联合开发网   搜索   要求与建议
                登陆    注册
排序按匹配   按投票   按下载次数   按上传日期
按分类查找All 防火墙与安全工具(2) 
按平台查找All WORD(2) 

[防火墙与安全工具] ArithmetiqueCrypto

黑客攻击与防范 黑客常用的攻击步骤可以说变幻莫测,但纵观其整个攻击过程,还是有一定规律可循的,一般可以分:攻击前奏、实施攻击、巩固控制、继续深入几个过程。 目前比较流行的网络级安全防范措施是使用专业防火墙+入侵检测系统(IDS)为企业内部网络构筑一道安全屏障。防火墙可以有效地阻止有害数据的通过,而IDS 则主要用于有害数据的分析和发现,它是防火墙功能的延续。2者联动,可及时发现并减缓DoS、DDoS 攻击,减轻攻击所造成的损失。
Hackers attack and to prevent common hacker attacks can be unpredictable steps, but throughout its entire course of the attack, there are still some rules to follow, and generally can be divided into: attack a prelude to implementation of the attack, to consolidate control, continue to penetrate several processes. Currently more popular network-level security measures is to use the professional firewall+ intrusion detection systems (IDS) for the enterprise internal network to build a security barrier. Firewall can effectively block the passage of bad data, while the IDS is mainly used for bad data analysis and discovery, which is a continuation of the firewall functionality. 2 person interaction, they can promptly detect and mitigate DoS, DDoS attacks, to reduce the losses caused by attacks. (2009-10-29, WORD, 14KB, 下载26次)

http://www.pudn.com/Download/item/id/953681.html

[防火墙与安全工具] Net_security

企业内网网络安全规划图,包含3层防火墙,VPN和设备物理安全的要求。
enterprise network security plans, contains three layers of firewalls, VPN equipment and physical security. (2007-05-15, WORD, 322KB, 下载61次)

http://www.pudn.com/Download/item/id/282161.html
总计:2