تبلیغات
Computer Book - مطالب ابر Secure

Virtualization Security: Business Continuity

نوشته شده در تاریخ : چهارشنبه 2 شهریور 1390   07:57 ب.ظ

نوع مطلب :امنیت ،تجارت ،

26511389668 Virtualization Security: Business Continuity

EC-Council, “Virtualization Security:  Continuity” 
Co rse Tec nology | 2010 | ISBN: 1435488695 | 144 pages | PDF | 7,6 MB

This is one of two books in the DISASTER RECOVERY/VIRTUALIZATION SECURITY SERIES, designed to fortify disaster recovery preparation and virtualization technology knowledge of information security students, system administrators, systems engineers, enterprise system architects, and any IT professional who is concerned about the integrity of their network infrastructure. Topics include disaster recovery planning, risk control policies and countermeasures, disaster recovery tools and services, and virtualization principles. The series when used in its entirety helps prepare readers to take and succeed on the E|CDR and E|CVT, Disaster Recovery and Virtualization Technology certification exam from EC-Council. The EC-Council Certified Disaster Recovery and Virtualization Technology professional will have a better understanding of how to set up disaster recovery plans using traditional and virtual technologies to ensure business continuity in the event of a disaster.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Business، Secure،

The Design of Rijndael: AES – The Advanced Encryption Standard

نوشته شده در تاریخ : پنجشنبه 6 مرداد 1390   06:03 ب.ظ

1100 The Design of Rijndael: AES – The Advanced Encryption Standard

Book Description
In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Standard (AES). AES is expected to gradually replace the present Data  Standard (DES) as the most widely applied data  technology.|This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.|This volume is THE authoritative guide to the Rijndael  and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Algorithm، Encryption، Secure، Security،