intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Securing operating system

Xem 1-20 trên 429 kết quả Securing operating system
  • Part 2 book "Power quality in power systems and electrical machines" includes content: Power system modeling under nonsinusoidal operating conditions, impact of poor power quality on reliability, relaying, and security, the roles of filters in power systems, optimal placement and sizing of shunt capacitor banks in the presence of harmonics, unified power quality conditioner (UPQC),... and other contents.

    pdf373p dianmotminh03 17-06-2024 0 0   Download

  • The research underscores the urgent need to adopt Blockchain technology in higher education to address the prevalent issues of cheating and hacking in student registration systems. These unethical practices negatively impact fairness and integrity within the educational sector. Blockchain and Smart Contracts offer a solution by ensuring secure, tamper-proof recording of academic records, which enhances transparency and operational efficiency.

    pdf5p viambani 18-06-2024 5 1   Download

  • By the time you finish this book, you’ll know how to: Work with the JUNOS network operating system; Set up and configure a Juniper router; Connect, manage, and trouble shoot routers and other Juniper appliances; Make your network more efficient; Configure JUNOS default security features as well as restricted physical access to protect routers; Solve hardware, software, interface, and router problems; Integrate JUNOS with other systems.

    pdf410p zizaybay1104 29-05-2024 2 1   Download

  • Ebook "Risk management of water supply and sanitation systems" is based on the discussions and papers prepared for the NATO Advanced Research Workshop that took place in Ohrid, Macedonia under the auspices of the NATO Security Through Science Programme and addressed problems Risk management of water supply and sanitation systems impaired by operational failures, natural disasters and war conflicts.

    pdf324p giangdongdinh 28-05-2024 3 1   Download

  • Part 2 book "Networking - The complete reference" by author Bobbi Sandberg includes content: TCP/IP, other TCP/IP protocols; the domain name system; internet services, windows chapter 18 active directory; linux; unix; other network operating systems and networking in the cloud, network clients; network security basics; wireless security; overview of network administration; network management and troubleshooting tools; backing up.

    pdf426p muasambanhan10 11-04-2024 6 1   Download

  • Part 2 book "Computer security - Principles and practice" includes content: Operating system security, human resources security, security auditing, legal and ethical aspects, internet security protocols and standards, symmetric encryption and message confidentiality, trusted computing and multilevel security, it security management and risk assessment, physical and infrastructure security, it security controls, plans, and procedures,... and other contents.

    pdf402p muasambanhan10 11-04-2024 2 1   Download

  • One of the main trends in the law development is its digitalization under the supply chain strategies, which is manifested both in the digitalization of legal regulation, legal technologies, legal processes and law enforcement. In the emergence of regulations affecting the issues of the digital economy, electronic state, information security.

    pdf6p longtimenosee09 08-04-2024 4 0   Download

  • Work in type systems for programming languages now touches many parts of computer science, from language design and implementation to software engineering, network security, databases, and analysis of concurrent and distributed systems. The aim of this book, together with its predecessor, Types and Programming Languages is to offer a comprehensive and accessible introduction to the area’s central ideas, results, and techniques.

    pdf589p longtimenosee08 31-03-2024 2 1   Download

  • The Cisco Certified Internet Expert Security Certification is an increasingly popular internetworking certification and one of the most popular security certifications in the world. Although CCIE certification builds on the foundation you might have established from the Cisco Certified Network Associate (CCNA) and Cisco Certified Network Professional (CCNP) certifications, there is no prerequisite to attempt to gain CCIE certification. However, attaining CCNA and CCNP certifications will help you understand Cisco subjects and testing strategies.

    pdf524p longtimenosee08 31-03-2024 2 1   Download

  • Part 2 book "It governance - A managers guide to data security" includes content: Network security management and media handling, exchanges of information, electronic commerce services, E-mail and internet use, access control, network access control, operating system access control, application access control and teleworking, systems acquisition, development and maintenance,.... and other contents.

    pdf180p longtimenosee08 31-03-2024 6 1   Download

  • Ebook Hardware hacking: Have fun while voiding your warranty – Part 2 includes contents: Chapter 8 hack your atari 5200 and 8-bit computer, chapter 9 hacking the playstation, chapter 10 wireless 802.11 hacks, chapter 11 hacking the ipod, chapter 12 can you hear me now? Nokia 6210 mobile phone modifications, chapter 13 upgrading memory on palm devices, chapter 14 operating systems overview, chapter 15 coding 101.

    pdf292p longtimenosee05 31-03-2024 1 0   Download

  • Ebook Nokia security solutions handbook: Part 1 includes contents: Chapter 1 overview of the Nokia security platform, chapter 2 overview of the Nokia ipso operating system, chapter 3 initial configuration, chapter 4 introducing the voyager web interface, chapter 5 basic system administration.

    pdf177p longtimenosee05 31-03-2024 4 0   Download

  • In ebook Operating systems: A concept-based approach - Part 2, the following content will be discussed: Chapter 11: memory management, chapter 12: virtual memory, chapter 13: file systems, chapter 14: implementation of file operations, chapter 15: security and protection, chapter 16: distributed operating systems, chapter 17: theoretical issues in distributed systems, chapter 18: distributed control algorithms, chapter 19: recovery and fault tolerance, chapter 20: distributed file systems, chapter 21: distributed system security.

    pdf469p longtimenosee05 31-03-2024 1 0   Download

  • In ebook Operating systems and middleware: Supporting controlled interaction – Part 2, the following content will be discussed: Chapter 7 processes and protection; chapter 8 files and other persistent storage; chapter 9 networking; chapter 10 messaging, rpc, and web services; chapter 11 security, chapter 12 stacks.

    pdf275p longtimenosee05 31-03-2024 1 0   Download

  • Ebook Operating systems internals and design principles (7th edition) - Part 2 includes contents: Chapter 7 memory management; chapter 8 virtual memory; chapter 9 scheduling: uni-processor scheduling; chapter 10 multi-processor and real time scheduling; chapter 11 i/o management and disk scheduling; chapter 12 file management; chapter 13 embedded operating systems; chapter 14 computer security threats; chapter 15 computer security techniques; chapter 16 distributed processing, client/server , and clusters.

    pdf495p longtimenosee05 31-03-2024 3 0   Download

  • In "Penetration testing essentials", the following content will be discussed: Chapter 1 introduction to penetration testing, chapter 2 introduction to operating systems and networking, chapter 3 introduction to cryptography, chapter 4 outlining the pen testing methodology, chapter 5 gathering intelligence, chapter 6 scanning and enumeration, chapter 7 conducting vulnerability scanning, chapter 8 cracking passwords, chapter 9 retaining access with backdoors and malware, chapter 10 reporting, chapter 11 working with defensive and detection systems, chapter 12 covering your tracks and evading ...

    pdf287p longtimenosee05 31-03-2024 2 0   Download

  • Ebook Professional penetration testing creating and operating a formal hacking lab: Part 2 includes contents: Chapter 9: information gathering, chapter 10: vulnerability identification, chapter 11: vulnerability verification, chapter 12: compromising a system and privilege escalation, chapter 13: maintaining access, chapter 14: covering your tracks, chapter 15: reporting results, chapter 16: archiving data, chapter 17: cleaning up your lab, chapter 18: planning for your next pentest.

    pdf288p longtimenosee05 31-03-2024 3 0   Download

  • Ebook "Certified Ethical Hacker (CEH): Foundation guide" includes contents: Chapter 1: operating system basics; chapter 2: database basics; chapter 3: networking basics; chapter 4: programming basics for security enthusiasts and hackers; chapter 5: virtualization and cloud basics; chapter 6: information security basics; chapter 7: penetration testing; chapter 8: information gathering; chapter 9: hacking basics; chapter 10: web application hacking; chapter 11: wireless hacking; chapter 12: hacking mobile platforms; chapter 13: IDSes, firewalls, and honeypots; chapter 14: cryptography.

    pdf207p haojiubujain010 14-12-2023 4 2   Download

  • Part 2 book "Information security management handbook" includes content: Applications and systems development security domain, cryptography domain, enterprise security architecture domain, operations security domain, business continuity planning domain, law, investigations, and ethics domain, physical security.

    pdf1587p haojiubujain09 21-11-2023 11 5   Download

  • How does one begin to protect their network against such a determined enemy who can sneak in past the firewall by using traffic that, by all accounts, looks to be perfectly acceptable according to the firewall? By using a Cisco Intrusion Detection Sensor, that’s how.The Cisco IDS looks at traffic more deeply than the firewall and operates proactively by blocking or changing access-lists on the PIX firewall or Cisco routers on the fly. In order for the Cisco IDS sensor to do its job, the IDS sensor and management software must be installed and configured properly.

    pdf673p haojiubujain09 30-11-2023 15 5   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2