intTypePromotion=1
ADSENSE

The system security

Xem 1-20 trên 1524 kết quả The system security
  • Ebook A+ guide to managing and maintaining your PC (Eighth edition): Part 1 presents the following content: Chapter 13: troubleshooting hardware problems; chapter 14: troubleshooting windows startup problems; chapter 15: connecting to and setting up a network; chapter 16: networking types, devices, and cabling; chapter 17: windows resources on a network; chapter 18: security strategies; chapter 19: supporting notebooks; chapter 20: mobile devices and client-side virtualization; chapter 21: supporting printers.

    pdf668p runthenight05 30-01-2023 2 0   Download

  • Continued part 1, part 2 of ebook "Food and beverage cost control (Sixth edition)" presents the following content: managing the cost of labor; controlling other expenses; analyzing results using the income statement; planning for profit; maintaining and improving the revenue control system;...

    pdf195p damtuyetha 09-01-2023 22 0   Download

  • Ebook Computer networks: A systems approach (5th edition) – Part 2 presents the following content: Chapter 6 congestion control and resource allocation, chapter 7 end-to-end data, chapter 8 network security, chapter 9 applications. Please refer to the documentation for more details.

    pdf410p runthenight03 07-12-2022 8 2   Download

  • Ebook Data and computer communications (5th ed): Part 2 presents the following content: Chapter 12 - LAN technology, Chapter 13 - LAN system, Chapter 14 - Bridges, Chapter 15 - Protocols and architecture, Chapter 16 - Internetworking, Chapter 17 - Transport Protocols, Chapter 18 - Network Security, Chapter 19 - Distributed applications. Please refer to the documentation for more details.

    pdf436p runthenight03 07-12-2022 8 2   Download

  • Ebook Fundamentals of database management systems (Second edition): Part 2 presents the following content: Chapter 7 logical database design; chapter 8 physical database design; chapter 9 object-oriented database management; chapter 10 data administration, database administration, and data dictionaries; chapter 11 database control issues: security, backup and recovery, concurrency; chapter 12 client/server database and distributed database; chapter 13 the data warehouse; chapter 14 databases and the internet.

    pdf240p runthenight03 07-12-2022 5 2   Download

  • Scintillator based coded-aperture imaging has proven to be effective when applied for X- and gamma-ray detection. Adaptation of the same method for neutron imaging has resulted in a number of propitious systems, which could be potentially employed for neutron detection in security and nuclear decommissioning applications.

    pdf13p vironald 15-12-2022 8 1   Download

  • Ebook Information security management handbook (Sixth edition, Volume 6): Part 1 include of the following content: Domain 1 access control: access control administration; domain 2 telecommunications and network security: internet, intranet, extranet security; domain 3 information security and risk management: security management concepts and principles; domain 4 application development security: system development controls; domain 5 cryptography: cryptographic concepts, methodologies, and practices.

    pdf263p runthenight03 07-12-2022 15 2   Download

  • Ebook Information storage and management: Storing, managing, and protecting digital information - Part 2 include of the following content: Chapter 11: Introduction to Business Continuity; Chapter 12: Backup and Recovery; Chapter 13: Local Replication; Chapter 14: Remote Replication; Chapter 15: Securing the Storage Infrastructure; Chapter 16: Managing the Storage Infrastructure; Appendix: Acronyms and Abbreviations.

    pdf230p runthenight03 07-12-2022 8 2   Download

  • Ebook Information technology auditing and assurance (Third edition): Part 1 include of the following content: Chapter 1: Auditing and internal control; Chapter 2: Auditing IT governance controls; Chapter 3: Security part I: Auditing operating systems and networks; Chapter 4: Security part II: Auditing database systems; Chapter 5: Systems development and program change activities; Chapter 6: Transaction processing and financial reporting systems overview.

    pdf304p runthenight03 07-12-2022 10 2   Download

  • Ebook Security engineering: A guide to building dependable distributed systems (Second Edition) – Part 1 include of the following content: Chapter 1 what is security engineering? chapter 2 usability and psychology, chapter 3 protocols, chapter 4 access control, chapter 5 cryptography, chapter 6 distributed systems, chapter 7 economics, chapter 8 multilevel security, chapter 9 multilateral security, chapter 10 banking and bookkeeping chapter 11 physical protection, chapter 12 monitoring and metering, chapter 13 nuclear command and control, chapter 14 security printing and seals, chapter 15 b...

    pdf524p runthenight03 07-12-2022 12 2   Download

  • Ebook Security engineering: A guide to building dependable distributed systems (Second Edition) – Part 1 include of the following content: Chapter 16 physical tamper resistance, chapter 17 emission security, chapter 18 API attacks, chapter 19 electronic and information warfare, chapter 20 telecom system security, chapter 21 network attack and defense, chapter 22 copyright and DRM, chapter 23 the bleeding edge, chapter 24 terror, justice and freedom, chapter 25 managing the development of secure systems, chapter 26 system evaluation and assurance, chapter 27 conclusions.

    pdf559p runthenight03 07-12-2022 12 2   Download

  • Lecture "On safety and security of information systems: Introduction to information systems security" provide students with knowledge about: History of information security; Information systems security; Risks, threats, and vulnerabilities;... Please refer to the detailed content of the lecture!

    pdf59p hoabingan205 12-12-2022 6 1   Download

  • Lecture "On safety and security of information systems: Malicious attacks" provide students with knowledge about: Malicious attack; The common types of malicious attacks; Attack tools; Malicious software;... Please refer to the detailed content of the lecture!

    pdf39p hoabingan205 12-12-2022 8 1   Download

  • Lecture "On safety and security of information systems: Cryptography" provide students with knowledge about: Basic terminology of cryptography; History of cryptography; Symmetric cipher;... Please refer to the detailed content of the lecture!

    pdf56p hoabingan205 12-12-2022 4 1   Download

  • Lecture "On safety and security of information systems: Symmetric ciphers" provide students with knowledge about: Block cipher principles; Data encryption standard; Feistel cipher;... Please refer to the detailed content of the lecture!

    pdf41p hoabingan205 12-12-2022 3 1   Download

  • Lecture "On safety and security of information systems: Symmetric ciphers advanced encryption standard" provide students with knowledge about: AES Origins; AES Structure; AES Key Expansion; An AES Example;... Please refer to the detailed content of the lecture!

    pdf38p hoabingan205 12-12-2022 6 1   Download

  • Lecture "On safety and security of information systems: Asymmetric ciphers" provide students with knowledge about: principles of public-Key cryptosystems; RSA algorithm;... Please refer to the detailed content of the lecture!

    pdf23p hoabingan205 12-12-2022 3 1   Download

  • Lecture "On safety and security of information systems: Cryptographic hash funtionns" provide students with knowledge about: Hash function; Applications of cryptographic hash functions; Simple hash functions; Requirements and security;... Please refer to the detailed content of the lecture!

    pdf22p hoabingan205 12-12-2022 5 1   Download

  • Lecture "On safety and security of information systems: Access control" provide students with knowledge about: Four parts of access control; Types of access control; Formal models of access control;... Please refer to the detailed content of the lecture!

    pdf18p hoabingan205 12-12-2022 3 1   Download

  • Lecture "On safety and security of information systems: Firewall" provide students with knowledge about: Firewall concept; Commercial firewalls; Selecting a firewall system;... Please refer to the detailed content of the lecture!

    pdf26p hoabingan205 12-12-2022 8 1   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

p_strKeyword=The system security
p_strCode=thesystemsecurity

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2