- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook Penetration tester’s: Open source toolkit (Volume 2) – Part 1
Ebook Penetration tester’s: Open source toolkit (Volume 2) – Part 1 includes contents: Chapter 1 reconnaissance, chapter 2 enumeration and scanning, chapter 3 hacking database services, chapter 4 web server and web application testing, chapter 5 wireless penetration testing using BackTrack 2.
342 p utm 22/04/2024 12 0
Từ khóa: Penetration tester’s, Open source toolkit, Network security, Computer security, Information security, Hacking database services, Hacking database services, BackTrack 2
Ebook Penetration tester’s: Open source toolkit (Volume 2) – Part 2
Ebook Penetration tester’s: Open source toolkit (Volume 2) – Part 2 includes contents: Chapter 6 network devices, chapter 7 customizing BackTrack 2, chapter 8 forensic discovery and analysis using backtrack, chapter 9 building penetration test labs.
246 p utm 22/04/2024 11 0
Từ khóa: Penetration tester’s, Open source toolkit, Network security, Computer security, Information security, Customizing BackTrack 2, Forensic discovery
Ebook Securing IM and P2P applications for the enterprise: Part 1
Ebook Securing IM and P2P applications for the enterprise: Part 1 includes contents: Chapter 1 Introduction to Instant Messaging; Chapter 2 AOL Instant Messenger (AIM); Chapter 3 Yahoo! Messenger; Chapter 4 MSN Messenger; Chapter 5 ICQ; Chapter 6 Trillian, Google Talk, and Web-based Clients; Chapter 7 Skype; Chapter 8 Introduction to P2P.
261 p utm 22/04/2024 12 0
Từ khóa: Securing IM, Securing IM and P2P applications, Network security, Computer security, Information security, AOL instant messenger, MSN messenger
Ebook Securing IM and P2P applications for the enterprise: Part 2
Ebook Securing IM and P2P applications for the enterprise: Part 2 includes contents: Chapter 9 Gnutella Architecture; Chapter 10 eDonkey and eMule; Chapter 11 BitTorrent; Chapter 12 FastTrack; Chapter 13 Internet Relay Chat—Major Players of IRC; Chapter 14 IRC Networks and Security; Chapter 15 Global IRC Security; Chapter 16 Common IRC Clients by OS.
218 p utm 22/04/2024 10 0
Từ khóa: Securing IM, Securing IM and P2P applications, Network security, Computer security, Information security, IRC Networks, Global IRC security
Ebook The practice of system and network administration (Second edition): Part 1
Ebook The practice of system and network administration (Second edition): Part 1 includes content: Chapter 1 what to do when, chapter 2 climb out of the hole, chapter 3 workstations, chapter 4 servers, chapter 5 services, chapter 6 data centers, chapter 7 networks, chapter 8 namespaces, chapter 9 documentation, chapter 10 disaster recovery and data integrity, chapter 11 security policy, chapter 12 ethics, chapter 13 helpdesks, chapter 14...
561 p utm 23/03/2024 17 1
Từ khóa: Network administration, Foundation elements, Change processes, Disaster recovery, Data integrity, Security policy, Change management
Ebook Web services security and e-business: Part 2
Ebook Web services security and e-business: Part 2 includes contents: Chapter X Verifiable encryption of digital signatures using elliptic curve digital signature algorithm and its implementation issues; Chapter XI An introductory study on business intelligence security; Chapter XII Secure trust transfer using chain signatures; Chapter XIII Distributed intrusion detection systems: An overview;…
210 p utm 23/09/2023 86 0
Từ khóa: Web services security, Computer networks, Security measures, Web services, Electronic commerce, Computer security, Verifiable encryption of digital signatures, Business intelligence security
Ebook Web services security and e-business: Part 1
Ebook Web services security and e-business: Part 1 includes contents: Chapter I Wireless LAN setup and security loopholes; Chapter II Wireless web security using a neural network-based cipher; Chapter III RFID systems: Applications vs. security and privacy implications; Chapter IV Mobile code and security issues; Chapter V A survey of key generation for secure multicast communication protocols;…
200 p utm 23/09/2023 89 0
Từ khóa: Web services security, Computer networks, Security measures, Web services, Electronic commerce, Computer security, Security loopholes, Wireless web security
Ebook Wireless network security: Part 2
Ebook Wireless network security: Part 2 includes contents: Chapter 8: Intrusion detection in cellular mobile networks; Chapter 9: The spread of epidemics on smartphones; Chapter 10: Cross-domain mobility-adaptive authentication; Chapter 11: AAA architecture and authentication for wireless LAN roaming; Chapter 12: An experimental study on security protocols in WLANs; Chapter 13: Security issues in wireless sensor networks used in clinical...
236 p utm 23/09/2023 82 0
Từ khóa: Ebook Wireless network security, Wireless network security, Cellular mobile networks, Cross-domain mobility-adaptive authentication, AAA architecture, Security protocols in WLANs
Ebook Wireless network security: Part 1
Ebook Wireless network security: Part 1 includes contents: Chapter 1: High performance elliptic curve cryptographic co-processor; Chapter 2: An adaptive encryption protocol in mobile computing; Chapter 3: Pre-authentication and authentication models in ad hoc networks; Chapter 4: Promoting identity-based key management in wireless ad hoc networks; Chapter 5: A survey of attacks and countermeasures in mobile ad hoc networks; Chapter 6: Secure...
186 p utm 23/09/2023 80 0
Từ khóa: Ebook Wireless network security, Wireless network security, Cryptographic co-processor, Encryption protocol, Mobile computing, Authentication models in ad hoc networks
Ebook Cryptography and Network Security Principles and Practices: Part 1
The following will be discussed in Cryptography and Network Security Principles and Practices - Part 1: Introduction, classical encryption techniques, block ciphers and the data encryption standard, finite fields, advanced encryption standard, more on symmetric ciphers, confidentiality using symmetric encryption, introduction to number theory, public-key cryptography and RSA, key management - other public-key cryptosystems, message...
576 p utm 08/07/2022 364 0
Từ khóa: Network security, Network Security Principles, An toàn mạng máy tính, Bảo mật mạng máy tính, Network security principles and practices, Data encryption standard
Ebook Cryptography and Network Security Principles and Practices: Part 2
The following will be discussed in Cryptography and Network Security Principles and Practices - Part 2: Authentication applications, Electronic mail security, IP security, web security, intruders, malicious software, firewalls, standards and standards-setting organizations, projects for teaching cryptography and network security,...
407 p utm 08/07/2022 102 0
Từ khóa: Computer network security, An toàn mạng máy tính, Bảo mật mạng máy tính, Authentication applications, Electronic mail security, IP Security
Ebook Computer Networks (5th Edition): Part 2 - Andrew S.Tanenbaum
Part 2 of book "Computer Networks (5th Edition)" provide with knowledge about: the network layer; the transport layer; network security; reading list and bibliography; authentication protocols; management of public keys; streaming audio and video; the internet transport protocols: TCP;...
444 p utm 07/07/2022 117 0
Từ khóa: Computer Networks, Network hardware, The transport layer, Network security, Authentication protocols, The internet transport protocols, TCP congestion control
Đăng nhập
Bộ sưu tập nổi bật