• Mastering Python for Networking and security: Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues

    Mastering Python for Networking and security: Leverage the scripts and libraries of Python version 3.7 and beyond to overcome networking and security issues

    It's now more apparent than ever that security is a critical aspect of IT infrastructure, and that devastating data breaches cccan occur from simple network line hacks. As shown in this book, combining the latest version of Python with an increased focus on network security can help you to level up your defenses against cyber attacks and cyber threats. Python is being used for increasingly advanced tasts, with the latest update introducing new...

     13 p hcmute 15/11/2022 290 2

  • Designing for Cisco Network Service architectures (ARCH): Foundation learning guide (CCDP ARCH 300-320)

    Designing for Cisco Network Service architectures (ARCH): Foundation learning guide (CCDP ARCH 300-320)

    As a Foundation Learning Guide, this book fully reflects the content of the newest Cisco CCDP ARCH course. Real-world scenarios illustrate key concepts; chapter learning objectives and summaries help focus study; and review questions help readers assess their knowledge. Call no. : 004.65 A316

     23 p hcmute 15/11/2022 254 0

  • CCDA 200-310 official cert guide

    CCDA 200-310 official cert guide

    CCDA Official Cert Guide, Fifth Edition is a comprehensive self-study tool for preparing for the new DESGN exam. Complete coverage of all exam topics as posted on the exam topic blueprint ensures students will arrive at a thorough understanding of what they need to master to succeed on the exam. Call no. : 004.6076 B898

     30 p hcmute 15/11/2022 278 0

  • Information security: principles and practice

    Information security: principles and practice

    Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Working knowledge is required of aspects of cryptography such as classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and...

     9 p hcmute 15/11/2022 243 0

  • Hands-on ethical hacking and network defense

    Hands-on ethical hacking and network defense

    Cyber-terrorism and corporate espionage are increasingly common and devastating threats, making trained network security professionals more important than ever. This text helps you gain the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors begin by exploring the concept of ethical hacking and its practitioners, explaining their importance in protecting corporate and government data from...

     10 p hcmute 15/11/2022 391 0

  • Certified ethical hacker V10: complete training guide with practice labs - technology workbook: Exam: 312-50

    Certified ethical hacker V10: complete training guide with practice labs - technology workbook: Exam: 312-50

    Certified ethical hacker V10: complete training guide with practice labs - technology workbook: Exam: 312-50. -- Updated edition. -- Monee: [IPSpecialist LTD], 2022 574p.: illustrations; 27cm Copyright 2018 IPSpecialist LTD Dùng cho môn học: Tấn công mạng và phòng thủ includes references and index ISBN 9781983005473 1. Computer networks -- Security measures -- Examinations --...

     18 p hcmute 15/11/2022 347 0

  • Certified ethical hacker (CEH) foundation guide

    Certified ethical hacker (CEH) foundation guide

    Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares...

     17 p hcmute 15/11/2022 266 0

  • Applied cryptography: Protocols, algorithms, and source code in C

    Applied cryptography: Protocols, algorithms, and source code in C

    From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no...

     12 p hcmute 15/11/2022 183 0

  • Handbook of applied cryptography

    Handbook of applied cryptography

    A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols; more than 200 tables and figures; more than 1,000 numbered definitions, facts, examples, notes, and remarks; and over 1,250 significant references, including brief comments on each paper. Call no. : 005.8 M543

     13 p hcmute 15/11/2022 136 0

  • Cryptography and network security: Principles and practice

    Cryptography and network security: Principles and practice

    Stallings' Cryptography and Network Security, Seventh Edition, introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the...

     10 p hcmute 15/11/2022 218 0

  • Information Technology : Workbook

    Information Technology : Workbook

    GAY, GLENDA Information Technology : Workbook/ Glenda Gay, Ronald Blades. -- 3rd ed. -- UK: Oxford University Press, 2019 117p.: 27cm Dùng cho môn học Tiếng Anh chuyên ngành Công nghệ thông tin ISBN 9780198437208 1. Information Technology . I. Ronald Blades . Dewey Class no. : 004 -- dc 23 Call no. : 004 G285

     4 p hcmute 15/11/2022 161 0

  • Computing Essentials 2023: Make IT Work for You

    Computing Essentials 2023: Make IT Work for You

    O'LEARY, DANIEL A Computing Essentials 2023: Make IT Work for You/ Daniel A. O'Leary, Timothy J. O'Leary, Linda I. O'Leary. -- New York: McGraw Hill LLC, 2023 390p.: 27cm Dùng cho môn học Tiếng Anh chuyên ngành Công nghệ thông tin ISBN 9781265263218 1. Computing Essentials . 2. Electronic data processing. I. Linda I. O'Leary . II. Timothy J. O'Leary . Dewey Class no. : 004 -- dc 23 Call...

     15 p hcmute 15/11/2022 572 1

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=hcmute
getDocumentFilter3 strKey=LIBTAILIEU2_LIST_FILTERhcmute24780vi