- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook Penetration tester’s: Open source toolkit (Volume 2) – Part 1
Ebook Penetration tester’s: Open source toolkit (Volume 2) – Part 1 includes contents: Chapter 1 reconnaissance, chapter 2 enumeration and scanning, chapter 3 hacking database services, chapter 4 web server and web application testing, chapter 5 wireless penetration testing using BackTrack 2.
342 p utm 22/04/2024 8 0
Từ khóa: Penetration tester’s, Open source toolkit, Network security, Computer security, Information security, Hacking database services, Hacking database services, BackTrack 2
Ebook Penetration tester’s: Open source toolkit (Volume 2) – Part 2
Ebook Penetration tester’s: Open source toolkit (Volume 2) – Part 2 includes contents: Chapter 6 network devices, chapter 7 customizing BackTrack 2, chapter 8 forensic discovery and analysis using backtrack, chapter 9 building penetration test labs.
246 p utm 22/04/2024 7 0
Từ khóa: Penetration tester’s, Open source toolkit, Network security, Computer security, Information security, Customizing BackTrack 2, Forensic discovery
Ebook Securing IM and P2P applications for the enterprise: Part 1
Ebook Securing IM and P2P applications for the enterprise: Part 1 includes contents: Chapter 1 Introduction to Instant Messaging; Chapter 2 AOL Instant Messenger (AIM); Chapter 3 Yahoo! Messenger; Chapter 4 MSN Messenger; Chapter 5 ICQ; Chapter 6 Trillian, Google Talk, and Web-based Clients; Chapter 7 Skype; Chapter 8 Introduction to P2P.
261 p utm 22/04/2024 8 0
Từ khóa: Securing IM, Securing IM and P2P applications, Network security, Computer security, Information security, AOL instant messenger, MSN messenger
Ebook Securing IM and P2P applications for the enterprise: Part 2
Ebook Securing IM and P2P applications for the enterprise: Part 2 includes contents: Chapter 9 Gnutella Architecture; Chapter 10 eDonkey and eMule; Chapter 11 BitTorrent; Chapter 12 FastTrack; Chapter 13 Internet Relay Chat—Major Players of IRC; Chapter 14 IRC Networks and Security; Chapter 15 Global IRC Security; Chapter 16 Common IRC Clients by OS.
218 p utm 22/04/2024 7 0
Từ khóa: Securing IM, Securing IM and P2P applications, Network security, Computer security, Information security, IRC Networks, Global IRC security
Ebook Web services security and e-business: Part 2
Ebook Web services security and e-business: Part 2 includes contents: Chapter X Verifiable encryption of digital signatures using elliptic curve digital signature algorithm and its implementation issues; Chapter XI An introductory study on business intelligence security; Chapter XII Secure trust transfer using chain signatures; Chapter XIII Distributed intrusion detection systems: An overview;…
210 p utm 23/09/2023 86 0
Từ khóa: Web services security, Computer networks, Security measures, Web services, Electronic commerce, Computer security, Verifiable encryption of digital signatures, Business intelligence security
Ebook Web services security and e-business: Part 1
Ebook Web services security and e-business: Part 1 includes contents: Chapter I Wireless LAN setup and security loopholes; Chapter II Wireless web security using a neural network-based cipher; Chapter III RFID systems: Applications vs. security and privacy implications; Chapter IV Mobile code and security issues; Chapter V A survey of key generation for secure multicast communication protocols;…
200 p utm 23/09/2023 88 0
Từ khóa: Web services security, Computer networks, Security measures, Web services, Electronic commerce, Computer security, Security loopholes, Wireless web security
Ebook Wireless network security: Part 1
Ebook Wireless network security: Part 1 includes contents: Chapter 1: High performance elliptic curve cryptographic co-processor; Chapter 2: An adaptive encryption protocol in mobile computing; Chapter 3: Pre-authentication and authentication models in ad hoc networks; Chapter 4: Promoting identity-based key management in wireless ad hoc networks; Chapter 5: A survey of attacks and countermeasures in mobile ad hoc networks; Chapter 6: Secure...
186 p utm 23/09/2023 80 0
Từ khóa: Ebook Wireless network security, Wireless network security, Cryptographic co-processor, Encryption protocol, Mobile computing, Authentication models in ad hoc networks
Ebook Cryptography and Network Security Principles and Practices: Part 2
The following will be discussed in Cryptography and Network Security Principles and Practices - Part 2: Authentication applications, Electronic mail security, IP security, web security, intruders, malicious software, firewalls, standards and standards-setting organizations, projects for teaching cryptography and network security,...
407 p utm 08/07/2022 99 0
Từ khóa: Computer network security, An toàn mạng máy tính, Bảo mật mạng máy tính, Authentication applications, Electronic mail security, IP Security
Ebook Game coding complete (Fourth Edition): Part 1
Part 1 of book "Game coding complete (Fourth Edition)" provide with knowledge about: what is game programming really like; what’s in a game; coding tidbits and style that saved me; building your game; game initialization and shutdown; game actors and component architecture; controlling the main loop; loading and caching game data; programming input devices;...
435 p utm 07/07/2022 93 0
Từ khóa: Game coding complete, Programming games, The computer game industry, Software Development Kits (SDKs), Operating system hell, Networked game architecture, Smart code design practices
Ebook Computer Networks (5th Edition): Part 1 - Andrew S.Tanenbaum
Part 1 of book "Computer Networks (5th Edition)" provide with knowledge about: uses of computer networks; network hardware; network software; the physical layer; the public switched telephone network; the theoretical basis for data communication; the theoretical basis for data communication; the medium access control sublayer; the network layer;...
518 p utm 07/07/2022 103 0
Từ khóa: Computer Networks, Network hardware, The physical layer, The public switched telephone network, The network layer, The theoretical basis for data communication
Ebook Computer Networks (5th Edition): Part 2 - Andrew S.Tanenbaum
Part 2 of book "Computer Networks (5th Edition)" provide with knowledge about: the network layer; the transport layer; network security; reading list and bibliography; authentication protocols; management of public keys; streaming audio and video; the internet transport protocols: TCP;...
444 p utm 07/07/2022 104 0
Từ khóa: Computer Networks, Network hardware, The transport layer, Network security, Authentication protocols, The internet transport protocols, TCP congestion control
Đăng nhập
Bộ sưu tập nổi bật