Ebook Securing IM and P2P applications for the enterprise: Part 2
Số trang: 218
Loại file: pdf
Dung lượng: 6.16 MB
Lượt xem: 14
Lượt tải: 0
Xem trước 10 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Ebook Securing IM and P2P applications for the enterprise: Part 2 includes contents: Chapter 9 Gnutella Architecture; Chapter 10 eDonkey and eMule; Chapter 11 BitTorrent; Chapter 12 FastTrack; Chapter 13 Internet Relay Chat—Major Players of IRC; Chapter 14 IRC Networks and Security; Chapter 15 Global IRC Security; Chapter 16 Common IRC Clients by OS.
Nội dung trích xuất từ tài liệu:
Ebook Securing IM and P2P applications for the enterprise: Part 2
Nội dung trích xuất từ tài liệu:
Ebook Securing IM and P2P applications for the enterprise: Part 2
Tìm kiếm theo từ khóa liên quan:
Securing IM Securing IM and P2P applications Network security Computer security Information security IRC Networks Global IRC securityTài liệu liên quan:
-
61 trang 306 0 0
-
Ebook Managing risk and information security: Protect to enable - Part 2
102 trang 279 0 0 -
Ebook Simple computer security: Disinfect your PC – Part 1
131 trang 122 0 0 -
Ebook The Database hacker's handbook: Defending database servers – Part 1
280 trang 120 0 0 -
Ebook Simple computer security: Disinfect your PC – Part 2
226 trang 114 0 0 -
Ebook Protecting your library's digital sources: the essential guide to planning and preservation
121 trang 102 0 0 -
192 trang 62 0 0
-
Lecture Network security: Chapter 8 - Dr. Munam Ali Shah
31 trang 51 0 0 -
Lecture Business driven information systems (4/e): Chapter 4 - Paige Baltzan
46 trang 49 0 0 -
Ebook Information security fundamentals: Part 2
144 trang 48 0 0