- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Lecture TCP-IP protocol suite - Chapter 29: Internet security
In this chapter, you will learn to: Differentiate between two categories of cryptography schemes; understand four aspects of security; understand the concept of digital signature; understand the role of key management in entity authentication; know how and where IPSec, TLS, and PPG provide security.
41 p itc 19/06/2016 265 1
Từ khóa: TCP-IP protocol suite, Lecture TCP-IP protocol suite, Network layer, Internet protocol, Internet security, Digital signature
Ebook Network security illustrated: Phần 1
Security concepts are organized based on business needs, as opposed to tech-nological similarity. We’ve tried to focus on how these concepts relate in terms of practical business functionality. For example, network monitoring is discussed in Part 1, "Managing Security " rather than in a section on intrusion detection. For people with a technical background, this method of organization may seem strange. But one of our goals is to change the...
276 p itc 23/04/2016 266 2
Từ khóa: Network security illustrated, Managing security, Outsourcing options, The other side of the coin, Determining identity, Preserving privacy
Ebook Network security illustrated: Phần 2
Part 1 of the book serial ebook Network security illustrated to part 2 of you will continue to learn about relevant issues such as: Connecting networks, hardening networks, storing information, hiding information, accessing information. Invite you to consult.
173 p itc 23/04/2016 268 2
Từ khóa: Network security illustrated, Connecting networks, Hardening networks, Storing information, Hiding information, Accessing information
Ebook Building internet firewalls: Phần 1
This book is a practical guide to building your own firewall. It provides step-by-step explanations of how to design and install a firewall at your site and how to configure Internet services such as electronic mail, FTP, the World Wide Web, and others to work with a firewall. Firewalls are complex, though, and we can't boil everything down to simple rules.
209 p itc 23/04/2016 276 2
Từ khóa: Building internet firewalls, Risks with using the internet, Services internet, Specific security mechanisms, Network concepts firewalls work
Lecture CCNA Security - Chapter 1: Modern Network Security Threats
Upon completion of this lesson, the successful participant will be able to: Describe the rationale for network security; describe the three principles of network security; identify risks, threats, vulnerabilities and countermeasures; discuss the three states of information and identify threats and appropriate countermeasures for each state;...
75 p itc 23/04/2016 283 2
Từ khóa: CCNA Security, Lecture CCNA Security, Modern Network Security Threats, Network Security, Evolution of Network Security, Drivers for Network Security
Lecture CCNA Security - Chapter 2: Securing Network Devices
Learning objectives of this chapter include: Secure the physical installation of and the administrative access to Cisco routers based on different network requirements using the CLI and CCP; configure administrative roles using privilege levels and role-based CLI; Implement the management and reporting features of syslog, SNMP, SSH, and NTP;...
175 p itc 23/04/2016 273 2
Từ khóa: CCNA Security, Lecture CCNA Security, Securing Network Devices, Securing the Edge Router, Privelege levels, Security audit tools
Lecture CCNA Security - Chapter 6: Securing the Local Area Network
The following will be discussed in this chapter: Describle endpoint security with IronPort; describle endpoint security with Network Admission Control; describle endpoint Security with Cisco Security Agent; describle MAC address spoofing attacks, STP manipulation attacks, MAC address overflow attacks, LAN storm attacks, and VLAN attacks;...
143 p itc 23/04/2016 310 2
Từ khóa: CCNA Security, Lecture CCNA Security, Local Area Network, Endpoint Security, Application attacks, Network Admission Control
Lecture CCNA Security - Chapter 8: Implementing Virtual Private Networks
Upon completion of this lesson, the successful participant will be able to: Describe the purpose and operation of VPNs, differentiate between the various types of VPNs; identify the Cisco VPN product line and the security features of these products; configure a site-to-site VPN GRE tunnel;... Inviting you to refer.
124 p itc 23/04/2016 266 1
Từ khóa: CCNA Security, Lecture CCNA Security, Virtual Private Networks, IPsec VPN, Troubleshooting VPNs, Site-to-Site VPN
Lecture CCNA Security - Chapter 9: Managing a Secure Network
This chapter include objectives: Describle the principles of secure network design, describle threat identificaion and risk analysis, describle risk managenment and risk avoidance, describle the Cisco SecureX architecture, describle operation security,...
82 p itc 23/04/2016 315 1
Từ khóa: CCNA Security, Lecture CCNA Security, Secure Network, Managing Secure Network, Risk analysis, Cisco SecureX Architecture
Lecture Scaling Networks - Chapter 4: Wireless LANs
In this chapter: Describe wireless LAN technology and standards, describe the components of a wireless LAN infrastructure, describe wireless topologies, describe the 802.11 frame structure, describe the media contention method used by wireless technology,... Inviting you to refer.
75 p itc 23/04/2016 252 1
Từ khóa: Scaling Networks, Lecture Scaling Networks, Wireless LANs, Wireless topologies, Wireless LAN Concepts, Wireless LAN Security
Đăng nhập
Bộ sưu tập nổi bật