
The network security
-
This paper introduces the application of artificial intelligence to build a security control software system in local military units. This software system uses state-of-the-art convolutional neural networks (CNN SOTA) for facial recognition by testing two of the best facial recognition models currently available: the FaceNet model and the VGGFace model.
8p
vifilm
11-10-2024
6
1
Download
-
In this study, we propose a NOMA communication model combined with linear array antennas for the purpose of enhancing physical layer security. We introduce a model of 4 nodes: transmitter node S, receiver node D1, receiver node D2, eavesdropping node E.
10p
viling
11-10-2024
1
1
Download
-
Recent attacks, infections, and malicious code are mostly exploited by hackers as a potential vulnerability on unsecured user computers. The issue for administrators is how to protect hundreds of computers within the organization from such insecurity.
6p
tuetuebinhan000
23-01-2025
3
2
Download
-
Blockchain technology is a revolutionary concept that has transformed various industries, offering decentralized and secure solutions for data management. At its core, a blockchain is a distributed and immutable ledger that records transactions across a network of computers.
9p
vibenya
31-12-2024
5
2
Download
-
to defend company resources: not only passively by using firewalls, virtual private networks (VPNs), encryption techniques, and whatever other tricks, but also by deploying proactive tools and devices throughout the network = IDS.
34p
vvnghi
05-05-2011
158
23
Download
-
In the last lecture we looked at some high-level descriptions of key distribution and agreement schemes. These protocols cannot be used as they were stated. In implementation of the actual protocol, there are many situations one should be careful of. In this lecture, we will look at some common protocol failures that arise when trying to implement security protocols We will then look at some specific examples of security protocols
30p
muathu_102
28-01-2013
37
5
Download
-
Các máy chủ Web (Webserver) luôn là những vùng đất màu mỡ cho các hacker tìm kiếm các thông tin giá trị hay gây rối vì một mục đích nào đó. Hiểm hoạ có thể là bất cứ cái gì từ kiểu tấn công từ chối dịch vụ, quảng cáo các website có nội dung không lành mạnh, xoá, thay đổi nội dung các file hay phần mềm chứa mã nguy hiểm. Bài viết dưới đây được trình bày như những lời khuyên cho việc đảm bảo an toàn cho các máy chủ Web....
42p
muathu_102
28-01-2013
147
50
Download
-
Chapter 3 - Attacks and malicious code (part 2). After studying this chapter you will be able to: Discuss man-in-the-middle attacks, replay attacks, and TCP session hijacking; detail three types of social-engineering attacks and explain why they can be incredibly damaging; list major types of attacks used against encrypted data; list major types of malicious software and identify a countermeasure for each one.
43p
nhanmotchut_3
20-10-2016
66
6
Download
-
Chapter 12 - Policies and disaster recovery. The main contents of this chapter include all of the following: Policies and procedures, privilege management, education and documentation, communication, disaster recovery, business continuity.
45p
nhanmotchut_3
20-10-2016
41
6
Download
-
Chapter 7 - Quản trị bảo mật cho hệ thống (Security management system). After studying this chapter you will be able to: Understand the purpose of a network firewall and the kinds of firewall technology available on the market; understand the role of routers, switches, and other networking hardware in security; determine when VPN or RAS technology works to provide a secure network connection.
76p
nhanmotchut_3
20-10-2016
73
5
Download
-
Lecture Security+ Certification: Chapter 9 - System hardening. The main contents of this chapter include all of the following: Disable nonessential systems, harden operating systems, harden applications, harden networks.
39p
nhanmotchut_3
20-10-2016
75
5
Download
-
Chapter 11 - Incident response. The main contents of this chapter include all of the following: Incident response overview, computer forensics defined, contemporary issues in computer forensics, forensic process, forensic tools, forensic problems, the future of computer forensics.
90p
nhanmotchut_3
20-10-2016
44
5
Download
-
Chapter 2 - Authentication. After studying this chapter you will be able to: Understand AAA (3A),create strong passwords and store them securely, understand the Kerberos authentication process, understand how CHAP works, understand what mutual authentication is and why it is necessary, understand how digital certificates are created and why they are used,...
55p
nhanmotchut_3
20-10-2016
66
4
Download
-
Chapter 3 - Attacks and malicious code (part 1). After reading the material in this chapter, you should be able to: Explain denial-of-service (DoS) attacks, explain and discuss ping-of-death attacks, identify major components used in a DDoS attack and how they are installed, understand major types of spoofing attacks.
43p
nhanmotchut_3
20-10-2016
66
4
Download
-
Chapter 6 - Email and web security. The main contents of this chapter include all of the following: Protect e-mail systems, list World Wide Web vulnerabilities, secure web communications, secure instant messaging.
48p
nhanmotchut_3
20-10-2016
57
4
Download
-
Chapter 8 - Network security topologies. Objectives in this chapter: Explain network perimeter’s importance to an organization’s security policies, identify place and role of the demilitarized zone in the network, explain how network address translation is used to help secure networks, spell out the role of tunneling in network security, describe security features of virtual local area networks.
40p
nhanmotchut_3
20-10-2016
68
4
Download
-
Trong chương này chúng at sẽ cùng tìm hiểu về mã hóa Playfair. Mã hóa Playfair xem hai ký tự đứng sát nhau là một đơn vị mã hóa, hai ký tự này được thay thế cùng lúc bằng hai ký tự khác. Mời các bạn cùng tham khảo để biết thêm nội dung chi tiết.
22p
nhanmotchut_5
01-11-2016
92
7
Download
-
Bài giảng An ninh mạng - Bài 5: Xác thực chủ thể. Bài này cung cấp cho sinh viên những nội dung gồm: khái niệm chung; xác thực dựa trên mật khẩu; các giao thức xác thực dựa trên mật khẩu; giao thức zero-knowledge; giới thiệu một số phương pháp xác thực khác;... Mời các bạn cùng tham khảo!
31p
codabach1016
03-05-2024
19
5
Download
-
This thesis proposes and implements a new and novel solution on simulators and real devices to solve the mobility problem in a VPN. The new solution adds mobility support to existing L2TP/IPsec (Layer 2 Tunneling Protocol/IP Security) tunnels. The new solution tunnels Layer 2 packets between VPN clients and a VPN server without using Mobile IP, without incurring tunnel-re-establishment at handoff, without losing packets during handoff, achieves better security than current mobility solutions for VPN, and supports fast handoff in IPv4 networks.
123p
runthenight07
01-03-2023
7
4
Download
-
Research Aims: The thesis aims to develop deep neural networks for analyzing security data. These techniques improve the accuracy of machine learning-based models applied in NAD. Therefore, the thesis attempts to address the above challenging problems in NAD using models and techniques in deep neural networks. Specifically, the following problems are studied.
128p
armyofthedead
23-06-2021
20
3
Download
CHỦ ĐỀ BẠN MUỐN TÌM
