Zustand: New.
Zustand: New.
Zustand: As New. Unread book in perfect condition.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 32,21
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 32,19
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 37,65
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: As New. Unread book in perfect condition.
Anbieter: liu xing, Nanjing, JS, China
paperback. Zustand: New. Language:Chinese.Paperback. Publisher: Machinery.
Verlag: Tsinghua University Press, 2000
ISBN 10: 7302081514 ISBN 13: 9787302081517
Anbieter: liu xing, Nanjing, JS, China
paperback. Zustand: New. Language:Chinese.Pages Number: 11218 Publisher: Tsinghua University Press Pub. Date :2004-04. book a comprehensive and systematic introduction to the current network security the relevant content. including an overview of network security. network security infrastructure. TCPIP-based. data encryption. network attacks. detection and prevention technology. software security vulnerabilities and related professional computer viruses and anti-virus. firewall technology. virtual private network tec.
Verlag: Electronic Industry Press, 1991
ISBN 10: 7121034719 ISBN 13: 9787121034718
Anbieter: liu xing, Nanjing, JS, China
paperback. Zustand: New. Language:Chinese.Publisher: Electronics Industry.
Verlag: Mechanical Industry Press Pub. Date :2004-09, 2000
ISBN 10: 7111148711 ISBN 13: 9787111148715
Anbieter: liu xing, Nanjing, JS, China
paperback. Zustand: New. Language:Chinese.Pages Number: 10274 Publisher: Machinery Industry Press. Pub. Date :2004-09. This book introduces the computer network system security architecture. the basic theory. technical principles and implementation methods. The main contents include: the physical security of computer networks. information encryption and PKI. firewall technology. intrusion detection. access control. network security testing and assessment techniques. computer virus prevention technology. backup and ne.
Verlag: Tsinghua University Press, 1991
ISBN 10: 7302110751 ISBN 13: 9787302110750
Anbieter: liu xing, Nanjing, JS, China
paperback. Zustand: New. Language:Chinese.Paperback. Publisher: Tsinghua University Press. This book describes in detail the computer network security mechanisms. the overall.
Verlag: China Water Power Press Pub. Date :2006-10, 2006
ISBN 10: 750844051X ISBN 13: 9787508440514
Anbieter: liu xing, Nanjing, JS, China
paperback. Zustand: New. Language:Chinese.Pages Number: 273 Publisher: China Water Resources and Hydropower Press Pub. Date :2006-10. This book introduces the basic network and information security theory and key technology. a total of 11 book chapters. mainly including: network security. cryptography. digital signatures and authentication. firewall technology . intrusion detection. prevention and treatment of computer viruses. hacker attack techniques used. the network site s security. operating system security. dat.
Verlag: Electronic Industry Publishing House, 2000
ISBN 10: 7121053640 ISBN 13: 9787121053641
Anbieter: liu xing, Nanjing, JS, China
paperback. Zustand: New. Language:Chinese.Pages Number: 11247 Publisher: Electronic Industry Press. Pub. Date :2007-12. Introduction comprehensive book describes the basic theory of computer network security. technical principles and implementation methods. The book is Chapter 9. Chapter 1 introduces the basics of network security. Chapter 2 to Chapter 4 describes firewall technology. VPN technologies. intrusion detection technology principles and applications solutions. Chapter 5 describes a hacker attack and respon.
Verlag: Mechanical Industry Press, 2000
ISBN 10: 711119957X ISBN 13: 9787111199571
Anbieter: liu xing, Nanjing, JS, China
paperback. Zustand: New. Language:Chinese.Paperback Pages Number: 384 Publisher.: Mechanical Industry Press; 1 edition (January 1. 2007). Book is a thorough introduction to computer network security technology. The book is divided into five parts. including: cryptography and PKI-based security firewall technology. intrusion detection security technologies. computer virus prevention. system security. The book is suitable for undergraduate teaching materials. electronics. computers. information security. e-commerce are.
Sprache: Chinesisch
Verlag: Beijing University of Aeronautics and Astronautics Press, 2000
ISBN 10: 7810773623 ISBN 13: 9787810773621
Anbieter: liu xing, Nanjing, JS, China
paperback. Zustand: New. Paperback. Pub Date: 2003 08 Pages: 200 in Publisher: Beijing University of Aeronautics and Astronautics Press computer network security theory and technology tutorials written by the authors on the basis of years of teaching practice. The main contents include an overview of the preliminary number theory. information encryption technology. the integrity of the message authentication and digital signatures. key management. authentication. access control. virtual private network technology. ne.
Sprache: Chinesisch
Verlag: Beijing University of Posts and Telecommunications, 2000
ISBN 10: 7563519599 ISBN 13: 9787563519590
Anbieter: liu xing, Nanjing, JS, China
paperback. Zustand: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Pages Number: 202 Publisher: Beijing University of Posts and Telecommunications Press Pub. Date: 2009 -08 this book is to adapt to computer network security. teaching and writing of an experimental teaching materials. Book is to highlight the systematic network security for the purpose to analyze and address specific security issues for the purpose of combining with the principles of network security. in accordance with the shallow depth. from the local to the whole idea of ??the network security course experiments carried out System classification. LAN and general book websites for common security attacks and network technology. emphasis on offensive and defensive opposition and balance. Book easy to understand. focus on practical. The author s many years of teaching practice. to find a combination of practicality and students interested in point. the design of experimental techniques and strong interest. Taking into account the different experimental conditions in different schools. the majority of experimental content is based on the Windows operating system is easy to set up the experimental environment. reducing the cost of the course of experimental set up. This book is based on the experimental design in order from easy to difficult. teachers can be flexible according to students with different layout. Each experiment consists of book experimental purposes. laboratory equipment. experimental procedures. experimental summary of several components. the experimental design is necessary to stress the independence of the various experiments also took note of the consistency between experiments. Note book and other computer programs. highlighting the computer knowledge of systematic. comprehensive. relevant to each experiment with a combination of computer knowledge. so the reader to establish the basic concepts of computer network security and basic infrastructure. This book not only as a vocational computer science. network management professionals. information security professional. teaching professional communication. computer networks can be used as more Contents: first network infrastructure and network sniffing and network infrastructure Chapter 1 Network Technology Experiment 1-1windows sniffing network traffic analysis (ethereal) experimental 1-2tcp three-way handshake protocol analysis of experimental 1-3udp protocol network sniffer based analysis of experimental techniques 1-4 second hacking vulnerability scanning technology Chapter 2 Use stealth and network experiments 2-1 supeFour Satisfaction guaranteed,or money back.
Sprache: Chinesisch
Verlag: China Electric Power Press, 1991
ISBN 10: 7508371712 ISBN 13: 9787508371719
Anbieter: liu xing, Nanjing, JS, China
paperback. Zustand: New. Language:Chinese.Paperback. Publisher: China Electric Power.
Sprache: Chinesisch
Verlag: People's Post Pub. Date :2010-9-1, 2010
ISBN 10: 7115232962 ISBN 13: 9787115232960
Anbieter: liu xing, Nanjing, JS, China
paperback. Zustand: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Pages Number: 278 Publisher: People's Post Pub. Date :2010-9-1. Contents: Project 1 Project Description and analysis of network security analysis of network vulnerability Task 1 tasks 1-1 to understand the basic elements of network security analysis of network vulnerability tasks 1-2 tasks 1-3 for the main threats facing the task of network planning overall network security tasks 2 2-1 2-2 familiar with the task of network security standards to know the task of network security design strategies 2-3 overall security project planning network operating system security tasks 1 2 Set basic security policy tasks 1-1 1-2 to set the local security policy tasks off unnecessary services and ports and protection vulnerability check Task 2 task tasks 2-2 2-1 check for common vulnerabilities vulnerability Item 3 of the Internet virus protection and removal of malicious software Task 1 and prevention of virus removal and prevention of common tasks 1-1 ARP virus removal and prevention tasks 1-2 network worm removal and prevention of Task 2 and prevention of malicious software removal malicious software task tasks 2-1 2-2 remove malicious software malware prevention task 2-3 task block malicious web page task 3 3-1 block malicious web browser repair task 3-2 task browser's security settings to prevent malicious web page task 4 3-3 anti-virus software to install and use stand-alone Task 4-1 Task 4-2 using antivirus software antivirus software to use the network version of the project and prevent network attacks 4 Task 1 scanner port scanner application tasks 1-1 1-2 scan segments to use integrated scanner task Task 2 segment scan denial of service attacks and DDOS attack prevention task to understand the phenomenon of 2-1 and 2-2 step task denial of service attacks and defenses common task 3 Trojan removal and protection tasks 3-1 identified Trojan infection symptoms tasks 3-2 horse killing and cleanup tasks 4 network monitoring tool environment for application tasks and installation tasks running 4-1 4-2 to capture the data package to see the TCP packet header capture FTP Task 4-3 Task 4-4 to capture clear-text passwords Telnet password in clear text item 5 encryption and digital signature technology Task 1 file encryption and decryption tasks tender 1-1 1-2 to decrypt files encrypted file tasks Task 2 Task 3 email encryption digital signatures in e-mail application for digital certificate application tasks 3-1 Task 3 -2 to send digitally signed e-mail program 6 firewall and intrusion detection technology Task 1 Configure the firewall and application firewall's basic task configuration tasks 1-1 1-2 1-3 firewall firewall application tasks the placement of Task 2 to apply intrusion detection of technical tasks 2-1 2-2 knowledge-based intrusion detection system tasks sessionWall Item 7 of the wireless LAN intrusion detection security configuration tasks a basic setup tasks wireless LAN security settings SSID Renwu 1-1 1-2 2 WEP settings to disable SSID Task 2 -1 wireless router setup tasks 2-2 Wireless LAN Client Security Settings item 8 network services and security tasks 1 Web application security setup tasks 1-1 web server security setup tasks 1-2 web browser security settings Task 2 e-mail security Task 2-1 Task 2-2 e-mail security services e-mail security settingsFour Satisfaction guaranteed,or money back.
Zustand: New. Print on Demand.
ISBN 10: 7115130973 ISBN 13: 9787115130976
Anbieter: liu xing, Nanjing, JS, China
paperback. Zustand: New. Language:Chinese.Paperback. Publisher: Posts Telecom Press. This book introduces specific detailed overview of network security. computer viruses. computer.
ISBN 10: 7030152956 ISBN 13: 9787030152954
Anbieter: liu xing, Nanjing, JS, China
paperback. Zustand: New. Language:Chinese.Paperback. Publisher: Science out.
Sprache: Chinesisch
Verlag: Huazhong University of Science and Technology Press, 2018
ISBN 10: 756803965X ISBN 13: 9787568039659
Anbieter: liu xing, Nanjing, JS, China
paperback. Zustand: New. Paperback. Pub Date: 2018-08-01 Language: Chinese Publisher: Huazhong University Press Test tutorial information and network security information technology space experiments Series institutions of higher learning computer textbook series can be used in computer science or information security professional practice teaching. helping students master the information and network security technologies. application of theoretical knowledge learned to .
Anbieter: liu xing, Nanjing, JS, China
paperback. Zustand: New. Paperback. Pub Date: 2018-10-01 Pages: 215 Language: Chinese Publisher: Science Press Network Security Technology Practice Guide Safety requirements for teaching professional training objectives and curriculum information network security. from a practical technology. take full account of network security laboratory of colleges and universities hardware and software environment. combined with the network security technology courses group .
ISBN 10: 7302290199 ISBN 13: 9787302290193
Anbieter: liu xing, Nanjing, JS, China
paperback. Zustand: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback. Pub Date: November 2012 Pages: 291 Language: Chinese Publisher: Tsinghua University Press Vocational network technology professional post ability to build a series of tutorials: Network Security Deployment focus on network security engineer job demand. combined with network security deployment and development status of enterprise network to protect against common network attacks said standard. common enterprise network security technology led to configure the main line with the management of enterprise network security equipment. three learning context for the process. step by step explained network security tasks. Higher vocational the network technical professional post ability to build a series of tutorials: network security deployment task-driven organization content. three learning situations designed a total of 16 missions. and research behind each task are scheduled to meet the vocational qualification clearance exercises. Tutorial series: network security deployment higher vocational the network technical professional post ability to build for the purpose to improve the students applying to design learning situations and tasks in accordance with the actual needs of the enterprise of college students. to enable students to be able to understand the relevant Based on the theory with practical skills. The book can be used as a special computer network and information security professional teaching books. as colleges. training guidance materials for computer training courses. can also be used as a network security technicians. network security enthusiasts. network management personnel and information security management reference books. Contents: learning scenarios in an enterprise network analysis tasks command 1.1 user needs analysis an understanding of common hacker hacker's history 1.2.4 1.2.3 1.2 Preliminaries 1.2.1 Introduction to Network Security 1.2.2 hacker definition port Overview of common network attacks 1.3 Design 1.4 task implementation 1.4.1 Task 1: scan open ports 1.4.2 task 2: hackers used intrusion command 1.5 FAQ answers detection 2.1 1.6 clearance to practice tasks two target system user needs analysis 2.2 Preliminaries 2.2 2.2.3 scanner .1 vulnerability Overview 2.2.2 main port and vulnerability describes the role and works 2.2.4 commonly used port scanning technology classification 2.2.5 commonly used scanner 2.3 Design 2.4 task implementation 2.4.1 Task 1: port use of the scanner SuperScan 2.4.2 Task 2: the use of the integrated scanner X-Scan 2.5 FAQs answer 2.6 clearance to practice tasks password significance crack the 3.1 user demand and Analysis 3.2 Preliminaries 3.2.1 password crack 3.2.2 for user password 3.3 Design 3.4 task implementation 3.4.1 Task 1: Use the the streamer scanner probe target hosts 3.4.2 task to: Use SMBcrack for password cracking 3.5 FAQ answers 3.6 clearance practice tasks four network monitoring tools use 4.1 4.3 design principles of user needs and Analysis 4.2 Preliminaries 4.2.1 network monitoring 4.2.2 network monitoring tool 4.4 task 4.4.1-task: use Sniffer sniffer 4.4.2 task: Wireshark tool 4.5 FAQ 4.6 clearance to practice tasks five remote control 5.1 user needs and Analysis 5.2 Preliminaries 5.2.1 Remote Control principle 5.2.2 recognize Trojan Trojan 5.2.3 Development and Classification 5.2.4 common remote control tool introduced 5.3 program Design 5.4 task implementation 5.4.1 Task 1: Using pcAnywhere remote control computer 5.4.2 Task 2: Use QuickIP 5.4.3 task of multi-computer remote control: Use GO software for remote computer control 5.5 common Questions . learning common protective Technical Analysis learning context Scenario 2 enterprise network security configuration of network equipment in the enterprise networkFour Satisfaction guaranteed,or money back.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - In an era where the digital realm is the cornerstone of modern connectivity, the importance of network security has never been more pronounced. This book, 'Network Security,' serves as a comprehensive guide and indispensable resource in navigating the intricate landscape of safeguarding digital networks. With technology evolving at an unprecedented pace, the vulnerabilities and threats that permeate these networks constantly mutate, demanding an agile and robust security framework. This book is not just a static compendium of established practices but a dynamic compendium that delves into the ever-evolving techniques, strategies, and ideologies essential to fortify networks against an array of cyber threats.Within these pages, readers will embark on a journey through the multifaceted domains of network security. From the foundational principles underpinning secure network architectures to the latest advancements in encryption, intrusion detection, and threat mitigation, this book encompasses a breadth of knowledge tailored for both beginners seeking a solid understanding and seasoned professionals aiming to stay abreast of the cutting-edge developments. The authors have meticulously crafted this resource, drawing from their extensive expertise and industry insights, to empower readers with the tools and insights necessary to defend against cyber threats in this interconnected digital landscape. Whether you're an IT professional, a security enthusiast, or a student venturing into the realm of cybersecurity, 'Network Security' aims to be your trusted companion in comprehending, implementing, and advancing network security practices.
Anbieter: preigu, Osnabrück, Deutschland
Taschenbuch. Zustand: Neu. Network Security | Step by Step Tutorials | Balakrishnan D (u. a.) | Taschenbuch | Englisch | 2023 | [.] | EAN 9781304764003 | Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, 36244 Bad Hersfeld, gpsr[at]libri[dot]de | Anbieter: preigu Print on Demand.