intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Security control

Xem 1-20 trên 619 kết quả Security control
  • This book covers code examples written in C# with steps on remediating various ASP.NET Core web application vulnerabilities discovered by a secure code review or security test. You'll find practical examples and different ways to solve the security bugs introduced by insecure code in a recipe-style format.

    pdf324p duyhai707 15-07-2024 2 2   Download

  • Part 2 book "The global airline industry" includes content: Irregular operations - schedule recovery and robustness; labor relations and human resource management in the airline industry, aviation safety and security, airports, air traffic control, air transport and the environment, information technology in airline operations, distribution and passenger processing, critical issues and prospects for the global airline industry.

    pdf240p dianmotminh04 12-07-2024 0 0   Download

  • Part 2 book "The electric power engineering handbook - Power system stability and control" includes content: Power system dynamic modeling, wide area monitoring and situational awareness, assessment of power system stability and dynamic security performance, power system dynamic interaction with turbine generators, wind power integration in power systems,flexible ac transmission systems (facts), energy management, generation control - economic dispatch and unit commitment, state estimation, optimal power flow, security analysis.

    pdf227p dianmotminh03 17-06-2024 0 0   Download

  • TCP-targeted low-rate distributed denial-of-service (LDDoS) attacks pose a serious challenge to the reliability and security of the Internet. Among various proposed solutions, we are particularly interested in the Congestion Participation Rate (CPR) metric and the CPR-based approach.

    pdf17p viambani 18-06-2024 2 1   Download

  • Ebook "Enterprise information systems assurance & system security: Managerial & technical issues" brings together authoritative authors to address the most pressing challenge in the IT field - how to create secure environments for the application of technology to serve our future needs.

    pdf423p zizaybay1103 29-05-2024 7 2   Download

  • Ebook Sams teach yourself today e-banking is a comprehensive tutorial of this emerging online trend. Learn the practices of online banking, how to compare services and fees, and how to determine which online bank is right for you. The book explains the security risks of online banking in clear, friendly terms. Take control of your money by employing the information available on the Internet.

    pdf255p vimeyers 29-05-2024 7 2   Download

  • Ebook Practical information security management: A complete guide to planning and implementation is organized as follows: Chapter 1: evolution of a profession; chapter 2: threats and vulnerabilities; chapter 3: the information security manager; chapter 4: organizational security; chapter 5: information security implementation; chapter 6: standards, frameworks, guidelines, and legislation; chapter 7: protection of information; chapter 8: protection of people; chapter 9: protection of premises; chapter 10: protection of systems; chapter 11: digital evidence and incident response; chapter 12: ...

    pdf253p zizaybay1103 29-05-2024 5 2   Download

  • Ebook Surveillance & security: technological politics & power in everyday life presents the following content: Chapter 1 questioning surveillance and security, chapter 2 he state goes home: local hypervigilance of children and the global retreat from social reproduction, chapter 3 sot surveillance: he growth of mandatory volunteerism in collecting personal information - “hey buddy can you spare a dna?, chapter 4 everyday insecurities: the microbehavioral politics of intrusive surveillance,...

    pdf356p zizaybay1103 29-05-2024 5 2   Download

  • Part 2 book "Power system stability and control" includes content: Direct stability methods; power system stability controls; power system dynamic modeling; integrated dynamic information for the western power system - wams analysis in 2005, dynamic security assessment; power system dynamic interaction with turbine generators; generation control - economic dispatch and unit commitment; state estimation; optimal power flow; security analysis.

    pdf198p dianmotminh01 20-05-2024 5 1   Download

  • Part 2 book "MATLAB for engineers – Applications in control, electrical engineering, it and robotics" includes content: Calculating radiation from power lines for power line communications; automatic modelling approach for power electronics converters - Code generation (C S function, modelica, VHDL-AMS) and MATLAB simulink simulation; PV curves for steady state security assessment with MATLAB;.... and other contents.

    pdf290p dianmotminh00 22-04-2024 5 4   Download

  • The principles and forms of investment of social insurance funds are specified by the law on social insurance, and investment activities are under the supervision and control of the state management agencies in charge of social insurance, according to the principle of safety and efficiency. In this article, the author will give some analysis and comments on the investment situation of Vietnam social insurance fund.

    pdf9p longtimenosee09 08-04-2024 3 1   Download

  • Part 1 book "Computer security - Principles and practice" includes content: Reader’s and instructor’s guide, overview, cryptographic tools, user authentication, access control, database and cloud security, malicious software, denial of service attacks, intrusion detection, firewalls and intrusion prevention systems, buffer overflow, software security.

    pdf436p muasambanhan10 11-04-2024 5 1   Download

  • Part 2 book "Computer security - Principles and practice" includes content: Operating system security, human resources security, security auditing, legal and ethical aspects, internet security protocols and standards, symmetric encryption and message confidentiality, trusted computing and multilevel security, it security management and risk assessment, physical and infrastructure security, it security controls, plans, and procedures,... and other contents.

    pdf402p muasambanhan10 11-04-2024 2 1   Download

  • Ebook "The ethical hack - A framework for business value penetration testing" includes content: Getting started, setting the stage, the framework, information security models, information security program, the business perspective, planning for a controlled attack, preparing for a hack, enumeration, vulnerability analysis, exploitation, the deliverable, integrating the results.

    pdf331p longtimenosee08 31-03-2024 8 1   Download

  • Ebook "The web application hackers handbook - Discovering and exploiting security flaws" includes content: Web application (In)security, core defense mechanisms, web application technologies, mapping the application, bypassing client side controls, attacking authentication, attacking session management, attacking access controls, injecting code, exploiting path traversal,... and other contents.

    pdf771p longtimenosee08 31-03-2024 3 1   Download

  • CCSP SECUR Exam Certification Guide is a complete study tool for the CCSP SECUR exam, enabling you to assess your knowledge, identify areas to concentrate your study, and master key concepts to help you succeed on the exams and in your daily job. The book is filled with features that help you master the skills needed to secure Cisco IOS Router networks. This book was developed in cooperation with the Cisco Internet Learning Solutions Group. Cisco Press books are the only self-study books authorized by Cisco for CCSP exam preparation.

    pdf505p longtimenosee08 31-03-2024 5 1   Download

  • Part 1 book "It governance - A managers guide to data security" includes content: Why is information security necessary the combined code; the turnbull report and sarbanes–oxley; organizing information security; information security policy and scope; the risk assessment and statement of applicability; external parties; asset management; human resources security, physical and environmental security, equipment security, communications and operations management, controls against malicious software (malware) and back-ups.

    pdf205p longtimenosee08 31-03-2024 3 1   Download

  • Part 2 book "It governance - A managers guide to data security" includes content: Network security management and media handling, exchanges of information, electronic commerce services, E-mail and internet use, access control, network access control, operating system access control, application access control and teleworking, systems acquisition, development and maintenance,.... and other contents.

    pdf180p longtimenosee08 31-03-2024 6 1   Download

  • Ebook Hacking exposed: Linux security secrets solutions - Part 2 includes contents: Chapter 8 elevating user privileges; chapter 9 password cracking; chapter 10 how hackers maintain access; chapter 11 mail and ftp security; chapter 12 web servers and dynamic content; chapter 13 access control and firewalls; appendixe a keeping your programs current; appendixe b turning off unneeded services; appendixe c online resources; appendixe d case studies.

    pdf316p longtimenosee05 31-03-2024 2 0   Download

  • The goal of this book is to share the art of hacking with everyone. Understanding hacking techniques is often difficult, since it requires both breadth and depth of knowledge. Many hacking texts seem esoteric and confusing because of just a few gaps in this prerequisite education. Ebook Hacking: the art of exploitation (2nd edition): Part 1 includes contents: 0x100: Introduction, 0x200: Programming, 0x300: Exploitation, 0x400: Networking.

    pdf290p longtimenosee05 31-03-2024 3 0   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2