- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook Privacy, security and trust within the context of pervasive computing
The goal of the workshop was not to focus on specific, even novel mechanisms, rather on the interfaces between mechanisms in different technical and social problem spaces. 21 people from different parts of the world took part in the one-day discussion, including PhD students, seasoned and junior researchers. This workshop promises to be a lasting experience and we encourage researchers to participate in future events. We hope that you will...
182 p actvn 26/03/2024 15 0
Từ khóa: Network security, Computer security, Information security, Pervasive computing, Mobile computing, Wireless networks
Ebook How to cheat at securing a wireless network: Part 1
Ebook How to cheat at securing a wireless network - Part 1 includes contents: Chapter 1: introduction to wireless: from past to present, chapter 2: wireless security, chapter 3: dangers of wireless devices in the workplace, chapter 4: WLAN rogue access point detection and mitigation, chapter 5: wireless LAN VLANs, chapter 6: designing a wireless network, chapter 7: wireless network architecture and design.
286 p actvn 26/03/2024 15 0
Từ khóa: Network security, Computer security, Information security, Wireless network, Wireless security, Dangers of wireless devices in the workplace, Wireless LAN VLANs
Ebook How to cheat at securing a wireless network: Part 2
Ebook How to cheat at securing a wireless network - Part 2 includes contents: Chapter 8: monitoring and intrusion detection, chapter 9: designing a wireless enterprise network: hospital case study, chapter 10: designing a wireless industrial network: retail case study, chapter 11: designing a wireless home network: home office case study, chapter 12: wireless penetration testing.
193 p actvn 26/03/2024 18 0
Từ khóa: Network security, Computer security, Information security, Wireless enterprise network, Wireless home network, Wireless industrial network, Wireless penetration testing
Ebook Unauthorised access: Physical penetration testing for IT security teams – Part 2
Ebook Unauthorised access: Physical penetration testing for IT security teams – Part 2 presents the following content: Chapter 7 hacking wireless equipment, chapter 8 gathering the right equipment, chapter 9 tales from the front line, chapter 10 introducing security policy concepts, chapter 11 counter intelligence, appendix A: UK Law, appendix B: US Law, appendix C: EU Law, appendix D: Security Clearances, appendix E: Security Accreditations.
167 p actvn 29/11/2023 21 0
Từ khóa: Ebook Unauthorised access, Unauthorised access, Physical penetration testing, IT security teams, Hacking wireless equipment, Gathering the right equipment
Ebook AAA and network security for mobile access: radius, diameter, EAP, PKI, and IP mobility
The book is geared towards people who have a basic understanding of Internet Protocol (IP) and TCP/IP stack layering concepts. Except for the above, most of the other IP-related concepts are explained in the text. Thus, the book is suitable for managers, engineers, researchers and students who are interested in the topic of network security and AAA but do not possess in-depth IP routing and security knowledge. We aimed at providing an overview...
318 p actvn 26/09/2023 57 0
Từ khóa: Wireless Internet, Security measures, Mobile computing, Wireless internet security measures, Mobile computing security, Network security for mobile access
Đăng nhập
Bộ sưu tập nổi bật
Bộ sưu tập Kỹ thuật viễn thông
11 16531
10 19592
12 23564
Bộ sưu tập Tài liệu học tiếng Anh
14 82964