- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook Managing Cisco network security: Part 2
Ebook Managing Cisco network security: Part 1 includes contents: Chapter 6 Cisco authentication, authorization, and accounting mechanisms; chapter 7 intrusion detection; chapter 8 network security management; chapter 9 security processes and managing Cisco security fast track.
240 p actvn 26/03/2024 23 0
Từ khóa: Ebook Managing Cisco network security, Managing Cisco network security, Network security, Computer security, Information security, Network security management, Security processes
Lecture Cryptography and network security: Chapter 6
Lecture Cryptography and network security: Chapter 6 after studying this section will help you understand: To review a short history of DES; To define the basic structure of DES ; To describe the details of building elements of DES; To describe the round keys generation process;...
63 p actvn 26/03/2024 16 0
Từ khóa: Lecture Cryptography and network security, Cryptography and network security, Data Encryption Standard, Encryption process, General structure of DES, Reverse Cipher
Ebook Outsourcing information security (2004) - C. Warren Axelrod
Chapter 1 outsourcing and information security, chapter 2 information security risks, chapter 3 justifying outsourcing, chapter 4 risks of outsourcing, chapter 5 categorizing costs and benefits, chapter 6 costs and benefits throughout the evaluation process, chapter 7 the outsourcing evaluation process - customer and outsourcer requirements, chapter 8 outsourcing security security considerations outsourcing, chapter 9 summary of the...
277 p actvn 26/09/2023 50 0
Từ khóa: Ebook Outsourcing information security, Outsourcing information security, Information security risks, Categorizing costs, The outsourcing evaluation process, The outsourcing process
Ebook Handbook of database security - Applications & trends: Part 2
Ebook Handbook of database security - Applications & trends: Part 2 includes contents: Chapter 12 security re-engineering for databases: concepts and techniques; chapter 13 database watermarking for copyright protection; chapter 14 database watermarking: a systematic view; chapter 15 trustworthy records retention; chapter 16 damage quarantine and recovery in data processing systems; chapter 17 hippocratic databases: current capabilities and...
305 p actvn 26/09/2023 37 0
Từ khóa: Handbook of database security, Database security, Database watermarking for copyright protection, Trustworthy records retention, Hippocratic databases, Data processing systems
Ebook Wireless security handbook: Part 2
Ebook Wireless security handbook: Part 2 includes contents: Chapter 9 the wireless deployment process, chapter 10 wireless access points, chapter 11 wireless end devices, chapter 12 wireless lan security, chapter 13 breaking wireless security, chapter 14 wireless security policy, chapter 15 wireless security architectures, chapter 16 wireless tools, appendix a review question answers.
215 p actvn 26/09/2023 28 0
Từ khóa: Wireless security handbook, Wireless security, The wireless deployment process, Wireless access points, Wireless lan security, Wireless security policy
Ebook Information security management handbook (Volume 7): Part 2
Ebook Information security management handbook (Volume 7): Part 2 includes the following content: Chapter 14 - managing the security testing process, chapter 15 - security and resilience in the software development life cycle, chapter 16 - cloud cryptography, chapter 17 - identity and access management architecture, chapter 18 - fedramp: entry or exit ramp for cloud security? chapter 19 - data storage and network security, chapter 20 -...
224 p actvn 21/07/2023 51 0
Từ khóa: Ebook Information security management handbook, Information security management, Managing the security testing process, Software development life cycle, Cloud cryptography
Đăng nhập
Bộ sưu tập nổi bật
12 23564
Bộ sưu tập Tài liệu học tiếng Anh
14 82965
Bộ sưu tập Kỹ thuật viễn thông
11 16531
10 19594