• Ebook The ethical hack - A framework for business value penetration testing

    Ebook The ethical hack - A framework for business value penetration testing

    Ebook "The ethical hack - A framework for business value penetration testing" includes content: Getting started, setting the stage, the framework, information security models, information security program, the business perspective, planning for a controlled attack, preparing for a hack, enumeration, vulnerability analysis, exploitation, the deliverable, integrating the results.

     331 p actvn 24/04/2024 1 0

  • Ebook The hacker ethic and the spirit of the information age

    Ebook The hacker ethic and the spirit of the information age

    This book is committed to the application and dissemination of the ideas of Max Weber. Max Weber Studies seeks an engagement with the fundamental issues in the social and historical sciences: The dilemmas of life-conduct and vocation in the contemporary world, the tracking of rationalization processes and their impact, disenchantment and the return of magic, the 'uniqueness of the West' and multiple modernities, the analysis of the...

     257 p actvn 24/04/2024 1 0

  • Ebook Internet security - Cryptographic principles algorithms protocols: Part 1

    Ebook Internet security - Cryptographic principles algorithms protocols: Part 1

    Part 1 book "Internet security - Cryptographic principles algorithms protocols" includes content: Internetworking and layered models; tcp ip suite and internet stack protocols; symmetric block ciphers; hash function, message digest and message authentication code, asymmetric public key cryptosystems.

     221 p actvn 24/04/2024 1 0

  • Ebook Internet security - Cryptographic principles algorithms protocols: Part 2

    Ebook Internet security - Cryptographic principles algorithms protocols: Part 2

    Part 2 book "Internet security - Cryptographic principles algorithms protocols" includes content: Public-key infrastructure; network layer security; transport layer security - SSLv3 and TLSv1; electronic mail security - PGP, S/MIME; internet firewalls for trusted systems, SET for E-commerce transactions.

     205 p actvn 24/04/2024 1 0

  • Ebook It governance - A managers guide to data security and ISO 2700/ISO 27002 (4th edition): Part 1

    Ebook It governance -  A managers guide to data security and ISO 2700/ISO 27002 (4th edition): Part 1

    Part 1 book "It governance - A managers guide to data security" includes content: Why is information security necessary the combined code; the turnbull report and sarbanes–oxley; organizing information security; information security policy and scope; the risk assessment and statement of applicability; external parties; asset management; human resources security, physical and environmental security, equipment security, communications and...

     205 p actvn 24/04/2024 1 0

  • Ebook It governance - A managers guide to data security and ISO 2700/ISO 27002 (4th edition): Part 2

    Ebook It governance -  A managers guide to data security and ISO 2700/ISO 27002 (4th edition): Part 2

    Part 2 book "It governance - A managers guide to data security" includes content: Network security management and media handling, exchanges of information, electronic commerce services, E-mail and internet use, access control, network access control, operating system access control, application access control and teleworking, systems acquisition, development and maintenance,.... and other contents.

     180 p actvn 24/04/2024 1 0

  • Ebook It security interviews exposed - Secrets to landing your next information security job: Part 1

    Ebook It security interviews exposed - Secrets to landing your next information security job: Part 1

    Part 1 book "It security interviews exposed - Secrets to landing your next information security job" includes content: Finding, interviewing for, and getting the job; knowing networks - fundamentals; knowing security - fundamentals; understanding regulations, legislation, and guidance; knowing firewalls - fundamentals.

     131 p actvn 24/04/2024 1 0

  • Ebook It security interviews exposed - Secrets to landing your next information security job: Part 2

    Ebook It security interviews exposed - Secrets to landing your next information security job: Part 2

    Part 2 book "It security interviews exposed - Secrets to landing your next information security job" includes content: Knowing virtual private networks, knowing IDS/IPS/IDP, everything you ever wanted to know about wireless but were afraid they’d ask, finding your posture, tools.

     112 p actvn 24/04/2024 1 0

  • Ebook Computer security - Principles and practice (3/E): Part 2

    Ebook Computer security - Principles and practice (3/E): Part 2

    Part 2 book "Computer security - Principles and practice" includes content: Operating system security, human resources security, security auditing, legal and ethical aspects, internet security protocols and standards, symmetric encryption and message confidentiality, trusted computing and multilevel security, it security management and risk assessment, physical and infrastructure security, it security controls, plans, and procedures,... and...

     402 p actvn 24/04/2024 1 0

  • Ebook Computer security - Principles and practice (3/E): Part 1

    Ebook Computer security - Principles and practice (3/E): Part 1

    Part 1 book "Computer security - Principles and practice" includes content: Reader’s and instructor’s guide, overview, cryptographic tools, user authentication, access control, database and cloud security, malicious software, denial of service attacks, intrusion detection, firewalls and intrusion prevention systems, buffer overflow, software security.

     436 p actvn 24/04/2024 1 0

  • Nâng cao tính năng bảo mật các thiết bị mạng trong xu thế chuyển tiếp IPv6 và IPv4

    Nâng cao tính năng bảo mật các thiết bị mạng trong xu thế chuyển tiếp IPv6 và IPv4

    Trong xu thế chuyển tiếp giữa IPv6 và IPv4, các nút trong hệ thống mạng vẫn còn dùng IPv4. Việc cấu hình không tương thích giữa hai hình thức này và các hạn chế của IPv4 sẽ là điểm yếu để kể xấu lợi dụng tấn công vào các hệ thống mạng. Do đó, giải pháp cần thực hiện để có được một hệ thống mạng an toàn là nâng cao tính bảo mật cho...

     8 p actvn 24/04/2024 1 0

  • Bài giảng C Programming introduction: Tuần 9 - Hàm

    Bài giảng C Programming introduction: Tuần 9 - Hàm

    Bài giảng "C Programming introduction: Tuần 9 - Hàm" trình bày những nội dung chính sau đây: Công dụng của hàm; Tính chất của hàm; Truyền tham số; Bài tập thực hành;... Mời các bạn cùng tham khảo!

     28 p actvn 24/04/2024 1 0

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=actvn
getDocumentFilter3 strKey=LIBTAILIEU2_LIST_FILTERactvn262710vi