·Î±×ÀÎ | ȸ¿ø°¡ÀÔ | ±â»çÁ¦º¸ | ½ºÅ©·¦ | ´º½º·¹ÅÍ ½Åû
 
Extranet Access Management(EAM)
Á¶¿µÁÖ

EAM °³¿ä ÅëÇÕÀÎÁõ, ±ÇÇѰü¸® ¼Ö·ç¼Ç EAM ÀÎÅͳÝ, ÀÎÆ®¶ó³Ý, C/S ȯ°æ¿¡¼­ È¿°úÀûÀÎ ÅëÇÕÀÎÁõ(SSO) ȯ°æ°ú À̸¦ ±â¹ÝÀ¸·Î ÅëÇÕµÈ ±ÇÇѰü...

´Ù¿î·Îµå : 145 / Á¶È¸¼ö : 11577 / Ãßõ :
¿ú(worm)ÀÇ ¹ø½Ä°ú ´ëÀÀÃ¥
ÃÖÈ¿½Ä

¾Ç¼º ÄÚµå °³¿ä Á¦ÀÛÀÚ°¡ ÀǵµÀûÀ¸·Î »ç¿ëÀÚ¿¡°Ô ÇÇÇØ¸¦ ÁÖ°íÀÚ ¸¸µç ÇÁ·Î±×·¥, ¸ÅÅ©·Î, ½ºÅ©¸³Æ® µî ½ÇÇà °¡´ÉÇÑ ÇüÅÂ

´Ù¿î·Îµå : 98 / Á¶È¸¼ö : 5605 / Ãßõ :
½Ã½ºÅÛ º¸¾È °úÁ¦
¹ÚÂù¿ë

¹öÆÛ ¿À¹öÇ÷οì(Buffer Overflow)´Â ¶§¶§·Î ÇØÄ¿°¡ ½Ã½ºÅÛÀÇ Á¦¾î±ÇÀ» °¡Áú¼ö ÀÖ´Â º¸¾ÈÀÇ Ãë¾àÁ¡ÀÌ µÉ¼ö ÀÖ´Ù. National Ins...

´Ù¿î·Îµå : 114 / Á¶È¸¼ö : 6887 / Ãßõ :
Defeating Overflow Attacks
¹ÚÂù¿ë

¹öÆÛ ¿À¹öÇ÷οì(Buffer Overflow) ¹öÆÛ°¡ °¡Áö°í ÀÖ´Â ¹öÆÛ ¿µ¿ª¹Û¿¡ µ¥ÀÌÅͰ¡ ¾²¿©Áö°Ô µÉ¶§ ¹ß»ý ¹öÆÛ ¿µ¿ª ¹ÛÀÇ µ¥ÀÌÅͰ¡ ½Ã½ºÅÛÀÇ ...

´Ù¿î·Îµå : 86 / Á¶È¸¼ö : 7002 / Ãßõ :
Building a More Secure Network
George Rosamond

¾ÈÀüÇÏ°Ô °í¾ÈµÈ ³×Æ®¿öÅ© topography´Â °ø±ÞÀÚ¿Í °í°´ °ü¸®ÀÚ »çÀÌÀÇ °øÅëÀûÀÎ ÁÖÁ¦ÀÌ´Ù. ±×·¯³ª ¾ÈÀüÇÑ ³×Æ®¿öÅ© µðÀÚÀÎÀº ¸Å¿ì ºñ½Ñ Çϵå¿þ...

´Ù¿î·Îµå : 80 / Á¶È¸¼ö : 6933 / Ãßõ :
SMB ±â¾÷ º¸¾È °¡À̵å
Á¤ Á¾ ¸í

ÀÎÅͳݰú ÃÖ±ÙÀÇ ¼¼°èÀû À̺¥Æ®·Î ÀÎÇØ ±â¾÷ÀÌ º¸¾È¿¡ Á¢±ÙÇÏ´Â ¹æ½ÄÀÌ ±Ùº»ÀûÀ¸·Î ¹Ù²î¾ú½À´Ï´Ù. ºÒ°ú 10³â Àü¸¸ ÇØµµ ³×Æ®¿öÅ© º¸È£´Â ¾î¶»°Ô ÇØ¼­...

´Ù¿î·Îµå : 112 / Á¶È¸¼ö : 7740 / Ãßõ :
A guide for Small & Mid-sized Business
Á¤Á¾¸í

º¸¾ÈÀÇ °³¿ä SMBÀÇ 30%ÀÌ»óÀÌ ¼¼»óÀÌ °³º®ÇÏÁö ¾Ê´Â ÇÑ °ø°Ý¹ÞÁö ¾ÊÀ» °ÍÀ¸·Î »ý°¢ ÇÏ´Â ÀÌÀ¯ Too small to be targeted ...

´Ù¿î·Îµå : 74 / Á¶È¸¼ö : 8508 / Ãßõ :
ÀÎÅÍ³Ý °ø°ÝÀÇ ´ëÀÀ¹æ¹ý
½Å¿µÂù

ÀûÀÇ ¸ðµç °ÍÀ» È®ÀÎÇØ º¸ÀÚ! ¡°Military action is important to the nation ? it is the ground ...

´Ù¿î·Îµå : 104 / Á¶È¸¼ö : 6873 / Ãßõ :
¼º°øÀûÀÎ º¸¾È ÇÁ·Î±×·¥À» À§ÇÑ °³¿ä
ÀÌâ¹è

º¸¾È Á¤Ã¥ º¸¾È Á¤Ã¥Àº ¿Ö ÇÊ¿äÇѰ¡? º¸¾È ÇÁ·Î±×·¥ÀÇ ÇÙ½É È¸»çÀÇ ¾î´À ºÎºÐ¿¡¼­ ¾î¶² º¸¾ÈÀÌ ÇÊ¿äÇÑÁö Á¤ÀÇ º¸¾È Á¤Ã¥°ú º¸¾È ÀýÂ÷ÀÇ Â÷ÀÌ Á¤Ã¥:...

´Ù¿î·Îµå : 97 / Á¶È¸¼ö : 5157 / Ãßõ :
½ºÅ×°¡³ë±×¶óÇÇ (Steganography)
ÀÌÈ«·Î

What is the steganography? Definition To hide even the occurrence of messages. O...

´Ù¿î·Îµå : 113 / Á¶È¸¼ö : 10011 / Ãßõ :
  121 | 122 | 123 | 124 | 125