Description: This a book about network security and SNMP .-This a book about network security and SN MP. Platform: |
Size: 19371325 |
Author:wangjia |
Hits:
Description: 網絡安全方面的書籍,非常好,本人從事嵌入linux以及網絡方面的研究-network security books, very good, I have engaged in embedded Linux and network of research Platform: |
Size: 6038528 |
Author:wu |
Hits:
Description: 这是一个基于java,snmp的网络安全日志审计系统,提供方便的用户交互界面,以及实用的日志分析功能-This is a java-based, snmp network security audit log system to provide easy user interface, as well as the practical function of the log analysis Platform: |
Size: 1311744 |
Author:高岩宇 |
Hits:
Description: Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll want this book beside you every step of the way.-Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in Theor y and practice of wireless security, dispelling some of the myths along the way. In do ing so, they provide you with the technical grounding r equired to think about how the rest of the book ap plies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--ba sed systems. you ll want this book beside you every step of the way. Platform: |
Size: 835584 |
Author:秦 |
Hits:
Description: 网络安全的ppt文档,讲的很详细,可以学到知识的-network security ppt files, said very detailed knowledge can be learned Platform: |
Size: 1337344 |
Author:yuhu |
Hits:
Description: This a book about network security and SNMP .-This a book about network security and SN MP. Platform: |
Size: 19371008 |
Author:wangjia |
Hits:
Description: 毕业设计论文-反病毒的
随着网络技术的不断发展,出现了大量的基于网络的服务,网络安全问题也就变得越来越重要。ACL即访问控制列表,它是工作在OSI参考模型三层以上设备,通过对数据包中的第三、四层中的包头信息按照给定的规则进行分析,判断是否转发该数据包。基于ACL的网络病毒的过滤技术在一定程度上可以比较好的保护局域网用户免遭外界病毒的干扰,是一种比较好的中小型局域网网络安全控制技术。
本设计重点从计算机网络病毒的出现、基本特征以及发展现状的角度出发,比较深入的研究了相关网络安全技术,深入分析了当前几种严重影响网络性能的网络病毒,结合ACL的工作原理,制定了相应的访问控制规则列表,并且通过模拟实验,对ACL的可行性进行了相应的测试。
-Design graduate thesis- with the anti-virus network technology continues to develop, a lot of Web-based services, network security issues have become increasingly important. ACL or access control lists, it is work in the OSI Reference Model for three more equipment, the data packet through the third, four of Baotou information according to the rules, to determine whether the transmitted data packets. Based on ACL network virus filtering technology will be able to better protect users from the outside world LAN virus interference is a relatively good small and medium-sized LAN security control technologies. The design focus from the computer network virus with the basic features of the status quo of the development perspective, more in-depth studies to the relevant network security technol Platform: |
Size: 128000 |
Author:thocr |
Hits:
Description: 实现对网络安全的保障,对入侵计算机的数据包进行截取检测
-realization of network security for the protection of computer hacking of data packets for an interception Detection Platform: |
Size: 80896 |
Author:杜维维 |
Hits:
Description: 这篇文章是关于P2P安全的,里面先介绍了P2P的原理,接着提出了一些解决网络安全的方法-This article is about the P2P security, which first introduced the principle of P2P, and then made a number of ways to solve the network security Platform: |
Size: 243712 |
Author:周林 |
Hits:
Description: 本书系统地介绍了密码编码学与网络安全的基本原理和应用技术。全书主要包括下列四个部分:对称密码部分讨论了对称密码的算法和设计原理;公钥加密和散列函数部分讨论了公钥密码的算法和设计原理、报文鉴别码和散列函数的应用等;网络安全应用部分讨论了系统层的安全问题,包括电子邮件安全、IP安全以及Web 安全等;系统安全部分讨论了入侵者和病毒造成的威胁及相应的对策、防火墙和可信系统的应用等。-This book systematically describes encryption and network security study of the basic principles and application technology. Book include the following four parts: symmetric cryptography, symmetric cryptography, discussed some of the algorithms and design principles public-key encryption and hash function discussed some public key cryptography algorithms and design principles, message authentication code and the application of hash function etc. network security part of the system application layer security issues, including e-mail security, IP security and Web security system security is discussed in part caused by the intruder and virus threats and appropriate countermeasures, firewalls and trusted systems and so on. Platform: |
Size: 12995584 |
Author:秦中元 |
Hits:
Description: 本文是一篇关于传感器网络安全的综述,详细地从各个层介绍了它的研究情况。-Wireless sensor networks(WSNs) use small nodes with constrained capabilities to sense,collect,and disseminate information in many types of applications.As sensor networks
become wide-spread,security issues become a central concern,
especially in mission-criticaltasks.In this paper,we identify
the
threats and vulnerabilities to WSNs and summarize the defense
methods based on the networking protocol layer analys is ?rst.Then we give a holistic overview of security issues.These issues are divided into seven categories:cryptography,keymanage-
ment,attack detections and preventions,securer outing,secure
location security,secure data fusion,and other security
issues.
Along the way we analyze thead vantages and disadvantages of
current secure schemes in each category.Inaddition,we also summarize the techniques and methods used in these categories,and point out the open research issues and directions in each
area. Platform: |
Size: 348160 |
Author:马宁 |
Hits: