Network Security Fundamentals [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Fundamentals [Electronic resources] - نسخه متنی

Gert De Laet, Gert Schauwers

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

Index

[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]

labor or manpower requirements, network design and

LAN-to-LAN tunnel type

Land.C attacks

LANs (limited-area networks) [See also WLANs]

connectivity between, using wireless networks

peer-to-peer, limitations of

WLANs

LANs (local-area networks)

latency, testing in network traffic simulation

Layer 2 or Layer 3, OSI model, NetScreen firewalls operating at

Layer 3, OSI model

Layer 4, OSI model (TCP layer)

Layer 7, OSI model

layered approach to security

defense in depth

external physical security

internal physical security

layers of security

external physical security

internal physical security

least trusted

levels of logging

warning levels, information sent to SYSLOG server

life cycle (network), stages of 2nd

Light Extensible Authentication Protocol (LEAP)

link layer, extensible authentication (802.1X)

Linksys, Inc

local Internet security zone (Internet Explorer)

local-area networks (LANs)

lock-and-key access lists

lock-and-key feature 2nd

logging 2nd

case study 2nd

default log file directory, changing for security

enabling for web servers

IIS, supported log file formats

IP session, by network IDSs

levels of

SYSLOG

logins, encrypted

Kerberos

SSH (Secure Shell)

LZS compression algorithm

/ 196