• Ebook Managing risk and information security: Protect to enable - Part 1

    Ebook Managing risk and information security: Protect to enable - Part 1

    Part 1 of ebook "Managing risk and information security: Protect to enable" provides readers with contents including: introduction; the misperception of risk; governance and internal partnerships: how to sense, interpret, and act on risk; external partnerships - the power of sharing information; people are the perimeter;...

     106 p actvn 29/11/2023 22 0

  • Ebook Managing risk and information security: Protect to enable - Part 2

    Ebook Managing risk and information security: Protect to enable - Part 2

    Continued part 1, part 2 of ebook "Managing risk and information security: Protect to enable" provides readers with contents including: emerging threats and vulnerabilities - reality and rhetoric; a new security architecture to improve business agility; looking to the future: emerging security capabilities; corporate social responsibility - the ethics of managing information risk; the 21st century CISO; performance coaching;...

     102 p actvn 29/11/2023 28 0

  • Ebook Platform embedded security technology revealed: Safeguarding the future of computing with Intel embedded security and management engine - Part 1

    Ebook Platform embedded security technology revealed: Safeguarding the future of computing with Intel embedded security and management engine - Part 1

    Part 1 of ebook "Platform embedded security technology revealed: Safeguarding the future of computing with Intel embedded security and management engine" provides readers with contents including: cyber security in the mobile age; intel’s embedded solutions: from management to security; building blocks of the security and management engine; the engine - safeguarding itself before safeguarding others;...

     120 p actvn 29/11/2023 28 0

  • Ebook Platform embedded security technology revealed: Safeguarding the future of computing with Intel embedded security and management engine - Part 2

    Ebook Platform embedded security technology revealed: Safeguarding the future of computing with Intel embedded security and management engine - Part 2

    Continued part 1, part 2 of ebook "Platform embedded security technology revealed: Safeguarding the future of computing with Intel embedded security and management engine" provides readers with contents including: privacy at the next level: intel’s enhanced privacy identification (EPID) technology; boot with integrity, or don’t boot; trust computing, backed by the intel platform trust technology; unleashing premium entertainment with...

     143 p actvn 29/11/2023 27 0

  • Ebook Practical VoIP Security: Part 1

    Ebook Practical VoIP Security: Part 1

    Ebook Practical VoIP Security: Part 1 includes contents: Chapter 1 Introduction to VoIP Security; Chapter 2 Asterisk Configuration and Features; Chapter 3 The Hardware Infrastructure; Chapter 4 PSTN Architecture; Chapter 5 H.323 Architecture; Chapter 6 SIP Architecture; Chapter 7 Other VoIP Communication Architectures; Chapter 8 Support Protocols; Chapter 9 Threats to VoIP Communications Systems.

     290 p actvn 29/11/2023 28 0

  • Ebook Practical VoIP Security: Part 2

    Ebook Practical VoIP Security: Part 2

    Ebook Practical VoIP Security: Part 2 includes contents: Chapter 10 Validate Existing Security Infrastructure; Chapter 11 Confirm User Identity; Chapter 12 Active Security Monitoring; Chapter 13 Logically Segregate Network Traffic; Chapter 14 IETF Encryption Solutions for VoIP; Chapter 15 Regulatory Compliance; Chapter 16 The IP Multimedia Subsystem: True Converged Communications; Chapter 17 Recommendations.

     302 p actvn 29/11/2023 21 0

  • Ebook Privacy protection and computer forensics (Second edition): Part 1

    Ebook Privacy protection and computer forensics (Second edition): Part 1

    Ebook Privacy protection and computer forensics (Second edition): Part 1 includes contents: Chapter 1 computer forensics, chapter 2 locating your sensitive data in your computer, chapter 3 specialized forensics applications, chapter 4 how can sensitive data be stolen from one's computer? chapter 5 why computer privacy and anonymity? chapter 6 practical measures for protecting sensitive information, chapter 7 basic protection from computer data...

     147 p actvn 29/11/2023 22 0

  • Ebook Privacy protection and computer forensics (Second edition): Part 2

    Ebook Privacy protection and computer forensics (Second edition): Part 2

    Ebook Privacy protection and computer forensics (Second edition): Part 1 includes contents: Chapter 8 practical measures for online computer activities, chapter 9 advanced protection from computer data theft online, chapter 10 encryption, chapter 11 practical encryption, chapter 12 link encryption: VPNs, chapter 13 security of wireless connectivity: wifi and bluetooth, chapter 14 other computer-related threats to privacy, chapter 15...

     219 p actvn 29/11/2023 21 0

  • Ebook Securing VOIP networks: Threats, vulnerabilities, and countermeasures – Part 1

    Ebook Securing VOIP networks: Threats, vulnerabilities, and countermeasures – Part 1

    Ebook Securing VOIP networks: Threats, vulnerabilities, and countermeasures – Part 1 includes content: Chapter 1: Introduction; Chapter 2: VoIP Architectures and Protocols; Chapter 3: Threats and Attacks; Chapter 4: VoIP Vulnerabilities; Chapter 5: Signaling protection mechanisms.

     241 p actvn 29/11/2023 18 0

  • Ebook Securing VOIP networks: Threats, vulnerabilities, and countermeasures – Part 2

    Ebook Securing VOIP networks: Threats, vulnerabilities, and countermeasures – Part 2

    Ebook Securing VOIP networks: Threats, vulnerabilities, and countermeasures – Part 1 includes content: Chapter 6: Media Protection Mechanisms; Chapter 7: Key Management Mechanisms; Chapter 8: VoIP and Network Security Controls; Chapter 9: A Security Framework for Enterprise VoIP Networks; Chapter 10: Provider Architectures and Security; Chapter 11: Enterprise Architectures and Security.

     143 p actvn 29/11/2023 11 0

  • Ebook Triển khai hệ thống mạng Wireless: Phần 1 - Tô Thanh Hải

    Ebook Triển khai hệ thống mạng Wireless: Phần 1 - Tô Thanh Hải

    Phần 1 của cuốn sách "Triển khai hệ thống mạng Wireless" hướng dẫn các bạn từng bước triển khai mạng wireless trong môi trường gia đình; cài đặt cấu hình Access Point; kết nối máy trạm vào mạng Wireless; cấu hình mạng Wireless theo mô hình Ad-hoc;... Mời các bạn cùng tham khảo!

     62 p actvn 25/10/2023 80 0

  • Ebook Triển khai hệ thống mạng Wireless: Phần 2 - Tô Thanh Hải

    Ebook Triển khai hệ thống mạng Wireless: Phần 2 - Tô Thanh Hải

    Nối tiếp phần 1, phần 2 của cuốn sách "Triển khai hệ thống mạng Wireless" gồm những nội dung chính sau: trình bày chi tiết về mạng wireless trong môi trường doanh nghiệp. Trong phần này, bạn sẽ tiếp cận với cách thức triển khai mạng wireless ở những nơi công cộng. Mời các bạn cùng tham khảo!

     110 p actvn 25/10/2023 60 0

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=actvn