- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook Computer & intrusion forensics: Part 1
In ebook Computer & intrusion forensics: Part 1, the following content will be discussed: Chapter 1 computer crime, computer forensics, and computer security; chapter 2 current practice; chapter 3 computer forensics in law enforcement and national security.
196 p hbu 25/02/2024 17 0
Từ khóa: Computer security, Computer networks, Security measures, Forensic sciences, Computer crime, Computer forensics, Computer forensics in law enforcement
Ebook Computer & intrusion forensics: Part 2
In ebook Computer & intrusion forensics: Part 2, the following content will be discussed: Chapter 4 computer forensics in forensic accounting; chapter 5 case studies; chapter 6 intrusion detection and intrusion forensics; chapter 7 research directions and future developments.
221 p hbu 25/02/2024 17 0
Từ khóa: Computer security, Computer networks, Security measures, Forensic sciences, Computer forensics in forensic accounting, Intrusion forensics
Ebook Cyber crime investigators field guide: Part 1
In this part, the following content will be discussed: Chapter 1: the initial contact, chapter 2: client site arrival, chapter 3: evidence collection procedures, chapter 4: evidence collection and analysis tools, chapter 5: password recovery, chapter 6: questions and answers by subject area, chapter 7: recommended reference materials, chapter 8: case study.
132 p hbu 26/01/2024 21 0
Từ khóa: Computer security, Computer networks, Security measures, Cyber crime investigators field guide, Cyber crime, Client site arrival, Evidence collection procedures
Ebook Cyber crime investigators field guide: Part 2
In this part, the following content will be discussed: Appendix A: Glossary, Appendix B: Port numbers used by malicious trojan horse programs, Appendix C: Attack signatures, Appendix D: UNIX/Linux commands, Appendix E: Cisco PIX firewall commands, Appendix F: Discovering unauthorized access to your computer, Appendix G: U.S. Department of justice search and seizure guidelines.
199 p hbu 26/01/2024 21 0
Từ khóa: Computer security, Computer networks, Security measures, Cyber crime, Cyber crime investigators, Linux commands, Attack signatures
Ebook Building the Infrastructure for Cloud security: A solutions view - Part 2
Continued part 1, part 2 of ebook "Building the Infrastructure for Cloud security: A solutions view" provides readers with contents including: network security in the cloud; identity management and control for clouds; trusted virtual machines - ensuring the integrity of virtual machines in the cloud; a reference design for secure cloud bursting;...
112 p hbu 24/11/2023 24 1
Từ khóa: Building the Infrastructure for Cloud security, Cloud security, Trusted virtual machines, Secure cloud bursting, The cloud network, Intel identity technologies
Ebook The InfoSec handbook: An introduction to Information security - Part 2
Continued part 1, part 2 of ebook "The InfoSec handbook: An introduction to Information security" provides readers with contents including: network security; understanding networks and network security; intrusion detection and prevention systems; virtual private networks; physical security; physical security and biometrics; current trends in information security;...
193 p hbu 25/10/2023 54 1
Từ khóa: The InfoSec handbook, Information security, Network security, Virtual private networks, Physical security, Cloud computing, Social engineering
Ebook Network security essentials: Applications and standards: Part 2
The following will be discussed in Ebook Network security essentials: Applications and standards – Part 2: Intruders, malicious software, firewalls, some aspects of number theory, projects for teaching network security, network management security, legal and ethical aspects, standards and standards-setting organizations,...
113 p hbu 15/06/2022 261 165
Từ khóa: Network security, Computer network security, Guide to computer network security, An toàn mạng máy tính, Bảo mật mạng máy tính, Network management security, Standards-setting organizations
Ebook Network security essentials: Applications and standards: Part 1
The followings will be discussed in Ebook Network security essentials: Applications and standards – Part 1: Introduction, symmetric encryption and message confidentiality, public-key cryptography and message authentication, key distribution and user authentication, transport-level security, wireless network security, electronic mail security, IP Security.
319 p hbu 15/06/2022 255 164
Từ khóa: Network security, Computer network security, Guide to computer network security, An toàn mạng máy tính, Symmetric encryption, Public-key cryptography
Ebook Cryptography and Network Security Principles and Practices: Part 2
The following will be discussed in Cryptography and Network Security Principles and Practices - Part 2: Authentication applications, Electronic mail security, IP security, web security, intruders, malicious software, firewalls, standards and standards-setting organizations, projects for teaching cryptography and network security,...
407 p hbu 15/06/2022 242 146
Từ khóa: Computer network security, An toàn mạng máy tính, Bảo mật mạng máy tính, Authentication applications, Electronic mail security, IP Security
Ebook Cryptography and Network Security Principles and Practices: Part 1
The following will be discussed in Cryptography and Network Security Principles and Practices - Part 1: Introduction, classical encryption techniques, block ciphers and the data encryption standard, finite fields, advanced encryption standard, more on symmetric ciphers, confidentiality using symmetric encryption, introduction to number theory, public-key cryptography and RSA, key management - other public-key cryptosystems, message...
576 p hbu 15/06/2022 223 143
Từ khóa: Network security, Network Security Principles, An toàn mạng máy tính, Bảo mật mạng máy tính, Network security principles and practices, Data encryption standard
Ebook Hacking exposed: Network security secrets and solutions (Third edition)
(BQ)Typically, these actors attempt to exploit flaws in the system implementation or its deployment in order to obtain information, acquire access to services, or simply to disrupt the operation of the cloud through loss of system availability or system and information integrity. As the description of these attacks implies some of these attacks violate the tenant boundaries and hardware abstraction layers that VMware vCloud Director attempts...
260 p hbu 26/08/2019 99 0
Từ khóa: Ebook Hacking exposed, Network security secrets and solutions, Network security secrets, The securities and exchange commission, Intrusion detection systems, Systems reachable via intranet TCP
Ebook Network Security Essentials: Applications and Standards (4th Edition) - William Stallings
(BQ) Adapted from Cryptography and Network Security, Fifth Edition, this text covers the same topics but with a much more concise treatment of cryptography. Network Security, 4/e also covers SNMP security, which is not covered in the fifth edition.
432 p hbu 26/08/2019 84 0
Từ khóa: Network Security Essentials, Principles Cryptography, Practice Cryptography, William Stallings, An ninh mạng, Bảo mật mạng
Bộ sưu tập nổi bật