- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook Network security illustrated: Part 1
Ebook Network security illustrated: Part 1 includes contents: Part I managing security, part II outsourcing options, part III reserving rights, part IV determining identity, part V preserving privacy, part VI connecting networks.
232 p actvn 26/03/2024 19 0
Từ khóa: Network security illustrated, Network security, Computer security, Information security, Managing security, Outsourcing options
Ebook Privacy, security and trust within the context of pervasive computing
The goal of the workshop was not to focus on specific, even novel mechanisms, rather on the interfaces between mechanisms in different technical and social problem spaces. 21 people from different parts of the world took part in the one-day discussion, including PhD students, seasoned and junior researchers. This workshop promises to be a lasting experience and we encourage researchers to participate in future events. We hope that you will...
182 p actvn 26/03/2024 15 0
Từ khóa: Network security, Computer security, Information security, Pervasive computing, Mobile computing, Wireless networks
Ebook How to cheat at securing a wireless network: Part 1
Ebook How to cheat at securing a wireless network - Part 1 includes contents: Chapter 1: introduction to wireless: from past to present, chapter 2: wireless security, chapter 3: dangers of wireless devices in the workplace, chapter 4: WLAN rogue access point detection and mitigation, chapter 5: wireless LAN VLANs, chapter 6: designing a wireless network, chapter 7: wireless network architecture and design.
286 p actvn 26/03/2024 15 0
Từ khóa: Network security, Computer security, Information security, Wireless network, Wireless security, Dangers of wireless devices in the workplace, Wireless LAN VLANs
Ebook How to cheat at securing a wireless network: Part 2
Ebook How to cheat at securing a wireless network - Part 2 includes contents: Chapter 8: monitoring and intrusion detection, chapter 9: designing a wireless enterprise network: hospital case study, chapter 10: designing a wireless industrial network: retail case study, chapter 11: designing a wireless home network: home office case study, chapter 12: wireless penetration testing.
193 p actvn 26/03/2024 18 0
Từ khóa: Network security, Computer security, Information security, Wireless enterprise network, Wireless home network, Wireless industrial network, Wireless penetration testing
Ebook Hack-X-Crypt: A straight forward guide towards ethical hacking and cyber security
This Book you will uncover the finest ways to defend your computer systems from the hackers This Book is written by keeping one object in mind that a beginner, who is not much familiar regarding computer hacking, can easily, attempts these hacks and recognize what we are trying to demonstrate. After Reading this book you will come to recognize that how Hacking is affecting our everyday routine work and can be very hazardous in many fields like...
105 p actvn 26/03/2024 15 0
Từ khóa: Network security, Computer security, Information security, Computer Viruses, Computer Hacking, Ethical hacking, Cyber security
Ebook Hacker’s challenge: Test your incident response skills using 20 scenarios
Hacker’s Challenge brings you fact-based, computer-security war stories from top researchers, consultants, incident-response specialists, and forensic analysts working in the computer-security industry today. Rather than just retelling the story, however, the book goes further—it pulls you, the reader, inside the story. As each story unfolds, you are presented with information about the incident and are looked upon to solve the case. This...
384 p actvn 26/03/2024 15 0
Từ khóa: Ebook Hacker’s challenge, Hacker’s challenge, Network security, Computer security, Information security
A good defense starts with a thorough understanding of your opponent’s offense. Hackers Beware teaches you how hackers think, what tools they use, and the techniques they utilize to compromise a machine. Eric Cole, a leading expert in information security, shows you not only how to detect these attacks, but what you can do to protect yourself against them. When it comes to securing your site, knowledge is power. This book gives you the...
817 p actvn 26/03/2024 18 0
Từ khóa: Ebook Hackers beware, Hackers beware, Network security, Computer security, Information security
Most people don't really understand what hacking is about, much less how to go about it. It's something that we just watch in movies or hear about on the news. This book, Hacking: Computer hacking, security testing, penetration testing and basic security, is meant to help you understand hacking techniques in a broader and deeper way. In this book, you will learn how you can protect yourself from some of the most prevalent hacking schemes to...
134 p actvn 26/03/2024 21 0
Từ khóa: Network security, Computer security, Information security, Computer hacking, Security testing, The Hacker's methodology
Ebook The official CHFI study guide for computer hacking forensics investigators: Part 2
Ebook The official CHFI study guide for computer hacking forensics investigators: Part 2 includes contents: Chapter 10: router forensics and network forensics; chapter 11: investigating wireless attacks; chapter 12: PDA, blackberry, and ipod forensics; chapter 13: forensic softwareand hardware; chapter 14: forensics investigation using encase; chapter 15: incident response; chapter 16: types of investigations; appendix a: becoming an expert...
471 p actvn 26/03/2024 10 0
Từ khóa: The official CHFI, Computer hacking forensics investigators, Computer hacking, Network forensics, Investigating wireless attacks, Forensic softwareand hardware
Ebook Computer & intrusion forensics: Part 1
In ebook Computer & intrusion forensics: Part 1, the following content will be discussed: Chapter 1 computer crime, computer forensics, and computer security; chapter 2 current practice; chapter 3 computer forensics in law enforcement and national security.
196 p actvn 26/03/2024 8 0
Từ khóa: Computer security, Computer networks, Security measures, Forensic sciences, Computer crime, Computer forensics, Computer forensics in law enforcement
Ebook Computer & intrusion forensics: Part 2
In ebook Computer & intrusion forensics: Part 2, the following content will be discussed: Chapter 4 computer forensics in forensic accounting; chapter 5 case studies; chapter 6 intrusion detection and intrusion forensics; chapter 7 research directions and future developments.
221 p actvn 26/03/2024 9 0
Từ khóa: Computer security, Computer networks, Security measures, Forensic sciences, Computer forensics in forensic accounting, Intrusion forensics
Ebook Securing IM and P2P applications for the enterprise: Part 1
Ebook Securing IM and P2P applications for the enterprise: Part 1 includes contents: Chapter 1 Introduction to Instant Messaging; Chapter 2 AOL Instant Messenger (AIM); Chapter 3 Yahoo! Messenger; Chapter 4 MSN Messenger; Chapter 5 ICQ; Chapter 6 Trillian, Google Talk, and Web-based Clients; Chapter 7 Skype; Chapter 8 Introduction to P2P.
261 p actvn 27/02/2024 11 0
Từ khóa: Securing IM, Securing IM and P2P applications, Network security, Computer security, Information security, AOL instant messenger, MSN messenger
Đăng nhập
Bộ sưu tập nổi bật
10 19597
Bộ sưu tập Tài liệu học tiếng Anh
14 82982
12 23568
Bộ sưu tập Kỹ thuật viễn thông
11 16531