![](images/graphics/blank.gif)
Securing the network
-
In this paper, we propose a geographically lightweight secure routing protocol (LS-TPGF) in a wireless multimedia sensor network (WMSN) using Cyclic Redundancy Check (CRC) and Elliptic Curve Cryptography (ECC) for node and message authentication.
10p
vithomson
02-07-2024
0
0
Download
-
Part 2 of ebook "Strategies in E-business: Positioning and social networking in online markets" provides readers with contents including: search engine optimization and ethical leadership strategies; search engine ranking a SEO strategy; the integration of social networks in the competitiveness of cooperation networks; how are new media changing the working environment; the importance of trust in information security in interconnected organisations;...
83p
giangmacvien
22-06-2024
2
1
Download
-
By the time you finish this book, you’ll know how to: Work with the JUNOS network operating system; Set up and configure a Juniper router; Connect, manage, and trouble shoot routers and other Juniper appliances; Make your network more efficient; Configure JUNOS default security features as well as restricted physical access to protect routers; Solve hardware, software, interface, and router problems; Integrate JUNOS with other systems.
410p
zizaybay1104
29-05-2024
4
2
Download
-
The second International Conference on Applied Cryptography and Network Security (ACNS 2004) was sponsored and organized by ICISA (the International Communications and Information Security Association). It was held in Yellow Mountain, China, June 8–11, 2004. The conference proceedings, representing papers from the academic track, are published in this volume of the Lecture Notes in Computer Science (LNCS) of Springer-Verlag.
525p
zizaybay1103
29-05-2024
1
1
Download
-
The rapid growth of electronic communication means that issues in information security are of increasing practical importance. Messages exchanged over worldwide publicly accessible computer networks must be kept confidential and protected against manipulation. Electronic business requires digital signatures that are valid in law, and secure payment protocols. Modern cryptography provides solutions to all these problems. This book originates from courses given for students in computer science at the Georg-Simon-Ohm University of Applied Sciences, Nurnberg.
372p
zizaybay1103
29-05-2024
5
2
Download
-
Many times, security professionals need a reference for reviewing, developing, and implementing a security policy architecture. This text will walk the reader through the process for an effective policy architecture for a small, medium, or large enterprise. Whether the reader is a novice or an experienced security professional, this text will give examples and hints on how to review an existing security policy architecture and develop it from scratch.
360p
zizaybay1103
29-05-2024
2
2
Download
-
Ebook "Enterprise information systems assurance & system security: Managerial & technical issues" brings together authoritative authors to address the most pressing challenge in the IT field - how to create secure environments for the application of technology to serve our future needs.
423p
zizaybay1103
29-05-2024
7
2
Download
-
Ebook "Risk management of water supply and sanitation systems" is based on the discussions and papers prepared for the NATO Advanced Research Workshop that took place in Ohrid, Macedonia under the auspices of the NATO Security Through Science Programme and addressed problems Risk management of water supply and sanitation systems impaired by operational failures, natural disasters and war conflicts.
324p
giangdongdinh
28-05-2024
3
1
Download
-
Bài giảng An ninh mạng - Bài 5: Xác thực chủ thể. Bài này cung cấp cho sinh viên những nội dung gồm: khái niệm chung; xác thực dựa trên mật khẩu; các giao thức xác thực dựa trên mật khẩu; giao thức zero-knowledge; giới thiệu một số phương pháp xác thực khác;... Mời các bạn cùng tham khảo!
31p
codabach1016
03-05-2024
4
2
Download
-
Part 2 book "Networking - The complete reference" by author Bobbi Sandberg includes content: TCP/IP, other TCP/IP protocols; the domain name system; internet services, windows chapter 18 active directory; linux; unix; other network operating systems and networking in the cloud, network clients; network security basics; wireless security; overview of network administration; network management and troubleshooting tools; backing up.
426p
muasambanhan10
11-04-2024
6
1
Download
-
The paper discusses the concept and problem of identifying DDoS attacks for information management. The main starting mechanisms and types of DDoS attacks are analyzed. To identify them, signature and behavioral methods of analyzing network traffic are used. Analysis of the advantages and disadvantages of these methods actualized the need for their combined use. To detect and classify DDoS attacks, the need to develop and use a neural network model has been updated. The training and testing of the model were made on the initial data from the NSL-KDD set.
5p
longtimenosee09
08-04-2024
4
1
Download
-
Part 2 of ebook "Software engineering, artificial intelligence, networking and parallel/distributed computing 2011" includes the following main contents: comparison of region based and weighted principal component analysis and locally salient ICA in terms of facial expression recognition; web health portal to enhance patient safety in Australian healthcare systems; peer-based complex profile management; detecting unwanted email using VAT; improving smart card security using elliptic curve cryptography over prime field (Fp);...
101p
khuynhlinhnguyet1009
05-04-2024
2
1
Download
-
Ebook "The ethical hack - A framework for business value penetration testing" includes content: Getting started, setting the stage, the framework, information security models, information security program, the business perspective, planning for a controlled attack, preparing for a hack, enumeration, vulnerability analysis, exploitation, the deliverable, integrating the results.
331p
longtimenosee08
31-03-2024
8
1
Download
-
Work in type systems for programming languages now touches many parts of computer science, from language design and implementation to software engineering, network security, databases, and analysis of concurrent and distributed systems. The aim of this book, together with its predecessor, Types and Programming Languages is to offer a comprehensive and accessible introduction to the area’s central ideas, results, and techniques.
589p
longtimenosee08
31-03-2024
2
1
Download
-
The Cisco Certified Internet Expert Security Certification is an increasingly popular internetworking certification and one of the most popular security certifications in the world. Although CCIE certification builds on the foundation you might have established from the Cisco Certified Network Associate (CCNA) and Cisco Certified Network Professional (CCNP) certifications, there is no prerequisite to attempt to gain CCIE certification. However, attaining CCNA and CCNP certifications will help you understand Cisco subjects and testing strategies.
524p
longtimenosee08
31-03-2024
3
1
Download
-
Ebook "CCNA Security - Official Certification Guide" presents the following content: Part I: Network security concepts, Part II: Constructing a secure infrastructure, Part III: Extending security and availability with cryptography and VPNs, Part IV: Final preparation, Part V: Appendixes.
672p
longtimenosee08
31-03-2024
3
1
Download
-
CCNA Security Official Exam Certification Guide is an excellent self-study resource for the Cisco IINS (640-553) exam. Passing the IINS exam validates the knowledge and skills required to successfully secure Cisco network devices. Gaining certification in Cisco technology is key to the continuing educational development of today’s networking professional. Through certification programs, Cisco validates the skills and expertise required to effectively manage the modern enterprise network.
776p
longtimenosee08
31-03-2024
2
1
Download
-
CCNA Wireless Official Exam Certification Guide is an excellent self-study resource for the Cisco IUWNE (640-721) exam. Passing the IUWNE exam validates the knowledge and skills required to successfully secure Cisco network devices. Gaining certification in Cisco technology is key to the continuing educational development of today’s networking professional. Through certification programs, Cisco validates the skills and expertise required to effectively manage the modern enterprise network.
505p
longtimenosee08
31-03-2024
2
1
Download
-
Network security is a very complex business. The Cisco PIX Firewall performs some very specific functions as part of the security process. It is very important to be familiar with many networking and network security concepts before you undertake the CSPFA certification. This book is designed for security professionals or networking professionals who are interested in beginning the security certification process.
605p
longtimenosee08
31-03-2024
5
1
Download
-
The Cisco Systems series of certifications provide you with a means of validating your expertise in certain core areas of study to current or prospective employers and to your peers. More network professionals are pursuing the Cisco Certified Security Professional (CCSP) certification because network security has become a critical element in the overall security plan of 21st-century businesses. This book is designed to help you attain this prestigious certification.
584p
longtimenosee08
31-03-2024
4
1
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)