- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook How to cheat at configuring open source security tools: The perfect reference for the multitasked sysadmin - Part 2 includes contents: Chapter 6: configuring snort and add-ons, chapter 7: introducing wireshark: network protocol analyzer, chapter 8: getting and installing wireshark, chapter 9: using wireshark, chapter 10: network reporting and troubleshooting with other tools, chapter 11: wireless monitoring and intrusion detection.
250 p hbu 25/02/2024 20 0
Từ khóa: Network security, Computer security, Information security, Configuring snort, Network protocol analyzer, Installing wireshark, Network reporting
Ebook Computer & intrusion forensics: Part 1
In ebook Computer & intrusion forensics: Part 1, the following content will be discussed: Chapter 1 computer crime, computer forensics, and computer security; chapter 2 current practice; chapter 3 computer forensics in law enforcement and national security.
196 p hbu 25/02/2024 21 0
Từ khóa: Computer security, Computer networks, Security measures, Forensic sciences, Computer crime, Computer forensics, Computer forensics in law enforcement
Ebook Computer & intrusion forensics: Part 2
In ebook Computer & intrusion forensics: Part 2, the following content will be discussed: Chapter 4 computer forensics in forensic accounting; chapter 5 case studies; chapter 6 intrusion detection and intrusion forensics; chapter 7 research directions and future developments.
221 p hbu 25/02/2024 21 0
Từ khóa: Computer security, Computer networks, Security measures, Forensic sciences, Computer forensics in forensic accounting, Intrusion forensics
Ebook Cyber crime investigators field guide: Part 1
In this part, the following content will be discussed: Chapter 1: the initial contact, chapter 2: client site arrival, chapter 3: evidence collection procedures, chapter 4: evidence collection and analysis tools, chapter 5: password recovery, chapter 6: questions and answers by subject area, chapter 7: recommended reference materials, chapter 8: case study.
132 p hbu 26/01/2024 26 0
Từ khóa: Computer security, Computer networks, Security measures, Cyber crime investigators field guide, Cyber crime, Client site arrival, Evidence collection procedures
Ebook Cyber crime investigators field guide: Part 2
In this part, the following content will be discussed: Appendix A: Glossary, Appendix B: Port numbers used by malicious trojan horse programs, Appendix C: Attack signatures, Appendix D: UNIX/Linux commands, Appendix E: Cisco PIX firewall commands, Appendix F: Discovering unauthorized access to your computer, Appendix G: U.S. Department of justice search and seizure guidelines.
199 p hbu 26/01/2024 27 0
Từ khóa: Computer security, Computer networks, Security measures, Cyber crime, Cyber crime investigators, Linux commands, Attack signatures
Ebook The InfoSec handbook: An introduction to Information security - Part 2
Continued part 1, part 2 of ebook "The InfoSec handbook: An introduction to Information security" provides readers with contents including: network security; understanding networks and network security; intrusion detection and prevention systems; virtual private networks; physical security; physical security and biometrics; current trends in information security;...
193 p hbu 25/10/2023 60 1
Từ khóa: The InfoSec handbook, Information security, Network security, Virtual private networks, Physical security, Cloud computing, Social engineering
Ebook Creating web-based training: A step-by-step guide to designing effective e-learning – Part 1
Ebook Creating web-based training: A step-by-step guide to designing effective e-learning – Part 1 presents the following content: Chapter 1 web pages, chapter 2 creating a web page, chapter 3 adding images, chapter 4 adding links, chapter 5 webtop publishing, chapter 6 color and images, chapter 7 navigation and menus, chapter 8 web hosting, chapter 9 defining WBT.
199 p hbu 23/04/2023 80 0
Từ khóa: Ebook Creating web-based training, Creating web-based training, Computer-assisted instruction, Computer network resources, Web sites design, World Wide Web
Ebook Creating web-based training: A step-by-step guide to designing effective e-learning – Part 2
Ebook Creating web-based training: A step-by-step guide to designing effective e-learning – Part 2 presents the following content: Chapter 10 interactivity and usability, chapter 11 supplementary protocols, chapter 12 types of WBT, chapter 13 embedded programming, chapter 14 forms, chapter 15 readable text, chapter 17 streaming sound, chapter 16 complementary technologies, chapter 18 streaming video, chapter 19 SMIL, chapter 20 advanced...
282 p hbu 23/04/2023 62 0
Từ khóa: Ebook Creating web-based training, Creating web-based training, Computer-assisted instruction, Computer network resources, Web sites design, World Wide Web
Ebook Network security essentials: Applications and standards: Part 2
The following will be discussed in Ebook Network security essentials: Applications and standards – Part 2: Intruders, malicious software, firewalls, some aspects of number theory, projects for teaching network security, network management security, legal and ethical aspects, standards and standards-setting organizations,...
113 p hbu 15/06/2022 263 165
Từ khóa: Network security, Computer network security, Guide to computer network security, An toàn mạng máy tính, Bảo mật mạng máy tính, Network management security, Standards-setting organizations
Ebook Network security essentials: Applications and standards: Part 1
The followings will be discussed in Ebook Network security essentials: Applications and standards – Part 1: Introduction, symmetric encryption and message confidentiality, public-key cryptography and message authentication, key distribution and user authentication, transport-level security, wireless network security, electronic mail security, IP Security.
319 p hbu 15/06/2022 257 164
Từ khóa: Network security, Computer network security, Guide to computer network security, An toàn mạng máy tính, Symmetric encryption, Public-key cryptography
Ebook Cryptography and Network Security Principles and Practices: Part 2
The following will be discussed in Cryptography and Network Security Principles and Practices - Part 2: Authentication applications, Electronic mail security, IP security, web security, intruders, malicious software, firewalls, standards and standards-setting organizations, projects for teaching cryptography and network security,...
407 p hbu 15/06/2022 245 146
Từ khóa: Computer network security, An toàn mạng máy tính, Bảo mật mạng máy tính, Authentication applications, Electronic mail security, IP Security
Key agreement scheme based on quantum neural networks
In quantum cryptography, the key is created during the process of key distribution, where as in classical key distribution a predetermined key is transmitted to the legitimate user. The most important contribution of quantum key distribution is the detection of eavesdropping.
15 p hbu 29/10/2019 257 2
Từ khóa: Neural networks, Quantum neural networks, Cryptographic algorithm, Key-agreement protocol, Quantum computing
Bộ sưu tập nổi bật