Tài liệu Thư viện số
Danh mục TaiLieu.VN
Kết quả 25-36 trong khoảng 562
Bài giảng Lập trình mạng: Chương 13 - ThS. Trần Bá Nhiệm
Trong các chương trước chúng ta đã làm việc có liên quan đến việc di chuyển dữ liệu từ client đến server, nhưng khi chúng ta chưa khảo sát kỹ cái gì đang di chuyển giữa chúng. Trong chương này chúng ta sẽ cùng phân tích gói tin mạng ở các mức như: Phân tích mức Network (IP-level), phân tích mức Data-link, phân tích mức Physical. Mời các bạn cùng tham khảo.
34 p daihocthudo 28/02/2024 8 0
Ebook Bài tập Tối ưu hoá: Phần 1
Cuốn "Bài tập Tối ưu hoá" Phần 1 được biên soạn gồm các nội dung chính sau: Quy hoạch tuyến tính; bài toàn vận tải; quy hoạch động; quy hoạch rời rạc. Mời các bạn cùng tham khảo!
177 p daihocthudo 29/01/2024 21 0
Ebook Bài tập Tối ưu hoá: Phần 2
Tiếp nội dung phần 1, cuốn "Bài tập Tối ưu hoá" Phần 2 được biên soạn gồm các nội dung chính sau: quy hoạch tham số; quy hoạch phi tuyến. Mời các bạn cùng tham khảo!
152 p daihocthudo 29/01/2024 21 0
Ebook Internet security - Cryptographic principles algorithms protocols: Part 1
Part 1 book "Internet security - Cryptographic principles algorithms protocols" includes content: Internetworking and layered models; tcp ip suite and internet stack protocols; symmetric block ciphers; hash function, message digest and message authentication code, asymmetric public key cryptosystems.
221 p daihocthudo 29/01/2024 15 0
Ebook Internet security - Cryptographic principles algorithms protocols: Part 2
Part 2 book "Internet security - Cryptographic principles algorithms protocols" includes content: Public-key infrastructure; network layer security; transport layer security - SSLv3 and TLSv1; electronic mail security - PGP, S/MIME; internet firewalls for trusted systems, SET for E-commerce transactions.
205 p daihocthudo 29/01/2024 17 0
Ebook Computer viruses hacking and malware attacks for dummies: Part 2
Ebook Computer viruses hacking and malware attacks for dummies: Part 2 includes contents: Chapter 8: updating antivirus software and signatures; chapter 9: installing security patches; chapter 10: using firewalls and spyware blockers; chapter 11: protecting PDAs from viruses; chapter 12: incorporating safe computing practices; chapter 13: viruses and the losers whowrite them; chapter 14: trojan horses, worms, spam, and hoaxes; chapter 15: how...
160 p daihocthudo 29/01/2024 16 0
Ebook Computer viruses hacking and malware attacks for dummies: Part 1
Ebook Computer viruses hacking and malware attacks for dummies: Part 1 includes contents: Chapter 1: understanding virus risks, chapter 2: does my computer have a virus?, chapter 3: does your computer have antivirus software?, chapter 4: obtaining and installing antivirus software, chapter 5: configuring antivirus software, chapter 6: scanning your computer and e-mail, chapter 7: ridding your computer of viruses.
130 p daihocthudo 29/01/2024 13 0
Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 1
Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 1 includes contents: Chapter 1 information security basics, chapter 2 the windows security architecture from the hacker's perspective, chapter 3 footprinting and scanning, chapter 4 enumeration, chapter 5 hacking windows-specific services, chapter 6 discovering and exploiting windows vulnerabilities, chapter 7 post-exploit pillaging.
252 p daihocthudo 29/01/2024 15 0
Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 2
Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 2 includes contents: Chapter 8 achieving stealth and maintaining presence, chapter 9 hacking SQL server, chapter 10 hacking Microsoft client apps, chapter 11 physical attacks, chapter 12 windows security features and tools, chapter a windows security checklist, chapter b about the companion website.
230 p daihocthudo 29/01/2024 14 0
Ebook Google hacking for penetration testers: Part 1
Ebook Google hacking for penetration testers: Part 1 includes contents: Chapter 1 Google searching basics, chapter 2 advanced operators, chapter 3 Google hacking basics, chapter 4 preassessment, chapter 5 network mapping, chapter 6 locating exploits and finding targets, chapter 7 ten simple security searches that work.
245 p daihocthudo 29/01/2024 15 0
Ebook Google hacking for penetration testers: Part 2
Ebook Google hacking for penetration testers: Part 2 includes contents: Chapter 8 tracking down web servers, login portals, and network hardware; chapter 9 usernames, passwords, and secret stuff, oh my! chapter 10 document grinding and database digging; chapter 11 protecting yourself from google hackers; chapter 12 automating google searches; appendix a professional security testing; appendix b an introduction to web application security;...
284 p daihocthudo 29/01/2024 15 0
Ebook Google hacking for penetration testers (Volume 2): Part 1
Ebook Google hacking for penetration testers (Volume 2): Part 1 includes contents: Chapter 1: Google searching basics, Chapter 2: advanced operators, chapter 3: Google hacking basics, chapter 4: document grinding and database digging, chapter 5: Google’s partin an information collection framework, chapter 6: locating exploits and finding targets.
283 p daihocthudo 29/01/2024 14 0
Đăng nhập
Bộ sưu tập nổi bật
Tổng hợp tài liệu Toán học hay
11 9333
Giáo trình ngành Công tác xã hội
19 13292
12 11240
10 8087
Thông báo