- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook It governance - A managers guide to data security and ISO 2700/ISO 27002 (4th edition): Part 1
Part 1 book "It governance - A managers guide to data security" includes content: Why is information security necessary the combined code; the turnbull report and sarbanes–oxley; organizing information security; information security policy and scope; the risk assessment and statement of applicability; external parties; asset management; human resources security, physical and environmental security, equipment security, communications and...
205 p actvn 24/04/2024 1 0
Từ khóa: It governance, Data security, Computer security, Data protection, Business enterprises, Computer networks, Security measures, Organizing information security
Ebook It governance - A managers guide to data security and ISO 2700/ISO 27002 (4th edition): Part 2
Part 2 book "It governance - A managers guide to data security" includes content: Network security management and media handling, exchanges of information, electronic commerce services, E-mail and internet use, access control, network access control, operating system access control, application access control and teleworking, systems acquisition, development and maintenance,.... and other contents.
180 p actvn 24/04/2024 1 0
Từ khóa: It governance, Data security, Computer security, Data protection, Business enterprises, Computer networks, Security measures, Electronic commerce services
Ebook Securing VOIP networks: Threats, vulnerabilities, and countermeasures – Part 1
Ebook Securing VOIP networks: Threats, vulnerabilities, and countermeasures – Part 1 includes content: Chapter 1: Introduction; Chapter 2: VoIP Architectures and Protocols; Chapter 3: Threats and Attacks; Chapter 4: VoIP Vulnerabilities; Chapter 5: Signaling protection mechanisms.
241 p actvn 29/11/2023 18 0
Từ khóa: Ebook Securing VOIP networks, Securing VOIP networks, An toàn thông tin, VoIP Architectures, Signaling protection mechanisms, Threats and Attacks
Ebook Securing VOIP networks: Threats, vulnerabilities, and countermeasures – Part 2
Ebook Securing VOIP networks: Threats, vulnerabilities, and countermeasures – Part 1 includes content: Chapter 6: Media Protection Mechanisms; Chapter 7: Key Management Mechanisms; Chapter 8: VoIP and Network Security Controls; Chapter 9: A Security Framework for Enterprise VoIP Networks; Chapter 10: Provider Architectures and Security; Chapter 11: Enterprise Architectures and Security.
143 p actvn 29/11/2023 11 0
Từ khóa: Ebook Securing VOIP networks, Securing VOIP networks, An toàn thông tin, Media Protection Mechanisms, Key Management Mechanisms, Network Security Controls
Ebook Hacking: The art of exploitation
The goal of this book is to share the art of hacking with everyone. Understanding hacking techniques is often difficult, since it requires both breadth and depth of knowledge. Many hacking texts seem esotericand confusing because of just a few gaps in this prerequisite education. This second edition of Hacking: The Art of Exploitation makes the world of hacking more accessible by providing the complete picture—from programming to machine...
492 p actvn 27/02/2022 215 7
Từ khóa: Ebook Ethical Hacking, Guide Hacking Laws, Guide Google Hacking, Guide Ethical Hacking, Network security protection, Enumeration Module Objective
Lecture Security+ Certification: Chapter 3 (part 1) - Trung tâm Athena
Chapter 3 - Attacks and malicious code (part 1). After reading the material in this chapter, you should be able to: Explain denial-of-service (DoS) attacks, explain and discuss ping-of-death attacks, identify major components used in a DDoS attack and how they are installed, understand major types of spoofing attacks.
43 p actvn 24/02/2017 391 6
Từ khóa: Network security, Information security, Security terminology, Bảo mật mạng, Malicious code, SYN flood, Protective measures against smurf
Lecture Security+ Certification: Chapter 6 - Trung tâm Athena
Chapter 6 - Email and web security. The main contents of this chapter include all of the following: Protect e-mail systems, list World Wide Web vulnerabilities, secure web communications, secure instant messaging.
48 p actvn 24/02/2017 379 5
Từ khóa: Network security, Information security, Security terminology, Bảo mật mạng, Email security, Web security, Protect e-mail systems
Đăng nhập
Bộ sưu tập nổi bật
Bộ sưu tập Kỹ thuật viễn thông
11 16531
Bộ sưu tập Tài liệu học tiếng Anh
14 82964
10 19593
12 23564