Preface Audience Scope Contents of This Book Online Companion Conventions Used in This Book Using Code Examples We'd Like to Hear from You Safari Enabled Acknowledgments C hapter 1. Apache Security Principles Section 1.1. Security Definitions Sectio
Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware. Combating Spyware in the Enterprise begins by examining the various types of insidious spyware an
已经有很多介绍DOS(Denial of Service,即拒绝服务)攻击的文章,但是,多数人还是不知道DOS到底是什么,它到底是怎么实现的。本文主要介绍DOS的机理和常见的实施方法。因前段时间仔细了解了TCP/IP协议以及RFC文档,有点心得。同时,文中有部分内容参考了Shaft的文章翻译而得。要想了解DOS攻击得实现机理,必须对TCP有一定的了解
一、 路由器网络服务安全配置 1 禁止CDP(Cisco Discovery Protocol)。如: Router(Config)#no cdp run Router(Config-if)# no cdp enable 2 禁止其他的TCP、UDP Small服务。 Router(Config)# no service tcp-small-servers Router(Config)# no service udp-samll-servers 3 禁止Finger服务。 Router(Con
AFFIRMATIONS & DENIALS CONCERNING CERTAIN ESSENTIAL DOCTRINES OF THE CHURCH 正文22章共138页,包括总序,前言,索引。 Presented by The International Church Council Project Executive Committee Dr. Jay Grimstead, General Editor “Biblical-theological standard of doctrine
Preface xiii List of abbreviations xv A guide to the book xxiii 1 Introduction 1 1.1 The vision of Ambient Intelligence 1 1.2 Application examples 3 1.3 Types of applications 6 1.4 Challenges for WSNs 7 1.4.1 Characteristic requirements 7 1.4.2 Requ
Practical UNIX & Internet Security英文版 chm 号称1004页一本老书,但是unix的基本原理,与网络安全的基本原理还是值得学习的Table of ContentsPrefacePart I: Computer Security BasicsChapter 1: IntroductionChapter 2: Policies and GuidelinesPart II: User ResponsibilitiesChapter 3: Users and Pa
This manual is a product of the Computer Crime and Intellectual Property Section (CCIPS) of the United States Department of Justice. Just as in Searching and Seizing Computers and Electronic Evidence (2d ed. 2002) and Prosecuting Intellectual Proper
LAN Switch Security: What Hackers Know About Your Switches A practical guide to hardening Layer 2 devices and stopping campus network attacks Eric Vyncke Christopher Paggen, CCIE® No. 2659 Contrary to popular belief, Ethernet switches are not inhere
Unit 1 - Introduction to SELinuxDiscretionary Access Control vs. Mandatory Access Control SELinux History and Architecture Overview Elements of the SELinux security model: user identity and role domain and type sensitivity and categories security co
Prepare for the new version of CEH certification with this advanced guide Once you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That's the philosophy behind ethical