- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
A good defense starts with a thorough understanding of your opponent’s offense. Hackers Beware teaches you how hackers think, what tools they use, and the techniques they utilize to compromise a machine. Eric Cole, a leading expert in information security, shows you not only how to detect these attacks, but what you can do to protect yourself against them. When it comes to securing your site, knowledge is power. This book gives you the...
817 p actvn 26/03/2024 17 0
Từ khóa: Ebook Hackers beware, Hackers beware, Network security, Computer security, Information security
Most people don't really understand what hacking is about, much less how to go about it. It's something that we just watch in movies or hear about on the news. This book, Hacking: Computer hacking, security testing, penetration testing and basic security, is meant to help you understand hacking techniques in a broader and deeper way. In this book, you will learn how you can protect yourself from some of the most prevalent hacking schemes to...
134 p actvn 26/03/2024 21 0
Từ khóa: Network security, Computer security, Information security, Computer hacking, Security testing, The Hacker's methodology
Ebook Securing IM and P2P applications for the enterprise: Part 1
Ebook Securing IM and P2P applications for the enterprise: Part 1 includes contents: Chapter 1 Introduction to Instant Messaging; Chapter 2 AOL Instant Messenger (AIM); Chapter 3 Yahoo! Messenger; Chapter 4 MSN Messenger; Chapter 5 ICQ; Chapter 6 Trillian, Google Talk, and Web-based Clients; Chapter 7 Skype; Chapter 8 Introduction to P2P.
261 p actvn 27/02/2024 10 0
Từ khóa: Securing IM, Securing IM and P2P applications, Network security, Computer security, Information security, AOL instant messenger, MSN messenger
Ebook Securing IM and P2P applications for the enterprise: Part 2
Ebook Securing IM and P2P applications for the enterprise: Part 2 includes contents: Chapter 9 Gnutella Architecture; Chapter 10 eDonkey and eMule; Chapter 11 BitTorrent; Chapter 12 FastTrack; Chapter 13 Internet Relay Chat—Major Players of IRC; Chapter 14 IRC Networks and Security; Chapter 15 Global IRC Security; Chapter 16 Common IRC Clients by OS.
218 p actvn 27/02/2024 8 0
Từ khóa: Securing IM, Securing IM and P2P applications, Network security, Computer security, Information security, IRC Networks, Global IRC security
Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 1
Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 1 includes contents: Chapter 1 information security basics, chapter 2 the windows security architecture from the hacker's perspective, chapter 3 footprinting and scanning, chapter 4 enumeration, chapter 5 hacking windows-specific services, chapter 6 discovering and exploiting windows vulnerabilities, chapter 7 post-exploit pillaging.
252 p actvn 25/12/2023 40 0
Từ khóa: Hacking exposed, Ebook Hacking exposed windows, Windows security secrets, Information security, The windows security architecture, Hacking windows-specific services
Ebook Managing risk and information security: Protect to enable - Part 1
Part 1 of ebook "Managing risk and information security: Protect to enable" provides readers with contents including: introduction; the misperception of risk; governance and internal partnerships: how to sense, interpret, and act on risk; external partnerships - the power of sharing information; people are the perimeter;...
106 p actvn 29/11/2023 21 0
Từ khóa: Managing risk and information security, Information security, The misperception of risk, External partnerships, Building credibility, Building internal partnerships, Corporate citizenship
Ebook Managing risk and information security: Protect to enable - Part 2
Continued part 1, part 2 of ebook "Managing risk and information security: Protect to enable" provides readers with contents including: emerging threats and vulnerabilities - reality and rhetoric; a new security architecture to improve business agility; looking to the future: emerging security capabilities; corporate social responsibility - the ethics of managing information risk; the 21st century CISO; performance coaching;...
102 p actvn 29/11/2023 27 0
Từ khóa: Managing risk and information security, Information security, Key threat activity areas, Internet of Things, Cloud computing, Artificial intelligence, Managing information risk
Ebook Practical VoIP Security: Part 1
Ebook Practical VoIP Security: Part 1 includes contents: Chapter 1 Introduction to VoIP Security; Chapter 2 Asterisk Configuration and Features; Chapter 3 The Hardware Infrastructure; Chapter 4 PSTN Architecture; Chapter 5 H.323 Architecture; Chapter 6 SIP Architecture; Chapter 7 Other VoIP Communication Architectures; Chapter 8 Support Protocols; Chapter 9 Threats to VoIP Communications Systems.
290 p actvn 29/11/2023 27 0
Từ khóa: Ebook Practical VoIP Security, Practical VoIP Security, Computer security, Information security, VoIP Security, Hardware Infrastructure, PSTN Architecture
Ebook Practical VoIP Security: Part 2
Ebook Practical VoIP Security: Part 2 includes contents: Chapter 10 Validate Existing Security Infrastructure; Chapter 11 Confirm User Identity; Chapter 12 Active Security Monitoring; Chapter 13 Logically Segregate Network Traffic; Chapter 14 IETF Encryption Solutions for VoIP; Chapter 15 Regulatory Compliance; Chapter 16 The IP Multimedia Subsystem: True Converged Communications; Chapter 17 Recommendations.
302 p actvn 29/11/2023 20 0
Từ khóa: Ebook Practical VoIP Security, Practical VoIP Security, Computer security, Information security, Confirm User Identity, IETF Encryption Solutions for VoIP
Ebook Privacy protection and computer forensics (Second edition): Part 1
Ebook Privacy protection and computer forensics (Second edition): Part 1 includes contents: Chapter 1 computer forensics, chapter 2 locating your sensitive data in your computer, chapter 3 specialized forensics applications, chapter 4 how can sensitive data be stolen from one's computer? chapter 5 why computer privacy and anonymity? chapter 6 practical measures for protecting sensitive information, chapter 7 basic protection from computer data...
147 p actvn 29/11/2023 21 0
Từ khóa: Privacy protection, Computer forensics, Computer security, Information security, Protecting sensitive information, Pecialized forensics applications, Computer data theft online
Ebook Privacy protection and computer forensics (Second edition): Part 2
Ebook Privacy protection and computer forensics (Second edition): Part 1 includes contents: Chapter 8 practical measures for online computer activities, chapter 9 advanced protection from computer data theft online, chapter 10 encryption, chapter 11 practical encryption, chapter 12 link encryption: VPNs, chapter 13 security of wireless connectivity: wifi and bluetooth, chapter 14 other computer-related threats to privacy, chapter 15...
219 p actvn 29/11/2023 18 0
Từ khóa: Privacy protection, Computer forensics, Computer security, Information security, Computer data theft online, Online computer activities, Practical encryption, Link encryption
Ebook Outsourcing information security (2004) - C. Warren Axelrod
Chapter 1 outsourcing and information security, chapter 2 information security risks, chapter 3 justifying outsourcing, chapter 4 risks of outsourcing, chapter 5 categorizing costs and benefits, chapter 6 costs and benefits throughout the evaluation process, chapter 7 the outsourcing evaluation process - customer and outsourcer requirements, chapter 8 outsourcing security security considerations outsourcing, chapter 9 summary of the...
277 p actvn 26/09/2023 50 0
Từ khóa: Ebook Outsourcing information security, Outsourcing information security, Information security risks, Categorizing costs, The outsourcing evaluation process, The outsourcing process
Đăng nhập
Bộ sưu tập nổi bật
Bộ sưu tập Tài liệu học tiếng Anh
14 82963
Bộ sưu tập Kỹ thuật viễn thông
11 16525
10 19588
12 23562