intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

The network security

Xem 1-20 trên 97 kết quả The network security
  • This paper explores the applications of Big Data in business network analysis, focusing on how it enhances supply chain visibility, risk management, and demand forecasting. It also addresses challenges like data privacy, security, and managing large datasets.

    pdf11p vijiraiya 19-05-2025 1 1   Download

  • Lecture Cryptography: Cryptography Applications (Part 1) introduces real-world applications of cryptographic principles in authentication, key negotiation, and secure protocols. Topics include SSL/TLS, IPSec, SSH, and Kerberos. The lecture emphasizes practical implementation in networks and systems. Please refer to the lecture for more details!

    ppt62p hoatrongguong03 15-05-2025 1 1   Download

  • Lecture Cryptography: Cryptography Applications (Part 2) explores modern applications of cryptography in blockchain systems. It covers secure transactions, consensus mechanisms, and network architecture. This lecture illustrates how cryptography underpins the security and trust of decentralized platforms. Please refer to the lecture for more details!

    ppt46p hoatrongguong03 15-05-2025 2 1   Download

  • This study delves into the security vulnerabilities of blockchain consensus mechanisms and the source code, providing insights into the cybersecurity challenges facing the DeFi sector.

    pdf7p visarada 28-04-2025 1 1   Download

  • This paper introduces the application of artificial intelligence to build a security control software system in local military units. This software system uses state-of-the-art convolutional neural networks (CNN SOTA) for facial recognition by testing two of the best facial recognition models currently available: the FaceNet model and the VGGFace model.

    pdf8p vifilm 11-10-2024 6 1   Download

  • In this study, we propose a NOMA communication model combined with linear array antennas for the purpose of enhancing physical layer security. We introduce a model of 4 nodes: transmitter node S, receiver node D1, receiver node D2, eavesdropping node E.

    pdf10p viling 11-10-2024 2 1   Download

  • Recent attacks, infections, and malicious code are mostly exploited by hackers as a potential vulnerability on unsecured user computers. The issue for administrators is how to protect hundreds of computers within the organization from such insecurity.

    pdf6p tuetuebinhan000 23-01-2025 3 2   Download

  • Blockchain technology is a revolutionary concept that has transformed various industries, offering decentralized and secure solutions for data management. At its core, a blockchain is a distributed and immutable ledger that records transactions across a network of computers.

    pdf9p vibenya 31-12-2024 6 2   Download

  • to defend company resources: not only passively by using firewalls, virtual private networks (VPNs), encryption techniques, and whatever other tricks, but also by deploying proactive tools and devices throughout the network = IDS.

    ppt34p vvnghi 05-05-2011 158 23   Download

  • In the last lecture we looked at some high-level descriptions of key distribution and agreement schemes. These protocols cannot be used as they were stated. In implementation of the actual protocol, there are many situations one should be careful of. In this lecture, we will look at some common protocol failures that arise when trying to implement security protocols We will then look at some specific examples of security protocols

    ppt30p muathu_102 28-01-2013 37 5   Download

  • Các máy chủ Web (Webserver) luôn là những vùng đất màu mỡ cho các hacker tìm kiếm các thông tin giá trị hay gây rối vì một mục đích nào đó. Hiểm hoạ có thể là bất cứ cái gì từ kiểu tấn công từ chối dịch vụ, quảng cáo các website có nội dung không lành mạnh, xoá, thay đổi nội dung các file hay phần mềm chứa mã nguy hiểm. Bài viết dưới đây được trình bày như những lời khuyên cho việc đảm bảo an toàn cho các máy chủ Web....

    ppt42p muathu_102 28-01-2013 148 50   Download

  • Chapter 3 - Attacks and malicious code (part 2). After studying this chapter you will be able to: Discuss man-in-the-middle attacks, replay attacks, and TCP session hijacking; detail three types of social-engineering attacks and explain why they can be incredibly damaging; list major types of attacks used against encrypted data; list major types of malicious software and identify a countermeasure for each one.

    pdf43p nhanmotchut_3 20-10-2016 66 6   Download

  • Chapter 12 - Policies and disaster recovery. The main contents of this chapter include all of the following: Policies and procedures, privilege management, education and documentation, communication, disaster recovery, business continuity.

    pdf45p nhanmotchut_3 20-10-2016 41 6   Download

  • Chapter 7 - Quản trị bảo mật cho hệ thống (Security management system). After studying this chapter you will be able to: Understand the purpose of a network firewall and the kinds of firewall technology available on the market; understand the role of routers, switches, and other networking hardware in security; determine when VPN or RAS technology works to provide a secure network connection.

    pdf76p nhanmotchut_3 20-10-2016 73 5   Download

  • Lecture Security+ Certification: Chapter 9 - System hardening. The main contents of this chapter include all of the following: Disable nonessential systems, harden operating systems, harden applications, harden networks.

    pdf39p nhanmotchut_3 20-10-2016 75 5   Download

  • Chapter 11 - Incident response. The main contents of this chapter include all of the following: Incident response overview, computer forensics defined, contemporary issues in computer forensics, forensic process, forensic tools, forensic problems, the future of computer forensics.

    pdf90p nhanmotchut_3 20-10-2016 44 5   Download

  • Chapter 2 - Authentication. After studying this chapter you will be able to: Understand AAA (3A),create strong passwords and store them securely, understand the Kerberos authentication process, understand how CHAP works, understand what mutual authentication is and why it is necessary, understand how digital certificates are created and why they are used,...

    pdf55p nhanmotchut_3 20-10-2016 66 4   Download

  • Chapter 3 - Attacks and malicious code (part 1). After reading the material in this chapter, you should be able to: Explain denial-of-service (DoS) attacks, explain and discuss ping-of-death attacks, identify major components used in a DDoS attack and how they are installed, understand major types of spoofing attacks.

    pdf43p nhanmotchut_3 20-10-2016 66 4   Download

  • Chapter 6 - Email and web security. The main contents of this chapter include all of the following: Protect e-mail systems, list World Wide Web vulnerabilities, secure web communications, secure instant messaging.

    pdf48p nhanmotchut_3 20-10-2016 57 4   Download

  • Chapter 8 - Network security topologies. Objectives in this chapter: Explain network perimeter’s importance to an organization’s security policies, identify place and role of the demilitarized zone in the network, explain how network address translation is used to help secure networks, spell out the role of tunneling in network security, describe security features of virtual local area networks.

    pdf40p nhanmotchut_3 20-10-2016 68 4   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
749=>2