![](images/graphics/blank.gif)
Virtual security core
-
Ebook "Field guide to hadoop" includes content: Core technologies, database and data management, serialization, management and monitoring, analytic helpers, data transfer, security, access control, and auditing, cloud computing and virtualization.
132p
haojiubujain07
20-09-2023
6
4
Download
-
Part 1 of ebook "Platform embedded security technology revealed: Safeguarding the future of computing with Intel embedded security and management engine" provides readers with contents including: cyber security in the mobile age; intel’s embedded solutions: from management to security; building blocks of the security and management engine; the engine - safeguarding itself before safeguarding others;...
120p
tieulangtran
28-09-2023
7
3
Download
-
A multi-user system usually involves a large amount of information shared among its users. The security impli- cations of such information can never be underestimated. In this paper, we present a new attack that allows a ma- licious user to eavesdrop on other users’ keystrokes us- ing such information. Our attack takes advantage of the stack information of a process disclosed by its virtual file within procfs, the process file system supported by Linux.
8p
nhacsihuytuan
06-04-2013
31
1
Download
-
Wireless sensor networks promise an unprecedented fine-grained interface between the virtual and physical worlds. They are one of the most rapidly developing new information technologies, with applications in a wide range of fields including industrial process control, security and surveillance, environmental sensing, and structural health monitoring. This book is motivated by the urgent need to provide a comprehensive and organized survey of the field.
215p
taurus23
02-08-2012
93
7
Download
-
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the strongest possible starting point, no matter what your endeavor. Network Security Foundations provides essential knowledge about the principles and techniques used to protect computers and networks from hackers, viruses, and other threats.
333p
ken333
14-06-2012
381
91
Download
-
Generated by Foxit PDF Creator © Foxit Software http://www.foxitsoftware.com For evaluation only. MICROSOFT WINDOWS SERVER® 2008 Presented by: Lê Thanh Tú Date: 23 – 05 – 2008 Generated by Foxit PDF Creator © Foxit Software http://www.foxitsoftware.com For evaluation only. Agenda History of Microsoft Windows Server® 2008. Editions of Microsoft Windows Server® 2008. New technologies in Microsoft Windows Server® 2008. Identity and Access. Security and Policy Enforcement. Hyper-V. Presentation Virtualization with Terminal Services.
40p
augi14
03-02-2012
111
7
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)