intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Secure networking solutions

Xem 1-20 trên 193 kết quả Secure networking solutions
  • There is an invisible elephant in this book: your application. And, it sits at the center of every topic we touch in each chapter we present. This book is for systems architects who are interested in building security into their applications. The book is designed to be useful to architects in three ways: as an introduction to security architecture, as a handbook on security issues for architecture review, and as a catalog of designs to look for within a security product.

    pdf482p longtimenosee03 22-02-2024 2 2   Download

  • This book is not designed to be a general networking topics book; although, it can be used for that purpose. This book is intended to tremendously increase your knowledge level with regards to OSPF. Personnel responsible for understanding OSPF should read this book. You might need to understand OSPF because you are a programmer, network manager, network engineer, studying for certification, and so on.

    pdf768p longtimenosee03 22-02-2024 6 2   Download

  • Ebook Mobile wireless network security privacy Part 2 includes contents: Chapter 6 on performance cost of on-demand anonymous routing protocols in mobile ad hoc networks; chapter 7 computer ecology: responding to mobile worms with location-based quarantine boundaries; chapter 8 approaches for ensuring security and privacy in unplanned ubiquitous computing interactions; chapter 9 an anonymous MAC protocol for wireless ad-hoc networks; chapter 10 hardware: software solution to improve security in mobile ad-hoc networks.

    pdf103p longtimenosee02 03-01-2024 4 1   Download

  • Ebook Physical logical security convergence: Powered by enterprise security management - Part 1 includes contents: Chapter 1 introduction; chapter 2 the evolution of physical security; chapter 3 security convergence: what is it anyway?; chapter 4 the challenges surrounding security convergence; chapter 5 IT governance and enterprise security policy; chapter 6 the evolution of global security solutions; chapter 7 positioning security: politics, industry, and business value.

    pdf251p longtimenosee02 03-01-2024 4 1   Download

  • Ebook Nokia security solutions handbook: Part 1 includes contents: Chapter 1 overview of the Nokia security platform, chapter 2 overview of the Nokia ipso operating system, chapter 3 initial configuration, chapter 4 introducing the voyager web interface, chapter 5 basic system administration.

    pdf177p longtimenosee02 03-01-2024 3 2   Download

  • Ebook Nokia security solutions handbook: Part 2 includes contents: Chapter 6 configuring the check point firewall, chapter 7 system monitoring, chapter 8 advanced system administration, chapter 9 advanced routing configuration, chapter 10 high availability, appendix b additional packages.

    pdf257p longtimenosee02 03-01-2024 3 2   Download

  • Ebook Secure your network for free: Using nmap, wireshark, snort, nessus, and MRTG - Part 1 includes contents: Chapter 1: presenting thebusiness case for free solutions, chapter 2: protecting your perimeter, chapter 3: protecting network resources, chapter 4: configuring an intrusion detection system.

    pdf278p longtimenosee02 03-01-2024 3 3   Download

  • Ebook Hacking exposed: Linux security secrets solutions - Part 1 includes contents: Chapter 1 linux security overview; chapter 2 proactive measures and recovering from a break-in; chapter 3 mapping your machine and network getting in from the outside; chapter 4 social engineering, trojans, and other hacker trickery; chapter 5 physical attacks; chapter 6 attacking over the network; chapter 7 abusing the network itself.

    pdf268p longtimenosee02 03-01-2024 3 3   Download

  • Ebook Hacking exposed: Linux security secrets solutions - Part 2 includes contents: Chapter 8 elevating user privileges; chapter 9 password cracking; chapter 10 how hackers maintain access; chapter 11 mail and ftp security; chapter 12 web servers and dynamic content; chapter 13 access control and firewalls; appendixe a keeping your programs current; appendixe b turning off unneeded services; appendixe c online resources; appendixe d case studies.

    pdf316p longtimenosee02 03-01-2024 2 2   Download

  • The new edition of this powerful best-seller contains a CD-ROM with links to security tools mentioned in the book, key security tools for download from the CD, and a password database. Inside the book, you'll also get all-new security information on 802.11 (Wireless) hacking, Windows XP, Windows.NET Server (code named Whistler), and IIS 5--plus a whole lot more!

    pdf260p longtimenosee02 03-01-2024 4 2   Download

  • This paper presents a lightweight digital signature-based routing message and node authentication solution for wireless multimedia sensor networks (WMSNs). The lightweight geographical security routing protocol (ECDSA-TPGF) is proposed on the basis of improving the original two-phase greedy geographical forwarding protocol (TPGF), in which we have added the solution Elliptic curve cryptography (ECC) and cyclic redundancy check (CRC) to create a digital signature for a sensor node attached to a routing message.

    pdf8p vimarillynhewson 02-01-2024 6 3   Download

  • The first aim of this document is to present how buffer overflows work and may compromise a system or a network security, and to focus on some existing protection solutions. Finally, we will try to point out the most interesting sets to secure an environment, and compare them on criteria such as efficiency or performance loss.

    pdf102p haojiubujain010 14-12-2023 0 0   Download

  • Ebook Hacking exposed Linux: Linux security secrets & solutions (Third edition) – Part 1 includes contents: Chapter 1 applying security, Chapter 2 applying interactive controls, Chapter 3 applying process controls, Chapter 4 local access control, Chapter 5 data networks security, Chapter 6 unconventional data attack vectors, chapter 7 voice over IP, chapter 8 wireless networks, chapter 9 input/output devices, chapter 10 RFID radio frequency identification, chapter 11 emanation attacks, chapter 12 trusted computing.

    pdf397p haojiubujain010 14-12-2023 3 1   Download

  • Ebook "How to cheat at VolP security" includes content: The hardware infrastructure, introduction to VolP security, architectures, support protocols, threats to VolP communications systems, confirm user identity, active security monitoring, logically segregate network traffic, IETF encryption solutions for VolP, skype security... and other contents.

    pdf433p haojiubujain09 30-11-2023 5 4   Download

  • CCNA Security Official Exam Certification Guide is an excellent self-study resource for the Cisco IINS (640-553) exam. Passing the IINS exam validates the knowledge and skills required to successfully secure Cisco network devices. Gaining certification in Cisco technology is key to the continuing educational development of today’s networking professional. Through certification programs, Cisco validates the skills and expertise required to effectively manage the modern enterprise network.

    pdf776p haojiubujain09 30-11-2023 8 4   Download

  • CCSP SECUR Exam Certification Guide is a complete study tool for the CCSP SECUR exam, enabling you to assess your knowledge, identify areas to concentrate your study, and master key concepts to help you succeed on the exams and in your daily job. The book is filled with features that help you master the skills needed to secure Cisco IOS Router networks. This book was developed in cooperation with the Cisco Internet Learning Solutions Group. Cisco Press books are the only self-study books authorized by Cisco for CCSP exam preparation.

    pdf505p haojiubujain09 30-11-2023 5 3   Download

  • This book focuses on the complete product line of Cisco firewall hardware: the PIX and ASA Security Appliance families and the Catalyst Firewall Services Module (FWSM). Of the many sources of information and documentation about Cisco firewalls, very few provide a quick and portable solution for networking professionals. This book is designed to provide a quick and easy reference guide for all the features that can be configured on any Cisco firewall.

    pdf964p haojiubujain09 30-11-2023 5 5   Download

  • Ebook Cisco network security little black book contains 7 chapters, includes: Chapter 1: Securing the Infrastructure In Brief Immediate Solutions, Chapter 2: AAA security technologies, chapter 3: perimeter router security, Chapter 4: IOS Firewall Feature set, chapter 5: cisco encryption technology, chapter 6: internet protocol security, chapter 7: additional access list features, Appendix A: IOS Firewall IDS Signature List, Appendix B: Securing Ethernet Switches.

    pdf292p haojiubujain09 30-11-2023 6 4   Download

  • Ebook Practical VoIP Security: Part 2 includes contents: Chapter 10 Validate Existing Security Infrastructure; Chapter 11 Confirm User Identity; Chapter 12 Active Security Monitoring; Chapter 13 Logically Segregate Network Traffic; Chapter 14 IETF Encryption Solutions for VoIP; Chapter 15 Regulatory Compliance; Chapter 16 The IP Multimedia Subsystem: True Converged Communications; Chapter 17 Recommendations.

    pdf302p haojiubujain06 23-10-2023 5 3   Download

  • Continued part 1, part 2 of ebook "Building the Infrastructure for Cloud security: A solutions view" provides readers with contents including: network security in the cloud; identity management and control for clouds; trusted virtual machines - ensuring the integrity of virtual machines in the cloud; a reference design for secure cloud bursting;...

    pdf112p tieulangtran 28-09-2023 2 2   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2