- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook Managing risk and information security: Protect to enable - Part 2
Continued part 1, part 2 of ebook "Managing risk and information security: Protect to enable" provides readers with contents including: emerging threats and vulnerabilities - reality and rhetoric; a new security architecture to improve business agility; looking to the future: emerging security capabilities; corporate social responsibility - the ethics of managing information risk; the 21st century CISO; performance coaching;...
102 p actvn 29/11/2023 28 0
Từ khóa: Managing risk and information security, Information security, Key threat activity areas, Internet of Things, Cloud computing, Artificial intelligence, Managing information risk
Ebook Securing VOIP networks: Threats, vulnerabilities, and countermeasures – Part 2
Ebook Securing VOIP networks: Threats, vulnerabilities, and countermeasures – Part 1 includes content: Chapter 6: Media Protection Mechanisms; Chapter 7: Key Management Mechanisms; Chapter 8: VoIP and Network Security Controls; Chapter 9: A Security Framework for Enterprise VoIP Networks; Chapter 10: Provider Architectures and Security; Chapter 11: Enterprise Architectures and Security.
143 p actvn 29/11/2023 11 0
Từ khóa: Ebook Securing VOIP networks, Securing VOIP networks, An toàn thông tin, Media Protection Mechanisms, Key Management Mechanisms, Network Security Controls
Ebook Bluetooth security - Christian Gehrmann Joakim Persson, Ben Smeets
Ebook Bluetooth security presents the following content: Chapter 1 introduction; chapter 2 overview of the bluetooth security architecture; chapter 3 bluetooth pairing and key management; chapter 4 algorithms; chapter 5 broadcast encryption; chapter 6 security policies and access control; chapter 7 attacks, strengths, and weaknesses; chapter 8 providing anonymity; chapter 9 key management extensions; chapter 10 security for bluetooth...
222 p actvn 26/09/2023 53 0
Từ khóa: Bluetooth Security, Bluetooth security enhancements, Bluetooth Security Basics, The bluetooth security architecture, Broadcast encryption, Key management extensions
Ebook Java security (2nd Edition)
"Ebook Java security, 2nd Edition" present covers the security model of Java 2, Version 1.3, which is significantly different from that of Java 1.1. It has extensive coverage of the two new important security APIs: JAAS (Java Authentication and Authorization Service) and JSSE (Java Secure Sockets Extension). Java Security, 2nd Edition, will give you a clear understanding of the architecture of Java's security model and how to use that model in...
486 p actvn 31/01/2022 96 0
Từ khóa: Key management, The security manager, Key management example, Java security, Comparison with previous releases
Đăng nhập
Bộ sưu tập nổi bật
Bộ sưu tập Kỹ thuật viễn thông
11 16531
12 23566
Bộ sưu tập Tài liệu học tiếng Anh
14 82966
10 19594