- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) – Part 2 includes contents: Chapter 6 input injection attacks, chapter 7 attacking XML web services, chapter 8 attacking web application management, chapter 9 hacking web clients, chapter 10 the enterprise web application security program, A: Web application security checklist, B: Web hacking tools and techniques cribsheet.
233 p actvn 25/12/2023 36 1
Từ khóa: Hacking exposed, Ebook Hacking exposed, Ebook Hacking exposed web applications, Hacking exposed web, Web application security secrets, Attacking XML web services, Attacking web application management
Ebook TCP/IP essentials: A lab-based approach - Part 2
Ebook TCP/IP essentials: A lab-based approach - Part 2 includes: TCP study, tulticast and realtime service; the web, DHCP, NTP and NAT; network management and security.
152 p actvn 21/07/2023 49 1
Từ khóa: TCP/IP essentials, TCP study, Tulticast and realtime service, Realtime service, The Web, Network management and security, Network management
Ebook IT Governance: An international guide to data security and ISO27001-ISO27002 - Part 2
Ebook IT Governance: An international guide to data security and ISO27001-ISO27002 - Part 2 includes contents: Chapter 15 Physical and environmental security; Chapter 16 Equipment security; Chapter 17 Operations security; Chapter 18 Controls against malicious software (malware); Chapter 19 Communications management; Chapter 20 Exchanges of information; Chapter 21 System acquisition, development and maintenance; Chapter 22 Development and...
168 p actvn 21/07/2023 40 1
Từ khóa: Ebook IT Governance, IT Governance, Data security, Equipment security, Operations security, Information security incident management, The ISO27001 audit
Ebook Information security management handbook (Sixth edition, Volume 6): Part 1
Ebook Information security management handbook (Sixth edition, Volume 6): Part 1 include of the following content: Domain 1 access control: access control administration; domain 2 telecommunications and network security: internet, intranet, extranet security; domain 3 information security and risk management: security management concepts and principles; domain 4 application development security: system development controls; domain 5...
263 p actvn 31/01/2023 76 1
Từ khóa: Information security management, Information security management handbook, Access control access control administration, Network security internet, Information security, Risk management
Part 2 of book "Cloud application architectures: Building applications and Infrastructure in the Cloud" provide students with knowledge about: data security; network security; host security; disaster recovery planning; disasters in the cloud; disaster management; scaling a cloud infrastructure; capacity planning; amazon web services reference;...
94 p actvn 28/11/2022 53 0
Từ khóa: Cloud application architectures, Building applications, Infrastructure in the Cloud, Data security, Network security, Disaster recovery planning, Disaster management
Ebook CompTIA® Security+: Guide to Network Security Fundamentals (Seventh edition) - Part 1
This book "CompTIA® Security+: Guide to Network Security Fundamentals" is designed to meet the needs of students and professionals who want to master basic information security. Part 1 of book provide students with knowledge about: introduction to security; threat management and cyber security resources; threats and attacks on endpoints; endpoint and application development security; mobile, embedded, and specialized device security; basic...
244 p actvn 22/10/2022 113 2
Từ khóa: CompTIA® Security+, Guide to Network Security Fundamentals, CompTIA Security+ certification, Data management tools, Cybersecurity resources, Securing endpoint computers, Secure coding techniques
Ebook Mastering VMware vSphere 5: Part 2
Ebook Mastering VMware vSphere 5: Part 2 has present the contents ensuring high availability and business continuity; securing VMware vSphere; creating and managing Virtual Machines; using templates and vApps; managing resource allocation; balancing resource utilization; monitoring VMware vSphere performance;...
389 p actvn 25/05/2022 89 0
Từ khóa: Mastering VMware vSphere 5, VMware vSphere design, Securing VMware vSphere, Creating and managing Virtual Machines, Managing resource allocation, Balancing resource utilization
Ebook VMware vSphere 5 Administration: Instant Reference - Part 2
Ebook VMware vSphere 5 Administration: Instant Reference - Part 2 has present the content about creating and managing virtual networking; configuring and managing storage; high availability and business continuity; managing virtual machines; importing and exporting virtual machines; configuring security; managing resources and performance;...
215 p actvn 27/02/2022 59 0
Từ khóa: VMware vSphere 5 Administration, VMware vSphere 5 Administration Instant Referencen, Configuring and managing storage, Managing virtual machines, Configuring security, Managing resources and performance
Ebook Java security (2nd Edition)
"Ebook Java security, 2nd Edition" present covers the security model of Java 2, Version 1.3, which is significantly different from that of Java 1.1. It has extensive coverage of the two new important security APIs: JAAS (Java Authentication and Authorization Service) and JSSE (Java Secure Sockets Extension). Java Security, 2nd Edition, will give you a clear understanding of the architecture of Java's security model and how to use that model in...
486 p actvn 31/01/2022 95 0
Từ khóa: Key management, The security manager, Key management example, Java security, Comparison with previous releases
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals...
458 p actvn 26/09/2018 576 4
Từ khóa: Information security management, Information security, Information security management handbook, Integrated threat managemen, Risk management, Hysical security
Lecture Security+ Certification: Chapter 12 - Trung tâm Athena
Chapter 12 - Policies and disaster recovery. The main contents of this chapter include all of the following: Policies and procedures, privilege management, education and documentation, communication, disaster recovery, business continuity.
45 p actvn 24/02/2017 369 4
Từ khóa: Network security, Information security, Security terminology, Bảo mật mạng, Privilege management, Disaster recovery
Ebook Network security illustrated: Phần 1
Security concepts are organized based on business needs, as opposed to tech-nological similarity. We’ve tried to focus on how these concepts relate in terms of practical business functionality. For example, network monitoring is discussed in Part 1, "Managing Security " rather than in a section on intrusion detection. For people with a technical background, this method of organization may seem strange. But one of our goals is to change the...
276 p actvn 21/04/2016 385 15
Từ khóa: Network security illustrated, Managing security, Outsourcing options, The other side of the coin, Determining identity, Preserving privacy
Đăng nhập
Bộ sưu tập nổi bật
Bộ sưu tập Kỹ thuật viễn thông
11 16516
Bộ sưu tập Tài liệu học tiếng Anh
14 82955
10 19580
12 23553