pretraga knjiga
knjige
Donirati
Prijaviti se
Prijaviti se
prijavljenim korisnicima su dostupni:
lične preporuke
Telegram bot
istorija preuzimanja
poslati na Email ili Kindle
upravljanje zbirkama
sačuvanje u izabrano
Lično
Upite za knjige
Proučavanje
Z-Recommend
Spiskovi knjiga
Najpopularnije
Kategorije
Učešće
Donirati
Otpremanja
Litera Library
Donirati papirne knjige
Dodati papirne knjige
Search paper books
Moj LITERA Point
Pretraga ključnih reči
Main
Pretraga ključnih reči
search
1
Ethical Hacking Countermeasures, Version 6. ModuleXLIX: Creating Security Policies
EC-Council
Certified Ethical Hacker
policy
security
prohibited
byec
council
councilall
reserved
strictly
policies
network
users
allowed
firewall
accounts
employees
organization
configuration
password
securityy
remote
requests
secure
sensitive
wireless
acceptable
classification
configure
department
designed
devices
passwords
provides
resources
approve
cont’d
defines
measures
module
necessary
relevant
resource
specific
statements
usage
www.watchguard.com
applicability
blocked
computing
configurations
cont
Godina:
2008
Jezik:
english
Fajl:
PDF, 2.08 MB
Vaši tagovi:
0
/
0
english, 2008
2
Ethical Hacking and Countermeasures, Version 6. Module XXI: Physical Security
EC-Council
Certified Ethical Hacker
council
security
prohibited
reserved
strictly
lock
systems
laptop
checklist
locks
device
devices
biometric
network
prevent
server
reception
wireless
cont’d
fingerprints
stolen
usb
measures
scan
secure
card
remote
theft
cameras
cards
picking
removable
securityy
spy
cctv
challenges
countermeasures
database
desk
employees
factors
identification
installing
intruder
locked
mantrap
personnel
premises
protect
recorders
Godina:
2008
Jezik:
english
Fajl:
PDF, 3.07 MB
Vaši tagovi:
0
/
4.0
english, 2008
3
CEH v6 Module 66 Security Convergence.
EC-Council
Certified Ethical Hacker
security
council
prohibited
reserved
strictly
esm
convergence
enterprise
logs
risk
event
systems
analysis
operations
severity
solutions
device
network
ramcap
standard
analyst
challenges
databases
esms
ipmi
module
monitoring
normalization
policy
processes
ability
administration
allow
categorization
ciso
content
demonstration
detection
devices
dhs
discovery
events
global
manager
protocol
securityy
storage
threat
aggregation
analyze
Godina:
2008
Jezik:
english
Fajl:
PDF, 631 KB
Vaši tagovi:
0
/
4.5
english, 2008
1
Idite na
ovaj link
ili potražite bota „@BotFather“ u Telegramu
2
Pošaljite komandu /newbot
3
Navedite ime za svog bota
4
Navedite korisničko ime za bota
5
Kopirajte poslednju poruku od BotFather i ubacite je ovde
×
×