![](images/graphics/blank.gif)
Securing operating system
-
Part 2 book "Power quality in power systems and electrical machines" includes content: Power system modeling under nonsinusoidal operating conditions, impact of poor power quality on reliability, relaying, and security, the roles of filters in power systems, optimal placement and sizing of shunt capacitor banks in the presence of harmonics, unified power quality conditioner (UPQC),... and other contents.
373p
dianmotminh03
17-06-2024
0
0
Download
-
The research underscores the urgent need to adopt Blockchain technology in higher education to address the prevalent issues of cheating and hacking in student registration systems. These unethical practices negatively impact fairness and integrity within the educational sector. Blockchain and Smart Contracts offer a solution by ensuring secure, tamper-proof recording of academic records, which enhances transparency and operational efficiency.
5p
viambani
18-06-2024
5
1
Download
-
By the time you finish this book, you’ll know how to: Work with the JUNOS network operating system; Set up and configure a Juniper router; Connect, manage, and trouble shoot routers and other Juniper appliances; Make your network more efficient; Configure JUNOS default security features as well as restricted physical access to protect routers; Solve hardware, software, interface, and router problems; Integrate JUNOS with other systems.
410p
zizaybay1104
29-05-2024
2
1
Download
-
Ebook "Risk management of water supply and sanitation systems" is based on the discussions and papers prepared for the NATO Advanced Research Workshop that took place in Ohrid, Macedonia under the auspices of the NATO Security Through Science Programme and addressed problems Risk management of water supply and sanitation systems impaired by operational failures, natural disasters and war conflicts.
324p
giangdongdinh
28-05-2024
3
1
Download
-
Part 2 book "Networking - The complete reference" by author Bobbi Sandberg includes content: TCP/IP, other TCP/IP protocols; the domain name system; internet services, windows chapter 18 active directory; linux; unix; other network operating systems and networking in the cloud, network clients; network security basics; wireless security; overview of network administration; network management and troubleshooting tools; backing up.
426p
muasambanhan10
11-04-2024
6
1
Download
-
Part 2 book "Computer security - Principles and practice" includes content: Operating system security, human resources security, security auditing, legal and ethical aspects, internet security protocols and standards, symmetric encryption and message confidentiality, trusted computing and multilevel security, it security management and risk assessment, physical and infrastructure security, it security controls, plans, and procedures,... and other contents.
402p
muasambanhan10
11-04-2024
2
1
Download
-
One of the main trends in the law development is its digitalization under the supply chain strategies, which is manifested both in the digitalization of legal regulation, legal technologies, legal processes and law enforcement. In the emergence of regulations affecting the issues of the digital economy, electronic state, information security.
6p
longtimenosee09
08-04-2024
4
0
Download
-
Work in type systems for programming languages now touches many parts of computer science, from language design and implementation to software engineering, network security, databases, and analysis of concurrent and distributed systems. The aim of this book, together with its predecessor, Types and Programming Languages is to offer a comprehensive and accessible introduction to the area’s central ideas, results, and techniques.
589p
longtimenosee08
31-03-2024
2
1
Download
-
The Cisco Certified Internet Expert Security Certification is an increasingly popular internetworking certification and one of the most popular security certifications in the world. Although CCIE certification builds on the foundation you might have established from the Cisco Certified Network Associate (CCNA) and Cisco Certified Network Professional (CCNP) certifications, there is no prerequisite to attempt to gain CCIE certification. However, attaining CCNA and CCNP certifications will help you understand Cisco subjects and testing strategies.
524p
longtimenosee08
31-03-2024
2
1
Download
-
Ebook It governance - A managers guide to data security and ISO 2700/ISO 27002 (4th edition): Part 2
Part 2 book "It governance - A managers guide to data security" includes content: Network security management and media handling, exchanges of information, electronic commerce services, E-mail and internet use, access control, network access control, operating system access control, application access control and teleworking, systems acquisition, development and maintenance,.... and other contents.
180p
longtimenosee08
31-03-2024
6
1
Download
-
Ebook Hardware hacking: Have fun while voiding your warranty – Part 2 includes contents: Chapter 8 hack your atari 5200 and 8-bit computer, chapter 9 hacking the playstation, chapter 10 wireless 802.11 hacks, chapter 11 hacking the ipod, chapter 12 can you hear me now? Nokia 6210 mobile phone modifications, chapter 13 upgrading memory on palm devices, chapter 14 operating systems overview, chapter 15 coding 101.
292p
longtimenosee05
31-03-2024
1
0
Download
-
Ebook Nokia security solutions handbook: Part 1 includes contents: Chapter 1 overview of the Nokia security platform, chapter 2 overview of the Nokia ipso operating system, chapter 3 initial configuration, chapter 4 introducing the voyager web interface, chapter 5 basic system administration.
177p
longtimenosee05
31-03-2024
4
0
Download
-
In ebook Operating systems: A concept-based approach - Part 2, the following content will be discussed: Chapter 11: memory management, chapter 12: virtual memory, chapter 13: file systems, chapter 14: implementation of file operations, chapter 15: security and protection, chapter 16: distributed operating systems, chapter 17: theoretical issues in distributed systems, chapter 18: distributed control algorithms, chapter 19: recovery and fault tolerance, chapter 20: distributed file systems, chapter 21: distributed system security.
469p
longtimenosee05
31-03-2024
1
0
Download
-
In ebook Operating systems and middleware: Supporting controlled interaction – Part 2, the following content will be discussed: Chapter 7 processes and protection; chapter 8 files and other persistent storage; chapter 9 networking; chapter 10 messaging, rpc, and web services; chapter 11 security, chapter 12 stacks.
275p
longtimenosee05
31-03-2024
1
0
Download
-
Ebook Operating systems internals and design principles (7th edition) - Part 2 includes contents: Chapter 7 memory management; chapter 8 virtual memory; chapter 9 scheduling: uni-processor scheduling; chapter 10 multi-processor and real time scheduling; chapter 11 i/o management and disk scheduling; chapter 12 file management; chapter 13 embedded operating systems; chapter 14 computer security threats; chapter 15 computer security techniques; chapter 16 distributed processing, client/server , and clusters.
495p
longtimenosee05
31-03-2024
3
0
Download
-
In "Penetration testing essentials", the following content will be discussed: Chapter 1 introduction to penetration testing, chapter 2 introduction to operating systems and networking, chapter 3 introduction to cryptography, chapter 4 outlining the pen testing methodology, chapter 5 gathering intelligence, chapter 6 scanning and enumeration, chapter 7 conducting vulnerability scanning, chapter 8 cracking passwords, chapter 9 retaining access with backdoors and malware, chapter 10 reporting, chapter 11 working with defensive and detection systems, chapter 12 covering your tracks and evading ...
287p
longtimenosee05
31-03-2024
2
0
Download
-
Ebook Professional penetration testing creating and operating a formal hacking lab: Part 2 includes contents: Chapter 9: information gathering, chapter 10: vulnerability identification, chapter 11: vulnerability verification, chapter 12: compromising a system and privilege escalation, chapter 13: maintaining access, chapter 14: covering your tracks, chapter 15: reporting results, chapter 16: archiving data, chapter 17: cleaning up your lab, chapter 18: planning for your next pentest.
288p
longtimenosee05
31-03-2024
3
0
Download
-
Ebook "Certified Ethical Hacker (CEH): Foundation guide" includes contents: Chapter 1: operating system basics; chapter 2: database basics; chapter 3: networking basics; chapter 4: programming basics for security enthusiasts and hackers; chapter 5: virtualization and cloud basics; chapter 6: information security basics; chapter 7: penetration testing; chapter 8: information gathering; chapter 9: hacking basics; chapter 10: web application hacking; chapter 11: wireless hacking; chapter 12: hacking mobile platforms; chapter 13: IDSes, firewalls, and honeypots; chapter 14: cryptography.
207p
haojiubujain010
14-12-2023
4
2
Download
-
Part 2 book "Information security management handbook" includes content: Applications and systems development security domain, cryptography domain, enterprise security architecture domain, operations security domain, business continuity planning domain, law, investigations, and ethics domain, physical security.
1587p
haojiubujain09
21-11-2023
11
5
Download
-
How does one begin to protect their network against such a determined enemy who can sneak in past the firewall by using traffic that, by all accounts, looks to be perfectly acceptable according to the firewall? By using a Cisco Intrusion Detection Sensor, that’s how.The Cisco IDS looks at traffic more deeply than the firewall and operates proactively by blocking or changing access-lists on the PIX firewall or Cisco routers on the fly. In order for the Cisco IDS sensor to do its job, the IDS sensor and management software must be installed and configured properly.
673p
haojiubujain09
30-11-2023
15
5
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)