intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Securing the network

Xem 1-20 trên 1916 kết quả Securing the network
  • In this paper, we propose a geographically lightweight secure routing protocol (LS-TPGF) in a wireless multimedia sensor network (WMSN) using Cyclic Redundancy Check (CRC) and Elliptic Curve Cryptography (ECC) for node and message authentication.

    pdf10p vithomson 02-07-2024 0 0   Download

  • Part 2 of ebook "Strategies in E-business: Positioning and social networking in online markets" provides readers with contents including: search engine optimization and ethical leadership strategies; search engine ranking a SEO strategy; the integration of social networks in the competitiveness of cooperation networks; how are new media changing the working environment; the importance of trust in information security in interconnected organisations;...

    pdf83p giangmacvien 22-06-2024 2 1   Download

  • By the time you finish this book, you’ll know how to: Work with the JUNOS network operating system; Set up and configure a Juniper router; Connect, manage, and trouble shoot routers and other Juniper appliances; Make your network more efficient; Configure JUNOS default security features as well as restricted physical access to protect routers; Solve hardware, software, interface, and router problems; Integrate JUNOS with other systems.

    pdf410p zizaybay1104 29-05-2024 4 2   Download

  • The second International Conference on Applied Cryptography and Network Security (ACNS 2004) was sponsored and organized by ICISA (the International Communications and Information Security Association). It was held in Yellow Mountain, China, June 8–11, 2004. The conference proceedings, representing papers from the academic track, are published in this volume of the Lecture Notes in Computer Science (LNCS) of Springer-Verlag.

    pdf525p zizaybay1103 29-05-2024 1 1   Download

  • The rapid growth of electronic communication means that issues in information security are of increasing practical importance. Messages exchanged over worldwide publicly accessible computer networks must be kept confidential and protected against manipulation. Electronic business requires digital signatures that are valid in law, and secure payment protocols. Modern cryptography provides solutions to all these problems. This book originates from courses given for students in computer science at the Georg-Simon-Ohm University of Applied Sciences, Nurnberg.

    pdf372p zizaybay1103 29-05-2024 5 2   Download

  • Many times, security professionals need a reference for reviewing, developing, and implementing a security policy architecture. This text will walk the reader through the process for an effective policy architecture for a small, medium, or large enterprise. Whether the reader is a novice or an experienced security professional, this text will give examples and hints on how to review an existing security policy architecture and develop it from scratch.

    pdf360p zizaybay1103 29-05-2024 2 2   Download

  • Ebook "Enterprise information systems assurance & system security: Managerial & technical issues" brings together authoritative authors to address the most pressing challenge in the IT field - how to create secure environments for the application of technology to serve our future needs.

    pdf423p zizaybay1103 29-05-2024 7 2   Download

  • Ebook "Risk management of water supply and sanitation systems" is based on the discussions and papers prepared for the NATO Advanced Research Workshop that took place in Ohrid, Macedonia under the auspices of the NATO Security Through Science Programme and addressed problems Risk management of water supply and sanitation systems impaired by operational failures, natural disasters and war conflicts.

    pdf324p giangdongdinh 28-05-2024 3 1   Download

  • Bài giảng An ninh mạng - Bài 5: Xác thực chủ thể. Bài này cung cấp cho sinh viên những nội dung gồm: khái niệm chung; xác thực dựa trên mật khẩu; các giao thức xác thực dựa trên mật khẩu; giao thức zero-knowledge; giới thiệu một số phương pháp xác thực khác;... Mời các bạn cùng tham khảo!

    pdf31p codabach1016 03-05-2024 4 2   Download

  • Part 2 book "Networking - The complete reference" by author Bobbi Sandberg includes content: TCP/IP, other TCP/IP protocols; the domain name system; internet services, windows chapter 18 active directory; linux; unix; other network operating systems and networking in the cloud, network clients; network security basics; wireless security; overview of network administration; network management and troubleshooting tools; backing up.

    pdf426p muasambanhan10 11-04-2024 6 1   Download

  • The paper discusses the concept and problem of identifying DDoS attacks for information management. The main starting mechanisms and types of DDoS attacks are analyzed. To identify them, signature and behavioral methods of analyzing network traffic are used. Analysis of the advantages and disadvantages of these methods actualized the need for their combined use. To detect and classify DDoS attacks, the need to develop and use a neural network model has been updated. The training and testing of the model were made on the initial data from the NSL-KDD set.

    pdf5p longtimenosee09 08-04-2024 4 1   Download

  • Part 2 of ebook "Software engineering, artificial intelligence, networking and parallel/distributed computing 2011" includes the following main contents: comparison of region based and weighted principal component analysis and locally salient ICA in terms of facial expression recognition; web health portal to enhance patient safety in Australian healthcare systems; peer-based complex profile management; detecting unwanted email using VAT; improving smart card security using elliptic curve cryptography over prime field (Fp);...

    pdf101p khuynhlinhnguyet1009 05-04-2024 2 1   Download

  • Ebook "The ethical hack - A framework for business value penetration testing" includes content: Getting started, setting the stage, the framework, information security models, information security program, the business perspective, planning for a controlled attack, preparing for a hack, enumeration, vulnerability analysis, exploitation, the deliverable, integrating the results.

    pdf331p longtimenosee08 31-03-2024 8 1   Download

  • Work in type systems for programming languages now touches many parts of computer science, from language design and implementation to software engineering, network security, databases, and analysis of concurrent and distributed systems. The aim of this book, together with its predecessor, Types and Programming Languages is to offer a comprehensive and accessible introduction to the area’s central ideas, results, and techniques.

    pdf589p longtimenosee08 31-03-2024 2 1   Download

  • The Cisco Certified Internet Expert Security Certification is an increasingly popular internetworking certification and one of the most popular security certifications in the world. Although CCIE certification builds on the foundation you might have established from the Cisco Certified Network Associate (CCNA) and Cisco Certified Network Professional (CCNP) certifications, there is no prerequisite to attempt to gain CCIE certification. However, attaining CCNA and CCNP certifications will help you understand Cisco subjects and testing strategies.

    pdf524p longtimenosee08 31-03-2024 3 1   Download

  • Ebook "CCNA Security - Official Certification Guide" presents the following content: Part I: Network security concepts, Part II: Constructing a secure infrastructure, Part III: Extending security and availability with cryptography and VPNs, Part IV: Final preparation, Part V: Appendixes.

    pdf672p longtimenosee08 31-03-2024 3 1   Download

  • CCNA Security Official Exam Certification Guide is an excellent self-study resource for the Cisco IINS (640-553) exam. Passing the IINS exam validates the knowledge and skills required to successfully secure Cisco network devices. Gaining certification in Cisco technology is key to the continuing educational development of today’s networking professional. Through certification programs, Cisco validates the skills and expertise required to effectively manage the modern enterprise network.

    pdf776p longtimenosee08 31-03-2024 2 1   Download

  • CCNA Wireless Official Exam Certification Guide is an excellent self-study resource for the Cisco IUWNE (640-721) exam. Passing the IUWNE exam validates the knowledge and skills required to successfully secure Cisco network devices. Gaining certification in Cisco technology is key to the continuing educational development of today’s networking professional. Through certification programs, Cisco validates the skills and expertise required to effectively manage the modern enterprise network.

    pdf505p longtimenosee08 31-03-2024 2 1   Download

  • Network security is a very complex business. The Cisco PIX Firewall performs some very specific functions as part of the security process. It is very important to be familiar with many networking and network security concepts before you undertake the CSPFA certification. This book is designed for security professionals or networking professionals who are interested in beginning the security certification process.

    pdf605p longtimenosee08 31-03-2024 5 1   Download

  • The Cisco Systems series of certifications provide you with a means of validating your expertise in certain core areas of study to current or prospective employers and to your peers. More network professionals are pursuing the Cisco Certified Security Professional (CCSP) certification because network security has become a critical element in the overall security plan of 21st-century businesses. This book is designed to help you attain this prestigious certification.

    pdf584p longtimenosee08 31-03-2024 4 1   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2