- Practical Network Scanning
- Ajay Singh Chauhan
- 71字
- 2022-07-12 10:43:05
Access control
As an application or network owner, we should know who or what is accessing our network resources. If we do not know or do not keep track of our activity and instead just assume what is happening on the network, we cannot guarantee data security and the safety of end-users.
We need to start with the basics of security. This begins with understanding what's on our network.
推薦閱讀
- Mobile Forensics Cookbook
- 數(shù)字身份與元宇宙信任治理
- 腦洞大開:滲透測試另類實(shí)戰(zhàn)攻略
- 可信計(jì)算3.0工程初步
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)
- Wireshark 2 Quick Start Guide
- INSTANT Burp Suite Starter
- 開發(fā)者的Web安全戒律:真實(shí)威脅與防御實(shí)踐
- Applied Network Security
- 硬黑客:智能硬件生死之戰(zhàn)
- 計(jì)算機(jī)網(wǎng)絡(luò)安全基礎(chǔ)(第5版)
- 數(shù)據(jù)安全架構(gòu)設(shè)計(jì)與實(shí)戰(zhàn)
- 信息安全工程與實(shí)踐
- 捍衛(wèi)隱私
- Mastering Python for Networking and Security