- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook Managing Cisco network security: Part 1
Ebook Managing Cisco network security: Part 1 includes contents: Chapter 1 introduction to IP network security, chapter 2 traffic filtering on the Cisco IOS, chapter 3 network address translation (NAT), chapter 4 Cisco PIX Firewall, chapter 5 virtual private networks.
257 p actvn 26/03/2024 30 0
Từ khóa: Ebook Managing Cisco network security, Managing Cisco network security, Network security, Computer security, Information security, IP network security, The Cisco IOS
Ebook Managing risk and information security: Protect to enable - Part 1
Part 1 of ebook "Managing risk and information security: Protect to enable" provides readers with contents including: introduction; the misperception of risk; governance and internal partnerships: how to sense, interpret, and act on risk; external partnerships - the power of sharing information; people are the perimeter;...
106 p actvn 29/11/2023 22 0
Từ khóa: Managing risk and information security, Information security, The misperception of risk, External partnerships, Building credibility, Building internal partnerships, Corporate citizenship
Ebook Bluetooth security - Christian Gehrmann Joakim Persson, Ben Smeets
Ebook Bluetooth security presents the following content: Chapter 1 introduction; chapter 2 overview of the bluetooth security architecture; chapter 3 bluetooth pairing and key management; chapter 4 algorithms; chapter 5 broadcast encryption; chapter 6 security policies and access control; chapter 7 attacks, strengths, and weaknesses; chapter 8 providing anonymity; chapter 9 key management extensions; chapter 10 security for bluetooth...
222 p actvn 26/09/2023 53 0
Từ khóa: Bluetooth Security, Bluetooth security enhancements, Bluetooth Security Basics, The bluetooth security architecture, Broadcast encryption, Key management extensions
Ebook TCP/IP essentials: A lab-based approach - Part 2
Ebook TCP/IP essentials: A lab-based approach - Part 2 includes: TCP study, tulticast and realtime service; the web, DHCP, NTP and NAT; network management and security.
152 p actvn 21/07/2023 49 1
Từ khóa: TCP/IP essentials, TCP study, Tulticast and realtime service, Realtime service, The Web, Network management and security, Network management
Ebook Information security management handbook (Volume 7): Part 2
Ebook Information security management handbook (Volume 7): Part 2 includes the following content: Chapter 14 - managing the security testing process, chapter 15 - security and resilience in the software development life cycle, chapter 16 - cloud cryptography, chapter 17 - identity and access management architecture, chapter 18 - fedramp: entry or exit ramp for cloud security? chapter 19 - data storage and network security, chapter 20 -...
224 p actvn 21/07/2023 51 0
Từ khóa: Ebook Information security management handbook, Information security management, Managing the security testing process, Software development life cycle, Cloud cryptography
Ebook Information Storage and Management: Part 2
Ebook Information Storage and Management: Part 2 includes the following content: Chapter 11: Introduction to Business Continuity; Chapter 12: Backup and Recovery; Chapter 13: Local Replication; Chapter 14: Remote Replication; Chapter 15: Securing the Storage Infrastructure; Chapter 16: Managing the Storage Infrastructure; Appendix: Acronyms and Abbreviations.
230 p actvn 21/07/2023 52 0
Từ khóa: Information Storage and Management, Information Storage, Business Continuity, Local Replication, Securing the Storage Infrastructure, Managing the Storage Infrastructure
Ebook IT Governance: An international guide to data security and ISO27001-ISO27002 - Part 2
Ebook IT Governance: An international guide to data security and ISO27001-ISO27002 - Part 2 includes contents: Chapter 15 Physical and environmental security; Chapter 16 Equipment security; Chapter 17 Operations security; Chapter 18 Controls against malicious software (malware); Chapter 19 Communications management; Chapter 20 Exchanges of information; Chapter 21 System acquisition, development and maintenance; Chapter 22 Development and...
168 p actvn 21/07/2023 41 1
Từ khóa: Ebook IT Governance, IT Governance, Data security, Equipment security, Operations security, Information security incident management, The ISO27001 audit
Part 2 of book "Cloud application architectures: Building applications and Infrastructure in the Cloud" provide students with knowledge about: data security; network security; host security; disaster recovery planning; disasters in the cloud; disaster management; scaling a cloud infrastructure; capacity planning; amazon web services reference;...
94 p actvn 28/11/2022 55 0
Từ khóa: Cloud application architectures, Building applications, Infrastructure in the Cloud, Data security, Network security, Disaster recovery planning, Disaster management
Ebook Java security (2nd Edition)
"Ebook Java security, 2nd Edition" present covers the security model of Java 2, Version 1.3, which is significantly different from that of Java 1.1. It has extensive coverage of the two new important security APIs: JAAS (Java Authentication and Authorization Service) and JSSE (Java Secure Sockets Extension). Java Security, 2nd Edition, will give you a clear understanding of the architecture of Java's security model and how to use that model in...
486 p actvn 31/01/2022 96 0
Từ khóa: Key management, The security manager, Key management example, Java security, Comparison with previous releases
Ebook Network security illustrated: Phần 1
Security concepts are organized based on business needs, as opposed to tech-nological similarity. We’ve tried to focus on how these concepts relate in terms of practical business functionality. For example, network monitoring is discussed in Part 1, "Managing Security " rather than in a section on intrusion detection. For people with a technical background, this method of organization may seem strange. But one of our goals is to change the...
276 p actvn 21/04/2016 385 15
Từ khóa: Network security illustrated, Managing security, Outsourcing options, The other side of the coin, Determining identity, Preserving privacy
Đăng nhập
Bộ sưu tập nổi bật
Bộ sưu tập Kỹ thuật viễn thông
11 16531
12 23566
10 19594
Bộ sưu tập Tài liệu học tiếng Anh
14 82966