Tài liệu Thư viện số
Danh mục TaiLieu.VN
Kết quả 1-12 trong khoảng 752
Ebook Access denied the practice and policy of global internet filtering
Chapter 1 measuring global internet filtering; chapter 2 internet filtering: the politics and mechanisms of control; chapter 3 tools and technology of internet filtering; chapter 4 filtering and the international system: a question of commitment; chapter 5 reluctant gatekeepers: corporate ethics on a filtered internet; chapter 6 good for liberty, bad for security? global civil society and the securitization of the internet.
467 p actvn 26/09/2023 5 0
Ebook AAA and network security for mobile access: radius, diameter, EAP, PKI, and IP mobility
The book is geared towards people who have a basic understanding of Internet Protocol (IP) and TCP/IP stack layering concepts. Except for the above, most of the other IP-related concepts are explained in the text. Thus, the book is suitable for managers, engineers, researchers and students who are interested in the topic of network security and AAA but do not possess in-depth IP routing and security knowledge. We aimed at providing an overview...
318 p actvn 26/09/2023 4 0
Ebook Bluetooth security - Christian Gehrmann Joakim Persson, Ben Smeets
Ebook Bluetooth security presents the following content: Chapter 1 introduction; chapter 2 overview of the bluetooth security architecture; chapter 3 bluetooth pairing and key management; chapter 4 algorithms; chapter 5 broadcast encryption; chapter 6 security policies and access control; chapter 7 attacks, strengths, and weaknesses; chapter 8 providing anonymity; chapter 9 key management extensions; chapter 10 security for bluetooth...
222 p actvn 26/09/2023 4 0
Ebook Outsourcing information security (2004) - C. Warren Axelrod
Chapter 1 outsourcing and information security, chapter 2 information security risks, chapter 3 justifying outsourcing, chapter 4 risks of outsourcing, chapter 5 categorizing costs and benefits, chapter 6 costs and benefits throughout the evaluation process, chapter 7 the outsourcing evaluation process - customer and outsourcer requirements, chapter 8 outsourcing security security considerations outsourcing, chapter 9 summary of the...
277 p actvn 26/09/2023 4 0
Ebook Security for wireless ad-hoc networks
The objective of this book is to make the readers aware of the fundamentals of the area of security of wireless networks as well as the open problems. This will hopefully spur much more activity in this area in the upcoming years. This book provides a broad and comprehensive overview of the research that has been done to date on the security of wireless ad hoc networks and discusses the advantages and disadvantages of the various schemes that...
266 p actvn 26/09/2023 5 0
Ebook Security in wireless LANs & MANs
This book discusses the security threats and requirements in wireless LANs and wireless MANs, with a discussion on what the original designs missed and how they were corrected in the new protocols. It highlights the features of the current wireless LAN and MAN security protocols and explains the caveats and discusses open issues. This book is divided into four parts. The first part discusses authentication technologies common to security in...
262 p actvn 26/09/2023 4 0
Ebook Bulletproof wireless security: GSM, UMTS, 802.11 and Ad Hoc security
"Bulletproof wireless security: GSM, UMTS, 802.11 and Ad Hoc security" presents the following content: Chapter 1: security and cryptography, chapter 2: network security protocols, chapter 3: security and the layered architecture, chapter 4: voice-oriented wireless networks, chapter 5: data-oriented wireless networks, chapter 6: security in traditional wireless networks, chapter 7: security in wireless local area networks, chapter 8: security...
273 p actvn 26/09/2023 3 0
Ebook Computer security, privacy, and politics: Current issues, challenges and solutions
"Computer Security, Privacy, & Politics " offers a review of recent developments of computer security, focusing on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations.It compiles timely content on such topics as reverse engineering of software, understanding emerging computer exploits, emerging lawsuits and cases, global and societal implications, and protection from attacks on privacy.
333 p actvn 26/09/2023 4 0
Ebook Combating spyware in the enterprise
Ebook Combating spyware in the enterprise includes contents: Chapter 1 an overview of spyware; chapter 2 the transformation of spyware; chapter 3 spyware and the enterprise network; chapter 4 real SPY ware - crime, economic espionage, and espionage; chapter 5 solutions for the end user; chapter 6 forensic detection and removal; chapter 7 dealing with spyware in a non-microsoft world; chapter 8 the frugal engineer’s guide to spyware prevention.
408 p actvn 26/09/2023 4 0
Ebook Cyber threat: How to manage the growing risk of cyber attacks
This book is an attempt to raise the level of awareness about the cyber threat and what to do about it. The cyber threat is a board of directors’ issue. Yet when some senior executives and board members hear the word “security” or “technology,” there’s a disconnect. They think it’s not their issue. Let the technology people deal with it. Let the security people deal with it. Although there is evidence that this perception is...
224 p actvn 26/09/2023 3 0
Ebook Aggressive network self-defense
Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted...
417 p actvn 26/09/2023 4 0
Ebook Cyber-physical attack recovery procedures: A step-by-step preparation and response guide
"Cyber-physical attack recovery procedures: A step-by-step preparation and response guide" includes contents: Chapter 1: cyber-physical attack recovery procedures, chapter 2: threats and attack detection, chapter 3: prevent hackers from destroying a boiler, chapter 4: prevent hackers from destroying a pressure vessel, chapter 5: prevent hackers from destroying chillers, chapter 6: prevent hackers from destroying a gas fuel train, chapter 7:...
177 p actvn 26/09/2023 2 0
Đăng nhập
Bộ sưu tập nổi bật
12 21396
Bộ sưu tập Kỹ thuật viễn thông
11 14593
Bộ sưu tập Tài liệu học tiếng Anh
14 80617
10 17616