English | XVID | 640×480 | SWF, AVI, WMV | 15 fps 459 kbps | 750.64 MB
برچسب ها: hacking، network،
Security + Guide to Network Security Fundamentals, 3rd Edition
Course Technology | 2008 | ISBN: 1428340661 | 640 pages | PDF | 10,6 MB
Now in its third edition, the best-selling SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS provides the most up-to-date industry information, reflecting the changes in security that have occurred since the most recent CompTIA Security+ objectives were created. The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam
This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.
برچسب ها: Fundamentals، guide، network، Security،
William Stallings’ Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.
برچسب ها: network، Security،
نوع مطلب :شبکه ،
Probabilistic graphical models and decision graphs are powerful modeling tools for reasoning and decision making under uncertainty. As modeling languages they allow a natural specification of problem domains with inherent uncertainty, and from a computational perspective they support efficient algorithms for automatic construction and query answering. This includes belief updating, finding the most probable explanation for the observed evidence, detecting conflicts in the evidence entered into the network, determining optimal strategies, analyzing for relevance, and performing sensitivity analysis.
برچسب ها: network،
Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, Second Edition
نوع مطلب :شبکه ،
Carefully coordinated, reliable, and accurate time synchronization is vital to a wide spectrum of fields—from air and ground traffic control, to buying and selling goods and services, to TV networkprogramming. Ill-gotten time could even lead to the unimaginable and cause DNS caches to expire, leaving the entire Internet to implode on the root servers.
برچسب ها: Network،
Beginning Database Design: From Novice to Professional, 2 edition جمعه 3 شهریور 1391
Fundamentals of Robotic Mechanical Systems: Theory, Methods, and Algorithms - 3rd edition جمعه 3 شهریور 1391
Ian H. Witten, “Data Mining: Practical Machine Learning Tools and Techniques” جمعه 3 شهریور 1391
Algorithms and Computation جمعه 3 شهریور 1391
Oracle Business Intelligence Enterprise Edition 11g: A Hands-On Tutorial شنبه 28 مرداد 1391
IBM Cognos Business Intelligence 10.1 Dashboarding Cookbook شنبه 28 مرداد 1391
Windows Phone 7.5: Building Location-aware Applications شنبه 28 مرداد 1391
Mastering Prezi for Business Presentations شنبه 28 مرداد 1391
Node Cookbook شنبه 28 مرداد 1391
Oracle Database XE 11gR2 Jump Start Guide پنجشنبه 26 مرداد 1391
Business Intelligence Cookbook: A Project Lifecycle Approach Using Oracle Technology پنجشنبه 26 مرداد 1391
Joomla! Search Engine Optimization پنجشنبه 26 مرداد 1391
Drupal 7 Cookbook پنجشنبه 26 مرداد 1391
لیست آخرین پستها