- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook How to cheat at VolP security
Ebook "How to cheat at VolP security" includes content: The hardware infrastructure, introduction to VolP security, architectures, support protocols, threats to VolP communications systems, confirm user identity, active security monitoring, logically segregate network traffic, IETF encryption solutions for VolP, skype security... and other contents.
433 p actvn 25/12/2023 33 0
Từ khóa: How to cheat at VolP security, Skype security, VolP security, Support protocols, VolP communications systems, Segregate network traffic, Active security monitoring
Ebook Security in wireless LANs & MANs
This book discusses the security threats and requirements in wireless LANs and wireless MANs, with a discussion on what the original designs missed and how they were corrected in the new protocols. It highlights the features of the current wireless LAN and MAN security protocols and explains the caveats and discusses open issues. This book is divided into four parts. The first part discusses authentication technologies common to security in...
262 p actvn 26/09/2023 47 0
Từ khóa: Wireless LANs, Security in wireless LANs, Security in wireless MANs, Wireless communication systems, Metropolitan area networks, Computer networks
Ebook Oxford English for Information technology (Second edition): Part 2
Ebook Oxford English for Information technology (Second edition): Part 2 has present the contents: communications systems, computing support, data security 1, data security 2, softwware engineering, people in computing, recent developments in IT, the future of IT, planning group presentation, defending a decision;...
118 p actvn 27/02/2022 98 0
Từ khóa: Oxford English for Information technology, Information technology, Communications systems, Computing support, Softwware engineering, Data security
Handbook of information and communication security: Part 2
The book is divided into 2 parts, part 1 from chapter 21 to chapter 38. This part includes the contents: Mobile ad hoc network routing, security for ad hoc networks, phishing attacks and countermeasures, chaos-based secure optical communications using semiconductor lasers, chaos applications in optical communications,...and other contents.
454 p actvn 31/07/2017 481 10
Từ khóa: Communication security, Information security, System security, Ad hoc network, Optical communications, Security via trusted communications
Handbook of information and communication security: Part 1
The Handbook of information and communication security covers some of the latest advances in fundamentals, cryptography, intrusion detection, access control, networking (including extensive sections on optics and wireless systems), software, forensics, and legal issues. The editors intention, with respect to the presentation and sequencing of the chapters, was to create a reasonably natural flow between the various sub-topics. The book is...
409 p actvn 31/07/2017 444 11
Từ khóa: Communication security, Information security, System security, Public-key cryptography, Elliptic curve cryptography, Chaos-based information security
Ebook Information Security Basics
Information security does not guarantee the safety of your organization or your information or your computer systems. Information security cannot, in and of itself, provide protection for your information. That being said, information security is also not a black art. There is no sorcery to implementing proper information security and the concepts that are included in information security are not rocket science. In many ways, information...
413 p actvn 24/08/2015 599 9
Từ khóa: Information Security Basics, Communications Security, Emissions Security, Computer Security, Network Security
Đăng nhập
Bộ sưu tập nổi bật
12 23555
Bộ sưu tập Kỹ thuật viễn thông
11 16517
Bộ sưu tập Tài liệu học tiếng Anh
14 82956
10 19581