Security policies
-
Nối tiếp phần 1, phần 2 của cuốn sách "Quản trị Windows server 2008 (Tập 2)" gồm những nội dung chính sau: Chương 14 - Triển khai Windows Deployment Services; Chương 15 - Quản trị Group Policy; Chương 16 - Network Access Protection; Chương 17 - Bảo mật hệ thống với Windows Firewall;... Mời các bạn cùng tham khảo!
139p vankhinh0210 15-10-2023 9 4 Download
-
This thesis intends to develop application-level access control models to address several major security issues in enterprise environments. The first goal is to provide simple and efficient authorization specifications to reduce the complexity of security management. The second goal is to provide dynamic access control for Web service applications. The third goal is to provide an access control framework for Semantic Web services. In this thesis, an Authorization-Function-Based Role-based Access Control (FB-RBAC) model is proposed for controlling enterprise systems at the application level.
182p runthenight07 01-03-2023 12 3 Download
-
An toàn hệ thống với PSAD và pfSense PSAD: Giới thiệu về tính năng và cách cài đặt PSAD, cấu hình iptables policy, giới thiệu pfSense, các đặc tính mong muốn đối với Firewall mới, một số Firewall thương mại, các bước cài đặt pfSense ... Mời các bạn tham khảo nội dung chi tiết.
56p lavender2022 22-04-2022 26 4 Download
-
Lecture Electronic commerce - Chapter 11: E-Commerce Security learning objectives: Explain EC-related crimes and why they cannot be stopped. Describe an EC security strategy and why a life cycle approach is needed. Describe the information assurance security principles. Describe EC security issues from the perspective of customers and e-businesses.
51p caphesuadathemtac 09-11-2021 16 3 Download
-
Bài thực hành Bảo mật hệ thống thông tin số 6: Virtual private database có nội dung trình bày giới thiệu về Virtual Private Database, Row-level security, kỹ thuật làm việc với policy function,... Mời các bạn cùng tham khảo chi tiết nội dung tài liệu.
15p xusong 05-07-2021 54 6 Download
-
Aims: Clarify the process of implementing social security policies in Dien Bien province after 10 years of establishment of the province (2004 - 2014), in order to summarize experiences, contribute to providing scientific and practical arguments, help committees and governments The power of Dien Bien province is getting better and better, and implementing social security policy in the province.
36p thebadguys 10-06-2021 23 4 Download
-
Purposes: Reproducing systematically, comprehensively and objectively the process of implementing social security policies from 2001 to 2015 in Hai Phong City, indicating achievements and limitations in the implementation process. From there, the author draws on the characteristics, impact assessment and issues raised.
27p thebadguys 08-06-2021 18 4 Download
-
The thesis clarifies the process of implementing social security policies in Dien Bien province after 10 years of establishment of the province (2004-2014), in order to summarize experiences, contribute to providing scientific and practical evidence, assisting Party committees and authorities at all levels of Dien Bien province to better improve policies and implement social security policies in the province.
28p chauchaungayxua9 01-12-2020 19 5 Download
-
The thesis analyzes and clarifies the process, content and form of security-defense cooperation between ASEAN and the US from 1991 to 2015. On that basis, drawing the characteristics, evaluating the impact on assessment and nature of the security and defense cooperation between ASEAN and US and providing suggestions for policy-making in Vietnam.
27p caygaocaolon8 07-11-2020 23 5 Download
-
Tài liệu trình bày các thông tin về cấu hình Windows Security Health Validator, cấu hình Health Policies, cấu hình Network Policies, cấu hình Connection Request Policies, cấu hình Remediation Server Groups trong mạng LAN.
17p hunggabeo 06-07-2020 49 1 Download
-
Summary of the Doctor thesis of Sociology: Role of grassroots socio political organizations in ensuring social security for rural residents: Case study in 2 communes with content to understand the role of grassroots socio-political organizations in ensuring social security for rural residents through the implementation of this organization, supporting labor market policies and social assistance in rural communities. On that basis, a number of recommendations are proposed to improve the performance of socio-political organizations in the context of current social change. Invite you to refer.
18p lanxichen 05-05-2020 40 4 Download
-
In this article, we analyze the information security risks of web services, evaluate existing solutions, and then select the most effective policies for the education database system. We have implemented security policies including authentication, authorization. In which authentication is based on OAuth 2.0 and JSON web tokens (JWT).
8p slimzslimz 08-12-2019 38 2 Download
-
Module 4: Configuring ISA server as a firewall. This module explains how to configure ISA Server 2004 to provide firewall capabilities and restrict traffic into and out of the network. The module describes how to configure firewall policies and rules to provide specific functionality.
31p nomoney2 10-02-2017 35 3 Download
-
Module 11: Implementing ISA Server 2004 enterprise edition. This module will focus on the concepts related to planning and implementing an ISA Server 2004 infrastructure. This module will highlight the differences between ISA Server 2004 Standard Edition and Enterprise Edition and explain how to implement the Enterprise Edition features.
31p nomoney2 10-02-2017 44 3 Download
-
Chapter 12 - Policies and disaster recovery. The main contents of this chapter include all of the following: Policies and procedures, privilege management, education and documentation, communication, disaster recovery, business continuity.
45p nhanmotchut_3 20-10-2016 41 6 Download
-
Chapter 8 - Network security topologies. Objectives in this chapter: Explain network perimeter’s importance to an organization’s security policies, identify place and role of the demilitarized zone in the network, explain how network address translation is used to help secure networks, spell out the role of tunneling in network security, describe security features of virtual local area networks.
40p nhanmotchut_3 20-10-2016 67 4 Download
-
Bài giảng "Bảo mật cơ sở dữ liệu - Chương 8: Virtual private database" cung cấp cho người học các nội dung: Giới thiệu về Virtual private database, Row-level security, kỹ thuật làm việc với policy function, quyền Exempt Access Policy, giám sát quyền Exempt Access Policy, xử lý các Exception về Policy Function,... Mời các bạn cùng tham khảo.
70p thangnamvoiva20 20-09-2016 150 17 Download
-
Lecture SQL XML Security presentation of content: Web Data - protection requirements, dissemination policies, why XML, graph representation, the author-X Project, enforcing access control, protection object specification, propagation option,...
66p thangnamvoiva20 20-09-2016 49 5 Download
-
The thesis topic "Impact of the development of socialist-oriented market economy on protecting the sovereignty and security of national borders in the Northern border provinces" is an independent research project, containing the dedication of the author, based on applying the system of theoretical perspectives of Marxism - Leninism and Ho Chi Minh’s ideology; guidelines and policies of the Party; directives and leadership resolutions of the Party
12p change12 30-06-2016 49 1 Download
-
In this chapter, students will be able to understand: Password policies ensure that users choose effective passwords; user-level security requires a separate account for each user; in share-level security, all users access shares by using the same passwords; a firewall is a hardware or software product that protects a network from unauthorized access, using techniques such as packet filtering, NAT, or proxy servers;...
15p tangtuy08 21-04-2016 35 3 Download