本站已收录 番号和无损神作磁力链接/BT种子 

computer-networks-security-from-scratch-to-advnaced-caz4/

种子简介

种子名称: computer-networks-security-from-scratch-to-advnaced-caz4/
文件类型: 视频
文件数目: 51个文件
文件大小: 879.91 MB
收录时间: 2020-7-13 16:04
已经下载: 3
资源热度: 178
最近下载: 2024-9-4 08:04

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:721df586eb21c079f1a051f1a4ef2706d1a9affd&dn=computer-networks-security-from-scratch-to-advnaced-caz4/ 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

computer-networks-security-from-scratch-to-advnaced-caz4/.torrent
  • 03_TCPIP_Protocol_Suite/012_Introduction_to_Computer_Networks_Protocols.mp419.51MB
  • 03_TCPIP_Protocol_Suite/016_TCPIP_Characteristics_and_Tools.mp426.67MB
  • 03_TCPIP_Protocol_Suite/015_Application_Protocols.mp419.9MB
  • 03_TCPIP_Protocol_Suite/013_IP_Protocol.mp422.51MB
  • 03_TCPIP_Protocol_Suite/014_TCP_and_UDP_Protocols.mp420.93MB
  • 10_Computer_Networks_Security_Conclusion/047 Confidentiality Integrity and Availability CIA.mp410.88MB
  • 10_Computer_Networks_Security_Conclusion/048 Assets Threats and Vulnerabilities.mp47.52MB
  • 10_Computer_Networks_Security_Conclusion/050 Common Attacks.mp416.18MB
  • 10_Computer_Networks_Security_Conclusion/049 Risks and Network Intrusion.mp410.09MB
  • 10_Computer_Networks_Security_Conclusion/051 Security Recommendations.mp410.99MB
  • 07_Intrusion_Detection_and_Prevention_systems_IDSIPS/036_Intrusion_Prevention_Systems_IPS.mp412.29MB
  • 07_Intrusion_Detection_and_Prevention_systems_IDSIPS/035_Snort_as_NIDS.mp414.46MB
  • 07_Intrusion_Detection_and_Prevention_systems_IDSIPS/033_Network_IDS_NIDS.mp410.77MB
  • 07_Intrusion_Detection_and_Prevention_systems_IDSIPS/032_What_is_Intrusion_Detection_Systems_IDS.mp418.96MB
  • 07_Intrusion_Detection_and_Prevention_systems_IDSIPS/034_NIDS_Challenges.mp414.92MB
  • 06_Firewalls_and_Honeypots/031_Bypassing_Firewalls.mp422.42MB
  • 06_Firewalls_and_Honeypots/029_Firewalls_Filtering.mp414.52MB
  • 06_Firewalls_and_Honeypots/028_Firewalls_Rules.mp418.12MB
  • 06_Firewalls_and_Honeypots/030_Honeypots.mp411.9MB
  • 06_Firewalls_and_Honeypots/027_Why_Using_a_Firewall.mp421.76MB
  • 05_Computer_Networks_Security/023_Securing_the_Network_Design.mp417.28MB
  • 05_Computer_Networks_Security/024_TCPIP_Security_and_Tools.mp422.17MB
  • 05_Computer_Networks_Security/025_Port_Scanning_and_Tools.mp421.64MB
  • 05_Computer_Networks_Security/022_Security_Goals.mp415.62MB
  • 05_Computer_Networks_Security/026_Sniffing_and_Tools.mp422MB
  • 01_Introduction_to_Computer_Networks/006_Computer_Networks_Transmission_Media.mp416.57MB
  • 01_Introduction_to_Computer_Networks/004_Computer_Networks_Categories.mp417.55MB
  • 01_Introduction_to_Computer_Networks/005_Computer_Networks_Devices_and_Services.mp418.85MB
  • 01_Introduction_to_Computer_Networks/002_What_is_a_Computer_Network.mp418.6MB
  • 01_Introduction_to_Computer_Networks/003_Computer_Networks_Topologies.mp420.65MB
  • 01_Introduction_to_Computer_Networks/001_Introduction.mp417.59MB
  • 04_Wireless_Networks/020_Wireless_Networks_Devices.mp418.63MB
  • 04_Wireless_Networks/021_Wireless_Networks_Drawbacks.mp416.18MB
  • 04_Wireless_Networks/017_Wireless_Networks_Benefits.mp416.39MB
  • 04_Wireless_Networks/019_Wireless_Networks_Protocol_Wi-Fi.mp412.18MB
  • 04_Wireless_Networks/018_Wireless_Networks_Types.mp421.99MB
  • 02_ISOOSI_Model_7_Layers/009_Transport_and_Network_Layers.mp419.14MB
  • 02_ISOOSI_Model_7_Layers/007_Why_ISOOSI_Model.mp417.78MB
  • 02_ISOOSI_Model_7_Layers/011_ISOOSI_Model_in_Action.mp418.1MB
  • 02_ISOOSI_Model_7_Layers/008_Application_Presentation_and_Session_Layers.mp421.31MB
  • 02_ISOOSI_Model_7_Layers/010_Data_Link_and_Physical_Layers.mp415.58MB
  • 08_Wireless_Networks_Security/040_Wireless_Attacks_and_Mitigation.mp415.8MB
  • 08_Wireless_Networks_Security/039_Wireless_Security_Misconceptions.mp416.57MB
  • 08_Wireless_Networks_Security/041_Secure_Network_Design_with_Wireless.mp415.44MB
  • 08_Wireless_Networks_Security/037_Wired_Equivalent_Privacy_WEP_Attacking.mp419.57MB
  • 08_Wireless_Networks_Security/038_WPA_and_AES_Protocols.mp416.01MB
  • 09_Physical_Security_and_Incident_Handling/042_Physical_Security_Objectives.mp419.37MB
  • 09_Physical_Security_and_Incident_Handling/043_Physical_Threats_and_Mitigation.mp419.75MB
  • 09_Physical_Security_and_Incident_Handling/044_Defense_in_Depth_DiD.mp412.68MB
  • 09_Physical_Security_and_Incident_Handling/045_What_is_an_Incident.mp49.77MB
  • 09_Physical_Security_and_Incident_Handling/046_Incident_Handling.mp423.85MB