• Ebook Computer security - Principles and practice (3/E): Part 2

    Ebook Computer security - Principles and practice (3/E): Part 2

    Part 2 book "Computer security - Principles and practice" includes content: Operating system security, human resources security, security auditing, legal and ethical aspects, internet security protocols and standards, symmetric encryption and message confidentiality, trusted computing and multilevel security, it security management and risk assessment, physical and infrastructure security, it security controls, plans, and procedures,... and...

     402 p TaiLieuvn 11/04/2024 1 0

  • Ebook Computer security - Principles and practice (3/E): Part 1

    Ebook Computer security - Principles and practice (3/E): Part 1

    Part 1 book "Computer security - Principles and practice" includes content: Reader’s and instructor’s guide, overview, cryptographic tools, user authentication, access control, database and cloud security, malicious software, denial of service attacks, intrusion detection, firewalls and intrusion prevention systems, buffer overflow, software security.

     436 p TaiLieuvn 11/04/2024 3 0

  • Bài giảng Giao thông thông minh - ITS

    Bài giảng Giao thông thông minh - ITS

    Bài giảng Giao thông thông minh - ITS gồm các nội dung chính như sau: Khái niệm cơ bản về hệ thống GTTM; Kiến trúc hệ thống GTTM; Các tiêu chuẩn cơ bản cho hệ thống GTTM; Một số hệ thống GTTM điển hình; Ứng dụng GTTM tại Việt Nam. Mời các bạn cùng tham khảo!

     164 p TaiLieuvn 04/04/2024 2 1

  • Study of security features present in Nepali passport

    Study of security features present in Nepali passport

    Security features present on Nepali passport are examined with the help of Video Spectral Comparator. Mainly examination is carried out with application ultra-violet light, normal light, oblique light and transmitted light. We obtain different types of security features including florescence, ghost image, binding thread, optical fiber, punched number, barcode, micro-printing, watermark, emboss etc.

     6 p TaiLieuvn 02/04/2024 3 0

  • Ebook It security interviews exposed - Secrets to landing your next information security job: Part 1

    Ebook It security interviews exposed - Secrets to landing your next information security job: Part 1

    Part 1 book "It security interviews exposed - Secrets to landing your next information security job" includes content: Finding, interviewing for, and getting the job; knowing networks - fundamentals; knowing security - fundamentals; understanding regulations, legislation, and guidance; knowing firewalls - fundamentals.

     131 p TaiLieuvn 31/03/2024 1 0

  • Ebook It governance - A managers guide to data security and ISO 2700/ISO 27002 (4th edition): Part 2

    Ebook It governance -  A managers guide to data security and ISO 2700/ISO 27002 (4th edition): Part 2

    Part 2 book "It governance - A managers guide to data security" includes content: Network security management and media handling, exchanges of information, electronic commerce services, E-mail and internet use, access control, network access control, operating system access control, application access control and teleworking, systems acquisition, development and maintenance,.... and other contents.

     180 p TaiLieuvn 31/03/2024 3 0

  • Ebook It governance - A managers guide to data security and ISO 2700/ISO 27002 (4th edition): Part 1

    Ebook It governance -  A managers guide to data security and ISO 2700/ISO 27002 (4th edition): Part 1

    Part 1 book "It governance - A managers guide to data security" includes content: Why is information security necessary the combined code; the turnbull report and sarbanes–oxley; organizing information security; information security policy and scope; the risk assessment and statement of applicability; external parties; asset management; human resources security, physical and environmental security, equipment security, communications and...

     205 p TaiLieuvn 31/03/2024 0 0

  • Ebook Internet security - Cryptographic principles algorithms protocols: Part 2

    Ebook Internet security - Cryptographic principles algorithms protocols: Part 2

    Part 2 book "Internet security - Cryptographic principles algorithms protocols" includes content: Public-key infrastructure; network layer security; transport layer security - SSLv3 and TLSv1; electronic mail security - PGP, S/MIME; internet firewalls for trusted systems, SET for E-commerce transactions.

     205 p TaiLieuvn 31/03/2024 2 0

  • Ebook Internet security - Cryptographic principles algorithms protocols: Part 1

    Ebook Internet security - Cryptographic principles algorithms protocols: Part 1

    Part 1 book "Internet security - Cryptographic principles algorithms protocols" includes content: Internetworking and layered models; tcp ip suite and internet stack protocols; symmetric block ciphers; hash function, message digest and message authentication code, asymmetric public key cryptosystems.

     221 p TaiLieuvn 31/03/2024 0 0

  • Ebook Insider attack cyber security beyond the hacker

    Ebook Insider attack cyber security beyond the hacker

    Ebook "Insider attack cyber security beyond the hacker" includes content: The insider attack problem nature and scope; reflections on the insider threat; a survey of insider attack detection research; naive bayes as a masquerade detector - addressing a chronic failure; towards a virtualization enabled framework for information traceability,... and other contents.

     228 p TaiLieuvn 31/03/2024 0 0

  • Ebook Infosec career hacking - Sell your skillz not your soul: Part 2

    Ebook Infosec career hacking - Sell your skillz not your soul: Part 2

    Part 2 book "Infosec career hacking - Sell your skillz not your soul" includes content: No place like home - creating an attack lab, vulnerability disclosure, classes of attack, don’t trip the sensors - integrate and imitate, vulnerability remediation - work within the system, incident response – putting out fires without getting burned, rooting - show me the money.

     284 p TaiLieuvn 31/03/2024 0 0

  • Ebook Infosec career hacking - Sell your skillz not your soul: Part 1

    Ebook Infosec career hacking - Sell your skillz not your soul: Part 1

    Part 1 book "Infosec career hacking - Sell your skillz not your soul" includes content: The targets—what i want to be when i grow up (or at least get older), reconnaissance - social engineering for profit, enumerate - determine what’s out there, first strike - basic tactics for successful exploitation, the laws of security.

     189 p TaiLieuvn 31/03/2024 0 0

Hướng dẫn khai thác thư viện số

Bộ sưu tập nổi bật