- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook The ethical hack - A framework for business value penetration testing
Ebook "The ethical hack - A framework for business value penetration testing" includes content: Getting started, setting the stage, the framework, information security models, information security program, the business perspective, planning for a controlled attack, preparing for a hack, enumeration, vulnerability analysis, exploitation, the deliverable, integrating the results.
331 p actvn 24/04/2024 2 0
Từ khóa: The ethical hack, Computer networks, Security measures, Computer hackers, Business enterprises, Vulnerability analysis, Getting started, Setting the stage, the framework
Ebook It governance - A managers guide to data security and ISO 2700/ISO 27002 (4th edition): Part 1
Part 1 book "It governance - A managers guide to data security" includes content: Why is information security necessary the combined code; the turnbull report and sarbanes–oxley; organizing information security; information security policy and scope; the risk assessment and statement of applicability; external parties; asset management; human resources security, physical and environmental security, equipment security, communications and...
205 p actvn 24/04/2024 1 0
Từ khóa: It governance, Data security, Computer security, Data protection, Business enterprises, Computer networks, Security measures, Organizing information security
Ebook It governance - A managers guide to data security and ISO 2700/ISO 27002 (4th edition): Part 2
Part 2 book "It governance - A managers guide to data security" includes content: Network security management and media handling, exchanges of information, electronic commerce services, E-mail and internet use, access control, network access control, operating system access control, application access control and teleworking, systems acquisition, development and maintenance,.... and other contents.
180 p actvn 24/04/2024 1 0
Từ khóa: It governance, Data security, Computer security, Data protection, Business enterprises, Computer networks, Security measures, Electronic commerce services
Ebook Computer & intrusion forensics: Part 1
In ebook Computer & intrusion forensics: Part 1, the following content will be discussed: Chapter 1 computer crime, computer forensics, and computer security; chapter 2 current practice; chapter 3 computer forensics in law enforcement and national security.
196 p actvn 26/03/2024 8 0
Từ khóa: Computer security, Computer networks, Security measures, Forensic sciences, Computer crime, Computer forensics, Computer forensics in law enforcement
Ebook Computer & intrusion forensics: Part 2
In ebook Computer & intrusion forensics: Part 2, the following content will be discussed: Chapter 4 computer forensics in forensic accounting; chapter 5 case studies; chapter 6 intrusion detection and intrusion forensics; chapter 7 research directions and future developments.
221 p actvn 26/03/2024 9 0
Từ khóa: Computer security, Computer networks, Security measures, Forensic sciences, Computer forensics in forensic accounting, Intrusion forensics
Ebook AAA and network security for mobile access: radius, diameter, EAP, PKI, and IP mobility
The book is geared towards people who have a basic understanding of Internet Protocol (IP) and TCP/IP stack layering concepts. Except for the above, most of the other IP-related concepts are explained in the text. Thus, the book is suitable for managers, engineers, researchers and students who are interested in the topic of network security and AAA but do not possess in-depth IP routing and security knowledge. We aimed at providing an overview...
318 p actvn 26/09/2023 57 0
Từ khóa: Wireless Internet, Security measures, Mobile computing, Wireless internet security measures, Mobile computing security, Network security for mobile access
Ebook Computer security, privacy, and politics: Current issues, challenges and solutions
"Computer Security, Privacy, & Politics " offers a review of recent developments of computer security, focusing on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations.It compiles timely content on such topics as reverse engineering of software, understanding emerging computer exploits, emerging lawsuits and cases, global and societal implications, and protection from attacks on privacy.
333 p actvn 26/09/2023 58 0
Từ khóa: Computer security, Computer networks security measures, Computer networks, Computer security government polic, Reverse engineering of software
Ebook Cyber threat: How to manage the growing risk of cyber attacks
This book is an attempt to raise the level of awareness about the cyber threat and what to do about it. The cyber threat is a board of directors’ issue. Yet when some senior executives and board members hear the word “security” or “technology,” there’s a disconnect. They think it’s not their issue. Let the technology people deal with it. Let the security people deal with it. Although there is evidence that this perception is...
224 p actvn 26/09/2023 53 0
Từ khóa: Cyber threat, Computer security, Cyber attacks, The risk of cyber attacks, Corporations security measures, Business enterprises, Computer networks security measures
Ebook Implementing NAP and NAC security technologies: The complete guide to network access control includes contents: Chapter 1: Understanding terms and technologies, Chapter 2: The technical components of NAC/NAP solutions, Chapter 3: What are you trying to protect? Chapter 4: Understanding the need for LAN-based NAC/NAP, Chapter 5: Understanding the need for mobile NAC, Chapter 6: Understanding Cisco clean access, Chapter 7: Understanding...
291 p actvn 26/09/2023 32 0
Từ khóa: NAC security technologies, NAP security technologies, Network access control, Computer networks, Access control, Security measures, Computer network protocols
Ebook Hacking: The art of exploitation – Part 1
The goal of the book "Hacking: The Art of Exploitation" is to share the art of hacking with everyone. Understanding hacking techniques is often difficult, since it requires both breadth and depth of knowledge. Many hacking texts seem esoteric and confusing because of just a few gaps in this prerequisite education. This second edition makes the world of hacking more accessible by providing the complete picture—from programming to machine code...
290 p actvn 22/07/2022 210 3
Từ khóa: Computer security, Computer hackers, Computer networks, Security measures, Hacking the art of exploitation, 0x200 Programming
Ebook Hacking: The art of exploitation – Part 2
Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity. Ebook Hacking: The art of...
198 p actvn 22/07/2022 178 2
Từ khóa: Computer security, Computer hackers, Computer networks, Security measures, Hacking the art of exploitation, 0x500 Shellcode
Đăng nhập
Bộ sưu tập nổi bật
12 23566
10 19594
Bộ sưu tập Tài liệu học tiếng Anh
14 82968
Bộ sưu tập Kỹ thuật viễn thông
11 16531