- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
TÀI LIỆU THƯ VIỆN SỐ
Danh mục TaiLieu.VN
Security là một hình thức nghe lén trên hệ thống mạng, dựa trên những đặc điểm của cơ chế TCP/IP. Security là một kỹ thuật bảo mật, được phát triển nhằm giúp đỡ những quản trị mạng. Security dùng để thu thập các gói tin trong hệ thống, mục đích ban đầu là giúp nhà quản trị mạng quản lý tốt hệ thống. Biến thể của Security là các chương...
19 p dnulib 28/12/2012 468 2
Từ khóa: quản trị mạng, an ninh mạng, an toàn và bảo mật, Security, đề tài môn Security, công nghệ thông tin
The Passionate Programmer: Creating a Remarkable Career in Software Development
Success in today's IT environment requires you to view your career as a business endeavor. In this book, you'll learn how to become an entrepreneur, driving your career in the direction of your choosing. You'll learn how to build your software development career step by step, following the same path that you would follow if you were building, marketing, and selling a product. After all, your skills themselves are a product. The choices you...
218 p dnulib 06/12/2012 314 2
Từ khóa: Network Security, Software Design, Software Development, Networking, thiết kế phần mềm, lập trình
The JOBS Act: Crowdfunding for Small Businesses and Startups
On April 5, 2012, President Barack Obama signed the Jumpstart Our Business Startups Act, better known as the JOBS Act. The act is designed to “reopen American capital markets to small companies,” defined in the act as Emerging Growth Companies. This is one of the most significant legislative initiatives in finance since the Securities and Exchange Acts of 1933 and 1934, and it opens up funding to a slew of companies previously shut out of...
196 p dnulib 06/12/2012 436 2
Từ khóa: Finance Business, Finance, Jumpstart Our Business Startups Act, securities and exchange, tài chính doanh nghiệp, giao dịch chứng khoán
Objective Password cracking Password attacks Identifying various password cracking tools Formulating countermeasures for password cracking Escalating privileges Executing applications Keyloggers and Spywares Spywares and keyloggers countermeasures Hiding files Understanding rootkits The use of Steganography Covering tracks Offline Attacks Offline attacks are time consuming LM Hashes are much more vulnerable due to smaller key space and...
165 p dnulib 20/11/2012 405 2
Từ khóa: System Hacking, tấn công hệ thống, hacker computer, vulnerabilities, security network, an ninh mạng, an ninh và bảo mật
Security+™ Study Guide Michael Pastore
The Security+ certification was developed at CompTIA in response to both corporate and government requests for a certification that validates foundation-level IT security skills. Topics covered include access control, authentication, intrusion detection, malicious code, cryptography, physical security, disaster recovery, policies and procedures and more. The CD includes an advanced testing program with two bonus sample exams, as well as...
567 p dnulib 20/11/2012 380 1
Từ khóa: Security Study Guide, hacking, Comp TIA, Network security, an ninh mạng, an ninh và bảo mật, computer science
ABC Amber CHM Converter Trial version
Most likely, ABC Amber CHM Converter is a batch decompiler for Compiled Windows HTML Help files (*. chm) you've been searching for a long time. Taking CHM files or CHM ebooks, it will convert them to any document format you wish - PDF, RTF, HTML, DOC, TXT, MCW, etc. It creates contents with bookmarks (in RTF and HTML), extract all pictures, keeps all internal and external hyperlinks. In other words, you can produce new hypertext system in...
467 p dnulib 20/11/2012 402 1
Từ khóa: general Networking and security concepts, an ninh và bảo mật, an ninh mạng, Basic TCP/IP principles, Network infrastructure security, quản trị mạng
Understand network security, Understand security threat trends, Understand the goals of network security, Determine the factors involved in a secure network strategy, Security Certification Network security (Information Security) • Tasks of guarding digital information, which is typically processed by a computer (such as a personal computer), stored on a magnetic or optical storage device (such as a hard drive or DVD), and transmitted...
643 p dnulib 20/11/2012 435 1
Từ khóa: overview, authentication, attacks, remote access, wireless, email and web security, devices and media, network topology and IDS, system hardening
The perfect place to learn how to design Web sites for mobile devices! With the popularity of Internet access via cell phones and other mobile devices, Web designers now have to consider as many as eight operating systems, several browsers, and a slew of new devices as they plan a new site, a new interface, or a new sub–site. This easy–to–follow friendly book guides you through this brave new world with a clear look at the fundamentals...
388 p dnulib 02/11/2012 382 1
Từ khóa: ASP.NET 2.0, Authentication Application, Database Design Tips, Catalog Application, Visual Studio 2005, Designing Secure ASP.NET, ASP.NET 2.0 For Dummies, Mobile Web Design for Dummies
Mastering Xcode 4: Develop and Design
Xcode 4 has a brand new user interface, built upon proven technologies that Apple itself uses to build Mac OS X and iOS, and that have produced over a quarter million Mac OS X and iOS apps. This project-based book introduces readers to Apple's development environment. The book is aimed at new Mac OS X and iOS developers and assumes the reader is familiar with programming and object-oriented concepts. The book starts at the basics--how to...
441 p dnulib 01/11/2012 380 1
Từ khóa: ASP.NET 2.0, Authentication Application, Database Design Tips, Catalog Application, Visual Studio 2005, Designing Secure ASP.NET, Xcode 4 iOS Development, Xcode 3 Unleashed, Mastering Xcode 4
Application Security for the Android Platform
With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You’ll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker’s opportunity to compromise your app and steal user data.
112 p dnulib 01/11/2012 371 1
Từ khóa: Công Nghệ Thông Tin, Flash, Lập Trình Di Động, Mobile Dev, Lập Trình, Programming, Other, Sách Tiếng Anh, Đồ Họa Thiết Kế, Design, Android Python with SL4A, Application Security for the Android Platform
Introducing Regular Expressions
If you’re a programmer new to regular expressions, this easy-to-follow guide is a great place to start. You’ll learn the fundamentals step-by-step with the help of numerous examples, discovering first-hand how to match, extract, and transform text by matching specific words, characters, and patterns.
152 p dnulib 01/11/2012 371 1
Từ khóa: ASP.NET 2.0, Authentication Application, Database Design Tips, Catalog Application, Visual Studio 2005, Designing Secure ASP.NET, step-by-step, Introducing Regular Expressions
Advance Praise for Head First iPhone Development
“The great thing about this book is its simple, step-by-step approach. It doesn’t try to teach everything—it just launches you right into building iPhone applications in a friendly, conversational way. It’s a fantastic book for people who already know how to write code and just want to get straight into the meat of building iPhone applications.” — Eric Shephard, owner of Syndicomm “Head First iPhone Development was clearly...
552 p dnulib 01/11/2012 394 1
Từ khóa: ASP.NET 2.0, Authentication Application, Database Design Tips, Catalog Application, Visual Studio 2005, Designing Secure ASP.NET, Advance Praise for Head First iPhone Development, step-by-step
Đăng nhập
Bộ sưu tập nổi bật
Bộ sưu tập Quản trị doanh nghiệp
11 11979
Tài liệu về Sư phạm Mầm non chọn lọc
24 23083
Tuyển tập tài liệu hay về Sinh học
12 11590
14 15879
Tin nhanh