Search preferences
Vai alla pagina principale dei risultati di ricerca

Filtri di ricerca

Tipo di articolo

  • Tutti i tipi di prodotto 
  • Libri (7)
  • Riviste e Giornali (Nessun altro risultato corrispondente a questo perfezionamento)
  • Fumetti (Nessun altro risultato corrispondente a questo perfezionamento)
  • Spartiti (Nessun altro risultato corrispondente a questo perfezionamento)
  • Arte, Stampe e Poster (Nessun altro risultato corrispondente a questo perfezionamento)
  • Fotografie (Nessun altro risultato corrispondente a questo perfezionamento)
  • Mappe (Nessun altro risultato corrispondente a questo perfezionamento)
  • Manoscritti e Collezionismo cartaceo (Nessun altro risultato corrispondente a questo perfezionamento)

Condizioni Maggiori informazioni

  • Nuovo (7)
  • Come nuovo, Ottimo o Quasi ottimo (Nessun altro risultato corrispondente a questo perfezionamento)
  • Molto buono o Buono (Nessun altro risultato corrispondente a questo perfezionamento)
  • Discreto o Mediocre (Nessun altro risultato corrispondente a questo perfezionamento)
  • Come descritto (Nessun altro risultato corrispondente a questo perfezionamento)

Legatura

  • Tutte 
  • Rilegato (Nessun altro risultato corrispondente a questo perfezionamento)
  • Brossura (7)

Ulteriori caratteristiche

  • Prima ed. (Nessun altro risultato corrispondente a questo perfezionamento)
  • Copia autograf. (Nessun altro risultato corrispondente a questo perfezionamento)
  • Sovracoperta (Nessun altro risultato corrispondente a questo perfezionamento)
  • Con foto (3)
  • Non Print on Demand (7)

Lingua (2)

Prezzo

  • Qualsiasi prezzo 
  • Inferiore a EUR 20 (Nessun altro risultato corrispondente a questo perfezionamento)
  • EUR 20 a EUR 45 (Nessun altro risultato corrispondente a questo perfezionamento)
  • Superiore a EUR 45 
Fascia di prezzo personalizzata (EUR)

Spedizione gratuita

  • Spedizione gratuita in U.S.A. (Nessun altro risultato corrispondente a questo perfezionamento)

Paese del venditore

  • CHEN MING

    Editore: Tsinghua University Press, 2000

    ISBN 10: 7302081514 ISBN 13: 9787302081517

    Da: liu xing, Nanjing, JS, Cina

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 46,69

    Spedizione EUR 15,46
    Spedito da Cina a U.S.A.

    Quantità: 1 disponibili

    Aggiungi al carrello

    paperback. Condizione: New. Language:Chinese.Pages Number: 11218 Publisher: Tsinghua University Press Pub. Date :2004-04. book a comprehensive and systematic introduction to the current network security the relevant content. including an overview of network security. network security infrastructure. TCPIP-based. data encryption. network attacks. detection and prevention technology. software security vulnerabilities and related professional computer viruses and anti-virus. firewall technology. virtual private network tec.

  • LIANG YA SHENG WANG YONG YI

    Editore: Mechanical Industry Press Pub. Date :2004-09, 2000

    ISBN 10: 7111148711 ISBN 13: 9787111148715

    Da: liu xing, Nanjing, JS, Cina

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 48,84

    Spedizione EUR 15,46
    Spedito da Cina a U.S.A.

    Quantità: 1 disponibili

    Aggiungi al carrello

    paperback. Condizione: New. Language:Chinese.Pages Number: 10274 Publisher: Machinery Industry Press. Pub. Date :2004-09. This book introduces the computer network system security architecture. the basic theory. technical principles and implementation methods. The main contents include: the physical security of computer networks. information encryption and PKI. firewall technology. intrusion detection. access control. network security testing and assessment techniques. computer virus prevention technology. backup and ne.

  • XIE DONG QING

    Editore: Mechanical Industry Press, 2000

    ISBN 10: 711119957X ISBN 13: 9787111199571

    Da: liu xing, Nanjing, JS, Cina

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 55,28

    Spedizione EUR 15,46
    Spedito da Cina a U.S.A.

    Quantità: 1 disponibili

    Aggiungi al carrello

    paperback. Condizione: New. Language:Chinese.Paperback Pages Number: 384 Publisher.: Mechanical Industry Press; 1 edition (January 1. 2007). Book is a thorough introduction to computer network security technology. The book is divided into five parts. including: cryptography and PKI-based security firewall technology. intrusion detection security technologies. computer virus prevention. system security. The book is suitable for undergraduate teaching materials. electronics. computers. information security. e-commerce are.

  • CAI YONG QUAN

    Lingua: Cinese

    Editore: Beijing University of Aeronautics and Astronautics Press, 2000

    ISBN 10: 7810773623 ISBN 13: 9787810773621

    Da: liu xing, Nanjing, JS, Cina

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 47,17

    Spedizione EUR 15,46
    Spedito da Cina a U.S.A.

    Quantità: 1 disponibili

    Aggiungi al carrello

    paperback. Condizione: New. Paperback. Pub Date: 2003 08 Pages: 200 in Publisher: Beijing University of Aeronautics and Astronautics Press computer network security theory and technology tutorials written by the authors on the basis of years of teaching practice. The main contents include an overview of the preliminary number theory. information encryption technology. the integrity of the message authentication and digital signatures. key management. authentication. access control. virtual private network technology. ne.

  • ZHOU FEI FEI // HE WEN

    Lingua: Cinese

    Editore: Beijing University of Posts and Telecommunications, 2000

    ISBN 10: 7563519599 ISBN 13: 9787563519590

    Da: liu xing, Nanjing, JS, Cina

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 48,12

    Spedizione EUR 15,46
    Spedito da Cina a U.S.A.

    Quantità: 10 disponibili

    Aggiungi al carrello

    paperback. Condizione: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Pages Number: 202 Publisher: Beijing University of Posts and Telecommunications Press Pub. Date: 2009 -08 this book is to adapt to computer network security. teaching and writing of an experimental teaching materials. Book is to highlight the systematic network security for the purpose to analyze and address specific security issues for the purpose of combining with the principles of network security. in accordance with the shallow depth. from the local to the whole idea of ??the network security course experiments carried out System classification. LAN and general book websites for common security attacks and network technology. emphasis on offensive and defensive opposition and balance. Book easy to understand. focus on practical. The author s many years of teaching practice. to find a combination of practicality and students interested in point. the design of experimental techniques and strong interest. Taking into account the different experimental conditions in different schools. the majority of experimental content is based on the Windows operating system is easy to set up the experimental environment. reducing the cost of the course of experimental set up. This book is based on the experimental design in order from easy to difficult. teachers can be flexible according to students with different layout. Each experiment consists of book experimental purposes. laboratory equipment. experimental procedures. experimental summary of several components. the experimental design is necessary to stress the independence of the various experiments also took note of the consistency between experiments. Note book and other computer programs. highlighting the computer knowledge of systematic. comprehensive. relevant to each experiment with a combination of computer knowledge. so the reader to establish the basic concepts of computer network security and basic infrastructure. This book not only as a vocational computer science. network management professionals. information security professional. teaching professional communication. computer networks can be used as more Contents: first network infrastructure and network sniffing and network infrastructure Chapter 1 Network Technology Experiment 1-1windows sniffing network traffic analysis (ethereal) experimental 1-2tcp three-way handshake protocol analysis of experimental 1-3udp protocol network sniffer based analysis of experimental techniques 1-4 second hacking vulnerability scanning technology Chapter 2 Use stealth and network experiments 2-1 supeFour Satisfaction guaranteed,or money back.

  • WU XIAN WEN. ZHU

    Lingua: Cinese

    Editore: People's Post Pub. Date :2010-9-1, 2010

    ISBN 10: 7115232962 ISBN 13: 9787115232960

    Da: liu xing, Nanjing, JS, Cina

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 53,85

    Spedizione EUR 15,46
    Spedito da Cina a U.S.A.

    Quantità: 10 disponibili

    Aggiungi al carrello

    paperback. Condizione: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Pages Number: 278 Publisher: People's Post Pub. Date :2010-9-1. Contents: Project 1 Project Description and analysis of network security analysis of network vulnerability Task 1 tasks 1-1 to understand the basic elements of network security analysis of network vulnerability tasks 1-2 tasks 1-3 for the main threats facing the task of network planning overall network security tasks 2 2-1 2-2 familiar with the task of network security standards to know the task of network security design strategies 2-3 overall security project planning network operating system security tasks 1 2 Set basic security policy tasks 1-1 1-2 to set the local security policy tasks off unnecessary services and ports and protection vulnerability check Task 2 task tasks 2-2 2-1 check for common vulnerabilities vulnerability Item 3 of the Internet virus protection and removal of malicious software Task 1 and prevention of virus removal and prevention of common tasks 1-1 ARP virus removal and prevention tasks 1-2 network worm removal and prevention of Task 2 and prevention of malicious software removal malicious software task tasks 2-1 2-2 remove malicious software malware prevention task 2-3 task block malicious web page task 3 3-1 block malicious web browser repair task 3-2 task browser's security settings to prevent malicious web page task 4 3-3 anti-virus software to install and use stand-alone Task 4-1 Task 4-2 using antivirus software antivirus software to use the network version of the project and prevent network attacks 4 Task 1 scanner port scanner application tasks 1-1 1-2 scan segments to use integrated scanner task Task 2 segment scan denial of service attacks and DDOS attack prevention task to understand the phenomenon of 2-1 and 2-2 step task denial of service attacks and defenses common task 3 Trojan removal and protection tasks 3-1 identified Trojan infection symptoms tasks 3-2 horse killing and cleanup tasks 4 network monitoring tool environment for application tasks and installation tasks running 4-1 4-2 to capture the data package to see the TCP packet header capture FTP Task 4-3 Task 4-4 to capture clear-text passwords Telnet password in clear text item 5 encryption and digital signature technology Task 1 file encryption and decryption tasks tender 1-1 1-2 to decrypt files encrypted file tasks Task 2 Task 3 email encryption digital signatures in e-mail application for digital certificate application tasks 3-1 Task 3 -2 to send digitally signed e-mail program 6 firewall and intrusion detection technology Task 1 Configure the firewall and application firewall's basic task configuration tasks 1-1 1-2 1-3 firewall firewall application tasks the placement of Task 2 to apply intrusion detection of technical tasks 2-1 2-2 knowledge-based intrusion detection system tasks sessionWall Item 7 of the wireless LAN intrusion detection security configuration tasks a basic setup tasks wireless LAN security settings SSID Renwu 1-1 1-2 2 WEP settings to disable SSID Task 2 -1 wireless router setup tasks 2-2 Wireless LAN Client Security Settings item 8 network services and security tasks 1 Web application security setup tasks 1-1 web server security setup tasks 1-2 web browser security settings Task 2 e-mail security Task 2-1 Task 2-2 e-mail security services e-mail security settingsFour Satisfaction guaranteed,or money back.

  • LI ZHEN . WANG MIN DENG BIAN

    Lingua: Cinese

    Editore: Huazhong University of Science and Technology Press, 2018

    ISBN 10: 756803965X ISBN 13: 9787568039659

    Da: liu xing, Nanjing, JS, Cina

    Valutazione del venditore 5 su 5 stelle 5 stelle, Maggiori informazioni sulle valutazioni dei venditori

    Contatta il venditore

    EUR 71,85

    Spedizione EUR 15,46
    Spedito da Cina a U.S.A.

    Quantità: 5 disponibili

    Aggiungi al carrello

    paperback. Condizione: New. Paperback. Pub Date: 2018-08-01 Language: Chinese Publisher: Huazhong University Press Test tutorial information and network security information technology space experiments Series institutions of higher learning computer textbook series can be used in computer science or information security professional practice teaching. helping students master the information and network security technologies. application of theoretical knowledge learned to .