• Ebook Network security technologies (Second edition) - Kwok T. Fung

    Ebook Network security technologies (Second edition) - Kwok T. Fung

    Ebook "Network security technologies" presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. This text is unique in that it classifies technologies as basic, enhanced, integrated, and architectural as a means of associating their functional complexities, providing added insight into their...

     267 p actvn 31/08/2017 1 1

  • Ebook Wireless and Mobile networks security

    Ebook Wireless and Mobile networks security

    This book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and fundamentals which underpin and provide the knowledge necessary for understanding and evaluating security issues, challenges, and solutions. This material will be of invaluable use to all those working in the network security field, and especially to...

     689 p actvn 31/08/2017 0 0

  • Ebook Network security hacks (2nd edition)

    Ebook Network security hacks (2nd edition)

    This second edition of Network security hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for...

     480 p actvn 31/08/2017 1 0

  • Handbook of information and communication security: Part 2

    Handbook of information and communication security: Part 2

    The book is divided into 2 parts, part 1 from chapter 21 to chapter 38. This part includes the contents: Mobile ad hoc network routing, security for ad hoc networks, phishing attacks and countermeasures, chaos-based secure optical communications using semiconductor lasers, chaos applications in optical communications,...and other contents.

     454 p actvn 31/07/2017 3 0

  • Handbook of information and communication security: Part 1

    Handbook of information and communication security: Part 1

    The Handbook of information and communication security covers some of the latest advances in fundamentals, cryptography, intrusion detection, access control, networking (including extensive sections on optics and wireless systems), software, forensics, and legal issues. The editors intention, with respect to the presentation and sequencing of the chapters, was to create a reasonably natural flow between the various sub-topics. The book is...

     409 p actvn 31/07/2017 3 0

  • Bài giảng An toàn thông tin

    Bài giảng An toàn thông tin

    Bài giảng An toàn thông tin cung cấp cho các bạn những nội dung về khái niệm, tầm quan trọng, nguy cơ của an toàn thông tin; chính sách an toàn thông tin. Mời các bạn tham khảo bài giảng để hiểu rõ hơn về những nội dung này.

     59 p actvn 22/05/2017 12 1

  • Tài liệu chuyên đề Sao lưu và phục hồi dữ liệu

    Tài liệu chuyên đề Sao lưu và phục hồi dữ liệu

    Tài liệu này hướng dẫn cách phục hồi dữ liệu do xóa nhầm, “ghost” nhầm, hay bị “format” một cách vô ý. Nội dung tài liệu gồm có 2 phần: Phần 1 - Những điều cần phải nắm khi xảy ra các lỗi gây mất mát dữ liệu; phần 2 - Sử dụng những phần mềm chuyên dụng phù hợp để khôi phục dữ liệu, khôi phục toàn bộ, khôi phục từng phần. Mời...

     28 p actvn 22/05/2017 18 2

  • Bài giảng Mạng và an ninh thông tin lĩnh vực: Công nghệ thông tin

    Bài giảng Mạng và an ninh thông tin lĩnh vực: Công nghệ thông tin

    Bài giảng Mạng và an ninh thông tin lĩnh vực: Công nghệ thông tin nêu lên Quyết định 35/2010/QĐ-UBND ngày 05/10/2010 của UBND tỉnh Ban hành Quy chế quản lý, vận hành, khai thác và sử dụng mạng thông tin tỉnh Lào Cai.

     20 p actvn 22/05/2017 6 0

  • Lecture Security+ Certification: Chapter 12 - Trung tâm Athena

    Lecture Security+ Certification: Chapter 12 - Trung tâm Athena

    Chapter 12 - Policies and disaster recovery. The main contents of this chapter include all of the following: Policies and procedures, privilege management, education and documentation, communication, disaster recovery, business continuity.

     45 p actvn 24/02/2017 13 0

  • Lecture Security+ Certification: Chapter 4 - Trung tâm Athena

    Lecture Security+ Certification: Chapter 4 - Trung tâm Athena

    Chapter 4 - Remote access. Objectives in this chapter: Understand implications of IEEE 802.1x and how it is used, understand VPN technology and its uses for securing remote access to networks, understand how RADIUS authentication works, understand how TACACS+ operates, understand how PPTP works and when it is used,...

     54 p actvn 24/02/2017 12 0

  • Lecture Security+ Certification: Chapter 3(part 2) - Trung tâm Athena

    Lecture Security+ Certification: Chapter 3(part 2) - Trung tâm Athena

    Chapter 3 - Attacks and malicious code (part 2). After studying this chapter you will be able to: Discuss man-in-the-middle attacks, replay attacks, and TCP session hijacking; detail three types of social-engineering attacks and explain why they can be incredibly damaging; list major types of attacks used against encrypted data; list major types of malicious software and identify a countermeasure for each one.

     43 p actvn 24/02/2017 10 0

  • Lecture Security+ Certification: Chapter 1 - Trung tâm Athena

    Lecture Security+ Certification: Chapter 1 - Trung tâm Athena

    Chapter 1 - Overview. After studying this chapter you will be able to: Understand network security, understand security threat trends, understand the goals of network security, determine the factors involved in a secure network strategy, security certification.

     18 p actvn 24/02/2017 7 0

Hướng dẫn khai thác thư viện số