- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook Internet security - Cryptographic principles algorithms protocols: Part 2
Part 2 book "Internet security - Cryptographic principles algorithms protocols" includes content: Public-key infrastructure; network layer security; transport layer security - SSLv3 and TLSv1; electronic mail security - PGP, S/MIME; internet firewalls for trusted systems, SET for E-commerce transactions.
205 p actvn 24/04/2024 1 0
Từ khóa: Internet security, Cryptographic principles algorithms protocols, Public-key infrastructure, Network layer security, Transport layer security, Internet firewalls
Ebook Bulletproof wireless security: GSM, UMTS, 802.11 and Ad Hoc security
"Bulletproof wireless security: GSM, UMTS, 802.11 and Ad Hoc security" presents the following content: Chapter 1: security and cryptography, chapter 2: network security protocols, chapter 3: security and the layered architecture, chapter 4: voice-oriented wireless networks, chapter 5: data-oriented wireless networks, chapter 6: security in traditional wireless networks, chapter 7: security in wireless local area networks, chapter 8: security...
273 p actvn 26/09/2023 54 0
Từ khóa: Ebook Bulletproof wireless security, Bulletproof wireless security, Ad Hoc security, Network security protocols, The layered architecture, Voice-oriented wireless networks
Ebook Hack the stack - Using snort and ethereal to master the 8 layers of an insecure network: Part 1 includes contents: Chapter 1 Extending OSI to network security, Chapter 2 Layer 1: The physical layer, Chapter 3 Layer 2: The data link layer, Chapter 4 Layer 3: The network layer, Chapter 5 Layer 4: The transport layer.
230 p actvn 26/09/2023 35 0
Từ khóa: Hack the stack, Insecure network, Network security, The physical layer, The data link layer, The network layer
Ebook Hack the stack - Using snort and ethereal to master the 8 layers of an insecure network Part 2 includes contents: Chapter 6 Layer 5: The session layer, Chapter 7 Layer 6: The presentation layer, Chapter 8 Layer 7: The application layer, Chapter 9 Layer 8: The people layer, Appendix A Risk mitigation: Securing the stack.
238 p actvn 26/09/2023 38 0
Từ khóa: Hack the stack, Insecure network, Network security, The session layer, The presentation layer, The application layer
Ebook Wireless security handbook: Part 1
Ebook Wireless security handbook: Part 1 includes contents: Chapter 1 wireless network overview, chapter 2 risks and threats of wireless, chapter 3 the legality of computer crime, chapter 4 wireless physical layer technologies, chapter 5 wireless management frames, chapter 6 wireless local and personal area networks, chapter 7 wide area wireless technologies, chapter 8 wireless antenna theory.
138 p actvn 26/09/2023 28 0
Từ khóa: Wireless security handbook, Wireless security, Wireless network, The legality of computer crime, Wireless physical layer technologies, Personal area networks
Ebook Computer Networks (5th Edition): Part 2 - Andrew S.Tanenbaum
Part 2 of book "Computer Networks (5th Edition)" provide with knowledge about: the network layer; the transport layer; network security; reading list and bibliography; authentication protocols; management of public keys; streaming audio and video; the internet transport protocols: TCP;...
444 p actvn 22/07/2022 88 0
Từ khóa: Computer Networks, Network hardware, The transport layer, Network security, Authentication protocols, The internet transport protocols, TCP congestion control
Đăng nhập
Bộ sưu tập nổi bật
Bộ sưu tập Kỹ thuật viễn thông
11 16531
10 19594
Bộ sưu tập Tài liệu học tiếng Anh
14 82966
12 23566