-
«1075 عنوان»
- همه (1075)
- مقاطع تحصیلی (1)
- کتب و مجلات (882)
- آموزشی (1)
- نرم افزار (179)
- فیلمهای آموزشی (13)
Learning Puppet Security
Untangle Network Security
Microsoft Azure Security
Transnational Security
Junos Security
Hyper-V Security
LTE Security
Web Security
In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of ...
Cryptography and Network Securi ...
William Stallings’ Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unma ...
Learning Puppet Security
As application and server environments become more complex, managing security and compliance becomes a challenging situation. By utilizing Puppet and ...
Distributed Networks: Intellige ...
For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized comm ...
Guide to Computer Network Secur ...
This fully updated new edition explores the security issues, vulnerabilities and dangers encountered by the users of modern computing and communicatio ...
Security Planning: An Applied A ...
This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan ...
Untangle Network Security
Untangle NG Firewall simplifies network security because of its easy configuration and user-friendly interface. These attributes, in addition to its l ...
Microsoft Azure Security
Microsoft Azure Security helps you ensure that all your applications and services stay secure and safe from any threats. Starting with a quick tour th ...
Microsoft Dynamics AX 2012 R3 S ...
Microsoft Dynamics AX is an ERP software that supports multisite operations. The variety of security features in MS Dynamics AX 2012 enables stakehold ...
Transnational Security
Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Preventing ...
Aspect-Oriented Security Harden ...
This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML langu ...
Android Security: Attacks and D ...
Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security ...
Data Analysis For Network Cyber ...
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering sys ...
A Practical Guide to Networking ...
This book describes how to use your iPhone, iPod touch, or iPad with iOS 8 on Wi-Fi and cellular/mobile networks securely, making connections with eas ...
Network Security Through Data A ...
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security resea ...
CCNA Security Portable Command ...
Preparing for the latest CCNA® Security exam? Here are all the CCNA Security commands you need in one condensed, portable resource. Filled with valuab ...
Junos Security
Junos Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, h ...
A+, Network+, Security+ Exams i ...
If you’re preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you’ll find this book invaluab ...
Building the Infrastructure for ...
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This boo ...
Hyper-V Security
Keeping systems safe and secure is a new challenge for Hyper-V Administrators. As critical data and systems are transitioned from traditional hardware ...
Advances in Security of Informa ...
This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, SecN ...
The Practice of Network Securit ...
Network security is not simply about building impenetrable walls â determined attackers will eventually overcome traditional defenses. The most effe ...
Nmap 6: Network Exploration and ...
Master the basic scanning techniques for port scanning and host discovery. Perform security checks to web applications, mail servers and databases. Le ...
LTE Security
Addressing the security solutions for LTE, a cellular technology from Third Generation Partnership Project (3GPP), this book shows how LTE security su ...
WiMAX Security and Quality of S ...
WiMAX is the first standard technology to deliver true broadbandmobility at speeds that enable powerful multimedia applicationssuch as Voice over Inte ...