Librería: liu xing, Nanjing, JS, China
EUR 43,75
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritopaperback. Condición: New. Paperback. Pub Date: 2008 09 Pages: 138 Language: Chinese in Publisher: People's Posts and Telecommunications Press Computer Information Security Essentials a brief introduction to computers and computer network security basics and basic technology. The main contents include: the concept of computer information security. cryptography. operating system security. database security. application systems security. computer virus and prevention. firewall. intrusion detection and security scanning t.
Publicado por Tsinghua University Press, 1991
ISBN 10: 7302091390 ISBN 13: 9787302091394
Librería: liu xing, Nanjing, JS, China
EUR 51,80
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritopaperback. Condición: New. Paperback. Pub Date: 2004 09 Pages: 266 Language: Chinese in Publisher: Tsinghua University Press book explains network security issues involved. but also by example. training to enhance the reader's understanding and ability. The main contents include the basics of network security. physical and environmental security. operating system security. network communications. security. Web security. data security. virus and its prevention. hacker attacks and prevention. firewall technology and netw.
Publicado por Tsinghua University Press Pub. Date :2008-09-01, 2008
ISBN 10: 7302180571 ISBN 13: 9787302180579
Idioma: Inglés
Librería: liu xing, Nanjing, JS, China
EUR 65,53
Convertir monedaCantidad disponible: 10 disponibles
Añadir al carritoSoft cover. Condición: New. Language:Chinese.Author:HUANG HE.Binding:Soft cover.Publisher:Tsinghua University Press Pub. Date :2008-09-01.
Publicado por Tsinghua University Press Pub. Date :2010-01, 2000
ISBN 10: 7302213666 ISBN 13: 9787302213666
Librería: liu xing, Nanjing, JS, China
EUR 53,46
Convertir monedaCantidad disponible: 3 disponibles
Añadir al carritopaperback. Condición: New. Pages Number: 362 Publisher: Tsinghua University Press Pub. Date :2010-01. book computer network security technology. the basic theory and practical application of the combination. a systematic introduction to the basic concepts of computer network security and network security architecture. data encryption. network operating system security. database and data security. PKl technology. working principle and application firewall. computer virus prevention. intrusion detection systems. Internet.
Publicado por Tsinghua University Press Pub. Date :2010-01-01, 1991
ISBN 10: 7302215243 ISBN 13: 9787302215240
Librería: liu xing, Nanjing, JS, China
EUR 55,58
Convertir monedaCantidad disponible: 3 disponibles
Añadir al carritoSoft cover. Condición: New. Language:Chinese.Author:HUANG MING XIANG LIN YONG ZHANG.Binding:Soft cover.Publisher:Tsinghua University Press Pub. Date :2010-01-01.
Publicado por Tsinghua University Press; 1 edition (August 1. 2006), 2000
ISBN 10: 7810823558 ISBN 13: 9787810823555
Idioma: Chino
Librería: liu xing, Nanjing, JS, China
EUR 48,49
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritopaperback. Condición: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback Pages Number: 272 in Publisher: Tsinghua University Press; 1st edition (August 1. 2006). The book is divided into 11 chapters. Main content Overview of computer network security. network architecture and network protocols. attack methods hackers. computer viruses and prevention. network security appliances - firewalls. intrusion detection. security vulnerability scanners. password intruders. encryption technology. user authentication technologies network security planning. design and management. Book from a security perspective. the basic theory for guidance. focusing on the security settings of the network operating system. and its operability and practicability. By reading this book. not only a deep understanding of the underlying network operating system security mechanisms. and can grasp the commonly used network operating system security configuration and security management skills. Book as the main audience groups to network security management. taking into account the needs of the enthusiasts of the majority of computer network. a network operating system security management. practical teaching materials and the necessary reference.Four Satisfaction guaranteed,or money back.
Publicado por Computer News Electronic Audio and Video Publishing House, 2000
ISBN 10: 7894766763 ISBN 13: 9787894766762
Librería: liu xing, Nanjing, JS, China
EUR 60,65
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritopaperback. Condición: New. Paperback. Pub Date: 2011 Pages: 336 Language: Chinese in Publisher: Computer News. Electronic Audio and Video Publishing House selection of 15 favorite hacker attack and defense topics. contains more than 200 hot applications. more than 1.000 of offensive and defensive skills. we resolve hackers a variety of offensive and defensive and offensive and defensive means. and introduce effective preventive measures. Specific content includes: microblogging and online shopping security risks. QQ ha.
Publicado por South China University of Technology Press, 1991
ISBN 10: 7562322260 ISBN 13: 9787562322269
Librería: liu xing, Nanjing, JS, China
EUR 61,06
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritopaperback. Condición: New. Paperback. Pub Date: 2006 Pages: 395 Language: Chinese in Publisher: South China University of Technology Press. network and information security has become one of the most critical areas of today's information society. computer science and technology in the 21st century textbook series: network security technology and applications (undergraduate) from the network. made a detailed introduction to network attack techniques. system defense technology. network security engineering and informatio.
Publicado por People's Post Pub. Date :2010-9-1, 2010
ISBN 10: 7115232962 ISBN 13: 9787115232960
Idioma: Chino
Librería: liu xing, Nanjing, JS, China
EUR 53,46
Convertir monedaCantidad disponible: 10 disponibles
Añadir al carritopaperback. Condición: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Pages Number: 278 Publisher: People's Post Pub. Date :2010-9-1. Contents: Project 1 Project Description and analysis of network security analysis of network vulnerability Task 1 tasks 1-1 to understand the basic elements of network security analysis of network vulnerability tasks 1-2 tasks 1-3 for the main threats facing the task of network planning overall network security tasks 2 2-1 2-2 familiar with the task of network security standards to know the task of network security design strategies 2-3 overall security project planning network operating system security tasks 1 2 Set basic security policy tasks 1-1 1-2 to set the local security policy tasks off unnecessary services and ports and protection vulnerability check Task 2 task tasks 2-2 2-1 check for common vulnerabilities vulnerability Item 3 of the Internet virus protection and removal of malicious software Task 1 and prevention of virus removal and prevention of common tasks 1-1 ARP virus removal and prevention tasks 1-2 network worm removal and prevention of Task 2 and prevention of malicious software removal malicious software task tasks 2-1 2-2 remove malicious software malware prevention task 2-3 task block malicious web page task 3 3-1 block malicious web browser repair task 3-2 task browser's security settings to prevent malicious web page task 4 3-3 anti-virus software to install and use stand-alone Task 4-1 Task 4-2 using antivirus software antivirus software to use the network version of the project and prevent network attacks 4 Task 1 scanner port scanner application tasks 1-1 1-2 scan segments to use integrated scanner task Task 2 segment scan denial of service attacks and DDOS attack prevention task to understand the phenomenon of 2-1 and 2-2 step task denial of service attacks and defenses common task 3 Trojan removal and protection tasks 3-1 identified Trojan infection symptoms tasks 3-2 horse killing and cleanup tasks 4 network monitoring tool environment for application tasks and installation tasks running 4-1 4-2 to capture the data package to see the TCP packet header capture FTP Task 4-3 Task 4-4 to capture clear-text passwords Telnet password in clear text item 5 encryption and digital signature technology Task 1 file encryption and decryption tasks tender 1-1 1-2 to decrypt files encrypted file tasks Task 2 Task 3 email encryption digital signatures in e-mail application for digital certificate application tasks 3-1 Task 3 -2 to send digitally signed e-mail program 6 firewall and intrusion detection technology Task 1 Configure the firewall and application firewall's basic task configuration tasks 1-1 1-2 1-3 firewall firewall application tasks the placement of Task 2 to apply intrusion detection of technical tasks 2-1 2-2 knowledge-based intrusion detection system tasks sessionWall Item 7 of the wireless LAN intrusion detection security configuration tasks a basic setup tasks wireless LAN security settings SSID Renwu 1-1 1-2 2 WEP settings to disable SSID Task 2 -1 wireless router setup tasks 2-2 Wireless LAN Client Security Settings item 8 network services and security tasks 1 Web application security setup tasks 1-1 web server security setup tasks 1-2 web browser security settings Task 2 e-mail security Task 2-1 Task 2-2 e-mail security services e-mail security settingsFour Satisfaction guaranteed,or money back.
Publicado por Jilin Publishing Group Co.. Ltd., 2024
ISBN 10: 7573147155 ISBN 13: 9787573147158
Idioma: Inglés
Librería: liu xing, Nanjing, JS, China
EUR 90,00
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritopaperback. Condición: New. Language:Chinese.Paperback. Pub Date: 2024-03 Pages: 176 Publisher: Jilin Publishing Group Co. Ltd.: This book is a book that studies computer information security and network technology applications. This book analyzes the basic knowledge of computer information security. including information security issues and importance. various factors that threaten information security. computer information security technology system. computer information system security protection and supervision; di.
Librería: Ria Christie Collections, Uxbridge, Reino Unido
EUR 111,03
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. In.
Librería: Ria Christie Collections, Uxbridge, Reino Unido
EUR 111,03
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. In.
Librería: liu xing, Nanjing, JS, China
EUR 60,22
Convertir monedaCantidad disponible: 3 disponibles
Añadir al carritopaperback. Condición: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback. Pub Date :2013-10-01 Pages: 226 Language: Chinese Publisher: Tsinghua University Press Wireless network security technology in the 21st century universities planning materials Computer Application for wireless LAN. wireless metropolitan area network . mobile communications networks. wireless sensor network and Ad Hoc network and other wireless network security issues in detail and summarized . rich content . concepts and principles to explain the detailed. easy to understand . Each.Four Satisfaction guaranteed,or money back.
Librería: Best Price, Torrance, CA, Estados Unidos de America
EUR 96,09
Convertir monedaCantidad disponible: 2 disponibles
Añadir al carritoCondición: New. SUPER FAST SHIPPING.
Librería: Best Price, Torrance, CA, Estados Unidos de America
EUR 96,09
Convertir monedaCantidad disponible: 2 disponibles
Añadir al carritoCondición: New. SUPER FAST SHIPPING.
Librería: liu xing, Nanjing, JS, China
EUR 54,88
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritopaperback. Condición: New. Language:Chinese.Paperback Pages Number: 319 Publisher: Science Press; 1 (2005 September 1st).
Librería: Lucky's Textbooks, Dallas, TX, Estados Unidos de America
EUR 102,89
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Librería: Lucky's Textbooks, Dallas, TX, Estados Unidos de America
EUR 102,89
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
ISBN 10: 7542732102 ISBN 13: 9787542732101
Librería: liu xing, Nanjing, JS, China
EUR 55,66
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritopaperback. Condición: New. Paperback. Pub Date: 2008 Pages: 308 Language: Chinese in Publisher: Shanghai Popular Science Press the album carefully Selected China Computer Education on its website Forum article the essence of all kinds of network applications. network security. by a number of senior editor of the new organization and classification. to ensure accuracy. practicality and readability of the content. Computer applications Digest this: network and security album (with CD-ROM). the body part of a collection o.
Publicado por Tsinghua University Press, 2014
ISBN 10: 7302348073 ISBN 13: 9787302348078
Idioma: Chino
Librería: liu xing, Nanjing, JS, China
EUR 70,17
Convertir monedaCantidad disponible: 3 disponibles
Añadir al carritopaperback. Condición: New. Paperback. Pub Date :2014-05-01 Pages: 332 Language: Chinese Publisher: Tsinghua University Press. world-renowned computer Textbooks & Network Security Basics: Applications and Standards (5th edition). written by the famous author William Stallings. Network security is the most important and most influential extensive materials. The world's leading computer-based materials selection & Network Security: Applications and Standards (5th edition) is a network security gate I book systematically i.
Librería: Majestic Books, Hounslow, Reino Unido
EUR 188,53
Convertir monedaCantidad disponible: 3 disponibles
Añadir al carritoCondición: New.
Librería: Books Puddle, New York, NY, Estados Unidos de America
EUR 198,57
Convertir monedaCantidad disponible: 3 disponibles
Añadir al carritoCondición: New.
Librería: Biblios, Frankfurt am main, HESSE, Alemania
EUR 212,87
Convertir monedaCantidad disponible: 3 disponibles
Añadir al carritoCondición: New.
ISBN 10: 7302239169 ISBN 13: 9787302239161
Librería: liu xing, Nanjing, JS, China
EUR 64,28
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritopaperback. Condición: New. Paperback. Pub Date: 2011 Pages: 328 in Publisher: Tsinghua University Press in the era of a global electronic interconnect flooded with computer viruses and electronic hackers. electronic eavesdropping and electronic fraud rampant. security is no longer a problem really has in the past . The two major trends discussed in the book is particularly important. First. the explosive growth of computer systems and their interconnection has been enhanced institutional and individual reliance on the .
Publicado por China Power, 2000
ISBN 10: 750832269X ISBN 13: 9787508322698
Librería: liu xing, Nanjing, JS, China
EUR 309,06
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritopaperback. Condición: New. Language:Chinese.Pages Number: 317 Publisher: China Power Pub. Date :2007-07-01 version 1.