- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook Managing Cisco network security: Part 1
Ebook Managing Cisco network security: Part 1 includes contents: Chapter 1 introduction to IP network security, chapter 2 traffic filtering on the Cisco IOS, chapter 3 network address translation (NAT), chapter 4 Cisco PIX Firewall, chapter 5 virtual private networks.
257 p actvn 26/03/2024 30 0
Từ khóa: Ebook Managing Cisco network security, Managing Cisco network security, Network security, Computer security, Information security, IP network security, The Cisco IOS
Ebook TCP/IP essentials: A lab-based approach - Part 2
Ebook TCP/IP essentials: A lab-based approach - Part 2 includes: TCP study, tulticast and realtime service; the web, DHCP, NTP and NAT; network management and security.
152 p actvn 21/07/2023 50 1
Từ khóa: TCP/IP essentials, TCP study, Tulticast and realtime service, Realtime service, The Web, Network management and security, Network management
Part 2 of book "Cloud application architectures: Building applications and Infrastructure in the Cloud" provide students with knowledge about: data security; network security; host security; disaster recovery planning; disasters in the cloud; disaster management; scaling a cloud infrastructure; capacity planning; amazon web services reference;...
94 p actvn 28/11/2022 55 0
Từ khóa: Cloud application architectures, Building applications, Infrastructure in the Cloud, Data security, Network security, Disaster recovery planning, Disaster management
Ebook Ethernet networks (4th edition): Part 2
Part 2 book "Ethernet networks" has contents: Bridging and switching methods and performance issues, routers, wireless ethernet, managing the network, the future of ethernet, security.
307 p actvn 31/01/2022 155 0
Từ khóa: Ethernet networks, Switching methods, Performance issues, Wireless ethernet, Managing the network, The future of ethernet
Ebook Network security illustrated: Phần 1
Security concepts are organized based on business needs, as opposed to tech-nological similarity. We’ve tried to focus on how these concepts relate in terms of practical business functionality. For example, network monitoring is discussed in Part 1, "Managing Security " rather than in a section on intrusion detection. For people with a technical background, this method of organization may seem strange. But one of our goals is to change the...
276 p actvn 21/04/2016 385 15
Từ khóa: Network security illustrated, Managing security, Outsourcing options, The other side of the coin, Determining identity, Preserving privacy
Đăng nhập
Bộ sưu tập nổi bật
Bộ sưu tập Tài liệu học tiếng Anh
14 83009
Bộ sưu tập Kỹ thuật viễn thông
11 16555
12 23590
10 19631