- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Handbook of information and communication security: Part 2
The book is divided into 2 parts, part 1 from chapter 21 to chapter 38. This part includes the contents: Mobile ad hoc network routing, security for ad hoc networks, phishing attacks and countermeasures, chaos-based secure optical communications using semiconductor lasers, chaos applications in optical communications,...and other contents.
454 p actvn 31/07/2017 480 10
Từ khóa: Communication security, Information security, System security, Ad hoc network, Optical communications, Security via trusted communications
Handbook of information and communication security: Part 1
The Handbook of information and communication security covers some of the latest advances in fundamentals, cryptography, intrusion detection, access control, networking (including extensive sections on optics and wireless systems), software, forensics, and legal issues. The editors intention, with respect to the presentation and sequencing of the chapters, was to create a reasonably natural flow between the various sub-topics. The book is...
409 p actvn 31/07/2017 444 11
Từ khóa: Communication security, Information security, System security, Public-key cryptography, Elliptic curve cryptography, Chaos-based information security
Lecture Security+ Certification: Chapter 4 - Trung tâm Athena
Chapter 4 - Remote access. Objectives in this chapter: Understand implications of IEEE 802.1x and how it is used, understand VPN technology and its uses for securing remote access to networks, understand how RADIUS authentication works, understand how TACACS+ operates, understand how PPTP works and when it is used,...
54 p actvn 24/02/2017 547 6
Từ khóa: Network security, Information security, Security terminology, Bảo mật mạng, Remote access, Authentication server, Virtual Private Network
Lecture Security+ Certification: Chapter 3 (part 1) - Trung tâm Athena
Chapter 3 - Attacks and malicious code (part 1). After reading the material in this chapter, you should be able to: Explain denial-of-service (DoS) attacks, explain and discuss ping-of-death attacks, identify major components used in a DDoS attack and how they are installed, understand major types of spoofing attacks.
43 p actvn 24/02/2017 384 5
Từ khóa: Network security, Information security, Security terminology, Bảo mật mạng, Malicious code, SYN flood, Protective measures against smurf
Lecture Security+ Certification: Chapter 6 - Trung tâm Athena
Chapter 6 - Email and web security. The main contents of this chapter include all of the following: Protect e-mail systems, list World Wide Web vulnerabilities, secure web communications, secure instant messaging.
48 p actvn 24/02/2017 376 5
Từ khóa: Network security, Information security, Security terminology, Bảo mật mạng, Email security, Web security, Protect e-mail systems
Lecture Security+ Certification: Chapter 5 - Trung tâm Athena
Chapter 5 - Wireless security. After studying this chapter you will be able to understand: Wireless concepts, Securing digital cellular telephony, wireless application protocol, wireless transport layer security, hardening wireless local area networks, IEEE 802.11, wired equivalent privacy (WEP).
20 p actvn 24/02/2017 474 5
Từ khóa: Network security, Information security, Security terminology, Bảo mật mạng, Wireless security, Securing digital cellular telephony
Lecture Security+ Certification: Chapter 10 - Trung tâm Athena
Chapter 10 - Public key infrastructure. After completing this chapter, students will be able to: Explain cryptography strengths and vulnerabilities, define public key infrastructure (PKI), manage digital certificates, explore key management.
34 p actvn 24/02/2017 408 5
Từ khóa: Network security, Information security, Security terminology, Bảo mật mạng, Public key infrastructure, Symmetric cryptography
Lecture Security+ Certification: Chapter 8 - Trung tâm Athena
Chapter 8 - Network security topologies. Objectives in this chapter: Explain network perimeter’s importance to an organization’s security policies, identify place and role of the demilitarized zone in the network, explain how network address translation is used to help secure networks, spell out the role of tunneling in network security, describe security features of virtual local area networks.
40 p actvn 24/02/2017 362 6
Từ khóa: Network security, Information security, Security terminology, Bảo mật mạng, Network security topologies, Perimeter security topologies
Lecture Security+ Certification: Chapter 9 - Trung tâm Athena
Lecture Security+ Certification: Chapter 9 - System hardening. The main contents of this chapter include all of the following: Disable nonessential systems, harden operating systems, harden applications, harden networks.
39 p actvn 24/02/2017 369 5
Từ khóa: Network security, Information security, Security terminology, Bảo mật mạng, System hardening, Harden operating systems
Ebook Network security illustrated: Phần 2
Part 1 of the book serial ebook Network security illustrated to part 2 of you will continue to learn about relevant issues such as: Connecting networks, hardening networks, storing information, hiding information, accessing information. Invite you to consult.
173 p actvn 21/04/2016 374 15
Từ khóa: Network security illustrated, Connecting networks, Hardening networks, Storing information, Hiding information, Accessing information
Ebook Information Security Fundamentals - Thomas R. Peltier
The book examines the elements of computer security, employee roles and responsibilities, and common threats. It discusses the legal requirements that impact security policies, including Sarbanes-Oxley, HIPAA, and the Gramm-Leach-Bliley Act. Detailing physical security requirements and controls, this updated edition offers a sample physical security policy and includes a complete list of tasks and objectives that make up an effective...
262 p actvn 24/08/2015 592 12
Từ khóa: Information Security, Security Policies, Access Control, Information Security Fundamentals, Computer Security, Network Security
Ebook Information Security Basics
Information security does not guarantee the safety of your organization or your information or your computer systems. Information security cannot, in and of itself, provide protection for your information. That being said, information security is also not a black art. There is no sorcery to implementing proper information security and the concepts that are included in information security are not rocket science. In many ways, information...
413 p actvn 24/08/2015 595 9
Từ khóa: Information Security Basics, Communications Security, Emissions Security, Computer Security, Network Security
Đăng nhập
Bộ sưu tập nổi bật
Bộ sưu tập Kỹ thuật viễn thông
11 16398
12 23428
10 19449
Bộ sưu tập Tài liệu học tiếng Anh
14 82789