- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook Network security illustrated: Part 1
Ebook Network security illustrated: Part 1 includes contents: Part I managing security, part II outsourcing options, part III reserving rights, part IV determining identity, part V preserving privacy, part VI connecting networks.
232 p actvn 26/03/2024 18 0
Từ khóa: Network security illustrated, Network security, Computer security, Information security, Managing security, Outsourcing options
Chương 14 trang bị cho người học những hiểu biết về các đặc tính bảo mật trong Windows Server 2003. Mục tiêu học tập của chương này gồm có: Xác định các phần tử và kỹ thuật khác nhau dùng để bảo mật hệ thống Windows Server 2003, Dùng các công cụ Security Configuration and Analysis để cấu hình và rà soát các thiết lập bảo mật, kiểm toán truy vập vào...
45 p actvn 27/02/2024 11 0
Từ khóa: Microsoft Windows Server 2003, Managing Microsoft Windows Server 2003, MCSE Guide, Bảo mật trong Windows Server 2003, Bảo mật hệ thống Windows 2003, Security Configuration Manager
Ebook Managing risk and information security: Protect to enable - Part 1
Part 1 of ebook "Managing risk and information security: Protect to enable" provides readers with contents including: introduction; the misperception of risk; governance and internal partnerships: how to sense, interpret, and act on risk; external partnerships - the power of sharing information; people are the perimeter;...
106 p actvn 29/11/2023 22 0
Từ khóa: Managing risk and information security, Information security, The misperception of risk, External partnerships, Building credibility, Building internal partnerships, Corporate citizenship
Ebook Managing risk and information security: Protect to enable - Part 2
Continued part 1, part 2 of ebook "Managing risk and information security: Protect to enable" provides readers with contents including: emerging threats and vulnerabilities - reality and rhetoric; a new security architecture to improve business agility; looking to the future: emerging security capabilities; corporate social responsibility - the ethics of managing information risk; the 21st century CISO; performance coaching;...
102 p actvn 29/11/2023 28 0
Từ khóa: Managing risk and information security, Information security, Key threat activity areas, Internet of Things, Cloud computing, Artificial intelligence, Managing information risk
Ebook Securing VOIP networks: Threats, vulnerabilities, and countermeasures – Part 2
Ebook Securing VOIP networks: Threats, vulnerabilities, and countermeasures – Part 1 includes content: Chapter 6: Media Protection Mechanisms; Chapter 7: Key Management Mechanisms; Chapter 8: VoIP and Network Security Controls; Chapter 9: A Security Framework for Enterprise VoIP Networks; Chapter 10: Provider Architectures and Security; Chapter 11: Enterprise Architectures and Security.
143 p actvn 29/11/2023 11 0
Từ khóa: Ebook Securing VOIP networks, Securing VOIP networks, An toàn thông tin, Media Protection Mechanisms, Key Management Mechanisms, Network Security Controls
Ebook Bluetooth security - Christian Gehrmann Joakim Persson, Ben Smeets
Ebook Bluetooth security presents the following content: Chapter 1 introduction; chapter 2 overview of the bluetooth security architecture; chapter 3 bluetooth pairing and key management; chapter 4 algorithms; chapter 5 broadcast encryption; chapter 6 security policies and access control; chapter 7 attacks, strengths, and weaknesses; chapter 8 providing anonymity; chapter 9 key management extensions; chapter 10 security for bluetooth...
222 p actvn 26/09/2023 53 0
Từ khóa: Bluetooth Security, Bluetooth security enhancements, Bluetooth Security Basics, The bluetooth security architecture, Broadcast encryption, Key management extensions
Ebook Handbook of database security - Applications & trends: Part 1
Ebook Handbook of database security - Applications & trends: Part 1 includes contents: Chapter 1 recent advances in access control, chapter 2 access control models for XML, chapter 3 access control policy languages in XML, chapter 4 database issues in trust management and trust negotiation, chapter 5 authenticated index structures for outsourced databases.
274 p actvn 26/09/2023 40 0
Từ khóa: Handbook of database security, Database security, Access control models for XML, Access control policy languages in XML, Database issues in trust management, Outsourced databases
Ebook Information security management handbook (Volume 7): Part 2
Ebook Information security management handbook (Volume 7): Part 2 includes the following content: Chapter 14 - managing the security testing process, chapter 15 - security and resilience in the software development life cycle, chapter 16 - cloud cryptography, chapter 17 - identity and access management architecture, chapter 18 - fedramp: entry or exit ramp for cloud security? chapter 19 - data storage and network security, chapter 20 -...
224 p actvn 21/07/2023 51 0
Từ khóa: Ebook Information security management handbook, Information security management, Managing the security testing process, Software development life cycle, Cloud cryptography
Ebook Information Storage and Management: Part 2
Ebook Information Storage and Management: Part 2 includes the following content: Chapter 11: Introduction to Business Continuity; Chapter 12: Backup and Recovery; Chapter 13: Local Replication; Chapter 14: Remote Replication; Chapter 15: Securing the Storage Infrastructure; Chapter 16: Managing the Storage Infrastructure; Appendix: Acronyms and Abbreviations.
230 p actvn 21/07/2023 52 0
Từ khóa: Information Storage and Management, Information Storage, Business Continuity, Local Replication, Securing the Storage Infrastructure, Managing the Storage Infrastructure
Ebook Information security management handbook (Sixth edition, Volume 6): Part 2
Ebook Information security management handbook (Sixth edition, Volume 6): Part 2 include of the following content: Domain 6 security architecture and design: principles of computer and network organizations, architectures, and designs; domain 7 operations security: operations controls; domain 8 business continuity and disaster recovery planning; domain 9 legal, regulations, compliance, and investigations: major categories of computer crime;...
231 p actvn 31/01/2023 71 0
Từ khóa: Information security management, Information security management handbook, Security architecture, Network organizations, Disaster recovery planning, Business continuity
Ebook Information storage and management: Storing, managing, and protecting digital information - Part 2 include of the following content: Chapter 11: Introduction to Business Continuity; Chapter 12: Backup and Recovery; Chapter 13: Local Replication; Chapter 14: Remote Replication; Chapter 15: Securing the Storage Infrastructure; Chapter 16: Managing the Storage Infrastructure; Appendix: Acronyms and Abbreviations.
230 p actvn 27/12/2022 46 0
Từ khóa: Information storage and management, Storage system, Information storage, Information management, Business continuity, Storage security
Ebook Introduction to Networking with Network +1: Part 2
Ebook Introduction to Networking with Network +1: Part 2 include of the following content: Lesson 7 LAN Technologies; Lesson 8 WAN Technologies; Lesson 9 Basic Network Security; Lesson 10 Network Access Security; Lesson 11 Network Management; Lesson 12 Network Troubleshooting.
303 p actvn 27/12/2022 31 0
Từ khóa: Networking with Network +1, LAN Technologies, WAN Technologies, Basic Network Security, Network Access Security, Network Management, Network Troubleshooting
Đăng nhập
Bộ sưu tập nổi bật
10 19594
Bộ sưu tập Kỹ thuật viễn thông
11 16531
Bộ sưu tập Tài liệu học tiếng Anh
14 82966
12 23566