• Ebook Network security technologies (Second edition) - Kwok T. Fung

    Ebook Network security technologies (Second edition) - Kwok T. Fung

    Ebook "Network security technologies" presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. This text is unique in that it classifies technologies as basic, enhanced, integrated, and architectural as a means of associating their functional complexities, providing added insight into their...

     267 p actvn 31/08/2017 1 1

  • Ebook Wireless and Mobile networks security

    Ebook Wireless and Mobile networks security

    This book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and fundamentals which underpin and provide the knowledge necessary for understanding and evaluating security issues, challenges, and solutions. This material will be of invaluable use to all those working in the network security field, and especially to...

     689 p actvn 31/08/2017 0 0

  • Ebook Network security hacks (2nd edition)

    Ebook Network security hacks (2nd edition)

    This second edition of Network security hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for...

     480 p actvn 31/08/2017 1 0

  • Ebook Network and system security - John R. Vacca

    Ebook Network and system security - John R. Vacca

    "Network and system security" provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux...

     405 p actvn 31/08/2017 0 0

  • Ebook Network Security Essentials: Applications and Standards (4th Edition) - William Stallings

    Ebook Network Security Essentials: Applications and Standards (4th Edition) - William Stallings

    (BQ) Adapted from Cryptography and Network Security, Fifth Edition, this text covers the same topics but with a much more concise treatment of cryptography. Network Security, 4/e also covers SNMP security, which is not covered in the fifth edition.

     432 p actvn 31/08/2017 0 0

  • Ebook Tiếng Anh giao tiếp hiện đại (Quan điểm, lý giải, yêu cầu, cảm ơn): Phần 1

    Ebook Tiếng Anh giao tiếp hiện đại (Quan điểm, lý giải, yêu cầu, cảm ơn): Phần 1

    Bộ sách "Tiếng Anh giao tiếp hiện đại" giúp bạn có thể tự rèn luyện các khả năng đọc, giao tiếp và nghe tiếng Anh. Phần 1 cuốn sách là các bài học về quan điểm, lời khuyên, lời đề nghị, sự thuyết phục, sự đồng ý và không đồng ý,... mời các bạn tham khảo

     56 p actvn 19/07/2016 8 2

  • Ebook Tiếng Anh giao tiếp hiện đại (Quan điểm, lý giải, yêu cầu, cảm ơn): Phần 2

    Ebook Tiếng Anh giao tiếp hiện đại (Quan điểm, lý giải, yêu cầu, cảm ơn): Phần 2

    Nối tiếp nội dung phần 1, phần 2 cuốn sách giới thiệu tới người đọc các bài học từ bài 11 bao gồm: Sự phán đoán, sự chính xác, tin tưởng và không tin tưởng, sự quyết định, lời tỉnh cầu, sự giúp đỡ,... Mời các bạn cùng tham khảo nội dung chi tiết.

     50 p actvn 19/07/2016 9 3

  • Ebook Information Security Fundamentals - Thomas R. Peltier

    Ebook Information Security Fundamentals - Thomas R. Peltier

    The book examines the elements of computer security, employee roles and responsibilities, and common threats. It discusses the legal requirements that impact security policies, including Sarbanes-Oxley, HIPAA, and the Gramm-Leach-Bliley Act. Detailing physical security requirements and controls, this updated edition offers a sample physical security policy and includes a complete list of tasks and objectives that make up an effective...

     262 p actvn 24/08/2015 26 6

  • Ebook Information Security Basics

    Ebook Information Security Basics

    Information security does not guarantee the safety of your organization or your information or your computer systems. Information security cannot, in and of itself, provide protection for your information. That being said, information security is also not a black art. There is no sorcery to implementing proper information security and the concepts that are included in information security are not rocket science. In many ways, information...

     413 p actvn 24/08/2015 26 3

  • Heartbleed

    Heartbleed

    How Codenomicon Discovered Heartbleed Solutions For Protecting Your Organization FINLAND SILICON VALLEY SINGAPORE 1 April 2014, All Rights Reserved.  @CodenomiconLTD . Heartbleed How Heartbleed Was Discovered What We All Need To Know Codenomicon Ltd. May 2, 2014 2 April 2014, All Rights Reserved. ...

     19 p actvn 04/05/2015 34 2

  • Ebook Computer crime, investigation, and the law

    Ebook Computer crime, investigation, and the law

    Ebook Computer crime, investigation, and the law including content: Computer Crime, Computer Forensics, Ligation, Computer Crime and Individuals, Techniques.

     514 p actvn 18/11/2014 28 0

Hướng dẫn khai thác thư viện số