- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook Securing IM and P2P applications for the enterprise: Part 2
Ebook Securing IM and P2P applications for the enterprise: Part 2 includes contents: Chapter 9 Gnutella Architecture; Chapter 10 eDonkey and eMule; Chapter 11 BitTorrent; Chapter 12 FastTrack; Chapter 13 Internet Relay Chat—Major Players of IRC; Chapter 14 IRC Networks and Security; Chapter 15 Global IRC Security; Chapter 16 Common IRC Clients by OS.
218 p actvn 27/02/2024 9 0
Từ khóa: Securing IM, Securing IM and P2P applications, Network security, Computer security, Information security, IRC Networks, Global IRC security
Ebook How to cheat at VolP security
Ebook "How to cheat at VolP security" includes content: The hardware infrastructure, introduction to VolP security, architectures, support protocols, threats to VolP communications systems, confirm user identity, active security monitoring, logically segregate network traffic, IETF encryption solutions for VolP, skype security... and other contents.
433 p actvn 25/12/2023 34 0
Từ khóa: How to cheat at VolP security, Skype security, VolP security, Support protocols, VolP communications systems, Segregate network traffic, Active security monitoring
Ebook How to cheat at securing Linux - The perfect reference for the multitasked SysAdmin
Ebook "How to cheat at securing Linux - The perfect reference for the multitasked SysAdmin" includes content: Presenting the business case for open source software; hardening the operating system; enumeration and scanning your network, introducing intrusion detection and snort; installing and configuring snort and add ons; advanced snort deployment; network analysis, troubleshooting, and packet sniffing; basics of cryptography and encryption;...
430 p actvn 25/12/2023 31 0
Từ khóa: How to cheat at securing Linux, Perimeter security, Hardening the operating system, Network analysis, Linux bastion hosts, Advanced snort deployment
Ebook Securing VOIP networks: Threats, vulnerabilities, and countermeasures – Part 1
Ebook Securing VOIP networks: Threats, vulnerabilities, and countermeasures – Part 1 includes content: Chapter 1: Introduction; Chapter 2: VoIP Architectures and Protocols; Chapter 3: Threats and Attacks; Chapter 4: VoIP Vulnerabilities; Chapter 5: Signaling protection mechanisms.
241 p actvn 29/11/2023 19 0
Từ khóa: Ebook Securing VOIP networks, Securing VOIP networks, An toàn thông tin, VoIP Architectures, Signaling protection mechanisms, Threats and Attacks
Ebook Securing VOIP networks: Threats, vulnerabilities, and countermeasures – Part 2
Ebook Securing VOIP networks: Threats, vulnerabilities, and countermeasures – Part 1 includes content: Chapter 6: Media Protection Mechanisms; Chapter 7: Key Management Mechanisms; Chapter 8: VoIP and Network Security Controls; Chapter 9: A Security Framework for Enterprise VoIP Networks; Chapter 10: Provider Architectures and Security; Chapter 11: Enterprise Architectures and Security.
143 p actvn 29/11/2023 12 0
Từ khóa: Ebook Securing VOIP networks, Securing VOIP networks, An toàn thông tin, Media Protection Mechanisms, Key Management Mechanisms, Network Security Controls
Ebook AAA and network security for mobile access: radius, diameter, EAP, PKI, and IP mobility
The book is geared towards people who have a basic understanding of Internet Protocol (IP) and TCP/IP stack layering concepts. Except for the above, most of the other IP-related concepts are explained in the text. Thus, the book is suitable for managers, engineers, researchers and students who are interested in the topic of network security and AAA but do not possess in-depth IP routing and security knowledge. We aimed at providing an overview...
318 p actvn 26/09/2023 57 0
Từ khóa: Wireless Internet, Security measures, Mobile computing, Wireless internet security measures, Mobile computing security, Network security for mobile access
Ebook Security for wireless ad-hoc networks
The objective of this book is to make the readers aware of the fundamentals of the area of security of wireless networks as well as the open problems. This will hopefully spur much more activity in this area in the upcoming years. This book provides a broad and comprehensive overview of the research that has been done to date on the security of wireless ad hoc networks and discusses the advantages and disadvantages of the various schemes that...
266 p actvn 26/09/2023 51 0
Từ khóa: Security for wireless ad-hoc networks, Wireless security, Wireless ad-hoc networks, Wireless LANs, Wireless LANs security measures
Ebook Security in wireless LANs & MANs
This book discusses the security threats and requirements in wireless LANs and wireless MANs, with a discussion on what the original designs missed and how they were corrected in the new protocols. It highlights the features of the current wireless LAN and MAN security protocols and explains the caveats and discusses open issues. This book is divided into four parts. The first part discusses authentication technologies common to security in...
262 p actvn 26/09/2023 49 0
Từ khóa: Wireless LANs, Security in wireless LANs, Security in wireless MANs, Wireless communication systems, Metropolitan area networks, Computer networks
Ebook Bulletproof wireless security: GSM, UMTS, 802.11 and Ad Hoc security
"Bulletproof wireless security: GSM, UMTS, 802.11 and Ad Hoc security" presents the following content: Chapter 1: security and cryptography, chapter 2: network security protocols, chapter 3: security and the layered architecture, chapter 4: voice-oriented wireless networks, chapter 5: data-oriented wireless networks, chapter 6: security in traditional wireless networks, chapter 7: security in wireless local area networks, chapter 8: security...
273 p actvn 26/09/2023 54 0
Từ khóa: Ebook Bulletproof wireless security, Bulletproof wireless security, Ad Hoc security, Network security protocols, The layered architecture, Voice-oriented wireless networks
Ebook Computer security, privacy, and politics: Current issues, challenges and solutions
"Computer Security, Privacy, & Politics " offers a review of recent developments of computer security, focusing on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations.It compiles timely content on such topics as reverse engineering of software, understanding emerging computer exploits, emerging lawsuits and cases, global and societal implications, and protection from attacks on privacy.
333 p actvn 26/09/2023 58 0
Từ khóa: Computer security, Computer networks security measures, Computer networks, Computer security government polic, Reverse engineering of software
Ebook Cyber threat: How to manage the growing risk of cyber attacks
This book is an attempt to raise the level of awareness about the cyber threat and what to do about it. The cyber threat is a board of directors’ issue. Yet when some senior executives and board members hear the word “security” or “technology,” there’s a disconnect. They think it’s not their issue. Let the technology people deal with it. Let the security people deal with it. Although there is evidence that this perception is...
224 p actvn 26/09/2023 54 0
Từ khóa: Cyber threat, Computer security, Cyber attacks, The risk of cyber attacks, Corporations security measures, Business enterprises, Computer networks security measures
Ebook Hack proofing your wireless network - Protect your wireless network from attack: Part 1
Ebook Hack proofing your wireless network - Protect your wireless network from attack: Part 1 includes contents: Chapter 1 the wireless challenge, chapter 2 a security primer, chapter 3 wireless network architecture and design, chapter 4 common attacks and vulnerabilities.
267 p actvn 26/09/2023 40 0
Từ khóa: Hack proofing your wireless network, Wireless network, Wireless security, The wireless challenge, Security primer, Wireless network architecture
Đăng nhập
Bộ sưu tập nổi bật
10 19626
Bộ sưu tập Tài liệu học tiếng Anh
14 83004
Bộ sưu tập Kỹ thuật viễn thông
11 16547
12 23584