Welcome![Sign In][Sign Up]
Location:
Search - network security

Search list

[Internet-Network1-Security-Issues-in-Wireless-Sensor-Networks---I

Description: Wireless sensor network in security
Platform: | Size: 78848 | Author: atul | Hits:

[Windows Developmcgraw-hill---wi-fi-security

Description: network security trends
Platform: | Size: 4773888 | Author: Amandeep kaur virk | Hits:

[Internet-Networknetwork

Description: network security on ppt
Platform: | Size: 1696768 | Author: aqbelajar | Hits:

[Software Engineeringystem

Description: Zigbee无线传感器网络在安全监测系统中的应用-Zigbee wireless sensor network security monitoring system
Platform: | Size: 358400 | Author: desk | Hits:

[SCMwsn

Description: 无线传感器网络安全协议设计方面内容,希望对大家有帮助-Wireless sensor network security protocol design aspects, we want to help
Platform: | Size: 829440 | Author: 南希儿 | Hits:

[Windows DevelopSecurity-Issues-in-Ad-Hoc-Networks

Description: Mobile wireless ad hoc network security issue. Mobile ad hoc network is an emerging area of mobile computing and is gradually becoming a new paradigm of wireless network. In mobile ad hoc networks, mobile nodes communicate directly with each other in a peer-to-peer manner and form a network on-the-fly, carrying out basic
Platform: | Size: 201728 | Author: badraac | Hits:

[BooksNetwork

Description: 让大家了解网络安全的重要性,以及所需的一些协议-So that we understand the importance of network security, and the required number of agreements
Platform: | Size: 5371904 | Author: yuer | Hits:

[OS programNetwork-state

Description: 网络态势可视化技术作为一项新技术,是网络安全态势感知与可视化技术的结合,将网络中蕴涵的态势状况通过可视化图形方式展示给用户,并借助于人在图形图像方面强大的处理能力,实现对网络异常行为的分析和检测。这种方式充分结合了计算机和人脑在图像处理方面的处理能力的优势,提高了对数据的综合分析能力,能够有效的降低误报率和漏报率,提高系统检测效率,减少反应时间。并且这种可视化方法对于有些显示有明显特征的异常行为,还具有一定的预测能力.-Network state visualization technology as a new technology, network security situational awareness and visualization technologies, the trend implied in the network status graphically via visual display to the user, and the help of graphic images in terms powerful processing capability for network analysis and detection of abnormal behavior. This approach is combined with a computer and image processing in the human brain' s processing power advantage, improve the comprehensive analysis of the data, can effectively reduce the false positive rate and false negative rate, and improve the system detection efficiency, reduce response time. And this visualization methods for showing some obvious features of abnormal behavior, also have some predictive power.
Platform: | Size: 1794048 | Author: sdjgkj | Hits:

[Internet-Networkcomputer-network

Description: 本书介绍了计算机网络的基础知识和基本概念,设计数据通信、网络技术、交换、命名和寻址、路由、应用和服务以及网络安全等诸多内容。-This book introduces the basics of computer networks and basic concepts, design data communication, network technology, exchange, naming and addressing, routing, and network security applications and services, and many other content.
Platform: | Size: 13920256 | Author: 钱建江 | Hits:

[Crack Hacksecurity-chats

Description: 用java写的,网络安全聊天,用des加密聊天内容、用rsa加密进行对消息摘要进行签名、用md5对消息生成摘要等等。-Written using java, network security, chat, chat with des encryption, rsa encryption used to sign the message digest using md5 generates a summary of the news and so on.
Platform: | Size: 41984 | Author: freeson | Hits:

[Internet-NetworkNetwork-penetration-Attack

Description: 黑客的基本攻击方法及原理,以及一些简单软件应用。 网络渗透攻击事件的发生极为普遍,众多的网络管理员和网络安全工作者却对网络安全环境所面临的严峻考验缺乏足够的认识,因而也未曾采取全面的防范补救措施应对各种攻击行为。《孙子兵法》曰“知已知彼,百战不殆;不知彼而知已,一胜一负;不知彼不知已,每战必败”。建立有效的防御体系的惟一障碍是知识的不足。不论你是一位信息安全技术的爱好者、一位IT专家或一名有经验的信息安全实践者,只要你想建立起一个有效的防御体系,就必须了解黑客们所使用的基本工具和手段。 以“网络渗透攻击”为切入点,就是要让实训对象认清网络安全环境和网络渗透入侵的一些普遍规律,并有针对性的补充知识和采取全面的防范补救措施,为网络防御提供事件依据和需求来源。力争打破常规实训体系,不同于普通实训书籍或培训机构的教学模式,实现由浅入深、由意识到技术分而治之的教学模式。-The fundamental hacker attack methods and principles, as well as some simple software application. Network attack events is very common, many network administrators and network security workers to network security environment is facing a severe test to lack enough understanding, and therefore not taking comprehensive precautionary and remedial measures to deal with all kinds of aggressive behavior. " Grandchildren strategics" Yue" Zhiyizhibi, invincible do not know and confidant, one of a negative do not know do not know, every war must be". The establishment of an effective defense system only obstacle is lack of knowledge. Whether you re a information security technology enthusiasts, a IT expert or an experienced information security practitioners, as long as you want to set up an effective defense system, it is necessary to understand the hackers were using basic tools and methods. With "the network attack" as the breakthrough point, is to make the training object recognize
Platform: | Size: 1503232 | Author: 小邓 | Hits:

[Internet-NetworkNetwork-and-system-training

Description: 本次培训内容覆盖目前大部分网络安全与防御知识,本课程详细讲述了网络安全与系统安全的各个概要,具体不想说,本人亲手制作,如有问题,请各位大侠一一指出,谢谢! 1、网络安全概述 2、导致网络安全问题的原因 3、网络安全特性 4、影响网络安全的主要因素 5、黑客常用攻击手段分析6、网络安全工具 7、网络安全防护建议 8、个人以及操作系统安全-The training covers most of the current network security and defense knowledge, this course is a detailed account of the network security and system security in all essentials, specific do not want to say, I personally produced, if there are questions, please one one points, thank you! 1, overview of network security 2, causes the network security problem 3, characteristics of network security In 4, the main factors influencing network security In 5, the hacker attack methods in common use analysis of 6, network security tools 7, network security and Protection Suggestion 8, individual as well as the operating system security
Platform: | Size: 3127296 | Author: 小邓 | Hits:

[Program docUMTS-Security-[Valtteri-Niemi-and-Kaisa-Nyberg]-2

Description: The Universal Mobile Telecommunication System (UMTS) offers a consistent set of services to mobile computer and phone users and numerous different radio access technologies will co-exist within the UMTS system’s core network – security is, therefore, of the utmost importance. UMTS Security focuses on the standardized security features of UMTS and brings together material previously only available in specifications, design documents and presentations in one concise form. In addition, this unique volume also covers non-standard implementation specific features that allow differentiation between operators and manufacturers. Describes the security solutions specified for UMTS-The Universal Mobile Telecommunication System (UMTS) offers a consistent set of services to mobile computer and phone users and numerous different radio access technologies will co-exist within the UMTS system’s core network – security is, therefore, of the utmost importance. UMTS Security focuses on the standardized security features of UMTS and brings together material previously only available in specifications, design documents and presentations in one concise form. In addition, this unique volume also covers non-standard implementation specific features that allow differentiation between operators and manufacturers. Describes the security solutions specified for UMTS
Platform: | Size: 1835008 | Author: Globalcitizen | Hits:

[OS programccie

Description: CCIE Professional Development Series. Network Security Technologies and Solutions. A comprehensive, all-in-one reference for Cisco Network Security. by Yusuf Bhaiji, CCIE No.9305
Platform: | Size: 16249856 | Author: Comm.Eng.Dude | Hits:

[Technology ManagementApplication-layer-network-safety

Description: 关于应用层网络安全防护设计的设计思路,以及传统防火墙和应用层防火墙的区别等-On the application layer network security protection design design thinking
Platform: | Size: 299008 | Author: chey | Hits:

[Othergreen-network

Description: 网络技术的出现和发展, 多方面改变了人们的思维方式和生活习惯, 也极大地影响了经济发展的模式。网络在带 来很多便利的同时, 也带来了很多问题, 比如病毒、黑客所造成的信息不安全等问题, 垃圾邮件所造成的网络资源浪费问 题, 尤其是网络上一些不良信息对我国青少年的危害相当大。在这种情况下, 为了我国互联网事业的健康发展, 分析现存 的网络安全问题, 构建一个绿色网络就显得至关重要。-The emergence and development of network technology, many ways to change people s way of thinking and living habits, and also greatly affected the economic development model. Network in the band To a lot of convenient, it also brings many problems, such as viruses, information insecurity and other problems caused by hackers, spam, caused by the waste of network resources Q Question, especially in a large network of some bad information on our young people harm. In this case, to the healthy development of the Internet in China, analysis of existing The problem of network security, build a green network is vital.
Platform: | Size: 882688 | Author: 小雨 | Hits:

[OtherLinux-network-safe-docs1

Description: Linux网络安全讲义:Netfilter机制与iptables工具.此文章仅是个人学习笔记整理,并非本人原创,来源互联网,仅供朋友们私下学习,请勿非法传播-Linux Network Security Lecture: the Netfilter mechanism and the iptables tool. This article is only organize personal study notes, is not my original source of the Internet, only friends in private study, do not illegally spread
Platform: | Size: 304128 | Author: jia | Hits:

[Crack HackInformation-security

Description: 《信息安全与加密解密核心技术》,讲述加解密的,有关计算机/网络安全类的教科书,解压后是PDF格式-" Information security and encryption and decryption core technology," about to add decryption, computer/network security class textbook
Platform: | Size: 12743680 | Author: lch | Hits:

[BooksComputer-Network-(fifth-edition)

Description: 书名:计算机网络(第五版) 作者: 谢希仁 出版社: 电子工业   《计算机网络(第5版)》自1989年首次出版以来,于1994年、1999年和2003年分别出了修订版。2006年8月本教材通过了教育部的评审,被纳入普通高等教育“十一五”国家级规划教材。《计算机网络》的第5版,在内容和结构方面都有了很大的修改。   全书分为10章,比较全面系统地介绍了计算机网络的发展和原理体系结构、物理层、数据链路层、网络层、运输层、应用层、网络安全、因特网上的音频/视频服务、无线网络和下一代因特网等内容。各章均附有练习题。此外,附录A给出了部分习题的答案和提示。随书配套的光盘中,有全书课件和作者教学中经常遇到的150多个问题及解答,计算机网络最基本概念的演示(PowerPoint文件),以及《计算机网络(第5版)》引用的全部RFC文档等,供读者参阅。 -Title: Computer Network (fifth edition) Author: Xie Xiren Publisher: Electronics Industry Computer network (5th edition) since it is first published in 1989, in 1994, 1999 and 2003, respectively, it is corrected and republished. In August 2006, the textbooks is incorporated into the regular higher education "Eleventh Five-Year" national planning materials. In the 5th edition of the "computer network", there had been substantial changes in content and structure. The book is divided into 10 chapters, more comprehensive and systematic introduction to the development of computer networks and principles of architecture, physical layer, data link layer, network layer, transport layer, application layer, network security, audio/video services on the Internet, wireless networks and next-generation Internet content. The various chapters are accompanied by exercises. In addition, Appendix A gives some answer to the exercises and tips.
Platform: | Size: 18117632 | Author: Victoria Hu | Hits:

[JSP/JavaEvaluating-the-Vulnerability-of-Network-Traffic-U

Description: This source code for network security and routing analysis I-This is source code for network security and routing analysis IEEE
Platform: | Size: 11956224 | Author: matlab | Hits:
« 1 2 3 4 5 6 7 89 10 11 12 13 ... 50 »

CodeBus www.codebus.net