![](images/graphics/blank.gif)
Security control
-
This book covers code examples written in C# with steps on remediating various ASP.NET Core web application vulnerabilities discovered by a secure code review or security test. You'll find practical examples and different ways to solve the security bugs introduced by insecure code in a recipe-style format.
324p
duyhai707
15-07-2024
2
2
Download
-
Part 2 book "The global airline industry" includes content: Irregular operations - schedule recovery and robustness; labor relations and human resource management in the airline industry, aviation safety and security, airports, air traffic control, air transport and the environment, information technology in airline operations, distribution and passenger processing, critical issues and prospects for the global airline industry.
240p
dianmotminh04
12-07-2024
0
0
Download
-
Part 2 book "The electric power engineering handbook - Power system stability and control" includes content: Power system dynamic modeling, wide area monitoring and situational awareness, assessment of power system stability and dynamic security performance, power system dynamic interaction with turbine generators, wind power integration in power systems,flexible ac transmission systems (facts), energy management, generation control - economic dispatch and unit commitment, state estimation, optimal power flow, security analysis.
227p
dianmotminh03
17-06-2024
0
0
Download
-
TCP-targeted low-rate distributed denial-of-service (LDDoS) attacks pose a serious challenge to the reliability and security of the Internet. Among various proposed solutions, we are particularly interested in the Congestion Participation Rate (CPR) metric and the CPR-based approach.
17p
viambani
18-06-2024
2
1
Download
-
Ebook "Enterprise information systems assurance & system security: Managerial & technical issues" brings together authoritative authors to address the most pressing challenge in the IT field - how to create secure environments for the application of technology to serve our future needs.
423p
zizaybay1103
29-05-2024
7
2
Download
-
Ebook Sams teach yourself today e-banking is a comprehensive tutorial of this emerging online trend. Learn the practices of online banking, how to compare services and fees, and how to determine which online bank is right for you. The book explains the security risks of online banking in clear, friendly terms. Take control of your money by employing the information available on the Internet.
255p
vimeyers
29-05-2024
7
2
Download
-
Ebook Practical information security management: A complete guide to planning and implementation is organized as follows: Chapter 1: evolution of a profession; chapter 2: threats and vulnerabilities; chapter 3: the information security manager; chapter 4: organizational security; chapter 5: information security implementation; chapter 6: standards, frameworks, guidelines, and legislation; chapter 7: protection of information; chapter 8: protection of people; chapter 9: protection of premises; chapter 10: protection of systems; chapter 11: digital evidence and incident response; chapter 12: ...
253p
zizaybay1103
29-05-2024
5
2
Download
-
Ebook Surveillance & security: technological politics & power in everyday life presents the following content: Chapter 1 questioning surveillance and security, chapter 2 he state goes home: local hypervigilance of children and the global retreat from social reproduction, chapter 3 sot surveillance: he growth of mandatory volunteerism in collecting personal information - “hey buddy can you spare a dna?, chapter 4 everyday insecurities: the microbehavioral politics of intrusive surveillance,...
356p
zizaybay1103
29-05-2024
5
2
Download
-
Part 2 book "Power system stability and control" includes content: Direct stability methods; power system stability controls; power system dynamic modeling; integrated dynamic information for the western power system - wams analysis in 2005, dynamic security assessment; power system dynamic interaction with turbine generators; generation control - economic dispatch and unit commitment; state estimation; optimal power flow; security analysis.
198p
dianmotminh01
20-05-2024
5
1
Download
-
Part 2 book "MATLAB for engineers – Applications in control, electrical engineering, it and robotics" includes content: Calculating radiation from power lines for power line communications; automatic modelling approach for power electronics converters - Code generation (C S function, modelica, VHDL-AMS) and MATLAB simulink simulation; PV curves for steady state security assessment with MATLAB;.... and other contents.
290p
dianmotminh00
22-04-2024
5
4
Download
-
The principles and forms of investment of social insurance funds are specified by the law on social insurance, and investment activities are under the supervision and control of the state management agencies in charge of social insurance, according to the principle of safety and efficiency. In this article, the author will give some analysis and comments on the investment situation of Vietnam social insurance fund.
9p
longtimenosee09
08-04-2024
3
1
Download
-
Part 1 book "Computer security - Principles and practice" includes content: Reader’s and instructor’s guide, overview, cryptographic tools, user authentication, access control, database and cloud security, malicious software, denial of service attacks, intrusion detection, firewalls and intrusion prevention systems, buffer overflow, software security.
436p
muasambanhan10
11-04-2024
5
1
Download
-
Part 2 book "Computer security - Principles and practice" includes content: Operating system security, human resources security, security auditing, legal and ethical aspects, internet security protocols and standards, symmetric encryption and message confidentiality, trusted computing and multilevel security, it security management and risk assessment, physical and infrastructure security, it security controls, plans, and procedures,... and other contents.
402p
muasambanhan10
11-04-2024
2
1
Download
-
Ebook "The ethical hack - A framework for business value penetration testing" includes content: Getting started, setting the stage, the framework, information security models, information security program, the business perspective, planning for a controlled attack, preparing for a hack, enumeration, vulnerability analysis, exploitation, the deliverable, integrating the results.
331p
longtimenosee08
31-03-2024
8
1
Download
-
Ebook "The web application hackers handbook - Discovering and exploiting security flaws" includes content: Web application (In)security, core defense mechanisms, web application technologies, mapping the application, bypassing client side controls, attacking authentication, attacking session management, attacking access controls, injecting code, exploiting path traversal,... and other contents.
771p
longtimenosee08
31-03-2024
3
1
Download
-
CCSP SECUR Exam Certification Guide is a complete study tool for the CCSP SECUR exam, enabling you to assess your knowledge, identify areas to concentrate your study, and master key concepts to help you succeed on the exams and in your daily job. The book is filled with features that help you master the skills needed to secure Cisco IOS Router networks. This book was developed in cooperation with the Cisco Internet Learning Solutions Group. Cisco Press books are the only self-study books authorized by Cisco for CCSP exam preparation.
505p
longtimenosee08
31-03-2024
5
1
Download
-
Ebook It governance - A managers guide to data security and ISO 2700/ISO 27002 (4th edition): Part 1
Part 1 book "It governance - A managers guide to data security" includes content: Why is information security necessary the combined code; the turnbull report and sarbanes–oxley; organizing information security; information security policy and scope; the risk assessment and statement of applicability; external parties; asset management; human resources security, physical and environmental security, equipment security, communications and operations management, controls against malicious software (malware) and back-ups.
205p
longtimenosee08
31-03-2024
3
1
Download
-
Ebook It governance - A managers guide to data security and ISO 2700/ISO 27002 (4th edition): Part 2
Part 2 book "It governance - A managers guide to data security" includes content: Network security management and media handling, exchanges of information, electronic commerce services, E-mail and internet use, access control, network access control, operating system access control, application access control and teleworking, systems acquisition, development and maintenance,.... and other contents.
180p
longtimenosee08
31-03-2024
6
1
Download
-
Ebook Hacking exposed: Linux security secrets solutions - Part 2 includes contents: Chapter 8 elevating user privileges; chapter 9 password cracking; chapter 10 how hackers maintain access; chapter 11 mail and ftp security; chapter 12 web servers and dynamic content; chapter 13 access control and firewalls; appendixe a keeping your programs current; appendixe b turning off unneeded services; appendixe c online resources; appendixe d case studies.
316p
longtimenosee05
31-03-2024
2
0
Download
-
The goal of this book is to share the art of hacking with everyone. Understanding hacking techniques is often difficult, since it requires both breadth and depth of knowledge. Many hacking texts seem esoteric and confusing because of just a few gaps in this prerequisite education. Ebook Hacking: the art of exploitation (2nd edition): Part 1 includes contents: 0x100: Introduction, 0x200: Programming, 0x300: Exploitation, 0x400: Networking.
290p
longtimenosee05
31-03-2024
3
0
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)