intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Testing network

Xem 1-20 trên 493 kết quả Testing network
  • The paper discusses the concept and problem of identifying DDoS attacks for information management. The main starting mechanisms and types of DDoS attacks are analyzed. To identify them, signature and behavioral methods of analyzing network traffic are used. Analysis of the advantages and disadvantages of these methods actualized the need for their combined use. To detect and classify DDoS attacks, the need to develop and use a neural network model has been updated. The training and testing of the model were made on the initial data from the NSL-KDD set.

    pdf5p longtimenosee09 08-04-2024 1 1   Download

  • Ebook "The ethical hack - A framework for business value penetration testing" includes content: Getting started, setting the stage, the framework, information security models, information security program, the business perspective, planning for a controlled attack, preparing for a hack, enumeration, vulnerability analysis, exploitation, the deliverable, integrating the results.

    pdf331p longtimenosee08 31-03-2024 3 1   Download

  • The Cisco Certified Internet Expert Security Certification is an increasingly popular internetworking certification and one of the most popular security certifications in the world. Although CCIE certification builds on the foundation you might have established from the Cisco Certified Network Associate (CCNA) and Cisco Certified Network Professional (CCNP) certifications, there is no prerequisite to attempt to gain CCIE certification. However, attaining CCNA and CCNP certifications will help you understand Cisco subjects and testing strategies.

    pdf524p longtimenosee08 31-03-2024 1 1   Download

  • Part 2 book "It security interviews exposed - Secrets to landing your next information security job" includes content: Knowing virtual private networks, knowing IDS/IPS/IDP, everything you ever wanted to know about wireless but were afraid they’d ask, finding your posture, tools.

    pdf112p longtimenosee08 31-03-2024 3 1   Download

  • Hacker’s Challenge brings you fact-based, computer-security war stories from top researchers, consultants, incident-response specialists, and forensic analysts working in the computer-security industry today. Rather than just retelling the story, however, the book goes further—it pulls you, the reader, inside the story. As each story unfolds, you are presented with information about the incident and are looked upon to solve the case. This book is unlike any other available right now.

    pdf384p longtimenosee05 31-03-2024 1 0   Download

  • Most people don't really understand what hacking is about, much less how to go about it. It's something that we just watch in movies or hear about on the news. This book, Hacking: Computer hacking, security testing, penetration testing and basic security, is meant to help you understand hacking techniques in a broader and deeper way. In this book, you will learn how you can protect yourself from some of the most prevalent hacking schemes to date. How? By learning how to hack! That's right.

    pdf134p longtimenosee05 31-03-2024 3 0   Download

  • Ebook How to cheat at configuring open source security tools: The perfect reference for the multitasked sysadmin - Part 1 includes contents: Chapter 1: testing and auditing your systems, chapter 2: protecting your perimeter, chapter 3: protecting network resources, chapter 4: introducing snort, chapter 5: installing snort 2.6.

    pdf280p longtimenosee05 31-03-2024 0 0   Download

  • Ebook How to cheat at securing a wireless network - Part 2 includes contents: Chapter 8: monitoring and intrusion detection, chapter 9: designing a wireless enterprise network: hospital case study, chapter 10: designing a wireless industrial network: retail case study, chapter 11: designing a wireless home network: home office case study, chapter 12: wireless penetration testing.

    pdf193p longtimenosee05 31-03-2024 3 0   Download

  • Ebook Lift in action: The simply functional web framework for scala – Part 2 includes contents: Chapter 6 common tasks with lift webkit; chapter 7 sitemap and access control; chapter 8 HTTP in lift; chapter 9 AJAX, wiring, and comet; chapter 10 persistence with mapper; chapter 11 persistence with record; chapter 12 localization; chapter 13 distributed messaging and java enterprise integration; chapter 14 application testing; chapter 15 deployment and scaling.

    pdf299p longtimenosee05 31-03-2024 0 0   Download

  • Ebook The SSCP prep guide: Mastering the seven key areas of system security - Part 2 includes contents: Chapter 5 domain 4: risk, response, and recovery; chapter 6 domain 5: cryptography; chapter 7 domain 6: data communications; chapter 8 domain 7: malicious code; appendix a glossary; appendix b testing tools; appendix c references for further study; appendix d answers to sample questions.

    pdf296p longtimenosee05 31-03-2024 0 0   Download

  • Ebook Network performance and security: Testing and analyzing using open source and low-cost tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network.

    pdf362p longtimenosee05 31-03-2024 0 0   Download

  • Ebook Penetration tester’s: Open source toolkit – Part 1 includes contents: Chapter 1 reconnaissance, chapter 2 enumeration and scanning, chapter 3 introduction to testing databases, chapter 4 web server & web application testing, chapter 5 wireless penetration testing using auditor, chapter 6 network devices.

    pdf389p longtimenosee05 31-03-2024 0 0   Download

  • Ebook Penetration tester’s: Open source toolkit – Part 2 includes contents: Chapter 7 writing open source security tools, chapter 8 nessus, chapter 9 coding for nessus, chapter 10 NASL extensions and custom tests, chapter 11 understanding the extended capabilities of the nessus environment, chapter 12 extending metasploit I, chapter 13 extending metasploit II.

    pdf348p longtimenosee05 31-03-2024 1 0   Download

  • Ebook Penetration tester’s: Open source toolkit (Volume 2) – Part 1 includes contents: Chapter 1 reconnaissance, chapter 2 enumeration and scanning, chapter 3 hacking database services, chapter 4 web server and web application testing, chapter 5 wireless penetration testing using BackTrack 2.

    pdf342p longtimenosee05 31-03-2024 0 0   Download

  • Ebook Penetration tester’s: Open source toolkit (Volume 2) – Part 2 includes contents: Chapter 6 network devices, chapter 7 customizing BackTrack 2, chapter 8 forensic discovery and analysis using backtrack, chapter 9 building penetration test labs.

    pdf246p longtimenosee05 31-03-2024 0 0   Download

  • In "Penetration testing essentials", the following content will be discussed: Chapter 1 introduction to penetration testing, chapter 2 introduction to operating systems and networking, chapter 3 introduction to cryptography, chapter 4 outlining the pen testing methodology, chapter 5 gathering intelligence, chapter 6 scanning and enumeration, chapter 7 conducting vulnerability scanning, chapter 8 cracking passwords, chapter 9 retaining access with backdoors and malware, chapter 10 reporting, chapter 11 working with defensive and detection systems, chapter 12 covering your tracks and evading ...

    pdf287p longtimenosee05 31-03-2024 2 0   Download

  • Ebook Professional penetration testing creating and operating a formal hacking lab: Part 1 includes contents: Chapter 1: introduction, chapter 2: ethics and hacking, chapter 3: hacking as a career, chapter 4: setting up your lab, chapter 5: creating and using pentest targets in your lab, chapter 6: methodologies, chapter 7: pentest metrics, chapter 8: management of a pentest.

    pdf237p longtimenosee05 31-03-2024 0 0   Download

  • Ebook Professional penetration testing creating and operating a formal hacking lab: Part 2 includes contents: Chapter 9: information gathering, chapter 10: vulnerability identification, chapter 11: vulnerability verification, chapter 12: compromising a system and privilege escalation, chapter 13: maintaining access, chapter 14: covering your tracks, chapter 15: reporting results, chapter 16: archiving data, chapter 17: cleaning up your lab, chapter 18: planning for your next pentest.

    pdf288p longtimenosee05 31-03-2024 3 0   Download

  • Ebook Secure your network for free: Using nmap, wireshark, snort, nessus, and MRTG - Part 2 includes contents: Chapter 5: managing event logs, chapter 6: testing and auditing your systems, chapter 7: network reporting and troubleshooting, chapter 8: security as an ongoing process.

    pdf231p longtimenosee05 31-03-2024 1 0   Download

  • Ebook Cabling: The complete guide to network wiring (2nd edition) - Part 2 includes content: Chapter 12 cabling-system design and installation, chapter 13 cable-connector installation, chapter 14 cable-system testing and troubleshooting, chapter 15 creating a request for proposal (RFP), chapter 16 cabling @ Work: experience from the field.

    pdf386p longtimenosee03 22-02-2024 3 2   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
207 tài liệu
1439 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
109=>1