- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook The web application hackers handbook - Discovering and exploiting security flaws
Ebook "The web application hackers handbook - Discovering and exploiting security flaws" includes content: Web application (In)security, core defense mechanisms, web application technologies, mapping the application, bypassing client side controls, attacking authentication, attacking session management, attacking access controls, injecting code, exploiting path traversal,... and other contents.
771 p actvn 25/12/2023 17 0
Từ khóa: The web application hackers handbook, Security measures, Computer security, Core defense mechanisms, Web application technologies, Mapping the application
Part 1 of ebook "Platform embedded security technology revealed: Safeguarding the future of computing with Intel embedded security and management engine" provides readers with contents including: cyber security in the mobile age; intel’s embedded solutions: from management to security; building blocks of the security and management engine; the engine - safeguarding itself before safeguarding others;...
120 p actvn 29/11/2023 27 0
Từ khóa: Platform embedded security technology revealed, Embedded-system engineers, Cyber security, The mobile age, Intel’s embedded solutions, Security development lifecycle, Virtual security core
Continued part 1, part 2 of ebook "Platform embedded security technology revealed: Safeguarding the future of computing with Intel embedded security and management engine" provides readers with contents including: privacy at the next level: intel’s enhanced privacy identification (EPID) technology; boot with integrity, or don’t boot; trust computing, backed by the intel platform trust technology; unleashing premium entertainment with...
143 p actvn 29/11/2023 25 0
Từ khóa: Platform embedded security technology revealed, Embedded-system engineers, Intel’s enhanced privacy identification, Intel platform trust technology, Processor serial number, Trusted platform module
Ebook Implementing NAP and NAC security technologies: The complete guide to network access control includes contents: Chapter 1: Understanding terms and technologies, Chapter 2: The technical components of NAC/NAP solutions, Chapter 3: What are you trying to protect? Chapter 4: Understanding the need for LAN-based NAC/NAP, Chapter 5: Understanding the need for mobile NAC, Chapter 6: Understanding Cisco clean access, Chapter 7: Understanding...
291 p actvn 26/09/2023 31 0
Từ khóa: NAC security technologies, NAP security technologies, Network access control, Computer networks, Access control, Security measures, Computer network protocols
Ebook Security technologies for the world wide web (Second edition): Part 2
Ebook Security technologies for the world wide web (Second edition): Part 2 presents the following content: Chapter 9 Electronic payment systems, Chapter 10 Client- side security, Chapter 11 Server- side security, Chapter 12 Privacy protection, Chapter 13 Intellectual property, Chapter 14 Censorship on the WWW, Chapter 15 Risk management, Chapter 16 Conclusions and outlook.
168 p actvn 26/09/2023 26 0
Từ khóa: Security technologies, The world wide web, Computer security, Security measures, Electronic payment systems, Client- side security
Ebook Security technologies for the world wide web (Second edition): Part 1
Ebook Security technologies for the world wide web (Second edition): Part 1 presents the following content: Chapter 1 Introduction, Chapter 2 HTTP security, Chapter 3 Proxy servers and firewalls, Chapter 4 Cryptographic techniques, Chapter 5 Internet security protocols, Chapter 6 SSL and TLS protocols, Chapter 7 Certificate management, Chapter 8 Authentication and authorization.
273 p actvn 26/09/2023 29 0
Từ khóa: Security technologies, The world wide web, Computer security, Information retrieval system, Security measures, HTTP security, Proxy servers
Ebook Wireless security handbook: Part 1
Ebook Wireless security handbook: Part 1 includes contents: Chapter 1 wireless network overview, chapter 2 risks and threats of wireless, chapter 3 the legality of computer crime, chapter 4 wireless physical layer technologies, chapter 5 wireless management frames, chapter 6 wireless local and personal area networks, chapter 7 wide area wireless technologies, chapter 8 wireless antenna theory.
138 p actvn 26/09/2023 27 0
Từ khóa: Wireless security handbook, Wireless security, Wireless network, The legality of computer crime, Wireless physical layer technologies, Personal area networks
Ebook Introduction to Networking with Network+: Part 2
Ebook Introduction to Networking with Network+: Part 2 includes the following content: Lesson 7 LAN Technologies, Lesson 8 WAN Technologies, Lesson 9 Basic Network Security, Lesson 10 Network Access Security, Lesson 11 Network Management, Lesson 12 Network Troubleshooting.
303 p actvn 21/07/2023 27 0
Từ khóa: Introduction to Networking, Introduction to Networking with Network, WAN Technologies, LAN Technologies, Network Security, Network Access Security
Ebook Introduction to Networking with Network +1: Part 2
Ebook Introduction to Networking with Network +1: Part 2 include of the following content: Lesson 7 LAN Technologies; Lesson 8 WAN Technologies; Lesson 9 Basic Network Security; Lesson 10 Network Access Security; Lesson 11 Network Management; Lesson 12 Network Troubleshooting.
303 p actvn 27/12/2022 30 0
Từ khóa: Networking with Network +1, LAN Technologies, WAN Technologies, Basic Network Security, Network Access Security, Network Management, Network Troubleshooting
Ebook Oxford English for Information technology (Second edition): Part 2
Ebook Oxford English for Information technology (Second edition): Part 2 has present the contents: communications systems, computing support, data security 1, data security 2, softwware engineering, people in computing, recent developments in IT, the future of IT, planning group presentation, defending a decision;...
118 p actvn 27/02/2022 98 0
Từ khóa: Oxford English for Information technology, Information technology, Communications systems, Computing support, Softwware engineering, Data security
Ebook Network security technologies (Second edition) - Kwok T. Fung
Ebook "Network security technologies" presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. This text is unique in that it classifies technologies as basic, enhanced, integrated, and architectural as a means of associating their functional complexities, providing added insight into their...
267 p actvn 31/08/2017 661 20
Từ khóa: Network security technologies, Ebook Network security technologies, Security in network design, Basic confidentiality technologies, Basic authentication technologies, Basic message integrity technologies
Ebook Network security hacks (2nd edition)
This second edition of Network security hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for...
480 p actvn 31/08/2017 750 46
Từ khóa: Network security hacks, Ebook Network security hacks, Network security technologies, Unix host security, Windows host security, Wireless Security
Đăng nhập
Bộ sưu tập nổi bật
Bộ sưu tập Kỹ thuật viễn thông
11 16522
10 19585
12 23557
Bộ sưu tập Tài liệu học tiếng Anh
14 82962