- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook Privacy protection and computer forensics (Second edition): Part 1
Ebook Privacy protection and computer forensics (Second edition): Part 1 includes contents: Chapter 1 computer forensics, chapter 2 locating your sensitive data in your computer, chapter 3 specialized forensics applications, chapter 4 how can sensitive data be stolen from one's computer? chapter 5 why computer privacy and anonymity? chapter 6 practical measures for protecting sensitive information, chapter 7 basic protection from computer data...
147 p actvn 29/11/2023 21 0
Từ khóa: Privacy protection, Computer forensics, Computer security, Information security, Protecting sensitive information, Pecialized forensics applications, Computer data theft online
Ebook Privacy protection and computer forensics (Second edition): Part 2
Ebook Privacy protection and computer forensics (Second edition): Part 1 includes contents: Chapter 8 practical measures for online computer activities, chapter 9 advanced protection from computer data theft online, chapter 10 encryption, chapter 11 practical encryption, chapter 12 link encryption: VPNs, chapter 13 security of wireless connectivity: wifi and bluetooth, chapter 14 other computer-related threats to privacy, chapter 15...
219 p actvn 29/11/2023 18 0
Từ khóa: Privacy protection, Computer forensics, Computer security, Information security, Computer data theft online, Online computer activities, Practical encryption, Link encryption
Ebook Handbook of database security - Applications & trends: Part 2
Ebook Handbook of database security - Applications & trends: Part 2 includes contents: Chapter 12 security re-engineering for databases: concepts and techniques; chapter 13 database watermarking for copyright protection; chapter 14 database watermarking: a systematic view; chapter 15 trustworthy records retention; chapter 16 damage quarantine and recovery in data processing systems; chapter 17 hippocratic databases: current capabilities and...
305 p actvn 26/09/2023 37 0
Từ khóa: Handbook of database security, Database security, Database watermarking for copyright protection, Trustworthy records retention, Hippocratic databases, Data processing systems
Ebook Hack the stack - Using snort and ethereal to master the 8 layers of an insecure network: Part 1 includes contents: Chapter 1 Extending OSI to network security, Chapter 2 Layer 1: The physical layer, Chapter 3 Layer 2: The data link layer, Chapter 4 Layer 3: The network layer, Chapter 5 Layer 4: The transport layer.
230 p actvn 26/09/2023 34 0
Từ khóa: Hack the stack, Insecure network, Network security, The physical layer, The data link layer, The network layer
Ebook IT Governance: An international guide to data security and ISO27001-ISO27002 - Part 1
Ebook IT Governance: An international guide to data security and ISO27001-ISO27002 - Part 1 includes contents: Chapter 1 Why is information security necessary? Chapter 2 The UK combined code, the FRC risk guidance and Sarbanes – Oxley; Chapter 3 ISO27001; Chapter 4 Organizing information security; Chapter 5 Information security policy and scope; Chapter 6 The risk assessment and Statement of Applicability; Chapter 7 Mobile devices; Chapter 8...
191 p actvn 21/07/2023 50 1
Từ khóa: Ebook IT Governance, IT Governance, Data security, Information security, Information security policy, Human resources security
Ebook IT Governance: An international guide to data security and ISO27001-ISO27002 - Part 2
Ebook IT Governance: An international guide to data security and ISO27001-ISO27002 - Part 2 includes contents: Chapter 15 Physical and environmental security; Chapter 16 Equipment security; Chapter 17 Operations security; Chapter 18 Controls against malicious software (malware); Chapter 19 Communications management; Chapter 20 Exchanges of information; Chapter 21 System acquisition, development and maintenance; Chapter 22 Development and...
168 p actvn 21/07/2023 40 1
Từ khóa: Ebook IT Governance, IT Governance, Data security, Equipment security, Operations security, Information security incident management, The ISO27001 audit
Part 2 of book "Cloud application architectures: Building applications and Infrastructure in the Cloud" provide students with knowledge about: data security; network security; host security; disaster recovery planning; disasters in the cloud; disaster management; scaling a cloud infrastructure; capacity planning; amazon web services reference;...
94 p actvn 28/11/2022 54 0
Từ khóa: Cloud application architectures, Building applications, Infrastructure in the Cloud, Data security, Network security, Disaster recovery planning, Disaster management
Ebook CompTIA® Security+: Guide to Network Security Fundamentals (Seventh edition) - Part 1
This book "CompTIA® Security+: Guide to Network Security Fundamentals" is designed to meet the needs of students and professionals who want to master basic information security. Part 1 of book provide students with knowledge about: introduction to security; threat management and cyber security resources; threats and attacks on endpoints; endpoint and application development security; mobile, embedded, and specialized device security; basic...
244 p actvn 22/10/2022 113 2
Từ khóa: CompTIA® Security+, Guide to Network Security Fundamentals, CompTIA Security+ certification, Data management tools, Cybersecurity resources, Securing endpoint computers, Secure coding techniques
Ebook Hacking Android explores every nook and cranny of the Android OS to modify your device and guard it against security threats. Part 1 presents the main content: setting up the lab, android rooting, fundamental building blocks of android apps, an overview of attacking android apps, data storage, and its security.
191 p actvn 25/05/2022 91 1
Từ khóa: Ebook Android Program, The Hacking Android, Setting up the lab, The Android rooting, The Android apps, Attacking Android apps, Data storage and its security
Ebook Oxford English for Information technology (Second edition): Part 2
Ebook Oxford English for Information technology (Second edition): Part 2 has present the contents: communications systems, computing support, data security 1, data security 2, softwware engineering, people in computing, recent developments in IT, the future of IT, planning group presentation, defending a decision;...
118 p actvn 27/02/2022 98 0
Từ khóa: Oxford English for Information technology, Information technology, Communications systems, Computing support, Softwware engineering, Data security
Ebook Cryptography and network security: principles and practice (5th edition): Part 1
William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security....
511 p actvn 31/08/2017 579 17
Từ khóa: Network security, Ebook Cryptography and network security, Symmetric ciphers, Asymmetric ciphers, Cryptographic data integrity algorithms, Internet security
Ebook Cryptography and network security: principles and practice (5th edition): Part 2
In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. The book is divided into 2 parts, part 2 from chapter 16 to chapter 23.
389 p actvn 31/08/2017 528 12
Từ khóa: Network security, Ebook Cryptography and network security, Internet security, System security, Digital signatures, Cryptographic data integrity algorithms
Đăng nhập
Bộ sưu tập nổi bật
10 19589
Bộ sưu tập Kỹ thuật viễn thông
11 16526
12 23563
Bộ sưu tập Tài liệu học tiếng Anh
14 82963