Software protecting information networks
Reviews 0
The sale of this product is suspended.
The seller is blocked and sales of the product are suspended
Product description
Введение…………………………………………………………………………….3
1 The protection of information in computer networks ........................... 7
1.1 Program information encryption networks .... ........................... .... 16
1.2 encryption algorithm Blowfish ...... ... .......................................... ..18
1.3 Use of secure protocol Kerberos ... ... ........................ 20
2 Firewalls as a means of protection of information ... .. ..................... 29
2.1 Identify threats potentsionalnyh network
Company ....................................................................................... ..29
2.2 The organization of security in the enterprise network the choice of methods and means of ........................ .. .................................................................. ..31
2.3 Use of the Kerio WinRoute Firewall ........................... .. ... 38
2.4 Ensuring security in Intranet ............................ ................ ... .44
Заключение………………………………………………………………………...56
Глоссарий………………………………………………………………………….59
List of sources used ................................................... 62
Abbreviations ........................................................................ .66
Appendix A .................. .. ............................................. .. ............ .67
Appendix B .................................. .......................................... .... 68
Appendix ................ ............................................................ .... 69
Appendix D .............................................................................. .70
Appendix E ........................................................................ ... ... ..71
1 The protection of information in computer networks ........................... 7
1.1 Program information encryption networks .... ........................... .... 16
1.2 encryption algorithm Blowfish ...... ... .......................................... ..18
1.3 Use of secure protocol Kerberos ... ... ........................ 20
2 Firewalls as a means of protection of information ... .. ..................... 29
2.1 Identify threats potentsionalnyh network
Company ....................................................................................... ..29
2.2 The organization of security in the enterprise network the choice of methods and means of ........................ .. .................................................................. ..31
2.3 Use of the Kerio WinRoute Firewall ........................... .. ... 38
2.4 Ensuring security in Intranet ............................ ................ ... .44
Заключение………………………………………………………………………...56
Глоссарий………………………………………………………………………….59
List of sources used ................................................... 62
Abbreviations ........................................................................ .66
Appendix A .................. .. ............................................. .. ............ .67
Appendix B .................................. .......................................... .... 68
Appendix ................ ............................................................ .... 69
Appendix D .............................................................................. .70
Appendix E ........................................................................ ... ... ..71
Main features
- Content type File
- Content description 589,69 kB
- Added to the site 21.06.2010
Additional description
Диплом формата СГА 2010. В архиве раздаточный материал, резюме, речь.
Reviews
No reviews yet
The sale of this product is suspended.
Msdrago
Blocked
Msdrago
Blocked