تبلیغات
Computer Book - مطالب ابر Network

Network Hacking -52 video

نوشته شده در تاریخ : یکشنبه 25 دی 1390   11:55 ق.ظ

نوع مطلب :فیلم های آموزشی ،شبکه ،امنیت ،

52 Video Tutorials – Network  Hacking 
English | XVID | 640×480 | SWF, AVI, WMV | 15 fps 459 kbps | 750.64 MB
Genre: eLearning

ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: hacking، network،

Security+ Guide to Network Security Fundamentals, 3rd Edition

نوشته شده در تاریخ : شنبه 24 دی 1390   11:51 ب.ظ

215ac83875874706fea193a85879a76a5 Security+ Guide to Network Security Fundamentals, 3rd Edition

Security + Guide to Network  Security Fundamentals, 3rd Edition
Course Technology | 2008 | ISBN: 1428340661 | 640 pages | PDF | 10,6 MB

Now in its third edition, the best-selling SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS provides the most up-to-date industry information, reflecting the changes in security that have occurred since the most recent CompTIA Security+ objectives were created. The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam

This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Fundamentals، guide، network، Security،

(Cryptography and Network Security: Principles and Practice (5th Edition

نوشته شده در تاریخ : یکشنبه 27 شهریور 1390   05:55 ب.ظ

نوع مطلب :امنیت ،شبکه ،

 Cryptography and Network Security: Principles and Practice (5th Edition)
Pren tice H all | 2010 | ISBN: 0136097049 | 744 pages | PDF | 8 MB

William Stallings’ Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.

In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: network، Security،

Bayesian Networks and Decision Graphs

نوشته شده در تاریخ : دوشنبه 21 شهریور 1390   03:05 ب.ظ

نوع مطلب :شبکه ،

26511389659 Bayesian Networks and Decision Graphs
Springer | 2007-06-06 | ISBN: 0387682813 | 448 pages | PDF | 2,7 MB

Probabilistic graphical models and decision graphs are powerful modeling tools for reasoning and decision making under uncertainty. As modeling languages they allow a natural specification of problem domains with inherent uncertainty, and from a computational perspective they support efficient algorithms for automatic construction and query answering. This includes belief updating, finding the most probable explanation for the observed evidence, detecting conflicts in the evidence entered into the , determining optimal strategies, analyzing for relevance, and performing sensitivity analysis.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: network،

Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, Second Edition

نوشته شده در تاریخ : جمعه 17 تیر 1390   03:29 ب.ظ

نوع مطلب :شبکه ،

001c54fb medium Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, Second Edition

CR C | 2010 | ISBN: 1439814635 | 494 pages | PDF | 5,7 MB

Carefully coordinated, reliable, and accurate time synchronization is vital to a wide spectrum of fields—from air and ground traffic control, to buying and selling goods and services, to TV network. Ill-gotten time could even lead to the unimaginable and cause DNS caches to expire, leaving the entire Internet to implode on the root servers.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Network،