Học liệu mở

  • Bài giảng Lập trình mạng: Chương 13 - ThS. Trần Bá Nhiệm

    Bài giảng Lập trình mạng: Chương 13 - ThS. Trần Bá Nhiệm

    Trong các chương trước chúng ta đã làm việc có liên quan đến việc di chuyển dữ liệu từ client đến server, nhưng khi chúng ta chưa khảo sát kỹ cái gì đang di chuyển giữa chúng. Trong chương này chúng ta sẽ cùng phân tích gói tin mạng ở các mức như: Phân tích mức Network (IP-level), phân tích mức Data-link, phân tích mức Physical. Mời các bạn cùng tham khảo.

     34 p daihocthudo 28/02/2024 7 0

  • Ebook Bài tập Tối ưu hoá: Phần 1

    Ebook Bài tập Tối ưu hoá: Phần 1

    Cuốn "Bài tập Tối ưu hoá" Phần 1 được biên soạn gồm các nội dung chính sau: Quy hoạch tuyến tính; bài toàn vận tải; quy hoạch động; quy hoạch rời rạc. Mời các bạn cùng tham khảo!

     177 p daihocthudo 29/01/2024 20 0

  • Ebook Bài tập Tối ưu hoá: Phần 2

    Ebook Bài tập Tối ưu hoá: Phần 2

    Tiếp nội dung phần 1, cuốn "Bài tập Tối ưu hoá" Phần 2 được biên soạn gồm các nội dung chính sau: quy hoạch tham số; quy hoạch phi tuyến. Mời các bạn cùng tham khảo!

     152 p daihocthudo 29/01/2024 20 0

  • Ebook Internet security - Cryptographic principles algorithms protocols: Part 1

    Ebook Internet security - Cryptographic principles algorithms protocols: Part 1

    Part 1 book "Internet security - Cryptographic principles algorithms protocols" includes content: Internetworking and layered models; tcp ip suite and internet stack protocols; symmetric block ciphers; hash function, message digest and message authentication code, asymmetric public key cryptosystems.

     221 p daihocthudo 29/01/2024 14 0

  • Ebook Internet security - Cryptographic principles algorithms protocols: Part 2

    Ebook Internet security - Cryptographic principles algorithms protocols: Part 2

    Part 2 book "Internet security - Cryptographic principles algorithms protocols" includes content: Public-key infrastructure; network layer security; transport layer security - SSLv3 and TLSv1; electronic mail security - PGP, S/MIME; internet firewalls for trusted systems, SET for E-commerce transactions.

     205 p daihocthudo 29/01/2024 16 0

  • Ebook Computer viruses hacking and malware attacks for dummies: Part 2

    Ebook Computer viruses hacking and malware attacks for dummies: Part 2

    Ebook Computer viruses hacking and malware attacks for dummies: Part 2 includes contents: Chapter 8: updating antivirus software and signatures; chapter 9: installing security patches; chapter 10: using firewalls and spyware blockers; chapter 11: protecting PDAs from viruses; chapter 12: incorporating safe computing practices; chapter 13: viruses and the losers whowrite them; chapter 14: trojan horses, worms, spam, and hoaxes; chapter 15: how...

     160 p daihocthudo 29/01/2024 14 0

  • Ebook Computer viruses hacking and malware attacks for dummies: Part 1

    Ebook Computer viruses hacking and malware attacks for dummies: Part 1

    Ebook Computer viruses hacking and malware attacks for dummies: Part 1 includes contents: Chapter 1: understanding virus risks, chapter 2: does my computer have a virus?, chapter 3: does your computer have antivirus software?, chapter 4: obtaining and installing antivirus software, chapter 5: configuring antivirus software, chapter 6: scanning your computer and e-mail, chapter 7: ridding your computer of viruses.

     130 p daihocthudo 29/01/2024 12 0

  • Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 1

    Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 1

    Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 1 includes contents: Chapter 1 information security basics, chapter 2 the windows security architecture from the hacker's perspective, chapter 3 footprinting and scanning, chapter 4 enumeration, chapter 5 hacking windows-specific services, chapter 6 discovering and exploiting windows vulnerabilities, chapter 7 post-exploit pillaging.

     252 p daihocthudo 29/01/2024 14 0

  • Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 2

    Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 2

    Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 2 includes contents: Chapter 8 achieving stealth and maintaining presence, chapter 9 hacking SQL server, chapter 10 hacking Microsoft client apps, chapter 11 physical attacks, chapter 12 windows security features and tools, chapter a windows security checklist, chapter b about the companion website.

     230 p daihocthudo 29/01/2024 13 0

  • Ebook Google hacking for penetration testers: Part 1

    Ebook Google hacking for penetration testers: Part 1

    Ebook Google hacking for penetration testers: Part 1 includes contents: Chapter 1 Google searching basics, chapter 2 advanced operators, chapter 3 Google hacking basics, chapter 4 preassessment, chapter 5 network mapping, chapter 6 locating exploits and finding targets, chapter 7 ten simple security searches that work.

     245 p daihocthudo 29/01/2024 14 0

  • Ebook Google hacking for penetration testers: Part 2

    Ebook Google hacking for penetration testers: Part 2

    Ebook Google hacking for penetration testers: Part 2 includes contents: Chapter 8 tracking down web servers, login portals, and network hardware; chapter 9 usernames, passwords, and secret stuff, oh my! chapter 10 document grinding and database digging; chapter 11 protecting yourself from google hackers; chapter 12 automating google searches; appendix a professional security testing; appendix b an introduction to web application security;...

     284 p daihocthudo 29/01/2024 14 0

  • Ebook Google hacking for penetration testers (Volume 2): Part 1

    Ebook Google hacking for penetration testers (Volume 2): Part 1

    Ebook Google hacking for penetration testers (Volume 2): Part 1 includes contents: Chapter 1: Google searching basics, Chapter 2: advanced operators, chapter 3: Google hacking basics, chapter 4: document grinding and database digging, chapter 5: Google’s partin an information collection framework, chapter 6: locating exploits and finding targets.

     283 p daihocthudo 29/01/2024 13 0

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=cdsphanoi