- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook How to cheat at configuring open source security tools: The perfect reference for the multitasked sysadmin - Part 1 includes contents: Chapter 1: testing and auditing your systems, chapter 2: protecting your perimeter, chapter 3: protecting network resources, chapter 4: introducing snort, chapter 5: installing snort 2.6.
280 p hbu 25/02/2024 16 0
Từ khóa: Open source security tools, Network security, Computer security, Information security, Protecting your perimeter, Protecting network resources, Installing snort 2.6
Ebook How to cheat at configuring open source security tools: The perfect reference for the multitasked sysadmin - Part 2 includes contents: Chapter 6: configuring snort and add-ons, chapter 7: introducing wireshark: network protocol analyzer, chapter 8: getting and installing wireshark, chapter 9: using wireshark, chapter 10: network reporting and troubleshooting with other tools, chapter 11: wireless monitoring and intrusion detection.
250 p hbu 25/02/2024 17 0
Từ khóa: Network security, Computer security, Information security, Configuring snort, Network protocol analyzer, Installing wireshark, Network reporting
Ebook Computer & intrusion forensics: Part 1
In ebook Computer & intrusion forensics: Part 1, the following content will be discussed: Chapter 1 computer crime, computer forensics, and computer security; chapter 2 current practice; chapter 3 computer forensics in law enforcement and national security.
196 p hbu 25/02/2024 18 0
Từ khóa: Computer security, Computer networks, Security measures, Forensic sciences, Computer crime, Computer forensics, Computer forensics in law enforcement
Ebook Computer & intrusion forensics: Part 2
In ebook Computer & intrusion forensics: Part 2, the following content will be discussed: Chapter 4 computer forensics in forensic accounting; chapter 5 case studies; chapter 6 intrusion detection and intrusion forensics; chapter 7 research directions and future developments.
221 p hbu 25/02/2024 17 0
Từ khóa: Computer security, Computer networks, Security measures, Forensic sciences, Computer forensics in forensic accounting, Intrusion forensics
Ebook Cyber crime investigators field guide: Part 1
In this part, the following content will be discussed: Chapter 1: the initial contact, chapter 2: client site arrival, chapter 3: evidence collection procedures, chapter 4: evidence collection and analysis tools, chapter 5: password recovery, chapter 6: questions and answers by subject area, chapter 7: recommended reference materials, chapter 8: case study.
132 p hbu 26/01/2024 21 0
Từ khóa: Computer security, Computer networks, Security measures, Cyber crime investigators field guide, Cyber crime, Client site arrival, Evidence collection procedures
Ebook Cyber crime investigators field guide: Part 2
In this part, the following content will be discussed: Appendix A: Glossary, Appendix B: Port numbers used by malicious trojan horse programs, Appendix C: Attack signatures, Appendix D: UNIX/Linux commands, Appendix E: Cisco PIX firewall commands, Appendix F: Discovering unauthorized access to your computer, Appendix G: U.S. Department of justice search and seizure guidelines.
199 p hbu 26/01/2024 21 0
Từ khóa: Computer security, Computer networks, Security measures, Cyber crime, Cyber crime investigators, Linux commands, Attack signatures
Ebook The InfoSec handbook: An introduction to Information security - Part 2
Continued part 1, part 2 of ebook "The InfoSec handbook: An introduction to Information security" provides readers with contents including: network security; understanding networks and network security; intrusion detection and prevention systems; virtual private networks; physical security; physical security and biometrics; current trends in information security;...
193 p hbu 25/10/2023 54 1
Từ khóa: The InfoSec handbook, Information security, Network security, Virtual private networks, Physical security, Cloud computing, Social engineering
Ebook Network security essentials: Applications and standards: Part 2
The following will be discussed in Ebook Network security essentials: Applications and standards – Part 2: Intruders, malicious software, firewalls, some aspects of number theory, projects for teaching network security, network management security, legal and ethical aspects, standards and standards-setting organizations,...
113 p hbu 15/06/2022 261 165
Từ khóa: Network security, Computer network security, Guide to computer network security, An toàn mạng máy tính, Bảo mật mạng máy tính, Network management security, Standards-setting organizations
Ebook Network security essentials: Applications and standards: Part 1
The followings will be discussed in Ebook Network security essentials: Applications and standards – Part 1: Introduction, symmetric encryption and message confidentiality, public-key cryptography and message authentication, key distribution and user authentication, transport-level security, wireless network security, electronic mail security, IP Security.
319 p hbu 15/06/2022 255 164
Từ khóa: Network security, Computer network security, Guide to computer network security, An toàn mạng máy tính, Symmetric encryption, Public-key cryptography
Ebook Cryptography and Network Security Principles and Practices: Part 2
The following will be discussed in Cryptography and Network Security Principles and Practices - Part 2: Authentication applications, Electronic mail security, IP security, web security, intruders, malicious software, firewalls, standards and standards-setting organizations, projects for teaching cryptography and network security,...
407 p hbu 15/06/2022 243 146
Từ khóa: Computer network security, An toàn mạng máy tính, Bảo mật mạng máy tính, Authentication applications, Electronic mail security, IP Security
Bộ sưu tập nổi bật