• Chapter VIII. LOCATION FIREWALLS IN PROTECTION OF INFORMATION
  • Chapter IX. OPERATING SYSTEM SECURITY 9.1.
  • Chapter X. CHANNELS OF INFORMATION LEAKAGE
  • Used and recommended literature...................................... 256 Appendix....................................................................................
  • Chapter VII. MECHANISMS TO COMBAT




    Download 10,28 Mb.
    Pdf ko'rish
    bet183/183
    Sana25.01.2024
    Hajmi10,28 Mb.
    #145814
    1   ...   175   176   177   178   179   180   181   182   183
    Bog'liq
    Axborot xavfsizligi

    Chapter VII. MECHANISMS TO COMBAT 
    COMPUTER VIRUSES AND MALWARE
    7.1. Computer viruses and virus protection issues.................. 
    171
    7.2. Antivirus software..............................................................
    180
    7.3. Local system antivirus protection..................................... 
    187
    Chapter VIII. LOCATION FIREWALLS IN 
    PROTECTION OF INFORMATION
    8
    .
    1
    . Firewall features.................................................................. 
    192
    8.2. The main components o f Firewall.....................................
    202
    8.3. Protection scheme network on based Firewalls................. 213
    367


    Chapter IX. OPERATING SYSTEM SECURITY
    9.1. Security problems o f operating sy stem ............................
    226
    9.2. Architecture security subsystem of operating system ... 
    228
    9.3. Applying software application in protection o f in­
    formation................................................................................... 
    231
    Chapter X. CHANNELS OF INFORMATION 
    LEAKAGE
    10.1. Technical channels o f information leakage and their
    classification...............................................................................
    238
    10.2. Methods and tools to determine technical channels of
    information leakage................................................................... 
    242
    10.3. Engineering protection and technical defending o f ob­
    jects 
     
    250
    Used and recommended literature......................................
    256
    Appendix....................................................................................

    Download 10,28 Mb.

    1   ...   175   176   177   178   179   180   181   182   183




    Download 10,28 Mb.
    Pdf ko'rish