- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
TÀI LIỆU THƯ VIỆN SỐ
Danh mục TaiLieu.VN
The Passionate Programmer: Creating a Remarkable Career in Software Development
Success in today's IT environment requires you to view your career as a business endeavor. In this book, you'll learn how to become an entrepreneur, driving your career in the direction of your choosing. You'll learn how to build your software development career step by step, following the same path that you would follow if you were building, marketing, and selling a product. After all, your skills themselves are a product. The choices you...
218 p dnulib 06/12/2012 313 2
Từ khóa: Network Security, Software Design, Software Development, Networking, thiết kế phần mềm, lập trình
Packet analyzer (aka network analyzer, protocol analyzer or sniffer), computer software or hardware that can intercept and log traffic passing over a digital network According to a new study, your browsing history may be even less safe than the last time you heard about how your browsing history is not safe. Researchers at the University of California trolled through a wide range of popular websites to determine which ones were...
86 p dnulib 20/11/2012 363 1
Từ khóa: Sniffers, network analyzer, phân tích mạng, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Worm: A program that makes copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive in the form of a joke program or software of some sort. - Symantec Security Response Glossary Virus: A program or code that replicates; that is, infects another program, boot sector, partition sector, or...
82 p dnulib 20/11/2012 412 1
Từ khóa: Viruses and Worms, Virus và sâu máy, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Trojans and Backdoors are sorts of Bad-wares which their main purpose is to send and receive data and especially commands through a port to another system. This port can be even a well-known port such as 80 or an out of regular ports like 7777. The Trojans are most of the time defaced and shown as a legitimate and harmless application to encourage the user to execute them. The main characteristic of a Trojan is that first it should be...
98 p dnulib 20/11/2012 387 1
Từ khóa: trojans and backdoors, Bad-wares, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Objective Password cracking Password attacks Identifying various password cracking tools Formulating countermeasures for password cracking Escalating privileges Executing applications Keyloggers and Spywares Spywares and keyloggers countermeasures Hiding files Understanding rootkits The use of Steganography Covering tracks Offline Attacks Offline attacks are time consuming LM Hashes are much more vulnerable due to smaller key space and...
165 p dnulib 20/11/2012 405 2
Từ khóa: System Hacking, tấn công hệ thống, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
An enumerated type (also called enumeration or enum, or factor in the R programming language, and a categorical variable in statistics) is a data type consisting of a set of named values called elements, members or enumerators of the type. The enumerator names are usually identifiers that behave as constants in the language. A variable that has been declared as having an enumerated type can be assigned any of the enumerators as a value. In...
46 p dnulib 20/11/2012 380 1
Từ khóa: Enumeration, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Network Scanning is the process of examining the activity on a network, which can include monitoring data flow as well as monitoring the functioning of network devices. Network Scanning serves to promote both the security and performance of a network. Network Scanning may also be employed from outside a network in order to identify potential network vulnerabilities.
111 p dnulib 20/11/2012 294 1
Từ khóa: Scanning Networks, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Footprinting and Reconnaissance
Before jumping into Ethical hacking and hacking tips and tricks, it is direly needed to know what is ethical hacking all about and why do you need this and where you need this? You must know such aspects before you put yourselves into ethical hacking. Just assume that you are in need of accessing your own security parameters of your system, to fix several issues related to it. If you do this, it’s also a kind of ethical hacking because...
84 p dnulib 20/11/2012 311 1
Từ khóa: Reconnaissance, Footprinting, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Introduction to Ethical Hacking
"Patriotic hackers" backed by chinese authorities conducted extensive computer hacking on U.S.government agencies and companies, including computer networks of Google Inc, according to a report published by the New York Times An examination of 250000 diplomatic cables made public by WikiLeaks.org by the U.S.newspaper showed that high-level Chinese civilian and military offcials assisted succcessful hacking attacks aimed at retrieving a...
57 p dnulib 20/11/2012 371 1
Từ khóa: Introduction to Ethical Hacking, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Security+™ Study Guide Michael Pastore
The Security+ certification was developed at CompTIA in response to both corporate and government requests for a certification that validates foundation-level IT security skills. Topics covered include access control, authentication, intrusion detection, malicious code, cryptography, physical security, disaster recovery, policies and procedures and more. The CD includes an advanced testing program with two bonus sample exams, as well as...
567 p dnulib 20/11/2012 380 1
Từ khóa: Security Study Guide, hacking, Comp TIA, Network security, an ninh mạng, an ninh và bảo mật, computer science
ABC Amber CHM Converter Trial version
Most likely, ABC Amber CHM Converter is a batch decompiler for Compiled Windows HTML Help files (*. chm) you've been searching for a long time. Taking CHM files or CHM ebooks, it will convert them to any document format you wish - PDF, RTF, HTML, DOC, TXT, MCW, etc. It creates contents with bookmarks (in RTF and HTML), extract all pictures, keeps all internal and external hyperlinks. In other words, you can produce new hypertext system in...
467 p dnulib 20/11/2012 402 1
Từ khóa: general Networking and security concepts, an ninh và bảo mật, an ninh mạng, Basic TCP/IP principles, Network infrastructure security, quản trị mạng
Understand network security, Understand security threat trends, Understand the goals of network security, Determine the factors involved in a secure network strategy, Security Certification Network security (Information Security) • Tasks of guarding digital information, which is typically processed by a computer (such as a personal computer), stored on a magnetic or optical storage device (such as a hard drive or DVD), and transmitted...
643 p dnulib 20/11/2012 435 1
Từ khóa: overview, authentication, attacks, remote access, wireless, email and web security, devices and media, network topology and IDS, system hardening
Đăng nhập
Bộ sưu tập nổi bật
Tuyển tập tài liệu hay về Sinh học
12 11583
Tài liệu về Sư phạm Mầm non chọn lọc
24 23065
14 15859
Bộ sưu tập Quản trị doanh nghiệp
11 11964
Tin nhanh