种子简介
种子名称:
computer-networks-security-from-scratch-to-advnaced-caz4/
文件类型:
视频
文件数目:
51个文件
文件大小:
879.91 MB
收录时间:
2020-7-13 16:04
已经下载:
3次
资源热度:
193
最近下载:
2024-12-26 23:06
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:721df586eb21c079f1a051f1a4ef2706d1a9affd&dn=computer-networks-security-from-scratch-to-advnaced-caz4/
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
computer-networks-security-from-scratch-to-advnaced-caz4/.torrent
03_TCPIP_Protocol_Suite/012_Introduction_to_Computer_Networks_Protocols.mp419.51MB
03_TCPIP_Protocol_Suite/016_TCPIP_Characteristics_and_Tools.mp426.67MB
03_TCPIP_Protocol_Suite/015_Application_Protocols.mp419.9MB
03_TCPIP_Protocol_Suite/013_IP_Protocol.mp422.51MB
03_TCPIP_Protocol_Suite/014_TCP_and_UDP_Protocols.mp420.93MB
10_Computer_Networks_Security_Conclusion/047 Confidentiality Integrity and Availability CIA.mp410.88MB
10_Computer_Networks_Security_Conclusion/048 Assets Threats and Vulnerabilities.mp47.52MB
10_Computer_Networks_Security_Conclusion/050 Common Attacks.mp416.18MB
10_Computer_Networks_Security_Conclusion/049 Risks and Network Intrusion.mp410.09MB
10_Computer_Networks_Security_Conclusion/051 Security Recommendations.mp410.99MB
07_Intrusion_Detection_and_Prevention_systems_IDSIPS/036_Intrusion_Prevention_Systems_IPS.mp412.29MB
07_Intrusion_Detection_and_Prevention_systems_IDSIPS/035_Snort_as_NIDS.mp414.46MB
07_Intrusion_Detection_and_Prevention_systems_IDSIPS/033_Network_IDS_NIDS.mp410.77MB
07_Intrusion_Detection_and_Prevention_systems_IDSIPS/032_What_is_Intrusion_Detection_Systems_IDS.mp418.96MB
07_Intrusion_Detection_and_Prevention_systems_IDSIPS/034_NIDS_Challenges.mp414.92MB
06_Firewalls_and_Honeypots/031_Bypassing_Firewalls.mp422.42MB
06_Firewalls_and_Honeypots/029_Firewalls_Filtering.mp414.52MB
06_Firewalls_and_Honeypots/028_Firewalls_Rules.mp418.12MB
06_Firewalls_and_Honeypots/030_Honeypots.mp411.9MB
06_Firewalls_and_Honeypots/027_Why_Using_a_Firewall.mp421.76MB
05_Computer_Networks_Security/023_Securing_the_Network_Design.mp417.28MB
05_Computer_Networks_Security/024_TCPIP_Security_and_Tools.mp422.17MB
05_Computer_Networks_Security/025_Port_Scanning_and_Tools.mp421.64MB
05_Computer_Networks_Security/022_Security_Goals.mp415.62MB
05_Computer_Networks_Security/026_Sniffing_and_Tools.mp422MB
01_Introduction_to_Computer_Networks/006_Computer_Networks_Transmission_Media.mp416.57MB
01_Introduction_to_Computer_Networks/004_Computer_Networks_Categories.mp417.55MB
01_Introduction_to_Computer_Networks/005_Computer_Networks_Devices_and_Services.mp418.85MB
01_Introduction_to_Computer_Networks/002_What_is_a_Computer_Network.mp418.6MB
01_Introduction_to_Computer_Networks/003_Computer_Networks_Topologies.mp420.65MB
01_Introduction_to_Computer_Networks/001_Introduction.mp417.59MB
04_Wireless_Networks/020_Wireless_Networks_Devices.mp418.63MB
04_Wireless_Networks/021_Wireless_Networks_Drawbacks.mp416.18MB
04_Wireless_Networks/017_Wireless_Networks_Benefits.mp416.39MB
04_Wireless_Networks/019_Wireless_Networks_Protocol_Wi-Fi.mp412.18MB
04_Wireless_Networks/018_Wireless_Networks_Types.mp421.99MB
02_ISOOSI_Model_7_Layers/009_Transport_and_Network_Layers.mp419.14MB
02_ISOOSI_Model_7_Layers/007_Why_ISOOSI_Model.mp417.78MB
02_ISOOSI_Model_7_Layers/011_ISOOSI_Model_in_Action.mp418.1MB
02_ISOOSI_Model_7_Layers/008_Application_Presentation_and_Session_Layers.mp421.31MB
02_ISOOSI_Model_7_Layers/010_Data_Link_and_Physical_Layers.mp415.58MB
08_Wireless_Networks_Security/040_Wireless_Attacks_and_Mitigation.mp415.8MB
08_Wireless_Networks_Security/039_Wireless_Security_Misconceptions.mp416.57MB
08_Wireless_Networks_Security/041_Secure_Network_Design_with_Wireless.mp415.44MB
08_Wireless_Networks_Security/037_Wired_Equivalent_Privacy_WEP_Attacking.mp419.57MB
08_Wireless_Networks_Security/038_WPA_and_AES_Protocols.mp416.01MB
09_Physical_Security_and_Incident_Handling/042_Physical_Security_Objectives.mp419.37MB
09_Physical_Security_and_Incident_Handling/043_Physical_Threats_and_Mitigation.mp419.75MB
09_Physical_Security_and_Incident_Handling/044_Defense_in_Depth_DiD.mp412.68MB
09_Physical_Security_and_Incident_Handling/045_What_is_an_Incident.mp49.77MB
09_Physical_Security_and_Incident_Handling/046_Incident_Handling.mp423.85MB