Course: "bezopasna access in the Internet booking"

Pay with:
i agree with "Terms for Customers"
Sold: 0
Refunds: 0

Uploaded: 29.06.2011
Content: (206,99 kB)


Determining the structure and properties of an unsecured network, the analysis of threats to the security of the system. Descriptions of counter intelligence network at the application level, reducing the threat of sniffing packets. Development of protection when connecting the LAN to the Internet.


Chapter 1. Postanovka problemy protection ICAL INFORMATION
1.1 Vyyavlenie structure and osnovnyh svoystv nezaschischёnnoy seti
1.2 Vyyavlenie and analysis osnovnyh an outlet on sistemy bezopasnosti ugroz
1.3 Formirovanie trebovany to protect sisteme
Chapter 2. Issledovanie sposobov protivodeystviya setevym attacks
2.1 Protivodeystvie atake ARP-spoofing'a
2.2 Protivodeystvie DDoS-attacks
2.3 Snizhenie ugrozy sniffing paketov
2.5 Protivodeystvie attacks on urovne prilozheny
2.6 Protivodeystvie setevoy razvedke
Chapter 3. Razrabotka and formirovanie zaschischёnnoy seti
3.1 Formirovanie structure zaschischёnnoy seti with ispolzovaniem tehnologii "Open Internet booking"
3.1.1 Razrabotka protection in podklyuchenii lokalnoy seti to Internet booking for Organizations afterwards the otdelnyh stations lokalnoy seti with Open resursami Internet booking
3.1.2 Razrabotka protection in podklyuchenii lokalnoy seti to Internet booking for Organizations tolko zaschischёnnogo vzaimodeystviya an outlet on lokalnoy seti or otdelnyh eё kompyuterov other lokalnymi setyami or otdelnymi kompyuterami
3.1.3 Razrabotka protection in ispolzovanii kombinirovannoy skhemy
Spisok ispolzuemoy literatury

Volume - 24 pages.


No feedback yet.
1 month 3 months 12 months
0 0 0
0 0 0
In order to counter copyright infringement and property rights, we ask you to immediately inform us at the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)