Network Security Fundamentals [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Network Security Fundamentals [Electronic resources] - نسخه متنی

Gert De Laet, Gert Schauwers

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید

Index

[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]

vendor

ventilation, air-conditioning, and other environmental requirements for network equipment 2nd

view record, creating or modifying

Virtual Private Networks
[See VPNs]

virtual type terminal (VTY) lines

viruses

antivirus software

antivirus software for firewalls

enabled by Trojan horses

risk of

smart card protection against

VMS Management Center for IDS, Cisco

voice communication over IP

government role in security

voice recognition

VPN concentrator

VPNs (virtual private networks) 2nd 3rd

case study, remote access VPN 2nd

enrollment of devices in PKI

VPNs (Virtual Private Networks)

example security policy for

VPNs (virtual private networks)

GRE (generic routing encapsulation) tunnels

IPSec (IP Security) 2nd

antireplay protection

data integrity

origin authentication 2nd

protocol framework

transform sets

tunnel or transport mode

PKI solution for authentication

types of

using IPSec with

configuring IPSec

pareparation for

wireless network security, using for

VTY (virtual type terminal) lines

vulnerabilities 2nd 3rd

buffer overflows

protecting against

communications over public networks

fingerprint scanning

information about, in CSEC

internal and external

log file alteration or deletion by intruders

of TCP/IP protocol suite[vulnerabilities:TCP]

on data port 139[vulnerabilities:data]

patching

reusable passwords

risk and

shared key authentication, WLANs

social engineering

countermeasures

software-based firewalls

spoofing techniques

SSIDs, WLAN

TCP/IP security issues 2nd

WEP protocol

countermeasures to

/ 196