• Ebook Codes - The Guide to Secrecy From Ancient to Modern Times

    Ebook Codes - The Guide to Secrecy From Ancient to Modern Times

    This book has been written with a broad spectrum of readers in mind, which includes anyone interested in secrecy and related issues. Thus, this is a tome for the merely curious, as well as history-minded readers, amateur mathematicians, engineers, bankers, academics, students, those practitioners working in cryptography, specialists in the field, and instructors wanting to use the book for a text in a course on a variety of topics related to...

     700 p actvn 27/02/2022 244 3

  • Ebook Information security: Fundamentals

    Ebook Information security: Fundamentals

    The purpose of information security is to protect an organization’s valuableresources, such as information, computer hardware, and software. Throughthe selection and application of appropriate safeguards, security helps theorganization’s mission by protecting its physical and financial resources,reputation, legal position, employees, and other tangible and intangibleassets. To many, security is sometimes viewed as thwarting the...

     262 p actvn 27/02/2022 146 0

  • Ebook Hacking: The art of exploitation

    Ebook Hacking: The art of exploitation

    The goal of this book is to share the art of hacking with everyone. Understanding hacking techniques is often difficult, since it requires both breadth and depth of knowledge. Many hacking texts seem esotericand confusing because of just a few gaps in this prerequisite education. This second edition of Hacking: The Art of Exploitation makes the world of hacking more accessible by providing the complete picture—from programming to machine...

     492 p actvn 27/02/2022 215 7

  • Ebook Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network

    Ebook Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network

    Books about Internet security are common (firewall technology seems to dominate the subject list). In such books, the information is often sparse, confined to a narrow range of products. Authors typically include full-text reproductions of stale, dated documents that are readily available on the Net. This poses a problem, mainly because such texts are impractical. Experienced readers are already aware of these reference sources, and...

     670 p actvn 27/02/2022 98 1

  • Ebook Hacker's Challenge: Test your incident response skills using 20 scenarios

    Ebook Hacker's Challenge: Test your incident response skills using 20 scenarios

    Hacker’s Challenge will definitely challenge even the most technically astute I.T.security pros with its ‘ripped from the headlines’ incident response scenarios. These based-on-real-life vignettes from a diverse field of experienced contributors make for page-turning drama, and the reams of authentic log data will test the analytical skills of anyone sharp enough to get to the bottom of these puzzling tableaus.

     384 p actvn 27/02/2022 59 1

  • Ebook Understanding cryptography: A Textbook for Students and Practitioners

    Ebook Understanding cryptography: A Textbook for Students and Practitioners

    This book provides the reader with a deep understanding of how modern cryptographic schemes work. We introduce the necessary mathematical concepts in away that is accessible for every reader with a minimum background in college-level calculus. It is thus equally well suited as a textbook for undergraduate or beginning graduate classes, or as a reference book for practicing engineers and computerscientists who are interested in a solid...

     382 p actvn 27/02/2022 230 1

  • Ebook Hacking exposed: Network security secrets and solutions (Third edition)

    Ebook Hacking exposed: Network security secrets and solutions (Third edition)

    Typically, these actors attempt to exploit flaws in the system implementation or its deployment in order to obtain information, acquire access to services, or simply to disrupt the operation of the cloud through loss of system availability or system and information integrity. As the description of these attacks implies some of these attacks violate the tenant boundaries and hardware abstraction layers that VMware vCloud Director attempts to...

     260 p actvn 27/02/2022 145 0

  • Ebook Security+ Study Guide and DVD Training System

    Ebook Security+ Study Guide and DVD Training System

    All of CompTIA’s published objectives for the Security+exam are covered in this book. To help you easily find the sections that directly support particular objectives, we’ve referenced the domain and objective number next to the corresponding text in the following Table of Contents. In some chapters, we’ve made the judgment that it is probably easier for the student to cover objectives in as lightly different sequence than the order of...

     862 p actvn 27/02/2022 160 0

  • Ebook Open Source Security Tools: Practical Applications for Security - Tony Howlett

    Ebook Open Source Security Tools: Practical Applications for Security - Tony Howlett

    This book covers most of the major areas of information security and the open source tools you can use to help secure them. The chapters are designed around the major disciplines of information security and key concepts are covered in each chapter. The tools included on the book’s CD-ROM allow for a lab-like environment that everyone can participate in. All you need is a PC and this book’s CD-ROM to start using the tools described herein.

     600 p actvn 27/02/2022 135 0

  • Phân tích định tính - bảo mật thông tin trên mạng xã hội Facebook trong Thời đại 4.0

    Phân tích định tính - bảo mật thông tin trên mạng xã hội Facebook trong Thời đại 4.0

    Nội dung bài viết trình bày vấn đề hàng tỉ người dùng trên khắp thế giới đã bị rò rỉ thông tin cá nhân khi dùng các ứng dụng trên mạng xã hội và bị tin tặc tấn công. Các vụ tấn công hệ thống thông tin, cài mã độc, rao bán thông tin người dùng… ngày càng diễn biến phức tạp, khiến yêu cầu bảo mật thông tin cá nhân trở nên cấp thiết. Mời...

     7 p actvn 27/02/2022 98 1

  • Lược đồ chữ ký số mù phát triển dựa trên bài toán logarit rời rạc

    Lược đồ chữ ký số mù phát triển dựa trên bài toán logarit rời rạc

    Bài viết đề xuất lược đồ chữ ký số mù được phát triển dựa trên tính khó của bài toán logarit rời rạc. Ưu điểm của lược đồ mới đề xuất ở đây là có mức độ an toàn cao hơn so với các lược đồ đã được công bố trước đó về khả năng chống lại kiểu tấn công làm lộ nguồn gốc bản tin được ký. Mời các bạn cùng tham khảo!

     9 p actvn 27/02/2022 192 0

  • Phát hiện hành vi chèn mã dịch vụ web

    Phát hiện hành vi chèn mã dịch vụ web

    Bài viết này khảo sát hiệu năng phân loại của các mô hình dựa trên học máy để phát hiện hiệu quả hành vi tấn công chèn mã tới các dịch vụ Web. Báo cáo đề xuất việc thu thập và xây dựng bộ mẫu tấn công chèn mã dùng cho việc huấn luyện và đánh giá với hơn 400 nghìn mẫu với 9 dạng.

     10 p actvn 27/02/2022 190 0

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=actvn