Welcome![Sign In][Sign Up]
Location:
Search - network security

Search list

[Other resourceCisco.Press.Network.Security.Fundamentals.Sep.2004

Description: This a book about network security and SNMP .-This a book about network security and SN MP.
Platform: | Size: 19371325 | Author: wangjia | Hits:

[Develop ToolsThe Tao of Network Security Monitoring Beyond Intr

Description: The Tao of Network Security Monitoring Beyond Intrusion Detection
Platform: | Size: 16212041 | Author: 小云 | Hits:

[BooksThe Tao of Network Security Monitoring Beyond Intr

Description: The Tao of Network Security Monitoring Beyond Intrusion Detection
Platform: | Size: 16211968 | Author: 小云 | Hits:

[Other计算机网络安全基础

Description: 一本了解计算机网络安全的书籍,供参考和学习用-an understanding of computer network security books for reference and learning with
Platform: | Size: 990208 | Author: 海风 | Hits:

[DocumentsNetwork safty

Description: 網絡安全方面的書籍,非常好,本人從事嵌入linux以及網絡方面的研究-network security books, very good, I have engaged in embedded Linux and network of research
Platform: | Size: 6038528 | Author: wu | Hits:

[OS programalertLogAnalysis

Description: 这是一个基于java,snmp的网络安全日志审计系统,提供方便的用户交互界面,以及实用的日志分析功能-This is a java-based, snmp network security audit log system to provide easy user interface, as well as the practical function of the log analysis
Platform: | Size: 1311744 | Author: 高岩宇 | Hits:

[matlab802.11Security

Description: Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll want this book beside you every step of the way.-Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in Theor y and practice of wireless security, dispelling some of the myths along the way. In do ing so, they provide you with the technical grounding r equired to think about how the rest of the book ap plies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--ba sed systems. you ll want this book beside you every step of the way.
Platform: | Size: 835584 | Author: | Hits:

[Software Engineeringnetwork_security

Description: 网络安全的ppt文档,讲的很详细,可以学到知识的-network security ppt files, said very detailed knowledge can be learned
Platform: | Size: 1337344 | Author: yuhu | Hits:

[Software EngineeringCourse_PKI

Description: 网络安全的论文,简单介绍PKI加密的周边知识。-network security paper, a brief introduction of PKI encryption peripheral knowledge.
Platform: | Size: 51200 | Author: | Hits:

[SNMPCisco.Press.Network.Security.Fundamentals.Sep.2004

Description: This a book about network security and SNMP .-This a book about network security and SN MP.
Platform: | Size: 19371008 | Author: wangjia | Hits:

[Software Engineeringbiyesheji_jiyuACLdewangluo

Description: 毕业设计论文-反病毒的 随着网络技术的不断发展,出现了大量的基于网络的服务,网络安全问题也就变得越来越重要。ACL即访问控制列表,它是工作在OSI参考模型三层以上设备,通过对数据包中的第三、四层中的包头信息按照给定的规则进行分析,判断是否转发该数据包。基于ACL的网络病毒的过滤技术在一定程度上可以比较好的保护局域网用户免遭外界病毒的干扰,是一种比较好的中小型局域网网络安全控制技术。 本设计重点从计算机网络病毒的出现、基本特征以及发展现状的角度出发,比较深入的研究了相关网络安全技术,深入分析了当前几种严重影响网络性能的网络病毒,结合ACL的工作原理,制定了相应的访问控制规则列表,并且通过模拟实验,对ACL的可行性进行了相应的测试。 -Design graduate thesis- with the anti-virus network technology continues to develop, a lot of Web-based services, network security issues have become increasingly important. ACL or access control lists, it is work in the OSI Reference Model for three more equipment, the data packet through the third, four of Baotou information according to the rules, to determine whether the transmitted data packets. Based on ACL network virus filtering technology will be able to better protect users from the outside world LAN virus interference is a relatively good small and medium-sized LAN security control technologies. The design focus from the computer network virus with the basic features of the status quo of the development perspective, more in-depth studies to the relevant network security technol
Platform: | Size: 128000 | Author: thocr | Hits:

[OS programwangluobaojiequ

Description: 实现对网络安全的保障,对入侵计算机的数据包进行截取检测 -realization of network security for the protection of computer hacking of data packets for an interception Detection
Platform: | Size: 80896 | Author: 杜维维 | Hits:

[Software Engineeringwangluoloudonglunwen

Description: 本文档是毕设论文。是网络安全漏洞扫描的。已通过答辩。-this documentation is completed based papers. Network security vulnerability scanning. The respondent has passed.
Platform: | Size: 1359872 | Author: 金晓爽 | Hits:

[Crack HackAes_jiamidaima

Description: 网络安全加密的AES算法代码,希望大家能用的着。-network security encryption algorithm AES code, the hope everyone can be significant.
Platform: | Size: 12288 | Author: 阿太 | Hits:

[OtherAppliedCryptography

Description: 应用密码学,协议,算法与C源程序,密码学经典著作,网络安全与密码学必备书-Applied Cryptography, protocol, algorithm and C source code, classic cryptography, network security and cryptography an essential book
Platform: | Size: 2579456 | Author: | Hits:

[P2Pp2p-security

Description: 这篇文章是关于P2P安全的,里面先介绍了P2P的原理,接着提出了一些解决网络安全的方法-This article is about the P2P security, which first introduced the principle of P2P, and then made a number of ways to solve the network security
Platform: | Size: 243712 | Author: 周林 | Hits:

[SCMsecurity

Description: 关于无线传感器网络安全性问题的研究进展和相关讨论的论文。-On wireless sensor network security research progress and related discussion papers.
Platform: | Size: 128000 | Author: 苏可 | Hits:

[Firewall-SecurityCryptography.and.Network.Security.4th.Edition

Description: 本书系统地介绍了密码编码学与网络安全的基本原理和应用技术。全书主要包括下列四个部分:对称密码部分讨论了对称密码的算法和设计原理;公钥加密和散列函数部分讨论了公钥密码的算法和设计原理、报文鉴别码和散列函数的应用等;网络安全应用部分讨论了系统层的安全问题,包括电子邮件安全、IP安全以及Web 安全等;系统安全部分讨论了入侵者和病毒造成的威胁及相应的对策、防火墙和可信系统的应用等。-This book systematically describes encryption and network security study of the basic principles and application technology. Book include the following four parts: symmetric cryptography, symmetric cryptography, discussed some of the algorithms and design principles public-key encryption and hash function discussed some public key cryptography algorithms and design principles, message authentication code and the application of hash function etc. network security part of the system application layer security issues, including e-mail security, IP security and Web security system security is discussed in part caused by the intruder and virus threats and appropriate countermeasures, firewalls and trusted systems and so on.
Platform: | Size: 12995584 | Author: 秦中元 | Hits:

[Internet-NetworkSensor-Network-Security-A-Survey

Description: 本文是一篇关于传感器网络安全的综述,详细地从各个层介绍了它的研究情况。-Wireless sensor networks(WSNs) use small nodes with constrained capabilities to sense,collect,and disseminate information in many types of applications.As sensor networks become wide-spread,security issues become a central concern, especially in mission-criticaltasks.In this paper,we identify the threats and vulnerabilities to WSNs and summarize the defense methods based on the networking protocol layer analys is ?rst.Then we give a holistic overview of security issues.These issues are divided into seven categories:cryptography,keymanage- ment,attack detections and preventions,securer outing,secure location security,secure data fusion,and other security issues. Along the way we analyze thead vantages and disadvantages of current secure schemes in each category.Inaddition,we also summarize the techniques and methods used in these categories,and point out the open research issues and directions in each area.
Platform: | Size: 348160 | Author: 马宁 | Hits:

[Firewall-Security4. Information Forensics & Security

Description: Base Papers for Network Security
Platform: | Size: 5901312 | Author: cschellaa | Hits:
« 12 3 4 5 6 7 8 9 10 ... 50 »

CodeBus www.codebus.net