- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook The web application hackers handbook - Discovering and exploiting security flaws
Ebook "The web application hackers handbook - Discovering and exploiting security flaws" includes content: Web application (In)security, core defense mechanisms, web application technologies, mapping the application, bypassing client side controls, attacking authentication, attacking session management, attacking access controls, injecting code, exploiting path traversal,... and other contents.
771 p actvn 25/12/2023 17 0
Từ khóa: The web application hackers handbook, Security measures, Computer security, Core defense mechanisms, Web application technologies, Mapping the application
Ebook AAA and network security for mobile access: radius, diameter, EAP, PKI, and IP mobility
The book is geared towards people who have a basic understanding of Internet Protocol (IP) and TCP/IP stack layering concepts. Except for the above, most of the other IP-related concepts are explained in the text. Thus, the book is suitable for managers, engineers, researchers and students who are interested in the topic of network security and AAA but do not possess in-depth IP routing and security knowledge. We aimed at providing an overview...
318 p actvn 26/09/2023 56 0
Từ khóa: Wireless Internet, Security measures, Mobile computing, Wireless internet security measures, Mobile computing security, Network security for mobile access
Ebook Security for wireless ad-hoc networks
The objective of this book is to make the readers aware of the fundamentals of the area of security of wireless networks as well as the open problems. This will hopefully spur much more activity in this area in the upcoming years. This book provides a broad and comprehensive overview of the research that has been done to date on the security of wireless ad hoc networks and discusses the advantages and disadvantages of the various schemes that...
266 p actvn 26/09/2023 50 0
Từ khóa: Security for wireless ad-hoc networks, Wireless security, Wireless ad-hoc networks, Wireless LANs, Wireless LANs security measures
Ebook Computer security, privacy, and politics: Current issues, challenges and solutions
"Computer Security, Privacy, & Politics " offers a review of recent developments of computer security, focusing on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations.It compiles timely content on such topics as reverse engineering of software, understanding emerging computer exploits, emerging lawsuits and cases, global and societal implications, and protection from attacks on privacy.
333 p actvn 26/09/2023 57 0
Từ khóa: Computer security, Computer networks security measures, Computer networks, Computer security government polic, Reverse engineering of software
Ebook Cyber threat: How to manage the growing risk of cyber attacks
This book is an attempt to raise the level of awareness about the cyber threat and what to do about it. The cyber threat is a board of directors’ issue. Yet when some senior executives and board members hear the word “security” or “technology,” there’s a disconnect. They think it’s not their issue. Let the technology people deal with it. Let the security people deal with it. Although there is evidence that this perception is...
224 p actvn 26/09/2023 53 0
Từ khóa: Cyber threat, Computer security, Cyber attacks, The risk of cyber attacks, Corporations security measures, Business enterprises, Computer networks security measures
Ebook Hack proofing your wireless network - Protect your wireless network from attack: Part 2
Ebook Hack proofing your wireless network - Protect your wireless network from attack: Part 2 includes contents: Chapter 5 wireless security countermeasures, chapter 6 circumventing security measures, chapter 7 monitoring and intrusion detection, chapter 8 auditing, chapter 9 case scenarios, appendix: hack proofing your wireless network fast track.
246 p actvn 26/09/2023 33 0
Từ khóa: Hack proofing your wireless network, Wireless network, Wireless security, Wireless security countermeasures, Circumventing security measures, Intrusion detection
Ebook Implementing NAP and NAC security technologies: The complete guide to network access control includes contents: Chapter 1: Understanding terms and technologies, Chapter 2: The technical components of NAC/NAP solutions, Chapter 3: What are you trying to protect? Chapter 4: Understanding the need for LAN-based NAC/NAP, Chapter 5: Understanding the need for mobile NAC, Chapter 6: Understanding Cisco clean access, Chapter 7: Understanding...
291 p actvn 26/09/2023 31 0
Từ khóa: NAC security technologies, NAP security technologies, Network access control, Computer networks, Access control, Security measures, Computer network protocols
Ebook Security technologies for the world wide web (Second edition): Part 2
Ebook Security technologies for the world wide web (Second edition): Part 2 presents the following content: Chapter 9 Electronic payment systems, Chapter 10 Client- side security, Chapter 11 Server- side security, Chapter 12 Privacy protection, Chapter 13 Intellectual property, Chapter 14 Censorship on the WWW, Chapter 15 Risk management, Chapter 16 Conclusions and outlook.
168 p actvn 26/09/2023 26 0
Từ khóa: Security technologies, The world wide web, Computer security, Security measures, Electronic payment systems, Client- side security
Ebook Security technologies for the world wide web (Second edition): Part 1
Ebook Security technologies for the world wide web (Second edition): Part 1 presents the following content: Chapter 1 Introduction, Chapter 2 HTTP security, Chapter 3 Proxy servers and firewalls, Chapter 4 Cryptographic techniques, Chapter 5 Internet security protocols, Chapter 6 SSL and TLS protocols, Chapter 7 Certificate management, Chapter 8 Authentication and authorization.
273 p actvn 26/09/2023 29 0
Từ khóa: Security technologies, The world wide web, Computer security, Information retrieval system, Security measures, HTTP security, Proxy servers
Ebook Hacking: The art of exploitation – Part 1
The goal of the book "Hacking: The Art of Exploitation" is to share the art of hacking with everyone. Understanding hacking techniques is often difficult, since it requires both breadth and depth of knowledge. Many hacking texts seem esoteric and confusing because of just a few gaps in this prerequisite education. This second edition makes the world of hacking more accessible by providing the complete picture—from programming to machine code...
290 p actvn 22/07/2022 207 3
Từ khóa: Computer security, Computer hackers, Computer networks, Security measures, Hacking the art of exploitation, 0x200 Programming
Ebook Hacking: The art of exploitation – Part 2
Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity. Ebook Hacking: The art of...
198 p actvn 22/07/2022 175 2
Từ khóa: Computer security, Computer hackers, Computer networks, Security measures, Hacking the art of exploitation, 0x500 Shellcode
Lecture Security+ Certification: Chapter 3 (part 1) - Trung tâm Athena
Chapter 3 - Attacks and malicious code (part 1). After reading the material in this chapter, you should be able to: Explain denial-of-service (DoS) attacks, explain and discuss ping-of-death attacks, identify major components used in a DDoS attack and how they are installed, understand major types of spoofing attacks.
43 p actvn 24/02/2017 390 6
Từ khóa: Network security, Information security, Security terminology, Bảo mật mạng, Malicious code, SYN flood, Protective measures against smurf
Đăng nhập
Bộ sưu tập nổi bật
Bộ sưu tập Tài liệu học tiếng Anh
14 82962
12 23557
10 19585
Bộ sưu tập Kỹ thuật viễn thông
11 16522