Narrow your search
Listing 1 - 10 of 6230 << page
of 623
>>
Sort by

Book
Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessus
Author:
ISBN: 1788832493 9781788832496 1788839234 9781788839235 Year: 2018 Publisher: Birmingham ; Mumbai : Packt Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Get more from your network by securing its infrastructure and increasing its effectiveness About This Book Learn to choose the best network scanning toolset for your system Implement different concepts of network scanning such as port scanning and OS detection Adapt a practical approach to securing your network Who This Book Is For If you are a security professional who is responsible for securing an organization's infrastructure, then this book is for you. What You Will Learn Achieve an effective security posture to design security architectures Learn vital security aspects before moving to the Cloud Launch secure applications with Web Application Security and SQL Injection Explore the basics of threat detection/response/ mitigation with important use cases Learn all about integration principles for PKI and tips to secure it Design a WAN infrastructure and ensure security over a public WAN In Detail Network scanning is the process of assessing a network to identify an active host network; same methods can be used by an attacker or network administrator for security assessment. This procedure plays a vital role in risk assessment programs or while preparing a security plan for your organization. Practical Network Scanning starts with the concept of network scanning and how organizations can benefit from it. Then, going forward, we delve into the different scanning steps, such as service detection, firewall detection, TCP/IP port detection, and OS detection. We also implement these concepts using a few of the most prominent tools on the market, such as Nessus and Nmap. In the concluding chapters, we prepare a complete vulnerability assessment plan for your organization. By the end of this book, you will have hands-on experience in performing network scanning using different tools and in choosing the best tools for your system. Style and approach A practical guide that offers a simple way to easily understand network security concepts and apply them to strengthen your network.


Book
Computer information systems and industrial Management : 20th international Conference, CISIM 2021, Ełk, Poland, September 24-26, 2021 : proceedings
Authors: ---
ISBN: 3030843408 3030843394 Year: 2021 Publisher: Cham, Switzerland : Springer,


Book
Resource allocation in network function virtualization : problems, models and algorithms
Author:
ISBN: 9811948151 9811948143 Year: 2023 Publisher: Singapore : Springer,


Book
Ubiquitous networking : 7th international symposium, UNet 2021 virtual event, May 19-22, 2021 : revised selected papers
Author:
ISBN: 3030863557 3030863565 Year: 2021 Publisher: Cham, Switzerland : Springer,


Book
Nature of computation and communication : 7th EAI International Conference, ICTCC 2021, Virtual Event, October 28-29, 2021, Proceedings
Authors: ---
ISBN: 3030929418 3030929426 Year: 2021 Publisher: Cham, Switzerland : Springer,


Book
Distributed computer and communication networks : control, computation, communications : 25th International Conference, DCCN 2022, Moscow, Russia, September 26-29, 2022, revised selected papers
Authors: --- ---
ISBN: 3031232070 3031232062 Year: 2022 Publisher: Cham, Switzerland : Springer,


Book
MOCAST 2021
Authors: ---
ISBN: 3036562931 303656294X Year: 2023 Publisher: [Place of publication not identified] : MDPI - Multidisciplinary Digital Publishing Institute,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The 10th International Conference on Modern Circuit and System Technologies on Electronics and Communications (MOCAST 2021) will take place in Thessaloniki, Greece, from July 5th to July 7th, 2021. The MOCAST technical program includes all aspects of circuit and system technologies, from modeling to design, verification, implementation, and application. This Special Issue presents extended versions of top-ranking papers in the conference. The topics of MOCAST include: Analog/RF and mixed signal circuits; Digital circuits and systems design; Nonlinear circuits and systems; Device and circuit modeling; High-performance embedded systems; Systems and applications; Sensors and systems; Machine learning and AI applications; Communication; Network systems; Power management; Imagers, MEMS, medical, and displays; Radiation front ends (nuclear and space application); Education in circuits, systems, and communications.


Book
Principles of protocol design
Author:
ISBN: 1281216550 9786611216559 3540775412 3540775404 9783540775409 Year: 2008 Publisher: Berlin : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book introduces the reader to the principles used in the construction of a large range of modern data communication protocols. The approach we take is rather a formal one, primarily based on descriptions of protocols in the notation of CSP. This not only enables us to describe protocols in a concise manner, but also to reason about many of their interesting properties and formally to prove certain aspects of their correctness with respect to appropriate speci?cations. Only after considering the main principles do we go on to consider actual protocols where these principles are exploited. This is a completely new edition of a book which was ?rst published in 1994, where the main focus of many international efforts to develop data communication systems was on OSI – Open Systems Interconnection – the standardised archit- ture for communication systems developed within the International Organisation for Standardization, ISO. In the intervening 13 years, many of the speci?c protocols - veloped as part of the OSI initiative have fallen into disuse. However, the terms and concepts introduced in the OSI Reference Model are still essential for a systematic and consistent analysis of data communication systems, and OSI terms are therefore used throughout. There are three signi?cant changes in this second edition of the book which p- ticularly re?ect recent developments in computer networks and distributed systems.

Listing 1 - 10 of 6230 << page
of 623
>>
Sort by