• Ebook Network security assessment: From vulnerability to patch – Part 2

    Ebook Network security assessment: From vulnerability to patch – Part 2

    Ebook Network security assessment: From vulnerability to patch – Part 2 includes contents: Chapter 7: vulnerability management; chapter 8: vulnerability management tools; chapter 9: vulnerability and configuration management; chapter 10: regulatory compliance; chapter 11: tying it all together; appendix a: legal principles for information security evaluations; appendix b: examples of INFOSEC tools by baseline activity.

     227 p TaiLieuvn 31/03/2024 1 0

  • Ebook Network security assessment: From vulnerability to patch – Part 1

    Ebook Network security assessment: From vulnerability to patch – Part 1

    Ebook Network security assessment: From vulnerability to patch – Part 1 includes contents: Chapter 1: windows of vulnerability; chapter 2: vulnerability assessment 101; chapter 3: vulnerability assessment tools; chapter 4: vulnerability assessment: step one; chapter 5: vulnerability assessment: step two; chapter 6: going further.

     171 p TaiLieuvn 31/03/2024 0 0

  • Ebook Network performance and security: Testing and analyzing using open source and low-cost tools

    Ebook Network performance and security: Testing and analyzing using open source and low-cost tools

    Ebook Network performance and security: Testing and analyzing using open source and low-cost tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best...

     362 p TaiLieuvn 31/03/2024 0 0

  • Ebook Multicast group security: Part 2

    Ebook Multicast group security: Part 2

    Ebook Multicast group security Part 1 includes contents: Chapter 6 group key management algorithms, chapter 7 group security policy, chapter 8 securing multicast routing protocols, chapter 9 security in reliable multicast protocols, chapter 10 applications of multicast and their security, chapter 11 conclusion and future work.

     179 p TaiLieuvn 31/03/2024 0 0

  • Ebook Multicast group security: Part 1

    Ebook Multicast group security: Part 1

    Ebook Multicast group security Part 1 includes contents: Chapter 1 introduction, chapter 2 framework for multicast and group security, chapter 3 multicast data authentication, chapter 4 introduction to group key management, chapter 5 architectures and protocols for group key management.

     151 p TaiLieuvn 31/03/2024 0 0

  • Ebook Mobile wireless network security privacy: Part 2

    Ebook Mobile wireless network security privacy: Part 2

    Ebook Mobile wireless network security privacy Part 2 includes contents: Chapter 6 on performance cost of on-demand anonymous routing protocols in mobile ad hoc networks; chapter 7 computer ecology: responding to mobile worms with location-based quarantine boundaries; chapter 8 approaches for ensuring security and privacy in unplanned ubiquitous computing interactions; chapter 9 an anonymous MAC protocol for wireless ad-hoc networks; chapter...

     103 p TaiLieuvn 31/03/2024 0 0

  • Ebook Mobile wireless network security privacy: Part 1

    Ebook Mobile wireless network security privacy: Part 1

    Ebook Mobile wireless network security privacy Part 1 includes contents: Chapter 1 research directions in security and privacy for mobile and wireless networks; chapter 2 pervasive systems: enhancing trust negotiation with privacy support; chapter 3 applying trust in mobile and wireless networks; chapter 4 a framework for computing trust in mobile ad-hoc networks; chapter 5 the concept of opportunistic networks and their research challenges in...

     129 p TaiLieuvn 31/03/2024 0 0

  • Ebook Mission critical internet security: Part 2

    Ebook Mission critical internet security: Part 2

    Ebook Mission critical internet security: Part 2 includes contents: Chapter 6 Microsoft RAS and VPN for Windows 2000, Chapter 7 securing your network with Microsoft Proxy Server 2.0, Chapter 8 traffic filtering on Cisco IOS, Chapter 9 configuring and securing the Cisco PIX Firewall, Chapter 10 axent technologies raptor firewall 6.5, Chapter 11 check point software’s check point firewall-1.

     320 p TaiLieuvn 31/03/2024 0 0

  • Ebook Mission critical internet security: Part 1

    Ebook Mission critical internet security: Part 1

    Ebook Mission critical internet security: Part 1 includes contents: Chapter 1 securing your internetwork, Chapter 2 internetwork security concepts, Chapter 3 IPSec, Chapter 4 internet security applications, Chapter 5 attacks that await your network.

     209 p TaiLieuvn 31/03/2024 0 0

  • Ebook Maximum linux security (2nd edition): Part 2

    Ebook Maximum linux security (2nd edition): Part 2

    Ebook Maximum linux security (2nd edition): Part 2 includes contents: Chapter 11 FTP security, chapter 12 mail security, chapter 13 TELNET and SSH security, chapter 14 web server security, chapter 15 secure web protocols, chapter 16 secure web development, chapter 17 file sharing security, chapter 18 denial-of-service attacks, chapter 19 Linux and firewalls, chapter 20 intrusion detection, chapter 21 logs and audit trails, chapter 22 disaster...

     528 p TaiLieuvn 31/03/2024 0 0

  • Ebook Maximum linux security (2nd edition): Part 1

    Ebook Maximum linux security (2nd edition): Part 1

    Ebook Maximum linux security (2nd edition): Part 1 includes contents: Chapter 1 introducing Linux security, chapter 2 physical security, chapter 3 installation issues, chapter 4 basic Linux system administration, chapter 5 password attacks, chapter 6 data attacks, chapter 7 malicious code, chapter 8 sniffers and electronic eavesdropping, chapter 9 scanners, chapter 10 spoofing.

     367 p TaiLieuvn 31/03/2024 0 0

  • Ebook The SSCP prep guide: Mastering the seven key areas of system security - Part 2

    Ebook The SSCP prep guide: Mastering the seven key areas of system security - Part 2

    Ebook The SSCP prep guide: Mastering the seven key areas of system security - Part 2 includes contents: Chapter 5 domain 4: risk, response, and recovery; chapter 6 domain 5: cryptography; chapter 7 domain 6: data communications; chapter 8 domain 7: malicious code; appendix a glossary; appendix b testing tools; appendix c references for further study; appendix d answers to sample questions.

     296 p TaiLieuvn 31/03/2024 0 0

Hướng dẫn khai thác thư viện số

Bộ sưu tập nổi bật