Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Building & Managing Virtual Private NetworksНазвание: Building & Managing Virtual Private Networks
Автор: Dave Kosiur
Издательство: Wiley
Год: 1998
Формат: EPUB, PDF
Размер: 14,8 Мб
Язык: английский / English

Everything you need to know about selecting, designing, building, and managing the right VPN for your company Building and Managing Virtual Private Networks Get complete answers to all your VPN questions in Building and Managing Virtual Private Networks. International networking guru Dave Kosiur provides a candid assessment of the current state of VPN technology. With the help of fascinating and informative case studies based on the experiences of organizations at the forefront of the VPN revolution, he clearly explains the basic concepts and technologies involved, as well as the business reasons for making the switch to an Internet-based network. And he provides practical guidance on all aspects of designing, building, and managing the best VPN for your organization.
Разместил: black 8-11-2016, 23:05 | Комментарии: 0 | Подробнее
Название: Practical VoIP Security
Автор: Thomas Porter and Jan Kanclirz Jr.
Издательство: Syngress
Год: 2006
Формат: True PDF
Размер: 4 Мб
Язык: английский / English

Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or workstation.

This book will cover a wide variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems. The book will cover the attack methodologies that are used against the SIP and H.323 protocols as well as VoIP network infrastructure. Significant emphasis will be placed on both attack and defense techniques.
Разместил: bomboane 8-11-2016, 08:39 | Комментарии: 0 | Подробнее
Название: Formal Models and Techniques for Analyzing Security Protocols
Автор: V. Cortier, S. Kremer
Издательство: IOS Press
Год: 2011
Формат: PDF, EPUB
Размер: 7,2 Мб
Язык: английский / English

Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure networks like the internet, they are notoriously difficult to devise. The field of symbolic analysis of security protocols has seen significant advances during the last few years.
Разместил: bomboane 7-11-2016, 10:16 | Комментарии: 0 | Подробнее
Learning Docker Networking
Название: Learning Docker Networking
Автор: Rajdeep Dua, Santosh Kumar Konduri, Vaibhav Kohli
Издательство: Packt Publishing
Год: 2016
Страниц: 176
Формат: PDF
Размер: 10 Mb
Язык: English

Docker is a Linux container implementation that enables the creation of light weight portable development and production environments. These environments can be updated incrementally. Docker achieves this by leveraging containment principles like cgroups and Linux namespaces along with Overlay filesystem based portable images. Docker provides the networking primitives that allow administrators to specify how different containers network with each application and connect each of its components, then distribute them across a large number of servers and ensure coordination between them irrespective of the host or VM they are running in.
Разместил: bhaer 3-11-2016, 18:13 | Комментарии: 0 | Подробнее
Проектирование и внедрение компьютерных сетей
Название: Проектирование и внедрение компьютерных сетей
Автор: Палмер М., Синклер Р.Б.
Издательство: БХВ-Петербург
Год: 2004
Страниц: 752
ISBN: 5-94157-374-X
Формат: PDF
Размер: 124 Мб
Язык: русский

В книге излагаются как базовые, так и более сложные концепции построения компьютерных сетей на базе современных технологий (Fast Ethernet, DSL, ISDN, frame relay, ATM, SONET, беспроводных и др.). Подробно рассматриваются протоколы (включая стек TCP/IP), методы передачи сигналов, сетевые топологии и оборудование.
Разместил: MIHAIL62 31-10-2016, 14:25 | Комментарии: 0 | Подробнее
Incorporating Resiliency Concepts into NFPA Codes and StandardsНазвание: Incorporating Resiliency Concepts into NFPA Codes and Standards
Автор: Dungan
Издательство: Springer
Год: 2016
Формат: PDF
Размер: 2,8 Мб
Язык: английский / English

This brief addresses the contextual definition of resilience, explains the existing resiliency frameworks developed by Federal Agencies, and emphasizes the risk informed approach to applying resiliency concepts to National Fire Protection Association (NFPA) documents.

In an effort to assess and further define NFPA’s position in the realm of resiliency, this brief identifies those provisions in NFPA codes and standards that embody the concepts of resiliency. Additionally, the brief develops an NFPA-centric definition of resiliency and compiles available information to serve as a technical reference for the codes and standards, identifying key gaps in knowledge. Key topics range from engineered features and the built environment to emergency response and risk-informed approaches to disaster events. The brief also includes a comprehensive literature review on multiple resiliency frameworks.
Разместил: black 30-10-2016, 09:19 | Комментарии: 0 | Подробнее
Security in Fixed and Wireless NetworksНазвание: Security in Fixed and Wireless Networks
Автор: Guenter Schaefer and Michael Rossberg
Издательство: Wiley
Год: 2016
Формат: PDF
Размер: 9,6 Мб
Язык: английский / English

Introduces aspects on security threats and their countermeasures in both fixed and wireless networks, advising on how countermeasures can provide secure communication infrastructures. Enables the reader to understand the risks of inappropriate network security, what mechanisms and protocols can be deployed to counter these risks, and how these mechanisms and protocols work.
Разместил: black 30-10-2016, 08:01 | Комментарии: 0 | Подробнее
The Dark Net: Inside the Digital UnderworldНазвание: The Dark Net: Inside the Digital Underworld
Автор: Jamie Bartlett
Издательство: Melville House
Год: 2016
Формат: EPUB
Размер: 2 Мб
Язык: английский / English

Beyond the familiar online world that most of us inhabit—a world of Google, Facebook, and Twitter—lies a vast and often hidden network of sites, communities, and cultures where freedom is pushed to its limits, and where people can be anyone, or do anything, they want. This is the world of Bitcoin and Silk Road, of radicalism and pornography. This is the Dark Net.

Разместил: black 30-10-2016, 07:53 | Комментарии: 0 | Подробнее
Authorizations in SAPНазвание: Authorizations in SAP
Автор: Andrea Cavalleri and Massimo Manara
Издательство: SAP PRESS
Год: 2012
Формат: PDF
Размер: 11,7 Мб
Язык: английский / English

Work smarter with authorizations! Have you ever had an unauthorized user access something in your system that you could have sworn was off limits? Here you go: SAP PRESS equips you with "100 Things" that unlock the secrets of managing your security and authorizations in SAP.
Разместил: black 24-10-2016, 15:16 | Комментарии: 0 | Подробнее
The Basics of Cyber Safety: Computer and Mobile Device Safety Made EasyНазвание: The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy
Автор: John Sammons and Michael Cross
Издательство: Syngress
Год: 2016
Формат: EPUB
Размер: 4 Мб
Язык: английский / English

The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history.
Разместил: black 23-10-2016, 21:06 | Комментарии: 0 | Подробнее
 MirKnig.Su  ©2024     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности