- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
TÀI LIỆU THƯ VIỆN SỐ
Danh mục TaiLieu.VN
Social engineering là phương pháp phi kỹ thuật đột nhập vào hệ thống hoặc mạng công ty. Đó là quá trình đánh lừa người dùng của hệ thống, hoặc thuyết phục họ cung cấp thông tin có thể giúp chúng ta đánh bại bộ phận an ninh. Social engineering là rất quan trọng để tìm hiểu, bởi vì hacker có thể lợi dụng tấn công vào yếu tố con người và phá...
75 p dnulib 20/11/2012 390 1
Từ khóa: social Engineering, kỹ thuật xã hội, đột nhập hệ thống, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Packet analyzer (aka network analyzer, protocol analyzer or sniffer), computer software or hardware that can intercept and log traffic passing over a digital network According to a new study, your browsing history may be even less safe than the last time you heard about how your browsing history is not safe. Researchers at the University of California trolled through a wide range of popular websites to determine which ones were...
86 p dnulib 20/11/2012 364 1
Từ khóa: Sniffers, network analyzer, phân tích mạng, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Worm: A program that makes copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive in the form of a joke program or software of some sort. - Symantec Security Response Glossary Virus: A program or code that replicates; that is, infects another program, boot sector, partition sector, or...
82 p dnulib 20/11/2012 413 1
Từ khóa: Viruses and Worms, Virus và sâu máy, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Trojans and Backdoors are sorts of Bad-wares which their main purpose is to send and receive data and especially commands through a port to another system. This port can be even a well-known port such as 80 or an out of regular ports like 7777. The Trojans are most of the time defaced and shown as a legitimate and harmless application to encourage the user to execute them. The main characteristic of a Trojan is that first it should be...
98 p dnulib 20/11/2012 389 1
Từ khóa: trojans and backdoors, Bad-wares, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
An enumerated type (also called enumeration or enum, or factor in the R programming language, and a categorical variable in statistics) is a data type consisting of a set of named values called elements, members or enumerators of the type. The enumerator names are usually identifiers that behave as constants in the language. A variable that has been declared as having an enumerated type can be assigned any of the enumerators as a value. In...
46 p dnulib 20/11/2012 380 1
Từ khóa: Enumeration, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Network Scanning is the process of examining the activity on a network, which can include monitoring data flow as well as monitoring the functioning of network devices. Network Scanning serves to promote both the security and performance of a network. Network Scanning may also be employed from outside a network in order to identify potential network vulnerabilities.
111 p dnulib 20/11/2012 295 1
Từ khóa: Scanning Networks, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Footprinting and Reconnaissance
Before jumping into Ethical hacking and hacking tips and tricks, it is direly needed to know what is ethical hacking all about and why do you need this and where you need this? You must know such aspects before you put yourselves into ethical hacking. Just assume that you are in need of accessing your own security parameters of your system, to fix several issues related to it. If you do this, it’s also a kind of ethical hacking because...
84 p dnulib 20/11/2012 314 1
Từ khóa: Reconnaissance, Footprinting, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Introduction to Ethical Hacking
"Patriotic hackers" backed by chinese authorities conducted extensive computer hacking on U.S.government agencies and companies, including computer networks of Google Inc, according to a report published by the New York Times An examination of 250000 diplomatic cables made public by WikiLeaks.org by the U.S.newspaper showed that high-level Chinese civilian and military offcials assisted succcessful hacking attacks aimed at retrieving a...
57 p dnulib 20/11/2012 372 1
Từ khóa: Introduction to Ethical Hacking, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Security+™ Study Guide Michael Pastore
The Security+ certification was developed at CompTIA in response to both corporate and government requests for a certification that validates foundation-level IT security skills. Topics covered include access control, authentication, intrusion detection, malicious code, cryptography, physical security, disaster recovery, policies and procedures and more. The CD includes an advanced testing program with two bonus sample exams, as well as...
567 p dnulib 20/11/2012 381 1
Từ khóa: Security Study Guide, hacking, Comp TIA, Network security, an ninh mạng, an ninh và bảo mật, computer science
CCNA: Cisco Certified Network Associate Exam Notes
Cisco Systems continues to dominate the internetworking hardware market with a more than 80 percent share of the routers used on the Internet. The Cisco Certified Network Associate (CCNA) certification is the first-tier certification in Cisco's Network Support and Communications & Services tracks and by far its most popular. Cisco recently refreshed the CCNA exam, assigning it a new exam number, 640-607, and expanding the question pool. In...
157 p dnulib 20/11/2012 377 1
Từ khóa: software, Cisco, computer science, Networking, CCNA, quản trị mạng, protocols and APIs
C# Corner: C# and .NET Developer's Network
This book is for anyone who wants to learn how to build rich and interactive web sites that run on the Microsoft platform. With the knowledge you gain from this book, you create a great foundation to build any type of web site, ranging from simple hobby-related web sites to sites you may be creating for commercial purposes.
187 p dnulib 02/11/2012 336 1
Từ khóa: Microsoft office, thủ thuật máy tinh, công nghệ thông tin, quản trị mạng, computer network, tìm hiểu microsoft word
10266A Programming in C# with Microsoft Visual Studio 2010
Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be...
896 p dnulib 02/11/2012 416 1
Từ khóa: Microsoft office, thủ thuật máy tinh, công nghệ thông tin, quản trị mạng, computer network, Microsoft visual basic 2012, Step by step word, Microsoft Visual Studio 2010
Đăng nhập
Bộ sưu tập nổi bật
14 15881
Bộ sưu tập Quản trị doanh nghiệp
11 11982
Tuyển tập tài liệu hay về Sinh học
12 11593
Tin nhanh