ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Mastering Network Security

دانلود کتاب تسلط بر امنیت شبکه

Mastering Network Security

مشخصات کتاب

Mastering Network Security

ویرایش: Bk&Cd-Rom 
نویسندگان:   
سری:  
ISBN (شابک) : 0782123430, 9780782123432 
ناشر: Sybex Inc 
سال نشر: 1998 
تعداد صفحات: 623 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 4 مگابایت 

قیمت کتاب (تومان) : 39,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 7


در صورت تبدیل فایل کتاب Mastering Network Security به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب تسلط بر امنیت شبکه نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب تسلط بر امنیت شبکه

این متن جنبه‌هایی از نحوه محافظت از داده‌ها و سیستم‌های اطلاعاتی شرکت را در حین ادغام محیط‌های شبکه پیچیده شامل سیستم‌های عامل شبکه‌های متعدد و فراهم کردن دسترسی از راه دور برای کارگران سیار و راه دور را توضیح می‌دهد و پوشش می‌دهد.


توضیحاتی درمورد کتاب به خارجی

This text explains and covers aspects of how to protect the company's data and information systems while integrating complex network environments involving multiple network operating systems and providing remote access to mobile workers and telecommuters.



فهرست مطالب

Local Disk......Page 0
Mastering Network Security:Table of Contents......Page 1
Mastering Network Security:Introduction......Page 11
Mastering Network Security:Why Secure Your Network?......Page 16
Mastering Network Security:Why Secure Your Network?......Page 19
Mastering Network Security:Why Secure Your Network?......Page 22
Mastering Network Security:Why Secure Your Network?......Page 25
Mastering Network Security:How Much Security Do You Need?......Page 27
Mastering Network Security:How Much Security Do You Need?......Page 31
Mastering Network Security:How Much Security Do You Need?......Page 34
Mastering Network Security:How Much Security Do You Need?......Page 37
Mastering Network Security:How Much Security Do You Need?......Page 40
Mastering Network Security:How Much Security Do You Need?......Page 43
Mastering Network Security:How Much Security Do You Need?......Page 46
Mastering Network Security:How Much Security Do You Need?......Page 49
Mastering Network Security:Understanding How Network Systems Communicate......Page 52
Mastering Network Security:Understanding How Network Systems Communicate......Page 55
Mastering Network Security:Understanding How Network Systems Communicate......Page 58
Mastering Network Security:Understanding How Network Systems Communicate......Page 62
Mastering Network Security:Understanding How Network Systems Communicate......Page 66
Mastering Network Security:Understanding How Network Systems Communicate......Page 69
Mastering Network Security:Understanding How Network Systems Communicate......Page 72
Mastering Network Security:Understanding How Network Systems Communicate......Page 75
Mastering Network Security:Understanding How Network Systems Communicate......Page 77
Mastering Network Security:Understanding How Network Systems Communicate......Page 80
Mastering Network Security:Understanding How Network Systems Communicate......Page 83
Mastering Network Security:Understanding How Network Systems Communicate......Page 86
Mastering Network Security:Understanding How Network Systems Communicate......Page 88
Mastering Network Security:Understanding How Network Systems Communicate......Page 91
Mastering Network Security:Understanding How Network Systems Communicate......Page 95
Mastering Network Security:Understanding How Network Systems Communicate......Page 98
Mastering Network Security:Understanding How Network Systems Communicate......Page 101
Mastering Network Security:Understanding How Network Systems Communicate......Page 104
Mastering Network Security:Understanding How Network Systems Communicate......Page 107
Mastering Network Security:Understanding How Network Systems Communicate......Page 110
Mastering Network Security:Topology Security......Page 114
Mastering Network Security:Topology Security......Page 117
Mastering Network Security:Topology Security......Page 120
Mastering Network Security:Topology Security......Page 123
Mastering Network Security:Topology Security......Page 126
Mastering Network Security:Topology Security......Page 129
Mastering Network Security:Topology Security......Page 132
Mastering Network Security:Topology Security......Page 135
Mastering Network Security:Topology Security......Page 138
Mastering Network Security:Topology Security......Page 141
Mastering Network Security:Firewalls......Page 143
Mastering Network Security:Firewalls......Page 146
Mastering Network Security:Firewalls......Page 149
Mastering Network Security:Firewalls......Page 152
Mastering Network Security:Firewalls......Page 155
Mastering Network Security:Firewalls......Page 159
Mastering Network Security:Firewalls......Page 163
Mastering Network Security:Firewalls......Page 166
Mastering Network Security:Firewalls......Page 169
Mastering Network Security:Firewalls......Page 172
Mastering Network Security:Firewalls......Page 176
Mastering Network Security:Firewalls......Page 178
Mastering Network Security:Configuring Cisco Access Lists......Page 180
Mastering Network Security:Configuring Cisco Access Lists......Page 183
Mastering Network Security:Configuring Cisco Access Lists......Page 187
Mastering Network Security:Configuring Cisco Access Lists......Page 191
Mastering Network Security:Configuring Cisco Access Lists......Page 194
Mastering Network Security:Configuring Cisco Access Lists......Page 198
Mastering Network Security:Configuring Cisco Access Lists......Page 202
Mastering Network Security:Configuring Cisco Access Lists......Page 206
Mastering Network Security:Check Point[TITLE]#146;s FireWall-1......Page 208
Mastering Network Security:Check Point[TITLE]#146;s FireWall-1......Page 212
Mastering Network Security:Check Point[TITLE]#146;s FireWall-1......Page 215
Mastering Network Security:Check Point[TITLE]#146;s FireWall-1......Page 219
Mastering Network Security:Check Point[TITLE]#146;s FireWall-1......Page 223
Mastering Network Security:Check Point[TITLE]#146;s FireWall-1......Page 227
Mastering Network Security:Check Point[TITLE]#146;s FireWall-1......Page 230
Mastering Network Security:Check Point[TITLE]#146;s FireWall-1......Page 233
Mastering Network Security:Check Point[TITLE]#146;s FireWall-1......Page 236
Mastering Network Security:Check Point[TITLE]#146;s FireWall-1......Page 239
Mastering Network Security:Intrusion Detection Systems......Page 243
Mastering Network Security:Intrusion Detection Systems......Page 246
Mastering Network Security:Intrusion Detection Systems......Page 250
Mastering Network Security:Intrusion Detection Systems......Page 253
Mastering Network Security:Intrusion Detection Systems......Page 256
Mastering Network Security:Intrusion Detection Systems......Page 259
Mastering Network Security:Intrusion Detection Systems......Page 263
Mastering Network Security:Intrusion Detection Systems......Page 266
Mastering Network Security:Intrusion Detection Systems......Page 269
Mastering Network Security:Authentication and Encryption......Page 273
Mastering Network Security:Authentication and Encryption......Page 277
Mastering Network Security:Authentication and Encryption......Page 280
Mastering Network Security:Authentication and Encryption......Page 283
Mastering Network Security:Authentication and Encryption......Page 286
Mastering Network Security:Authentication and Encryption......Page 289
Mastering Network Security:Authentication and Encryption......Page 292
Mastering Network Security:Authentication and Encryption......Page 295
Mastering Network Security:Virtual Private Networking......Page 297
Mastering Network Security:Virtual Private Networking......Page 301
Mastering Network Security:Virtual Private Networking......Page 304
Mastering Network Security:Virtual Private Networking......Page 307
Mastering Network Security:Virtual Private Networking......Page 311
Mastering Network Security:Virtual Private Networking......Page 316
Mastering Network Security:Viruses, Trojans, and Worms: Oh My!......Page 320
Mastering Network Security:Viruses, Trojans, and Worms: Oh My!......Page 323
Mastering Network Security:Viruses, Trojans, and Worms: Oh My!......Page 326
Mastering Network Security:Viruses, Trojans, and Worms: Oh My!......Page 329
Mastering Network Security:Viruses, Trojans, and Worms: Oh My!......Page 332
Mastering Network Security:Viruses, Trojans, and Worms: Oh My!......Page 335
Mastering Network Security:Viruses, Trojans, and Worms: Oh My!......Page 338
Mastering Network Security:Viruses, Trojans, and Worms: Oh My!......Page 341
Mastering Network Security:Viruses, Trojans, and Worms: Oh My!......Page 344
Mastering Network Security:Viruses, Trojans, and Worms: Oh My!......Page 347
Mastering Network Security:Disaster Prevention and Recovery......Page 349
Mastering Network Security:Disaster Prevention and Recovery......Page 352
Mastering Network Security:Disaster Prevention and Recovery......Page 355
Mastering Network Security:Disaster Prevention and Recovery......Page 359
Mastering Network Security:Disaster Prevention and Recovery......Page 362
Mastering Network Security:Disaster Prevention and Recovery......Page 365
Mastering Network Security:Disaster Prevention and Recovery......Page 368
Mastering Network Security:Disaster Prevention and Recovery......Page 371
Mastering Network Security:Disaster Prevention and Recovery......Page 374
Mastering Network Security:Disaster Prevention and Recovery......Page 377
Mastering Network Security:Disaster Prevention and Recovery......Page 381
Mastering Network Security:NetWare......Page 385
Mastering Network Security:NetWare......Page 388
Mastering Network Security:NetWare......Page 391
Mastering Network Security:NetWare......Page 395
Mastering Network Security:NetWare......Page 398
Mastering Network Security:NetWare......Page 401
Mastering Network Security:NetWare......Page 405
Mastering Network Security:NT Server......Page 409
Mastering Network Security:NT Server......Page 412
Mastering Network Security:NT Server......Page 416
Mastering Network Security:NT Server......Page 419
Mastering Network Security:NT Server......Page 423
Mastering Network Security:NT Server......Page 427
Mastering Network Security:NT Server......Page 431
Mastering Network Security:NT Server......Page 434
Mastering Network Security:NT Server......Page 437
Mastering Network Security:NT Server......Page 441
Mastering Network Security:NT Server......Page 445
Mastering Network Security:NT Server......Page 449
Mastering Network Security:NT Server......Page 452
Mastering Network Security:UNIX......Page 455
Mastering Network Security:UNIX......Page 458
Mastering Network Security:UNIX......Page 461
Mastering Network Security:UNIX......Page 465
Mastering Network Security:UNIX......Page 468
Mastering Network Security:UNIX......Page 472
Mastering Network Security:UNIX......Page 476
Mastering Network Security:UNIX......Page 479
Mastering Network Security:UNIX......Page 483
Mastering Network Security:UNIX......Page 487
Mastering Network Security:UNIX......Page 490
Mastering Network Security:UNIX......Page 494
Mastering Network Security:UNIX......Page 497
Mastering Network Security:The Anatomy of an Attack......Page 499
Mastering Network Security:The Anatomy of an Attack......Page 503
Mastering Network Security:The Anatomy of an Attack......Page 507
Mastering Network Security:The Anatomy of an Attack......Page 510
Mastering Network Security:The Anatomy of an Attack......Page 514
Mastering Network Security:The Anatomy of an Attack......Page 517
Mastering Network Security:The Anatomy of an Attack......Page 520
Mastering Network Security:The Anatomy of an Attack......Page 523
Mastering Network Security:The Anatomy of an Attack......Page 527
Mastering Network Security:Staying Ahead of Attacks......Page 529
Mastering Network Security:Staying Ahead of Attacks......Page 533
Mastering Network Security:Staying Ahead of Attacks......Page 537
Mastering Network Security:Staying Ahead of Attacks......Page 540
Mastering Network Security:Staying Ahead of Attacks......Page 544
Mastering Network Security:Staying Ahead of Attacks......Page 548
Mastering Network Security:Staying Ahead of Attacks......Page 552
Mastering Network Security:About the CD-ROM......Page 555
Mastering Network Security:Sample Network Usage Policy......Page 560
Mastering Network Security:Index......Page 566




نظرات کاربران