- Arts & Culture 5941
- Business & Economics 689
- Computers 319
- Dictionaries & Encyclopedias 81
- Education & Science 76021
- Abstracts 252
- Astrology 4
- Astronomy 1
- Biology 8
- Chemistry 2330
- Coursework 15546
- Culture 9
- Diplomas 411
- Drawings 574
- Ecology 6
- Economy 83
- English 75
- Ethics, Aesthetics 3
- For Education Students 17615
- Foreign Languages 11
- Geography 3
- Geology 1
- History 89
- Maps & Atlases 5
- Mathematics 13871
- Musical Literature 2
- Pedagogics 19
- Philosophy 23
- Physics 14870
- Political Science 5
- Practical Work 101
- Psychology 60
- Religion 4
- Russian and culture of speech 8
- School Textbooks 7
- Sexology 42
- Sociology 9
- Summaries, Cribs 87
- Test Answers 150
- Tests 9243
- Textbooks for Colleges and Universities 32
- Theses 24
- To Help Graduate Students 14
- To Help the Entrant 37
- Vetting 364
- Works 13
- Информатика 10
- Engineering 3062
- Fiction 696
- House, Family & Entertainment 107
- Law 132
- Website Promotion 71
4.20 Methods and means of information protection in com
Uploaded: 06.11.2023
Content: 90919214245420.20_________________________________________________________.zip 103,66 kB
Product description
Contents
Introduction ............ .3
1 Comparative analysis of the characteristics and methods of protection
information ... .. ............ .5
1.1 Antivirus ............ .5
1.2 Protection of information on the Internet 9
1.3 Protection against unauthorized access ......... ... 10
2 The decisions on the program level ......... ... 14
2.1 SSL - Secure Socket Layer - Secure Sockets Layer ......... ... 14
2.2 IPSec - security protocol network traffic on IP-level ......... ... 18
2.3 FireWall ......... ... 27
2.4 Check Point FireWall-1 technology stateful inspection protocol (Stateful Inspection Technology) ......... ... 30
2.5 Disadvantages firewalls ......... ... 35
3 solutions in hardware ......... ... 40
Conclusion ......... ... 44
Глоссарий………………………………………………………………………………...48
List of sources used ......... ... 51
Appendix A ......... ... 54
Appendix B ....................................................................................... 57
Appendix ....................................................................................... 58
Appendix D ....................................................................................... 59
Appendix E ....................................................................................... 60
Additional information
Diploma SGA.
4.20 Methods and means of information protection in computer networks
Feedback
0Period | |||
1 month | 3 months | 12 months | |
0 | 0 | 0 | |
0 | 0 | 0 |