Listing 1 - 10 of 36 | << page >> |
Sort by
|
Choose an application
Choose an application
This book provides a comprehensive review of the IEC 61850 standard and outlines the modelling and implementation of the standard using object oriented approaches. In addition to covering general information about the IEC 61850 communication standard, the book also describes a research project that was carried out for the implementation of the IEC 61850 standard as a concrete application layer protocol above a middleware layer specifically designed and implemented in a real-time communication processor environment to support all the communication needs required by the standard.
Choose an application
Choose an application
Choose an application
Choose an application
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay. You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. Youll learn to do just that with this books assessments of the risks, rewards, and trade-offs related implementing security measures. + Helps you see through a hacker's eyes so you can make your network more secure. + Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates. + Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices. + Covers techniques for enhancing the physical security of your systems and network. + Explains how hackers use information-gathering to find and exploit security flaws. + Examines the most effective ways to prevent hackers from gaining root access to a server. + Addresses Denial of Service attacks, "malware," and spoofing. + Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates.
Choose an application
Choose an application
Choose an application
Packed with the latest information on TCP/IP standards and protocols TCP/IP is a hot topic, because it′s the glue that holds the Internet and the Web together, and network administrators need to stay on top of the latest developments. TCP/IP For Dummies, 6th Edition, is both an introduction to the basics for beginners as well as the perfect goto resource for TCP/IP veterans. The book includes the latest on Web protocols and new hardware, plus very timely information on how TCP/IP secures connectivity for blogging, vlogging, photoblogging, and social networking. Stepbystep instructions show you how to install and set up TCP/IP on clients and servers; build security with encryption, authentication, digital certificates, and signatures; handle new voice and mobile technologies, and much more. Transmission Control Protocol / Internet Protocol (TCP/IP) is the de facto standard transmission medium worldwide for computertocomputer communications; intranets, private internets, and the Internet are all built on TCP/IP The book shows you how to install and configure TCP/IP and its applications on clients and servers; explains intranets, extranets, and virtual private networks (VPNs); provides stepbystep information on building and enforcing security; and covers all the newest protocols You′ll learn how to use encryption, authentication, digital certificates, and signatures to set up a secure Internet credit card transaction Find practical security tips, a Quick Start Security Guide, and still more in this practical guide.
Choose an application
Listing 1 - 10 of 36 | << page >> |
Sort by
|