• Ebook Managing Cisco network security: Part 1

    Ebook Managing Cisco network security: Part 1

    Ebook Managing Cisco network security: Part 1 includes contents: Chapter 1 introduction to IP network security, chapter 2 traffic filtering on the Cisco IOS, chapter 3 network address translation (NAT), chapter 4 Cisco PIX Firewall, chapter 5 virtual private networks.

     257 p actvn 26/03/2024 2 0

  • Ebook Managing Cisco network security: Part 2

    Ebook Managing Cisco network security: Part 2

    Ebook Managing Cisco network security: Part 1 includes contents: Chapter 6 Cisco authentication, authorization, and accounting mechanisms; chapter 7 intrusion detection; chapter 8 network security management; chapter 9 security processes and managing Cisco security fast track.

     240 p actvn 26/03/2024 1 0

  • Ebook Network security illustrated: Part 2

    Ebook Network security illustrated: Part 2

    Ebook Network security illustrated: Part 2 includes contents: Part VII hardening networks, part VIII storing information, part IX hiding information, part X accessing information, part XI ensuring availability, part XII detecting intrusions.

     217 p actvn 26/03/2024 1 0

  • Ebook Network security illustrated: Part 1

    Ebook Network security illustrated: Part 1

    Ebook Network security illustrated: Part 1 includes contents: Part I managing security, part II outsourcing options, part III reserving rights, part IV determining identity, part V preserving privacy, part VI connecting networks.

     232 p actvn 26/03/2024 1 0

  • Ebook Privacy, security and trust within the context of pervasive computing

    Ebook Privacy, security and trust within the context of pervasive computing

    The goal of the workshop was not to focus on specific, even novel mechanisms, rather on the interfaces between mechanisms in different technical and social problem spaces. 21 people from different parts of the world took part in the one-day discussion, including PhD students, seasoned and junior researchers. This workshop promises to be a lasting experience and we encourage researchers to participate in future events. We hope that you will...

     182 p actvn 26/03/2024 2 0

  • Ebook How to cheat at securing a wireless network: Part 1

    Ebook How to cheat at securing a wireless network: Part 1

    Ebook How to cheat at securing a wireless network - Part 1 includes contents: Chapter 1: introduction to wireless: from past to present, chapter 2: wireless security, chapter 3: dangers of wireless devices in the workplace, chapter 4: WLAN rogue access point detection and mitigation, chapter 5: wireless LAN VLANs, chapter 6: designing a wireless network, chapter 7: wireless network architecture and design.

     286 p actvn 26/03/2024 1 0

  • Ebook How to cheat at securing a wireless network: Part 2

    Ebook How to cheat at securing a wireless network: Part 2

    Ebook How to cheat at securing a wireless network - Part 2 includes contents: Chapter 8: monitoring and intrusion detection, chapter 9: designing a wireless enterprise network: hospital case study, chapter 10: designing a wireless industrial network: retail case study, chapter 11: designing a wireless home network: home office case study, chapter 12: wireless penetration testing.

     193 p actvn 26/03/2024 1 0

  • Ebook Google Hacks: 100 Industrial-Strength Tips & Tools

    Ebook Google Hacks: 100 Industrial-Strength Tips & Tools

    With the largest collection of web documents in the world, Google is a reflection of the Web. The hacks in this book are not just about Google, they are also about unleashing the vast potential of the Web today and in the years to come. Google Hacks is a great resource for search enthusiasts, and we hope you enjoy it as much as we did.

     384 p actvn 26/03/2024 1 0

  • Ebook Hack-X-Crypt: A straight forward guide towards ethical hacking and cyber security

    Ebook Hack-X-Crypt: A straight forward guide towards ethical hacking and cyber security

    This Book you will uncover the finest ways to defend your computer systems from the hackers This Book is written by keeping one object in mind that a beginner, who is not much familiar regarding computer hacking, can easily, attempts these hacks and recognize what we are trying to demonstrate. After Reading this book you will come to recognize that how Hacking is affecting our everyday routine work and can be very hazardous in many fields like...

     105 p actvn 26/03/2024 1 0

  • Ebook Hacker’s challenge: Test your incident response skills using 20 scenarios

    Ebook Hacker’s challenge: Test your incident response skills using 20 scenarios

    Hacker’s Challenge brings you fact-based, computer-security war stories from top researchers, consultants, incident-response specialists, and forensic analysts working in the computer-security industry today. Rather than just retelling the story, however, the book goes further—it pulls you, the reader, inside the story. As each story unfolds, you are presented with information about the incident and are looked upon to solve the case. This...

     384 p actvn 26/03/2024 1 0

  • Ebook Hackers beware

    Ebook Hackers beware

    A good defense starts with a thorough understanding of your opponent’s offense. Hackers Beware teaches you how hackers think, what tools they use, and the techniques they utilize to compromise a machine. Eric Cole, a leading expert in information security, shows you not only how to detect these attacks, but what you can do to protect yourself against them. When it comes to securing your site, knowledge is power. This book gives you the...

     817 p actvn 26/03/2024 1 0

  • Ebook Hacking: Computer hacking, security testing, penetration testing and basic security - Gary Hall, Erin Watson

    Ebook Hacking: Computer hacking, security testing, penetration testing and basic security - Gary Hall, Erin Watson

    Most people don't really understand what hacking is about, much less how to go about it. It's something that we just watch in movies or hear about on the news. This book, Hacking: Computer hacking, security testing, penetration testing and basic security, is meant to help you understand hacking techniques in a broader and deeper way. In this book, you will learn how you can protect yourself from some of the most prevalent hacking schemes to...

     134 p actvn 26/03/2024 2 0

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=actvn