haghighithesis.pdf
1.9 MB
ارائه پایان نامه مقابله با حملات انکار سرویس در شبکه های موردی سیار از طریق بهبود مسیریابی (فارسی)
#ارائه #پایان_نامه #منت #حملات_انکار_سرویس
#MANET #Attacks #DOS
@Computer_IT_Engineering
#ارائه #پایان_نامه #منت #حملات_انکار_سرویس
#MANET #Attacks #DOS
@Computer_IT_Engineering
pn-dos-ddos.pdf
1.6 MB
حملات انکار سرویس (DOS & DDOS) (فارسی) 114 صفحه
#پایان_نامه #حملات_انکار_سرویس
#Attacks #DOS #DDOS
@Computer_IT_Engineering
#پایان_نامه #حملات_انکار_سرویس
#Attacks #DOS #DDOS
@Computer_IT_Engineering
DoS-MAZANDARAN.pdf
1.2 MB
معرفی وبررسی حملات انکارسرویس (فارسی) 22 صفحه
#تحقیق #حملات_انکار_سرویس
#Attacks #DOS
@Computer_IT_Engineering
#تحقیق #حملات_انکار_سرویس
#Attacks #DOS
@Computer_IT_Engineering
APA_FUM_W_MAL_0105_63535.pdf
721.6 KB
حملات جلوگيري از سرويس توزيعي 33 صفحه دانشگاه فردوسی مشهد
#تحقیق #حملات_انکار_سرویس
#Attacks #DOS #DDOS
@Computer_IT_Engineering
#تحقیق #حملات_انکار_سرویس
#Attacks #DOS #DDOS
@Computer_IT_Engineering
DOS_Farsi.rar
2.5 MB
پنج مقاله حملات انکار سرویس (فارسی)
#مقاله #حملات_انکار_سرویس
#Attacks #DOS #DDOS
@Computer_IT_Engineering
#مقاله #حملات_انکار_سرویس
#Attacks #DOS #DDOS
@Computer_IT_Engineering
DDOS & SDN.rar
6.1 MB
یازده مقاله حملات انکار سرویس توزیع شده در SDN (انگلیسی)
#مقاله #حملات_انکار_سرویس
#Network #Attacks #DOS #DDOS #SDN
@Computer_IT_Engineering
#مقاله #حملات_انکار_سرویس
#Network #Attacks #DOS #DDOS #SDN
@Computer_IT_Engineering
DDOS_English.rar
13 MB
بیست مقاله حملات انکار سرویس توزیع شده (انگلیسی)
#مقاله #حملات_انکار_سرویس
#Network #Attacks #DOS #DDOS
@Computer_IT_Engineering
#مقاله #حملات_انکار_سرویس
#Network #Attacks #DOS #DDOS
@Computer_IT_Engineering
VANET.Attacks-@Computer_IT_Engineering.pdf
254.1 KB
مقاله بررسی و دسته بندي انواع حملات در شبکه هاي موردي بین خودرویی (فارسی)
مناسب سمینار و پایان نامه
#مقاله #بین_خودرویی #ونت #امنیت #حملات
#Paper #VANET #Security #Attacks
@Computer_IT_Engineering
مناسب سمینار و پایان نامه
#مقاله #بین_خودرویی #ونت #امنیت #حملات
#Paper #VANET #Security #Attacks
@Computer_IT_Engineering
✅سری هفتم فیلم های آموزشی با عنوان:
Securing the IoT: Privacy
The rapid expansion of IoT technology brings with it an array of exciting and imaginative ways to make our products smarter and our lives easier. But the growth of this emerging technology also brings with it huge gaps in security. The IoT is plagued with vulnerabilities, malware, DDoS attacks, and the potential to disrupt infrastructure. In this course, join Lisa Bock as she explores the relationship between security, privacy, and the IoT. Lisa discusses how the vulnerabilities in IoT devices have the potential to compromise user privacy and make them more susceptible to attacks and glitches. In addition, she discusses IoT privacy concerns; existing standards, regulations, and guidelines, such as HIPAA and Sarbanes-Oxley; and proposed standards and legislation that are currently in the works to ensure the privacy of the data collected on the IoT.
Topics include:
- Security, privacy, and the IoT
- Attacks and glitches
- Denial-of-sleep attacks
- Voice and sound attacks
- IoT vulnerabilities
- Glitches and compatibility issues
- Privacy concerns
- Existing standards and regulations
- Proposed standards and legislation
- Firewalls and IDS
- Blockchain
#ویدئو #فیلم #اینترنت_اشیا #امنیت #حریم_خصوصی #حملات #تشخیص_نفوذ
#Video #IOT #InternetofThings #Security #privacy #IDS #Attacks #DDoS #COBIT #NIST
@Computer_IT_Engineering
Securing the IoT: Privacy
The rapid expansion of IoT technology brings with it an array of exciting and imaginative ways to make our products smarter and our lives easier. But the growth of this emerging technology also brings with it huge gaps in security. The IoT is plagued with vulnerabilities, malware, DDoS attacks, and the potential to disrupt infrastructure. In this course, join Lisa Bock as she explores the relationship between security, privacy, and the IoT. Lisa discusses how the vulnerabilities in IoT devices have the potential to compromise user privacy and make them more susceptible to attacks and glitches. In addition, she discusses IoT privacy concerns; existing standards, regulations, and guidelines, such as HIPAA and Sarbanes-Oxley; and proposed standards and legislation that are currently in the works to ensure the privacy of the data collected on the IoT.
Topics include:
- Security, privacy, and the IoT
- Attacks and glitches
- Denial-of-sleep attacks
- Voice and sound attacks
- IoT vulnerabilities
- Glitches and compatibility issues
- Privacy concerns
- Existing standards and regulations
- Proposed standards and legislation
- Firewalls and IDS
- Blockchain
#ویدئو #فیلم #اینترنت_اشیا #امنیت #حریم_خصوصی #حملات #تشخیص_نفوذ
#Video #IOT #InternetofThings #Security #privacy #IDS #Attacks #DDoS #COBIT #NIST
@Computer_IT_Engineering
Attacks.Cloud-@Computer_IT_Engineering.pdf
359.9 KB
Attack&Defence.PHP-@Computer_IT_Engineering.pdf
3.5 MB
⭕️حمله مرد میانی یا همان MITM
(Man In The Middle)
#امنیت #حمله #حملات
#Seurity #Attacks #MITM #Man_in_the_middle
@Computer_IT_Engineering
(Man In The Middle)
#امنیت #حمله #حملات
#Seurity #Attacks #MITM #Man_in_the_middle
@Computer_IT_Engineering