• Ebook Information security: Principles and practice - Mark Stamp

    Ebook Information security: Principles and practice - Mark Stamp

    Ebook Information security: Principles and practice includes contents: Chapter 1: introduction; chapter 2: classic cryptography; chapter 3: symmetric key crypto; chapter 4: public key crypto; chapter 5: hash functions; chapter 6: advanced cryptanalysis; chapter 7: authentication; chapter 8: authorization; chapter 9: authentication protocols; chapter 10: real-world protocols; chapter 11: software flaws and malware; chapter 12: insecurity in...

     413 p ntt 20/11/2023 32 1

  • Ebook Implementing email security and tokens: Current standards, tools, and practices - Sean Turner, Russ Housley

    Ebook Implementing email security and tokens: Current standards, tools, and practices - Sean Turner, Russ Housley

    Ebook Implementing email security and tokens: Current standards, tools, and practices includes contents: Chapter 1 Introduction; Chapter 2 Understanding email; Chapter 3 Security fundamentals; Chapter 4 Cryptography primer; Chapter 5 Understanding public key infrastructure; Chapter 6 Protecting email message contents; Chapter 7 Protecting email passwords, headers, and commands; Chapter 8 Tokens and hardware security modules; Chapter 9...

     314 p ntt 20/11/2023 29 1

  • Ebook Security in wireless mesh networks: Part 1

    Ebook Security in wireless mesh networks: Part 1

    Ebook Security in wireless mesh networks: Part 1 includes contents: Chapter 1 an introduction to wireless mesh networks; chapter 2 mesh networking in wireless PANs, LANs,MANs, and WANs; chapter 3 attacks and security mechanisms; chapter 4 intrusion detection in wireless mesh networks; chapter 5 secure routing in wireless mesh networks; chapter 6 hop integrity in wireless mesh networks; chapter 7 privacy preservation in wireless mesh networks;...

     357 p ntt 20/11/2023 29 1

  • Ebook Security in wireless mesh networks: Part 2

    Ebook Security in wireless mesh networks: Part 2

    Ebook Security in wireless mesh networks: Part 2 includes contents: Chapter 11 security in wireless PAN mesh networks; chapter 12 security in wireless LAN mesh networks; chapter 13 security in IEEE802.15.4 cluster-based networks; chapter 14 security in wireless sensor networks; chapter 15 key management in wireless sensor networks.

     191 p ntt 20/11/2023 32 1

  • Ebook Standard C library: Part 1

    Ebook Standard C library: Part 1

    The standard C library explains how the library was meant to be used and how it can be used. It places particular emphasis on features added to C as part of the C Standard. These features include support for multiple locales (cultural conventions) and very large character sets. Ebook Standard C library: Part 1 includes contents: Chapter 0: Introduction Chapter 1: , Chapter 2: , Chapter 3: , Chapter 4: , Chapter 5: , Chapter 6: , Chapter 7: ....

     196 p ntt 20/11/2023 25 0

  • Ebook Standard C library: Part 2

    Ebook Standard C library: Part 2

    Ebook Standard C library: Part 2 presents the following content: Chapter 8: , Chapter 9: , Chapter 10: , Chapter 11: , Chapter 12: , Chapter 13: , Chapter 14: , Chapter 15: . Please refer to the documentation for more details. Please refer to the documentation for more details.

     318 p ntt 20/11/2023 24 0

  • Ebook Security technologies for the world wide web (Second edition): Part 1

    Ebook Security technologies for the world wide web (Second edition): Part 1

    Ebook Security technologies for the world wide web (Second edition): Part 1 presents the following content: Chapter 1 Introduction, Chapter 2 HTTP security, Chapter 3 Proxy servers and firewalls, Chapter 4 Cryptographic techniques, Chapter 5 Internet security protocols, Chapter 6 SSL and TLS protocols, Chapter 7 Certificate management, Chapter 8 Authentication and authorization.

     273 p ntt 20/11/2023 26 1

  • Ebook Security technologies for the world wide web (Second edition): Part 2

    Ebook Security technologies for the world wide web (Second edition): Part 2

    Ebook Security technologies for the world wide web (Second edition): Part 2 presents the following content: Chapter 9 Electronic payment systems, Chapter 10 Client- side security, Chapter 11 Server- side security, Chapter 12 Privacy protection, Chapter 13 Intellectual property, Chapter 14 Censorship on the WWW, Chapter 15 Risk management, Chapter 16 Conclusions and outlook.

     168 p ntt 20/11/2023 26 1

  • Ebook Wardriving & wireless penetration testing: Part 1

    Ebook Wardriving & wireless penetration testing: Part 1

    Ebook Wardriving & wireless penetration testing: Part 1 presents the following content: Chapter 1 Introduction to wardriving and penetration testing, chapter 2 understanding antennas and antenna theory, chapter 3 handheld devices and direction finding, chapter 4 wardriving and penetration testing with Windows, chapter 5 wardriving and penetration testing with Linux, chapter 6 wardriving and wireless penetration testing with OS X.

     183 p ntt 20/11/2023 8 0

  • Ebook Wardriving & wireless penetration testing: Part 2

    Ebook Wardriving & wireless penetration testing: Part 2

    Ebook Wardriving & wireless penetration testing: Part 2 presents the following content: Chapter 7 wireless penetration testing using a bootable Linux distribution, chapter 8 mapping wardrives, chapter 9 using man-in-the- middle attacks to your advantage, chapter 10 using custom firmware for wireless penetration testing, chapter 11 wireless video testing.

     250 p ntt 20/11/2023 11 0

  • Ebook Practical VoIP Security: Part 1

    Ebook Practical VoIP Security: Part 1

    Ebook Practical VoIP Security: Part 1 includes contents: Chapter 1 Introduction to VoIP Security; Chapter 2 Asterisk Configuration and Features; Chapter 3 The Hardware Infrastructure; Chapter 4 PSTN Architecture; Chapter 5 H.323 Architecture; Chapter 6 SIP Architecture; Chapter 7 Other VoIP Communication Architectures; Chapter 8 Support Protocols; Chapter 9 Threats to VoIP Communications Systems.

     290 p ntt 20/11/2023 21 0

  • Ebook Practical VoIP Security: Part 2

    Ebook Practical VoIP Security: Part 2

    Ebook Practical VoIP Security: Part 2 includes contents: Chapter 10 Validate Existing Security Infrastructure; Chapter 11 Confirm User Identity; Chapter 12 Active Security Monitoring; Chapter 13 Logically Segregate Network Traffic; Chapter 14 IETF Encryption Solutions for VoIP; Chapter 15 Regulatory Compliance; Chapter 16 The IP Multimedia Subsystem: True Converged Communications; Chapter 17 Recommendations.

     302 p ntt 20/11/2023 20 0

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=ntt