- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook Firewalls - jumpstart for network & systems administrators: Part 2
Ebook Firewalls - jumpstart for network & systems administrators: Part 2 includes content: Section V: Secure external services provision, Section VI: Internal IP services protection, Section VII: Firewall remote access configuration, Section VIII: Firewall management, Section IX: Appendixes.
234 p umt 23/03/2024 16 0
Từ khóa: Ebook Firewalls, Jumpstart for Network, Systems Administrators, Secure external services provision, Internal IP services protection, Firewall remote access configuration
A novel security routing using identity-based lightweight digital signature in WMSNs
This paper presents a lightweight digital signature-based routing message and node authentication solution for wireless multimedia sensor networks (WMSNs). The lightweight geographical security routing protocol (ECDSA-TPGF) is proposed on the basis of improving the original two-phase greedy geographical forwarding protocol (TPGF), in which we have added the solution Elliptic curve cryptography (ECC) and cyclic redundancy check (CRC) to create...
8 p umt 21/02/2024 6 0
Từ khóa: Lightweight digital signature-based routing message, Novel security routing, Node authentication solution, Wireless multimedia sensor network, Cyclic redundancy check
Ebook The InfoSec handbook: An introduction to Information security - Part 2
Continued part 1, part 2 of ebook "The InfoSec handbook: An introduction to Information security" provides readers with contents including: network security; understanding networks and network security; intrusion detection and prevention systems; virtual private networks; physical security; physical security and biometrics; current trends in information security;...
193 p umt 23/10/2023 16 0
Từ khóa: The InfoSec handbook, Information security, Network security, Virtual private networks, Physical security, Cloud computing, Social engineering
Ebook Wireless network security: Part 2
Ebook Wireless network security: Part 2 includes contents: Chapter 8: Intrusion detection in cellular mobile networks; Chapter 9: The spread of epidemics on smartphones; Chapter 10: Cross-domain mobility-adaptive authentication; Chapter 11: AAA architecture and authentication for wireless LAN roaming; Chapter 12: An experimental study on security protocols in WLANs; Chapter 13: Security issues in wireless sensor networks used in clinical...
236 p umt 23/09/2023 34 0
Từ khóa: Ebook Wireless network security, Wireless network security, Cellular mobile networks, Cross-domain mobility-adaptive authentication, AAA architecture, Security protocols in WLANs
Ebook Wireless network security: Part 1
Ebook Wireless network security: Part 1 includes contents: Chapter 1: High performance elliptic curve cryptographic co-processor; Chapter 2: An adaptive encryption protocol in mobile computing; Chapter 3: Pre-authentication and authentication models in ad hoc networks; Chapter 4: Promoting identity-based key management in wireless ad hoc networks; Chapter 5: A survey of attacks and countermeasures in mobile ad hoc networks; Chapter 6: Secure...
186 p umt 23/09/2023 36 0
Từ khóa: Ebook Wireless network security, Wireless network security, Cryptographic co-processor, Encryption protocol, Mobile computing, Authentication models in ad hoc networks
Ebook Wireless security handbook: Part 1
Ebook Wireless security handbook: Part 1 includes contents: Chapter 1 wireless network overview, chapter 2 risks and threats of wireless, chapter 3 the legality of computer crime, chapter 4 wireless physical layer technologies, chapter 5 wireless management frames, chapter 6 wireless local and personal area networks, chapter 7 wide area wireless technologies, chapter 8 wireless antenna theory.
138 p umt 23/09/2023 36 0
Từ khóa: Wireless security handbook, Wireless security, Wireless network, The legality of computer crime, Wireless physical layer technologies, Personal area networks
Đăng nhập
Bộ sưu tập nổi bật