Бази даних

Наукова електронна бібліотека - результати пошуку

Mozilla Firefox Для швидкої роботи та реалізації всіх функціональних можливостей пошукової системи використовуйте браузер
"Mozilla Firefox"

Вид пошуку
у знайденому
Сортувати знайдені документи за:
авторомназвоюроком видання
Формат представлення знайдених документів:
повнийстислий
 Знайдено в інших БД:Віртуальна довідка (139)Тематичний інтернет-навігатор (14)Автореферати дисертацій (16061)Реферативна база даних (100759)Книжкові видання та компакт-диски (11476)Журнали та продовжувані видання (404)
Пошуковий запит: (<.>K=ЗАСТОСУВАНН$<.>+<.>K=ПРОВАЙДЕРІВ$<.>+<.>K=ЗАХИСТ$<.>)
Загальна кількість знайдених документів : 571
Представлено документи з 1 до 20
...

   Тип видання:   методичний посібник   
1.


Abwehr englischer gangster-methoden "Silent killing" [Electronic resource]. - [S. l. : s. n.]. - 52 S.
Переклад назви: Захист від англійських гангстерських прийомів "Тихе вбивство"

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ




Кл.слова:
німецька армія -- рукопашний бій

   Тип видання:   наукове видання   
2.

Alt, B. L.
Fleecing grandma and grandpa [Electronic resource] : protecting Against Scams, Cons, and Frauds / B. L. Alt, S. K. Wells. - Westport : Praeger Publishers, 2004. - 167 p.
Переклад назви: Оббираючи бабусь і дідусів: захист від шахрайства

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


Falling for a scam or con is humiliating for anyone, and can have terrible consequences. But for the elderly, being the victim of fraud can be disastrous, and they are the most common and vulnerable targets of everyday scams, cons, and frauds. From identity theft to gambling scams, from power of attorney issues to pyramid schemes, there is no dearth of creativity in the ways some criminals will relieve the elderly from their money and their homes. Here, Alt and Wells describe the most common scams, offer the stories of actual victims, and detail ways to protect yourself and your family from becoming easy targets. What makes the elderly such easy marks for con artists? How can they avoid the common traps? Knowing about them is one place to start, and this book helps readers to understand and identify the most common scams perpetrated against the elderly. Because such cons are so hard to prosecute, it is important to know the methods criminals employ to separate innocents from their hard-earned money. This lively, vivid account of one of the most insidious forms of crime will help families and individuals protect themselves and their loved ones from the machinations of those who view them as easy marks.



Кл.слова:
соціологія -- шахрайство

   Тип видання:   методичний посібник   
3.

Arata, M. J.
Identity theft for dummies [Electronic resource] / M. J. Arata. - Hoboken : Wiley Publishing, 2010. - 291 p.
Переклад назви: Крадіжки персональних даних для чайників

Рубрики:

  Повний текст доступний у читальних залах НБУВ


In this book, I tell you how to prevent identity theft and what to do if you’re a victim. If you’re wondering what sort of information is vulnerable and should be shredded, or how to reclaim your credit if you’ve been a victim, this is the one-stop reference for you. Today, the name of the game is making yourself a hard target, and armed with this book, you’ll do exactly that.



Кл.слова:
захист інформації -- безпека інформації -- відновлення даних

   Тип видання:   науково-популярне видання   
4.
 


Atsctoy, Alex.
Самоучитель хакера [Електронний ресурс] / Alex Atsctoy. - М. : Лучшие книги, 2005. - 192 с.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Что нового привносит в общий поток хакерской литературы эта небольшая книга? А то, что в ней вся необъятная тема хакинга рассмотрена в единственном, но самом важном аспекте - практическом. В книге рассмотрены темы Хакинг, Зашита Windows 2000/XP, Проникновение в систему, Сокрытие следов, Хакинг fyay, pofc Web, Деструкция почтового клиента, хакинг lCQ, Хакинг Web-сайтов, атаки DOS Хакинг компьютеров Windows 2000/XP, Хакинг коммутируемого доступа.



Кл.слова:
захист інформації -- інформатика -- інформаційна безпека -- хакінг

   Тип видання:   наукове видання   
5.

Bar-Shalom, Yaakov.
Estimation with applications to tracking and navigation [Electronic resource] / Yaakov Bar-Shalom, X. Rong Li, Thiagalingam Kirubarajan. - New York : John Wiley & Sons, 2001. - 558 p.
Переклад назви: Оцінка та застосування в стеженні та навігації

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The authors provide a review of the necessary background mathematical techniques and offer an overview of the basic concepts in estimation. They then provide detailed treatments of all the major issues in estimation with a focus on applying these techniques to real systems.



Кл.слова:
лінійна алгебра -- лінійна система -- теорія ймовірностей

   Тип видання:   наукове видання   
6.

Barken, L.
How secure is your wireless network? Safeguarding your wi-fi LAN [Electronic resource] / L. Barken. - Upper Saddle River : Prentice Hall PTR, 2003. - 224 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Now you can have the awesome benefits of wireless LANs without falling victim to their notorious security flaws. Leading wireless security expert Lee Barken shows you practical workarounds and fixes for the vulnerabilities in today's WLANs, introduces high-security wireless protocols new to the marketplace, and offers step-by-step instructions for protecting all your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you've been searching for-whether you're a network administrator,security specialist, manager, or home user.



Кл.слова:
бездротові локальні мережі -- захист інформації

   Тип видання:   наукове видання   
7.

Bastien, G.
CCSP Cisco Secure PIX® Firewall advanced exam certification guide [Electronic resource] / G. Bastien, E. Carter, C. Degu. - 2th. ed.. - Indianapolis : Cisco Press, 2004. - 816 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Becoming a CCSP distinguishes you as part of an exclusive group of experts, ready to take on today's most challenging security tasks. Administration of the Cisco PIX Firewall is a difficult and complex task, critical for protecting a network. Whether you are seeking a PIX-focused certification or the full-fledged CCSP certification, learning what you need to know to pass the Cisco Secure PIX Firewall Advanced (CSPFA) exam will qualify you to keep your company's network safe while meeting business needs.



Кл.слова:
адміністрування мереж -- захист мережі

   Тип видання:   методичний посібник   
8.

Bejtlich, R.
The Tao of network security monitoring. Beyond intrusion detection [Electronic resource] / R. Bejtlich. - Boston : Addison Wesley, 2004. - 832 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The book you are about to read will arm you with the knowledge you need to defend your network from attackers—both the obvious and the not so obvious....If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP protocols and run an open source or commercial IDS, you may be asking "What's next?" If so, this book is for you.



Кл.слова:
мережа -- захист

   Тип видання:   методичний посібник   
9.

Bishop, M.
Introduction to computer security [Electronic resource] / M. Bishop. - New Jersey : Prentice Hall PTR, 2004. - 784 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop`s insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security challenges of IT environments. Bishop explains the fundamentals of security: the different types of widely used policies, the mechanisms that implement these policies, the principles underlying both policies and mechanisms, and how attackers can subvert these tools - as well as how to defend against attackers. A practicum demonstrates how to apply these ideas and mechanisms to a realistic company.



Кл.слова:
захист -- адміністрування системи

   Тип видання:   методичний посібник   
10.

Bott, E.
Microsoft Windows security inside out for Windows XP and Windows 2000 [Electronic resource] / E. Bott, C. Siechert. - Redmond : Microsoft Press, 2003. - 800 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Hey, you know your way around a desktop -- so now dig into the Windows operating system and really put its security features to work! Covering Windows XP Professional, Windows XP Home Edition, and Windows 2000 Professional, this supremely organized reference packs hundreds of timesaving solutions, checklists, troubleshooting tips, and workarounds -- all in concise, fast-answers format. Learn the essential tools and techniques for tightening up security on your personal computer or network, including ways to fend off viruses, hackers, spam, denial-of-service attacks, and other threats. Discover how to button up your Virtual Private Networks (VPNs), remote access, and wireless networking services. And take ultimate control of security with advanced solutions such as file encryption, port blocking, Internet Protocol Security, group policies, and tamper-proofing the Registry.



Кл.слова:
безпека системи -- захист інформації

   Тип видання:   методичний посібник   
11.

Chapman, D. B.
Building Internet firewalls [Electronic resource] / D. B. Chapman, E. D. Zwicky. - Sebastopol : O'Reilly, 1995. - 517 p.
Переклад назви: Побудова інтернет-фаєрволів

Рубрики:

  Повний текст доступний у читальних залах НБУВ


More than a million systems are now connected to the Internet, and something like 15 million people in 100 countries on all seven continents use Internet services. More than 100 million email messages are exchanged each day, along with countless files, documents, and audio and video images. Everyone is jumping on the Internet bandwagon. Once a haven for academicians and scientists, the Net is now reaching large and small businesses, government at all levels, school children, and senior citizens. The commercial world is rushing headlong into doing business on the Internet, barely pausing while technologies and policies catch up with their desire to go online. But, too few of the seekers after Internet wisdom and riches consider whether their businesses will be safe on the Net. What kinds of security risks are posed by the Internet? Some risks have been around since the early days of networking -- password attacks (guessing them or cracking them via password dictionaries and cracking programs), denial of service, and exploiting known security holes. Some risks are newer and even more dangerous -- packet sniffers, IP (Internet Protocol) forgery, and various types of hijacking attacks. Firewalls are a very effective way to protect your system from these Internet security threats. Firewalls in computer networks keep damage on one part of the network (e.g., eavesdropping, a worm program, file damage) from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. What is a firewall? It's a hardware and/or software solution that restricts access from your internal network to the Internet -- and vice versa. A firewall may also be used to separate two or more parts of your local network (for example, protecting finance from R&D). The firewall is installed at the perimeter of the network, ordinarily where it connects to the Internet. You can think of a firewall as a checkpoint; all traffic, incoming and outgoing, is stopped at this point. Because it is, the firewall can make sure that it is acceptable. "Acceptable" means that whatever is passing through -- email, file transfers, remote logins, NFS mounts, etc. -- conforms to the security policy of the site. Building Internet Firewalls is a practical guide to building firewalls on the Internet. If your site is connected to the Internet, or if you're considering getting connected, you need this book. It describes a variety of firewall approaches and architectures and discusses how you can build packet filtering and proxying solutions at your site. It also contains a full discussion of how to configure Internet services (e.g., FTP, SMTP, Telnet) to work with a firewall. The book also includes a complete list of resources, including the location of many publicly available firewall construction tools. The book is divided into four parts: Part I discusses Internet threats, the benefits of firewalls, overall security strategies, and a summary of Internet services and their security risks. Part II describes possible firewall designs and general terms and concepts, how to protect the bastion host in your firewall configuration, how to build proxying and packet filtering firewalls, and how to configure Internet services to operate with a firewall. Part III describes how to maintain a firewall, develop a security policy, and respond to a security incident. Part IV contains appendic



Кл.слова:
мережа -- захист

   Тип видання:   методичний посібник   
12.
 


Chevallier, Andrew.
Herbal remedies [Electronic resource] / A. Chevallier. - London : Dorling Kindersley, 2007. - 290 p. - (Eyewitness companions)
Переклад назви: Лікувальні трави

Рубрики:

  Повний текст доступний у читальних залах НБУВ


For anyone who wants to learn more about medicinal plants and how to use them at home, Herbal Remedies provides essential information on how to safely use herbal medicines and shows you how to create your own remedies to target common ailments.



Кл.слова:
трави -- захист -- лікування

   Тип видання:   наукове видання   
13.

Chuvakin, A.
Security Warrior [Electronic resource] / A. Chuvakin, C. Peikari. - Sebastobol : O'Reilly, 2004. - 552 p.
Переклад назви: Війна за безпеку

Рубрики:

  Повний текст доступний у читальних залах НБУВ


What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle



Кл.слова:
захист -- інформація

   Тип видання:   методичний посібник   
14.

Cobb, С.
Cryptography For Dummies [Electronic resource] / С. Cobb. - Indianapolis : John Wiley & Sons, 2004. - 336 p.
Переклад назви: Криптографія для чайників

Рубрики:

  Повний текст доступний у читальних залах НБУВ


This guide to keeping your data safe offers the latest security techniques and advice on choosing and using cryptography products. It covers terminology, specific encryption technologies, pros and cons of different implementations, and more.



Кл.слова:
інформація -- захист

   Тип видання:   наукове видання   
15.

Dahlen, T.
Advanced J2EE platform development [Electronic resource] : applying integration tier patterns / T. Dahlen, T. Fritzon. - Upper Saddle River : Prentice Hall PTR, 2003. - 224 p
Переклад назви: Розширена платформа розробки J2EE: застосування інтеграції рівня моделі

Рубрики:

  Повний текст доступний у читальних залах НБУВ


This book does not provide any defined solutions or silver bullets. Integrating J2EE Platform applications with legacy systems is a difficult task that requires a thorough understanding of both legacy system applications and object-oriented design. We have tried to find a practical approach to applying the J2EE integration tier patterns in real-world situations, the main design principle being that of separation of concerns. Some of the designs described in this book are currently running in production, while others represent theoretical work that has not yet been tested in a full-scale production environment. We hope, however, that in reading this book you will gain valuable tools with which to start the long journey toward application integration.



Кл.слова:
об'єктно-орієнтоване проектування -- системна програма -- додаток

   Тип видання:   наукове видання   
16.

Deal, R. A.
Cisco ASA Configuration [Electronic resource] / R. A. Deal. - New York : McGRAW-HILL, 2009. - 753 p. - (Networking Professional's Library)
Переклад назви: Конфігурація Cisco ASA

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The Cisco ASA product replaces Cisco PIX Firewalls, and Cisco expert Richard Deal updates his bestselling book, Cisco PIX Firewalls, to cover ASA. This book shows you how to configure and maintain a Cisco ASA appliance to control traffic in the corporate network and protect the network from internal and external threats and attacks. Cisco ASA Configuration covers the latest features available in versions 8.0 and 8.1, and includes detailed examples of complex configurations and troubleshooting. Implement and manage this powerful multifunction network adaptive security appliance with help from this expert guide.



Кл.слова:
продукт -- захист мережі -- пристрій

   Тип видання:   підручник   
Категорія: Механіка   
17.

Dorfman, Abram.
Applications of mathematical heat transfer and fluid flow models in engineering and medicine [Electronic resource] / A. Dorfman. - Hoboken : Wiley Publishing, 2017. - 454 p.
Переклад назви: Застосування математичної теплопередачі і моделей течії рідини у техніці та медицині

Рубрики:

  Текст у форматі PDF 6.21 Мб


This textbook for advanced graduate and post-graduate courses presents the applications of the modern heat transfer and fluid flow mathematical models in engineering, biology, and medicine. By writing this work, the author continues the introduction of brand-new efficient methods in fluid flow and heat transfer that have been developed and widely used during the last 50 years after computers became common. While his previous two monographs presented these contemporary methods on an academic level in heat transfer only or in both areas heat transfer and fluid flow on the preliminary level, this manual introduces the modern approaches in studying corresponding mathematical models—a core of each research means determining its efficiency and applicability. Two types of new mathematical models are considered: the conjugate models in heat transfer and in fluid flow and models of direct numerical simulation of turbulence. The current situation of applications of these models is presented in two parts: applications of conjugate heat transfer in engineering (Part I) and applications of conjugate fluid flow (peristaltic flow) in medicine and biology and applications in engineering of direct numerical simulation (Part II). These parts contain theory, analysis of mathematical models, and methods of problem solution introduced via 134 detailed and 231 shortly reviewed examples selected from a list of 448 cited original papers adopted from 152 scientific general mathematic, computing, and different specific oriented journals, 42 proceedings, reports, theses, and 37 books. This list of 448 references comprehends the whole period of the new methods existing from the 1950s to present time, including more than 100 results published during the last 5 years among which more than half of the studies were issued in 2014 to 2016.



Кл.слова:
теплова енергія -- перистальтичні потоки -- чисельне моделювання

   Тип видання:   наукове видання   
18.

Dubrawsky, I.
CCSP Self-Study CCSP CSI [Electronic resource] : exam Certification Guide / I. Dubrawsky, P. Grey. - 2-е вид.. - Indianapolis : Cisco Press, 2004. - 528 p.
Переклад назви: CCSP самовчитель CCSP CSI: Керівництво сертифікаційного іспиту

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The official self-study test preparation guide for the CCSP CSI exam 642-541 This study guide helps you master all the topics on the CCSP CSI exam, including Classifying and mitigating network attacks Securing designs for small, medium-sized, remote-user, and enterprise networks Understanding the SAFE network modules Using Host IPS and the Cisco Security Agent Identifying security threats Securing a wireless network Applying the SAFE Blueprint to networks utilizing IP telephony Implementing appropriate security products to prevent or counteract vulnerabilities Defining a security policy Using the Cisco Secure product portfolio, including perimeter security, IDS, secure connectivity, security management, and Cisco AVVID Understanding the SAFE architectural overview CCSP CSI Exam Certification Guide, Second Edition, is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CSI exam. Inside, you'll find preparation hints and test-taking tips to help you identify areas of weakness and improve both your conceptual and hands-on knowledge of network security. CCSP CSI Exam Certification Guide, Second Edition, presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Foundation Summary lists and tables make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions reinforce key concepts. An entire chapter of scenarios helps you place the exam objectives in real-world situations, thus increasing recall during exam time. New in this edition is coverage of wireless networks, IP telephony, Host Intrusion Prevention System (IPS), and enterprise networks. The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take a complete, timed exam. The assessment engine tracks your performance and provides feedback on a module-by-module basis, presenting links to the text for further review and helping you devise a complete study plan. Well-regarded for its level of detail, assessment features, challenging review questions, and hands-on exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCSP CSI Exam Certification Guide, Second Edition, is part of a recommended study program from Cisco Systems that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Companion CD-ROM The CD-ROM contains more than 200 practice questions for the CCSP CSI exam, including simulation-based questions. CD-ROM test engine powered by www.boson.com. Boson Software is a Cisco Learning Partner.



Кл.слова:
програмне забезпечення -- база даних -- електронний ресурс -- сервер -- захист даних -- CCSP CSI exam

   Тип видання:   законодавчі матеріали   
19.

Dunne, R.
Computers and the law: an introduction to basic legal principles and their application in cyberspace [Electronic resource] / R. Dunne. - Cambridge : Cambridge university press, 2009. - 458 p.
Переклад назви: Комп'ютери та закон: вступ до базових правових принципів та їх застосування в кіберпросторі

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Computers and the Law provides readers with an introduction to the legal issues associated with computing - particularly in the massively networked context of the Internet. Assuming no previous knowledge of the law or any special knowledge of programming or computer science, this textbook offers undergraduates of all disciplines and professionals in the computing industry an understanding of basic legal principles and an awareness of the peculiarities associated with legal issues in cyberspace. This book introduces readers to the fundamental workings of the law in physical space and suggests the opportunity to create new types of laws with nontraditional goals.



Кл.слова:
інформаційні технології -- комп'ютерні технології

   Тип видання:   нормативно-правовий акт   
20.


Eastern Cherokee applications of the U.S. Court of Claims, 1906-1909 [Electronic resource]. - Washington, D.C. : National Archives and Records Service, 1980
Переклад назви: Застосування США судових претензій до Східних Черокі, 1906-1909

Рубрики:

Географічні рубрики:


 Джерело інформації

  Повний текст доступний у читальних залах НБУВ

Vol. 344. - 1338 p.

Vol. 345. - 1311 p.

Vol. 346. - 967 p.

Vol. 347. - 633 p.

Voi. 348. - 672 p.




Кл.слова:
історія -- суд -- індіанець
...
 

Всі права захищені © Національна бібліотека України імені В. І. Вернадського