- Arts & Culture 6204
- Business & Economics 676
- Computers 329
- Dictionaries & Encyclopedias 70
- Education & Science 76847
- Abstracts 73
- Astrology 4
- Biology 8
- Chemistry 3920
- Coursework 15556
- Culture 8
- Diplomas 316
- Drawings 1596
- Ecology 5
- Economy 81
- English 80
- Ethics, Aesthetics 3
- For Education Students 17651
- Foreign Languages 11
- Geography 3
- Geology 1
- History 88
- Maps & Atlases 5
- Mathematics 12624
- Musical Literature 2
- Pedagogics 19
- Philosophy 22
- Physics 15120
- Political Science 5
- Practical Work 59
- Psychology 65
- Religion 4
- Russian and culture of speech 8
- School Textbooks 7
- Sociology 9
- Summaries, Cribs 87
- Test Answers 160
- Tests 8753
- Textbooks for Colleges and Universities 32
- Theses 7
- To Help Graduate Students 14
- To Help the Entrant 38
- Vetting 382
- Works 13
- Информатика 8
- Engineering 872
- Fiction 708
- House, Family & Entertainment 84
- Law 133
- Website Promotion 70
4.20 Methods and means of information protection in com
Content: 90919214245420.20_________________________________________________________.zip 103,66 kB
Product description
Contents
Introduction ............ .3
1 Comparative analysis of the characteristics and methods of protection
information ... .. ............ .5
1.1 Antivirus ............ .5
1.2 Protection of information on the Internet 9
1.3 Protection against unauthorized access ......... ... 10
2 The decisions on the program level ......... ... 14
2.1 SSL - Secure Socket Layer - Secure Sockets Layer ......... ... 14
2.2 IPSec - security protocol network traffic on IP-level ......... ... 18
2.3 FireWall ......... ... 27
2.4 Check Point FireWall-1 technology stateful inspection protocol (Stateful Inspection Technology) ......... ... 30
2.5 Disadvantages firewalls ......... ... 35
3 solutions in hardware ......... ... 40
Conclusion ......... ... 44
Глоссарий………………………………………………………………………………...48
List of sources used ......... ... 51
Appendix A ......... ... 54
Appendix B ....................................................................................... 57
Appendix ....................................................................................... 58
Appendix D ....................................................................................... 59
Appendix E ....................................................................................... 60
Additional information
Diploma SGA.
4.20 Methods and means of information protection in computer networks
Feedback
0Period | |||
1 month | 3 months | 12 months | |
0 | 0 | 0 | |
0 | 0 | 0 |