intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Security feature

Xem 1-20 trên 281 kết quả Security feature
  • By the time you finish this book, you’ll know how to: Work with the JUNOS network operating system; Set up and configure a Juniper router; Connect, manage, and trouble shoot routers and other Juniper appliances; Make your network more efficient; Configure JUNOS default security features as well as restricted physical access to protect routers; Solve hardware, software, interface, and router problems; Integrate JUNOS with other systems.

    pdf410p zizaybay1104 29-05-2024 4 2   Download

  • One of the main trends in the law development is its digitalization under the supply chain strategies, which is manifested both in the digitalization of legal regulation, legal technologies, legal processes and law enforcement. In the emergence of regulations affecting the issues of the digital economy, electronic state, information security.

    pdf6p longtimenosee09 08-04-2024 5 0   Download

  • Security features present on Nepali passport are examined with the help of Video Spectral Comparator. Mainly examination is carried out with application ultra-violet light, normal light, oblique light and transmitted light. We obtain different types of security features including florescence, ghost image, binding thread, optical fiber, punched number, barcode, micro-printing, watermark, emboss etc.

    pdf6p visergey 02-04-2024 5 0   Download

  • In today's world, smart surveillance plays an important role in protecting security and creating a safe living environment. For abnormal objects in the smart surveillance system, this is an important issue, requiring attention and timely response from managers and supervisors. To address this issue, the paper uses transfer learning techniques on modern object detection models to detect abnormal objects such as guns, knives, etc. in public places.

    pdf8p vilarry 01-04-2024 4 0   Download

  • The Cisco Systems series of certifications provide you with a means of validating your expertise in certain core areas of study to current or prospective employers and to your peers. More network professionals are pursuing the Cisco Certified Security Professional (CCSP) certification because network security has become a critical element in the overall security plan of 21st-century businesses. This book is designed to help you attain this prestigious certification.

    pdf584p longtimenosee08 31-03-2024 4 1   Download

  • CCSP SECUR Exam Certification Guide is a complete study tool for the CCSP SECUR exam, enabling you to assess your knowledge, identify areas to concentrate your study, and master key concepts to help you succeed on the exams and in your daily job. The book is filled with features that help you master the skills needed to secure Cisco IOS Router networks. This book was developed in cooperation with the Cisco Internet Learning Solutions Group. Cisco Press books are the only self-study books authorized by Cisco for CCSP exam preparation.

    pdf505p longtimenosee08 31-03-2024 5 1   Download

  • This second edition of Hacking: The Art of Exploitation makes the world of hacking more accessible by providing the complete picture—from programming to machine code to exploitation. In addition, this edition features a bootable LiveCD based on Ubuntu Linux that can be used in any computer with an x86 processor, without modifying the computer’s existing OS. Ebook Hacking: the art of exploitation (2nd edition): Part 2 includes contents: 0x500: Shellcode, 0x600: Countermeasures, 0x700: Cryptology, 0x800: Conclusion.

    pdf198p longtimenosee05 31-03-2024 4 0   Download

  • Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 2 includes contents: Chapter 8 achieving stealth and maintaining presence, chapter 9 hacking SQL server, chapter 10 hacking Microsoft client apps, chapter 11 physical attacks, chapter 12 windows security features and tools, chapter a windows security checklist, chapter b about the companion website.

    pdf230p haojiubujain010 14-12-2023 11 1   Download

  • Linux utilities cookbook includes contents: Chapter 1, Using the Terminal / Command Line, covers how to get the most out of the Linux command line. Chapter 2, The Desktop, introduces some of the desktop environments available for Linux. Chapter 3, Files and Directories, explains files, directories, and how to manage them. Chapter 4, Networking and the Internet, covers connectivity and how to fix it when it goes down. Chapter 5, Permissions, Access, and Security, gives a brief overview of Linux security features. Chapter 6, Processes, explains how to manage processes in Linux.

    pdf224p haojiubujain010 14-12-2023 6 4   Download

  • This book focuses on the complete product line of Cisco firewall hardware: the PIX and ASA Security Appliance families and the Catalyst Firewall Services Module (FWSM). Of the many sources of information and documentation about Cisco firewalls, very few provide a quick and portable solution for networking professionals. This book is designed to provide a quick and easy reference guide for all the features that can be configured on any Cisco firewall.

    pdf964p haojiubujain09 30-11-2023 6 6   Download

  • Ebook Cisco network security little black book contains 7 chapters, includes: Chapter 1: Securing the Infrastructure In Brief Immediate Solutions, Chapter 2: AAA security technologies, chapter 3: perimeter router security, Chapter 4: IOS Firewall Feature set, chapter 5: cisco encryption technology, chapter 6: internet protocol security, chapter 7: additional access list features, Appendix A: IOS Firewall IDS Signature List, Appendix B: Securing Ethernet Switches.

    pdf292p haojiubujain09 30-11-2023 7 5   Download

  • Ebook Practical VoIP Security: Part 1 includes contents: Chapter 1 Introduction to VoIP Security; Chapter 2 Asterisk Configuration and Features; Chapter 3 The Hardware Infrastructure; Chapter 4 PSTN Architecture; Chapter 5 H.323 Architecture; Chapter 6 SIP Architecture; Chapter 7 Other VoIP Communication Architectures; Chapter 8 Support Protocols; Chapter 9 Threats to VoIP Communications Systems.

    pdf290p haojiubujain06 23-10-2023 6 4   Download

  • Ebook "Learning node.js for mobile application development" includes content: Setting up your workspace, configuring persistence with mongoDB, creating an API, securing your backend, real time data and websockets, introducing ionic, building user interfaces, making our app interactive, accessing native phone features, working with apis,... and other contents.

    pdf248p haojiubujain07 20-09-2023 6 2   Download

  • This book discusses the security threats and requirements in wireless LANs and wireless MANs, with a discussion on what the original designs missed and how they were corrected in the new protocols. It highlights the features of the current wireless LAN and MAN security protocols and explains the caveats and discusses open issues. This book is divided into four parts. The first part discusses authentication technologies common to security in wireless LANs and MANs.

    pdf262p haojiubujain06 05-09-2023 5 3   Download

  • Ebook Hack proofing coldfusion - The only way to stop a hacker is to think like one Part 2 includes contents: Chapter 7 securing the coldfusion server after installation, chapter 8 securing Windows and IIS, chapter 9 securing solaris, Linux, and Apache, chapter 10 database security, chapter 11 securing your coldfusion applications using third-party tools, chapter 12 security features in coldfusion MX.

    pdf292p haojiubujain06 05-09-2023 6 3   Download

  • Ebook Security analysis (6th ed) Part 1 includes contents: Part I: Survey and approach, Part II: Fixed-value investments, Part III: Senior securities with speculative features. Please refer to the documentation for more details.

    pdf388p haojiubujain06 05-09-2023 2 2   Download

  • During a Phase 2 rectal microbicide trial, men who have sex with men and transgender women (n ¼ 187) in 4 countries (Peru, South Africa, Thailand, United States) reported product use daily via short message service (SMS). To prevent disclosure of study participation, the SMS system program included privacy and security features.

    pdf8p visteverogers 24-06-2023 3 2   Download

  • Lecture The economics of Money, Banking and Financial markets: Chapter 8 - An economic analysis of financial structure. This chapter answers that question by providing an economic analysis of how our financial structure is designed to promote economic efficiency. The analysis focuses on a few simple but powerful economic concepts that enable us to explain features of our financial system such as why financial contracts are written as they are and why financial intermediaries are more important than securities markets for getting funds to borrowers

    ppt15p runordie1 10-05-2022 16 2   Download

  • Advanced Operating Systems - Lecture 44: Java security. This lecture will cover the following: java security; UNIX file security; process operations and IDs; setuid programs; windows security; SE linux; features of a secure OS summarized; security descriptors and reference monitor;...

    ppt30p haoasakura 30-05-2022 15 3   Download

  • Lecture Advanced network security: APT attack has contents such as what is an APT, features, phases of APT, DNS cache, common APTs indicators, APTs detection,... Download this lecture to see more.

    pdf47p lavender2022 22-04-2022 22 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2