- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook How to cheat at configuring open source security tools: The perfect reference for the multitasked sysadmin - Part 2 includes contents: Chapter 6: configuring snort and add-ons, chapter 7: introducing wireshark: network protocol analyzer, chapter 8: getting and installing wireshark, chapter 9: using wireshark, chapter 10: network reporting and troubleshooting with other tools, chapter 11: wireless monitoring and intrusion detection.
250 p hbu 25/02/2024 20 0
Từ khóa: Network security, Computer security, Information security, Configuring snort, Network protocol analyzer, Installing wireshark, Network reporting
Ebook Computer & intrusion forensics: Part 1
In ebook Computer & intrusion forensics: Part 1, the following content will be discussed: Chapter 1 computer crime, computer forensics, and computer security; chapter 2 current practice; chapter 3 computer forensics in law enforcement and national security.
196 p hbu 25/02/2024 20 0
Từ khóa: Computer security, Computer networks, Security measures, Forensic sciences, Computer crime, Computer forensics, Computer forensics in law enforcement
Ebook Computer & intrusion forensics: Part 2
In ebook Computer & intrusion forensics: Part 2, the following content will be discussed: Chapter 4 computer forensics in forensic accounting; chapter 5 case studies; chapter 6 intrusion detection and intrusion forensics; chapter 7 research directions and future developments.
221 p hbu 25/02/2024 20 0
Từ khóa: Computer security, Computer networks, Security measures, Forensic sciences, Computer forensics in forensic accounting, Intrusion forensics
Ebook Cyber crime investigators field guide: Part 1
In this part, the following content will be discussed: Chapter 1: the initial contact, chapter 2: client site arrival, chapter 3: evidence collection procedures, chapter 4: evidence collection and analysis tools, chapter 5: password recovery, chapter 6: questions and answers by subject area, chapter 7: recommended reference materials, chapter 8: case study.
132 p hbu 26/01/2024 26 0
Từ khóa: Computer security, Computer networks, Security measures, Cyber crime investigators field guide, Cyber crime, Client site arrival, Evidence collection procedures
Ebook Cyber crime investigators field guide: Part 2
In this part, the following content will be discussed: Appendix A: Glossary, Appendix B: Port numbers used by malicious trojan horse programs, Appendix C: Attack signatures, Appendix D: UNIX/Linux commands, Appendix E: Cisco PIX firewall commands, Appendix F: Discovering unauthorized access to your computer, Appendix G: U.S. Department of justice search and seizure guidelines.
199 p hbu 26/01/2024 27 0
Từ khóa: Computer security, Computer networks, Security measures, Cyber crime, Cyber crime investigators, Linux commands, Attack signatures
Ebook Building the Infrastructure for Cloud security: A solutions view - Part 1
Part 1 of ebook "Building the Infrastructure for Cloud security: A solutions view" provides readers with contents including: cloud computing basics; the trusted cloud - addressing security and compliance; platform boot integrity - foundation for trusted compute pools; attestation - proving trustability; boundary control in the cloud - geo-tagging and asset tagging;...
128 p hbu 24/11/2023 23 1
Từ khóa: Building the Infrastructure for Cloud security, Cloud security, Cloud computing basics, The trusted cloud, Platform boot integrity, Trusted cloud usage models
Ebook Managing risk and information security: Protect to enable - Part 2
Continued part 1, part 2 of ebook "Managing risk and information security: Protect to enable" provides readers with contents including: emerging threats and vulnerabilities - reality and rhetoric; a new security architecture to improve business agility; looking to the future: emerging security capabilities; corporate social responsibility - the ethics of managing information risk; the 21st century CISO; performance coaching;...
102 p hbu 25/10/2023 67 2
Từ khóa: Managing risk and information security, Information security, Key threat activity areas, Internet of Things, Cloud computing, Artificial intelligence, Managing information risk
Ebook The InfoSec handbook: An introduction to Information security - Part 2
Continued part 1, part 2 of ebook "The InfoSec handbook: An introduction to Information security" provides readers with contents including: network security; understanding networks and network security; intrusion detection and prevention systems; virtual private networks; physical security; physical security and biometrics; current trends in information security;...
193 p hbu 25/10/2023 59 1
Từ khóa: The InfoSec handbook, Information security, Network security, Virtual private networks, Physical security, Cloud computing, Social engineering
Ebook The InfoSec handbook: An introduction to Information security - Part 1
Part 1 of ebook "The InfoSec handbook: An introduction to Information security" provides readers with contents including: introduction to security; history of computer security; key principles and practices; information systems management; application security; malicious software and anti-virus software;...
183 p hbu 25/10/2023 63 1
Từ khóa: The InfoSec handbook, Information security, Computer security, Information systems management, Malicious software, Anti-virus software
Ebook Network security essentials: Applications and standards: Part 2
The following will be discussed in Ebook Network security essentials: Applications and standards – Part 2: Intruders, malicious software, firewalls, some aspects of number theory, projects for teaching network security, network management security, legal and ethical aspects, standards and standards-setting organizations,...
113 p hbu 15/06/2022 263 165
Từ khóa: Network security, Computer network security, Guide to computer network security, An toàn mạng máy tính, Bảo mật mạng máy tính, Network management security, Standards-setting organizations
Ebook Network security essentials: Applications and standards: Part 1
The followings will be discussed in Ebook Network security essentials: Applications and standards – Part 1: Introduction, symmetric encryption and message confidentiality, public-key cryptography and message authentication, key distribution and user authentication, transport-level security, wireless network security, electronic mail security, IP Security.
319 p hbu 15/06/2022 257 164
Từ khóa: Network security, Computer network security, Guide to computer network security, An toàn mạng máy tính, Symmetric encryption, Public-key cryptography
Ebook Cryptography and Network Security Principles and Practices: Part 2
The following will be discussed in Cryptography and Network Security Principles and Practices - Part 2: Authentication applications, Electronic mail security, IP security, web security, intruders, malicious software, firewalls, standards and standards-setting organizations, projects for teaching cryptography and network security,...
407 p hbu 15/06/2022 245 146
Từ khóa: Computer network security, An toàn mạng máy tính, Bảo mật mạng máy tính, Authentication applications, Electronic mail security, IP Security
Bộ sưu tập nổi bật