- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook Computer security - Principles and practice (3/E): Part 2
Part 2 book "Computer security - Principles and practice" includes content: Operating system security, human resources security, security auditing, legal and ethical aspects, internet security protocols and standards, symmetric encryption and message confidentiality, trusted computing and multilevel security, it security management and risk assessment, physical and infrastructure security, it security controls, plans, and procedures,... and...
402 p actvn 24/04/2024 1 0
Từ khóa: Computer security, Operating system security, Human resources security, Security auditing, Risk assessment, Infrastructure security
Ebook Computer security - Principles and practice (3/E): Part 1
Part 1 book "Computer security - Principles and practice" includes content: Reader’s and instructor’s guide, overview, cryptographic tools, user authentication, access control, database and cloud security, malicious software, denial of service attacks, intrusion detection, firewalls and intrusion prevention systems, buffer overflow, software security.
436 p actvn 24/04/2024 1 0
Từ khóa: Computer security, Instructor’s guide, Intrusion prevention systems, Malicious software, Denial of service attacks, Intrusion detection, Cryptographic tools
Lecture Cryptography and network security: Chapter 10
Lecture Cryptography and network security: Chapter 10 after studying this section will help you understand: To distinguish between two cryptosystems: symmetric-key and asymmetric-key; To introduce trapdoor one-way functions and their use in asymmetric-key cryptosystems; To introduce the knapsack cryptosystem as one of the first ideas in asymmetric-key cryptography;...
59 p actvn 26/03/2024 9 0
Từ khóa: Lecture Cryptography and network security, Cryptography and network security, Symmetric-Key Cryptography, Knapsack Cryptosystem, Trapdoor One-Way Function, Security of the Rabin System
Ebook Incident response: Computer forensics toolkit – Part 2
Ebook Incident response: Computer forensics toolkit – Part 2 includes contents: Chapter 8: incident containment and eradication of vulnerabilities; chapter 9: disaster recovery and follow-up; chapter 10: responding to different types of incidents; chapter 11: assessing system security to prevent further attacks; chapter 12: pulling it all together; appendix a: what's on the CD-ROM; appendix b: commonly attacked ports; appendix c: field...
184 p actvn 26/01/2024 22 0
Từ khóa: Incident response, Computer forensics toolkit, Computer graphics, Incident containment, Disaster recovery, Assessing system security
Ebook How to cheat at VolP security
Ebook "How to cheat at VolP security" includes content: The hardware infrastructure, introduction to VolP security, architectures, support protocols, threats to VolP communications systems, confirm user identity, active security monitoring, logically segregate network traffic, IETF encryption solutions for VolP, skype security... and other contents.
433 p actvn 25/12/2023 34 0
Từ khóa: How to cheat at VolP security, Skype security, VolP security, Support protocols, VolP communications systems, Segregate network traffic, Active security monitoring
Ebook How to cheat at securing Linux - The perfect reference for the multitasked SysAdmin
Ebook "How to cheat at securing Linux - The perfect reference for the multitasked SysAdmin" includes content: Presenting the business case for open source software; hardening the operating system; enumeration and scanning your network, introducing intrusion detection and snort; installing and configuring snort and add ons; advanced snort deployment; network analysis, troubleshooting, and packet sniffing; basics of cryptography and encryption;...
430 p actvn 25/12/2023 31 0
Từ khóa: How to cheat at securing Linux, Perimeter security, Hardening the operating system, Network analysis, Linux bastion hosts, Advanced snort deployment
Part 1 of ebook "Building secure and reliable systems: Best practices for designing, implementing, and maintaining systems" provides readers with contents including: introductory material; designing systems; the intersection of security and reliability; understanding adversaries; design tradeoffs; design for least privilege; mitigating denial-of-service attacks;...
266 p actvn 29/11/2023 27 0
Từ khóa: Building secure and reliable systems, Building reliable systems, Maintaining systems, Reliability versus security, Risk assessment considerations, Design tradeoffs, Designing understandable systems
Continued part 1, part 2 of ebook "Building secure and reliable systems: Best practices for designing, implementing, and maintaining systems" provides readers with contents including: implementing systems; maintaining systems; organization and culture; a disaster risk assessment matrix; investigating systems; recovery and aftermath; understanding roles and responsibilities; building a culture of security and reliability;...
291 p actvn 29/11/2023 24 0
Từ khóa: Building secure and reliable systems, Building reliable systems, Maintaining systems, Disaster risk assessment matrix, Investigating systems, Chrome security team
Part 1 of ebook "Platform embedded security technology revealed: Safeguarding the future of computing with Intel embedded security and management engine" provides readers with contents including: cyber security in the mobile age; intel’s embedded solutions: from management to security; building blocks of the security and management engine; the engine - safeguarding itself before safeguarding others;...
120 p actvn 29/11/2023 28 0
Từ khóa: Platform embedded security technology revealed, Embedded-system engineers, Cyber security, The mobile age, Intel’s embedded solutions, Security development lifecycle, Virtual security core
Continued part 1, part 2 of ebook "Platform embedded security technology revealed: Safeguarding the future of computing with Intel embedded security and management engine" provides readers with contents including: privacy at the next level: intel’s enhanced privacy identification (EPID) technology; boot with integrity, or don’t boot; trust computing, backed by the intel platform trust technology; unleashing premium entertainment with...
143 p actvn 29/11/2023 26 0
Từ khóa: Platform embedded security technology revealed, Embedded-system engineers, Intel’s enhanced privacy identification, Intel platform trust technology, Processor serial number, Trusted platform module
Ebook Security in wireless LANs & MANs
This book discusses the security threats and requirements in wireless LANs and wireless MANs, with a discussion on what the original designs missed and how they were corrected in the new protocols. It highlights the features of the current wireless LAN and MAN security protocols and explains the caveats and discusses open issues. This book is divided into four parts. The first part discusses authentication technologies common to security in...
262 p actvn 26/09/2023 48 0
Từ khóa: Wireless LANs, Security in wireless LANs, Security in wireless MANs, Wireless communication systems, Metropolitan area networks, Computer networks
Đăng nhập
Bộ sưu tập nổi bật
10 19594
Bộ sưu tập Tài liệu học tiếng Anh
14 82966
12 23566
Bộ sưu tập Kỹ thuật viễn thông
11 16531