intelligence, networking and parallel/distributed computing 2011" includes the following main contents: comparison of region based and weighted principal component analysis and locally salient ICA in terms of facial expression recognition; web health portal to enhance patient safety in Australian healthcare systems; peer-based complex profile management; detecting unwanted email using VAT; improving smart card security using elliptic curve cryptography over prime field (Fp);...

    pdf101p khuynhlinhnguyet1009 05-04-2024 2 1   Download

  • Work in type systems for programming languages now touches many parts of computer science, from language design and implementation to software engineering, network security, databases, and analysis of concurrent and distributed systems. The aim of this book, together with its predecessor, Types and Programming Languages is to offer a comprehensive and accessible introduction to the area’s central ideas, results, and techniques.

    pdf589p longtimenosee08 31-03-2024 2 1   Download

  • Part 2 book "It governance - A managers guide to data security" includes content: Network security management and media handling, exchanges of information, electronic commerce services, E-mail and internet use, access control, network access control, operating system access control, application access control and teleworking, systems acquisition, development and maintenance,.... and other contents.

    pdf180p longtimenosee08 31-03-2024 6 1   Download

  • This book you will uncover the finest ways to defend your computer systems from the hackers This Book is written by keeping one object in mind that a beginner, who is not much familiar regarding computer hacking, can easily, attempts these hacks and recognize what we are trying to demonstrate. After Reading this book you will come to recognize that how Hacking is affecting our everyday routine work and can be very hazardous in many fields like bank account hacking etc.

    pdf105p longtimenosee05 31-03-2024 2 0   Download

  • Ebook Hardware hacking: Have fun while voiding your warranty – Part 2 includes contents: Chapter 8 hack your atari 5200 and 8-bit computer, chapter 9 hacking the playstation, chapter 10 wireless 802.11 hacks, chapter 11 hacking the ipod, chapter 12 can you hear me now? Nokia 6210 mobile phone modifications, chapter 13 upgrading memory on palm devices, chapter 14 operating systems overview, chapter 15 coding 101.

    pdf292p longtimenosee05 31-03-2024 1 0   Download

  • Ebook "Honeypots and routers: Collecting internet attacks" includes contents: Chapter 1 computer networks, chapter 2 information system security, chapter 3 intrusions and vulnerabilities, chapter 4 malware, chapter 5 a theoretical guide to honeypots, chapter 6 security systems, chapter 7 collecting zero-day polymorphic worms using double-honeynet.

    pdf198p longtimenosee05 31-03-2024 1 0   Download

  • Ebook How to cheat at configuring open source security tools: The perfect reference for the multitasked sysadmin - Part 1 includes contents: Chapter 1: testing and auditing your systems, chapter 2: protecting your perimeter, chapter 3: protecting network resources, chapter 4: introducing snort, chapter 5: installing snort 2.6.

    pdf280p longtimenosee05 31-03-2024 3 0   Download

  • Ebook How to cheat at deploying securing RFID: Part 1 includes contents: Chapter 1 Physics, Math, and RFID: Mind the Gap; Chapter 2 The Physics of RFID; Chapter 3 Working with RFID Tags; Chapter 4 Working with Interrogation Zones; Chapter 5 Working with Regulations and Standards; Chapter 6 Selecting the RFID System Design.

    pdf165p longtimenosee05 31-03-2024 2 0   Download

  • Ebook How to cheat at deploying securing RFID: Part 2 includes contents: Chapter 7 Performing Site Analysis; Chapter 8 Performing Installation; Chapter 9 Working with RFID peripherals; Chapter 10 Monitoring and Troubleshooting RFID Systems; Chapter 11 Threat and Target Identifi cation; Chapter 12 RFID Attacks: Tag Encoding Attacks; Chapter 13 RFID Attacks: Tag Application Attacks; Chapter 14 RFID Attacks: Securing Communications Using RFID Middleware; Chapter 15 RFID Security: Attacking the Backend; Chapter 16 Management of RFID Security.

    pdf197p longtimenosee05 31-03-2024 1 0   Download

  • Ebook Managing Linux systems with webmin: Part 1 includes contents: Introduction to Webmin, installing Webmin, securing your Webmin server, users and groups, disk and network filesystems, NFS file sharing, disk quotas, bootup and shutdown, scheduled commands, process management, software packages, network information service,…

    pdf393p longtimenosee05 31-03-2024 1 0   Download

  • Ebook The SSCP prep guide: Mastering the seven key areas of system security - Part 1 includes contents: Chapter 1 the journey toward information security: an overview; chapter 2 domain 1: access controls; chapter 3 domain 2: administration; chapter 4 domain 3: auditing and monitoring.

    pdf235p longtimenosee05 31-03-2024 3 0   Download

  • Ebook The SSCP prep guide: Mastering the seven key areas of system security - Part 2 includes contents: Chapter 5 domain 4: risk, response, and recovery; chapter 6 domain 5: cryptography; chapter 7 domain 6: data communications; chapter 8 domain 7: malicious code; appendix a glossary; appendix b testing tools; appendix c references for further study; appendix d answers to sample questions.

    pdf296p longtimenosee05 31-03-2024 2 0   Download

  • Ebook Maximum linux security (2nd edition): Part 1 includes contents: Chapter 1 introducing Linux security, chapter 2 physical security, chapter 3 installation issues, chapter 4 basic Linux system administration, chapter 5 password attacks, chapter 6 data attacks, chapter 7 malicious code, chapter 8 sniffers and electronic eavesdropping, chapter 9 scanners, chapter 10 spoofing.

    pdf367p longtimenosee05 31-03-2024 2 0   Download

  • Ebook Mobile wireless network security privacy Part 1 includes contents: Chapter 1 research directions in security and privacy for mobile and wireless networks; chapter 2 pervasive systems: enhancing trust negotiation with privacy support; chapter 3 applying trust in mobile and wireless networks; chapter 4 a framework for computing trust in mobile ad-hoc networks; chapter 5 the concept of opportunistic networks and their research challenges in privacy and security.

    pdf129p longtimenosee05 31-03-2024 2 0   Download

  • This book presents an overview and critique of online business security systems with emphasis on common electronic commerce activities and payment systems. It discusses legal, compliance and ethical issues that affect management and administration of online business systems. The book introduces the reader to concepts underlying online business systems, as well as technologies that drive online business processes.

    pdf231p longtimenosee05 31-03-2024 0 0   Download

  • In ebook Operating systems and middleware: Supporting controlled interaction – Part 2, the following content will be discussed: Chapter 7 processes and protection; chapter 8 files and other persistent storage; chapter 9 networking; chapter 10 messaging, rpc, and web services; chapter 11 security, chapter 12 stacks.

    pdf275p longtimenosee05 31-03-2024 2 0   Download

  • This book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems (Windows 2000, XP, 2003, and some Vista). My hope is that not only will consultants (such as myself) find this material valuable, but so will system administrators, law enforcement officers, and students in undergraduate and graduate programs focusing on computer forensics.

    pdf221p longtimenosee05 31-03-2024 1 0   Download

  • Ebook Professional penetration testing creating and operating a formal hacking lab: Part 2 includes contents: Chapter 9: information gathering, chapter 10: vulnerability identification, chapter 11: vulnerability verification, chapter 12: compromising a system and privilege escalation, chapter 13: maintaining access, chapter 14: covering your tracks, chapter 15: reporting results, chapter 16: archiving data, chapter 17: cleaning up your lab, chapter 18: planning for your next pentest.

    pdf288p longtimenosee05 31-03-2024 3 0   Download

  • Secure data management in decentralized systems presents a collection of essays, covering a wide range of today's active areas closely related to database security organized as follows. In Part I, We review classical work in database security, and report their recent advances and necessary extensions. In Part 11, We shift our focus to security of the Extensible Markup Language (XML) and other new data models. The need for cross-domain resource and information sharing dramatically changes the approaches to access control.

    pdf461p longtimenosee05 31-03-2024 8 0   Download

  • Ebook Secure your network for free: Using nmap, wireshark, snort, nessus, and MRTG - Part 1 includes contents: Chapter 1: presenting thebusiness case for free solutions, chapter 2: protecting your perimeter, chapter 3: protecting network resources, chapter 4: configuring an intrusion detection system.

    pdf278p longtimenosee05 31-03-2024 2 0   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2