intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Storage security

Xem 1-20 trên 117 kết quả Storage security
  • Part 2 of ebook "The building regulations: Explained and illustrated (14th edition)" provides readers with contents including: sound insulation (Part E); ventilation (Part F); sanitation, hot water safety and water efficiency (Part G); drainage and waste disposal (Part H); combustion appliances and fuel storage systems (Part J); protection from falling, collision and impact (Part K); conservation of fuel and power (Part L); access to and use of buildings (Part M); electrical safety (Part P); security (Part Q);...

    pdf561p mothoiphong 28-06-2024 1 1   Download

  • In ebook Operating systems and middleware: Supporting controlled interaction – Part 2, the following content will be discussed: Chapter 7 processes and protection; chapter 8 files and other persistent storage; chapter 9 networking; chapter 10 messaging, rpc, and web services; chapter 11 security, chapter 12 stacks.

    pdf275p longtimenosee05 31-03-2024 2 0   Download

  • Ebook Physical logical security convergence: Powered by enterprise security management - Part 2 includes contents: Chapter 8 the new security model: the trusted enterprise; chapter 9 ESM architecture; chapter 10 log collection; chapter 11 real-time event correlation, analysis, and response; chapter 12 event storage and forensic analysis; chapter 13 bridging the chinese wall; chapter 14 physical and logical access; chapter 15 intelligent video analytics; chapter 16 environmental sensors; chapter 17 protecting critical infrastructure: process control and SCADA; chapter 18 final thoughts.

    pdf342p longtimenosee05 31-03-2024 0 0   Download

  • The proposed method offers three-level protection the usage of AES algorithm and a secure personal key. The approach also provides data tankage privateness safety because of huge groups yet the discovery about sensitive facts tankage leaks. Our order gives some on the privateness practices ancient within wind computing services.

    pdf4p longtimenosee06 27-03-2024 2 1   Download

  • Ebook UNIX and Linux system administration handbook (5th Edition): Part 2 includes contents: Chapter 18 electronic mail, chapter 19 web hosting, chapter 20 storage, chapter 21 the network file system, chapter 22 smb, chapter 23 configuration management, chapter 24 virtualization, chapter 25 containers, chapter 26 continuous integration and delivery, chapter 27 security, chapter 28 monitoring, chapter 29 performance analysis, chapter 30 data center basics, chapter 31 methodology, policy, and politics

    pdf924p haojiubujain010 14-12-2023 6 4   Download

  • Ebook "Cloud computing for Logistics" contains 11 chapters, includes: Chapter 1 introduction, chapter 2 parallel and distributed systems, chapter 3 cloud infrastructure, chapter 4 cloud computing: applications and paradigms, chapter 5 cloud resource virtualization, chapter 6 cloud resource management and scheduling, chapter 7 networking support, chapter 8 storage systems, chapter 9 cloud security, chapter 10 complex systems and self-organization, chapter 11 cloud application development.

    pdf415p haojiubujain08 01-11-2023 6 3   Download

  • Ebook "Beginning amazon web services with node.js" includes contents: Chapter 1: Getting Started with Amazon Web Services; Chapter 2: Working with AWS OpsWorks; Chapter 3: OpsWorks Part II: Databases and Scaling; Chapter 4: CloudFront and DNS Management; Chapter 5: Simple Storage Service and Content Delivery; Chapter 6: Simple Email Service; Chapter 7: Monitoring the Application; Chapter 8: Securing the Application.

    pdf249p haojiubujain08 01-11-2023 5 2   Download

  • Ebook "Data protection for photographers: A guide to storing and protecting your valuable digital assets" explains current data protection and storage technologies in everyday terms. It describes effective procedures for protecting data, from capture to backup and archiving. Descriptions of specific products applicable to Windows, MacOS, and Linux systems are provided.

    pdf177p loivantrinh 29-10-2023 8 3   Download

  • In ebook "Learning bitcoin: Embrace the new world of fiance by leveraging the power of crypto-currencies using Bitcoin and the Blockchain" you will learn set up your wallet and buy a Bitcoin in a flash while understanding the basics of addresses and transactions; acquire the knack of buying, selling, and trading Bitcoins with online marketplaces; secure and protect your Bitcoins from online theft using Brainwallets and cold storage;...

    pdf236p loivantrinh 29-10-2023 9 6   Download

  • Ebook "Secure cloud computing" includes content: Cryptographic key management issues and challenges in cloud services, costs and security in clouds, hardware enhanced security for cloud computing, proof of isolation for cloud storage, selective and fine grained access to data in the cloud, enabling collaborative data authorization between enterprise clouds,...and other contents.

    pdf351p haojiubujain07 20-09-2023 10 4   Download

  • Ebook "Securing SQL server" includes content: Identifying security requirements, securing the network, key management, database encryption, SQL password security, securing the instance, analysis services, reporting services, database backup security, storage area network security,... and other contents.

    pdf442p haojiubujain07 20-09-2023 6 4   Download

  • Ebook Ajax security part 1 presents the following content: Chapter 1 introduction to ajax security, chapter 2 the heist, chapter 3 web attacks, chapter 4 ajax attack surface, chapter 5 ajax code complexity, chapter 6 transparency in ajax applications, chapter 7 hijacking ajax applications, chapter 8 attacking client-side storage.

    pdf271p haojiubujain06 05-09-2023 4 3   Download

  • Ebook Computer and information security handbook part 2 includes contents: Part IV privacy and access management, part V storage security, part VI physical security, part VII advanced security, part VIII appendices.

    pdf378p haojiubujain06 05-09-2023 5 3   Download

  • Ebook Purchasing: Selection and procurement for the hospitality industry – Part 2 includes contents: Chapter 14 typical receiving procedures; chapter 15 typical storage management procedures; chapter 16 security in the purchasing function; chapter 17 fresh produce; chapter 18 processed produce and other grocery items; chapter 19 dairy products; chapter 20 eggs; chapter 21 poultry; chapter 22 fish; chapter 23 meat; chapter 24 beverages; chapter 25 nonfood expense items; chapter 26 services; chapter 27 furniture, fixtures, and equipment.

    pdf364p haojiubujain03 24-07-2023 8 6   Download

  • Lecture Network + Guide to Networks (6th Edition) - Chapter 14: Ensuring Integrity and Availability, objectives of this chapter: Identify the characteristics of a network that keep data safe from loss or damage; Protect an enterprise-wide network from malware; Explain fault-tolerance techniques for storage, network design, connectivity devices, naming and addressing services, and servers.

    pdf70p chankora08 04-07-2023 10 4   Download

  • Lecture Network + Guide to Networks (6th Edition) - Chapter 11: Network Security, objectives of this chapter: Identify security threats and vulnerabilities in LANs and WANs and design security policies that minimize risks; Explain security measures for network hardware and design, including firewalls, intrusion detection systems, and scanning tools; Understand methods of encryption, such as SSL and IPSec, that can secure data in storage and in transit.

    pdf89p chankora08 04-07-2023 9 4   Download

  • Ebook Information security management handbook (Volume 7): Part 2 includes the following content: Chapter 14 - managing the security testing process, chapter 15 - security and resilience in the software development life cycle, chapter 16 - cloud cryptography, chapter 17 - identity and access management architecture, chapter 18 - fedramp: entry or exit ramp for cloud security? chapter 19 - data storage and network security, chapter 20 - national patient identifier and patient privacy in the digital era, chapter 21 - addressing social media security and privacy challenges,…

    pdf224p haojiubujain01 24-06-2023 9 5   Download

  • Ebook Information Storage and Management: Part 2 includes the following content: Chapter 11: Introduction to Business Continuity; Chapter 12: Backup and Recovery; Chapter 13: Local Replication; Chapter 14: Remote Replication; Chapter 15: Securing the Storage Infrastructure; Chapter 16: Managing the Storage Infrastructure; Appendix: Acronyms and Abbreviations.

    pdf230p haojiubujain01 24-06-2023 4 4   Download

  • Ebook Beginning PHP and MySQL: From Novice to Professional (3rd edition) - Part 2 presents the following content: Chapter 20 Web Services, Chapter 21 Secure PHP Programming, Chapter 22 SQLite, Chapter 23 Building web sites for the world, Chapter 24 MVC and the zend framework, Chapter 25 Introducing MySQL, Chapter 26 Installing and Configuring MySQL, Chapter 27 The Many MySQL Clients, Chapter 28 MySQL storage engines and datatypes, Chapter 29 Securing MySQL, Chapter 30 Using PHP with MySQL, Chapter 31 Introducing PDO, Chapter 32 Stored Routines, Chapter 33 MySQL Triggers, Chapter 34 MySQL Vi...

    pdf542p haojiubujain01 06-06-2023 7 3   Download

  • Ebook Operating system: Part 2 presents the following content: File Management; I/O & Secondary Storage Structure; System Protection; System Security; Security Solution; Case Study: Linux;...Please refer to the documentation for more details.

    pdf181p chankora 16-06-2023 5 4   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2