В этом разделе вы можете найти различные книги: художественную литературу и беллетристику на иностранных языках, пособия и методички, учебную и справочную литературу по изучающему языку. К вашему вниманию художественная литература на немецком и английском языке. Словари и энциклопедии. А понравившиеся издания вы можете заказать с доставкой.
Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including: key distribution for access control, source authentication of transmissions, and non-repudiation of streams. This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor...
Book DescriptionMultimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce. Data Hiding Fundamentals and Applications focuses on the theory and state-of-the-art applications of content security and data hiding in digital multimedia. One of the pillars of contentsecurity solutions is the imperceptible insertion of information into multimedia data for security purposes; the idea is that this inserted information will allow detection of unauthorized usage. * Provides a theoretical...
Part of the Illustrated Projects Series, this text offers a quick, visual way to apply their creating Web site skills. Covers beginning through intermediate skills.
The annual conferences on Occupational Ergonomics and Safety have become trend setters in linking work in theory and practice of ergonomics, safety, and design in production and service environments. This book contains the proceedings of the 14th annual event. The work covers areas from design of work and work environment, human factors, accident and injury prevention, to ergonomics in transportation, rehabilitation, consumer products, to areas including future directions, development and education. The work provides an essential reference to the state of the art on an international scale for professionals and scholars dealing with occupational Ergonomics and Safety.
Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools. This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs. The book covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book provides step-by-step instructions to quickly get up and running with Snort, and how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices. Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack.
3405.00 руб.*
Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky
Your Complete Guide to Cisco Enterprise IDS Management This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional?s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco Secure Intrusion Detection Systems Exam (CSIDS 9E0-100). Review Intrusion Detection Systems Find coverage of the basic threats and attack types, as well as an overview of the various types of intrusion detection. Learn About Cisco Intrusion Detection Explore the nuts and bolts behind a Cisco-based IDS system, covering both Cisco?s "Active Defense" and "Defense in Depth" methodologies. Install Sensor Appliances Install the Cisco IDS appliances on your network and learn about password recovery. Install the Cisco Secure Policy Manager (CSPM) Review the Cisco...
* Указанная цена за книгу может отличаться от той, по которой продается она в онлайн-магазине Ozon.ru, партнером которого является Ranez.Ru. Администрация сайта Ranez.Ru ни коим образом не гарантирует ни цену, ни наличие этой книги на складе у продавца, равно как и возможность ее купить. На сайте Ranez.Ru представлена только информация о книге, оформление покупки, оплата и вопросы с доставкой решаются на сайте онлайн-магазина Ozon.ru.
Данный интернет-сайт носит исключительно информационный характер, и ни при каких условиях информационные материалы и цены, размещенные на сайте, не являются публичной офертой, определяемой положениями Статьи 437 ГК РФ.