Mostrando 1,121 - 1,140 Resultados de 1,227 Para Buscar '"Guard"', tiempo de consulta: 0.07s Limitar resultados
  1. 1121
    por Rossiter, Mike
    Publicado 2009
    “…The night-time landing was just the beginning.The Commandos were engaged in a series of fast-moving and hard-fought battles against tanks, Ba'ath party Fedayeen and Republican Guards as they moved rapidly north up the Faw peninsula until they reached the outskirts of Basra, the second-largest city in Iraq.Finally, after a two-day battle that broke the back of the Iraqi resistance, and eighteen days after their first contact with the enemy, Royal Marine Commandos entered the presidential palace in Basra. …”
    Libro
  2. 1122
    Publicado 1943
    Manuscrito
  3. 1123
    Publicado 2018
    “…Being seen as a high potential leader is essential to getting promoted and reaching an organization's upper echelons, but most companies keep their top talent list a closely guarded secret. And the assessment process they use to decide who is and isn't a future leader is an even greater mystery. …”
    Grabación no musical
  4. 1124
    Publicado 2022
    Tabla de Contenidos: “…Logging Levels/Severity Levels -- 00-FMindd 18 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Interface Statistics/Status -- Link State (Up/Down) -- Speed/Duplex -- Send/Receive Traffic -- Cyclic Redundancy Checks (CRCs) -- Protocol Packet and Byte Counts -- Interface Errors or Alerts -- CRC Errors -- Giants -- Runts -- Encapsulation Errors -- Environmental Factors and Sensors: Temperature, Humidity, Electrical, Flooding -- Baselines -- NetFlow Data -- Uptime/Downtime -- REVIEW -- 31 QUESTIONS -- 31 ANSWERS -- Objective 32 Explain the purpose of organizational documents -- and policies -- Plans and Procedures -- Change Management -- Incident Response Plan -- Disaster Recovery Plan -- Business Continuity Plan -- System Life Cycle -- Standard Operating Procedures -- Hardening and Security Policies -- Password Policy -- Acceptable Use Policy -- Bring Your Own Device (BYOD) Policy -- Remote Access Policy -- Onboarding and Offboarding Policy -- Security Policy -- Data Loss Prevention -- Common Documentation -- Physical Network Diagram -- Logical Network Diagram -- Wiring Diagram -- Site Survey Report -- 00-FMindd 19 22/04/22 11:12 AM -- xx Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Audit and Assessment Report -- Baseline Configurations -- Common Agreements -- Non-Disclosure Agreement (NDA) -- Service-Level Agreement (SLA) -- Memorandum of Understanding (MOU) -- REVIEW -- 32 QUESTIONS -- 32 ANSWERS -- Objective 33 Explain high availability and disaster recovery -- concepts and summarize which is the best solution -- Load Balancing -- Multipathing -- Network Interface Card (NIC) Teaming -- Redundant Hardware/Clusters -- Switches -- Routers -- Firewalls -- Facilities and Infrastructure Support -- Uninterruptible Power Supply (UPS) -- Power Distribution Units (PDUs) -- Generator -- HVAC -- Fire Suppression -- Redundancy and High Availability (HA) Concepts -- Cold Site -- Warm Site -- Hot Site -- Cloud Site -- Active-Active vs Active-Passive -- Mean Time to Repair (MTTR) -- Mean Time Between Failure (MTBF) -- Recovery Time Objective (RTO) -- Recovery Point Objective (RPO) -- Network Device Backup/Restore -- Configuration -- State -- REVIEW -- 33 QUESTIONS -- 33 ANSWERS -- 00-FMindd 20 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- 40 Network Security -- Objective 41 Explain common security concepts -- Confidentiality, Integrity, Availability (CIA) -- Threats -- Internal -- External -- Vulnerabilities -- Common Vulnerabilities and Exposures (CVE) -- Zero-Day -- Exploits -- Least Privilege -- Role-Based Access -- Zero Trust -- Defense in Depth -- Network Segmentation Enforcement -- Screened Subnet [Previously Known as Demilitarized Zone (DMZ)] -- Separation of Duties -- Network Access Control -- Honeypot -- Authentication Methods -- Multifactor -- Terminal Access Controller Access-Control System Plus (TACACS+) -- Remote Authentication Dial-in User Service (RADIUS) -- Single Sign-On (SSO) -- LDAP -- Kerberos -- Local Authentication -- Extensible Authentication Protocol (EAP) -- 8021X -- Risk Management -- Security Risk Assessments -- Business Risk Assessments -- Security Information and Event Management (SIEM) -- REVIEW -- 41 QUESTIONS -- 41 ANSWERS -- Objective 42 Compare and contrast common types of attacks -- Technology-Based -- Denial-of-Service (DoS)/Distributed Denial-of-Service (DDoS) -- On-Path Attack (Previously Known as Man-in-the-Middle Attack) -- 00-FMindd 21 22/04/22 11:12 AM -- xxii Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- ARP Spoofing -- DNS Poisoning -- VLAN Hopping -- Rogue DHCP -- Rogue Access Point (AP) -- Evil Twin -- Ransomware -- Password Attacks -- MAC Spoofing -- IP Spoofing -- Deauthentication -- Malware -- Human and Environmental -- Social Engineering -- REVIEW -- 42 QUESTIONS -- 42 ANSWERS -- Objective 43 Given a scenario, apply network -- hardening techniques -- Best Practices -- Secure SNMP -- Router Advertisement (RA) Guard -- Port Security -- Dynamic ARP Inspection -- Control Plane Policing -- Private VLANs -- Disable Unneeded Switchports -- Disable Unneeded Network Services -- Change Default Passwords -- Password Complexity/Length -- Enable DHCP Snooping -- Change Default VLAN -- Patch and Firmware Management -- Access Control List -- Firewall Rules -- Role-Based Access -- Wireless Security -- MAC Filtering -- Antenna Placement -- Power Levels -- Wireless Client Isolation -- Guest Network Isolation -- 00-FMindd 22 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Preshared Keys (PSKs) -- EAP -- Geofencing -- Captive Portal -- IoT Access Considerations -- REVIEW -- 43 QUESTIONS -- 43 ANSWERS -- Objective 44 Compare and contrast remote access methods -- and security implications -- Site-to-Site VPN -- Client-to-Site VPN -- Clientless VPN -- Split Tunnel vs Full Tunnel -- Remote Desktop Connection -- Remote Desktop Gateway -- SSH -- Virtual Network Computing (VNC)…”
    Libro electrónico
  5. 1125
    Publicado 2013
    “…For the most part, however, researchers and scholars were caught off guard by the quickening pace of business change in Romania. …”
    Libro electrónico
  6. 1126
    Publicado 2014
    “…His affect is calm and he has a bit of restriction in his affect, perhaps being a bit guarded. He describes his present mood as 'normal, feel okay,' and his recent mood as 'the same, not too up and not too down.' …”
    Vídeo online
  7. 1127
    Publicado 2006
    “…It was their secret weapon, and it enabled them to do things, and work in an entirely different way than their competitors, and maybe that's why the secret power of Photoshop's channels has been such a closely guarded secret. Until now. Award-winning, bestselling author Scott Kelby (Editor of Photoshop User magazine) shows you how to unlock the power of Photoshop's Channels and really start using Photoshop like a pro. …”
    Libro electrónico
  8. 1128
    por Moles, Pascual Pedro, 1741-1797
    Publicado 1759
    Conectar con la versión electrónica
    Fotografía
  9. 1129
  10. 1130
    “…Aconseja al faraón que recoja la quinta parte de las cosechas y las guarde para comerlas en los siete años de escasez. …”
    Libro electrónico
  11. 1131
    Publicado 2015
    “…Similarly, close to 15 percent of those in the labor force could be considered unemployed. Reserve and National Guard Airmen evidenced heightened challenges across examined domains. …”
    Libro electrónico
  12. 1132
    Publicado 2015
    “…Air Force personnel - once trusted to operate or guard weapons of mass destruction - have come forward and revealed ongoing UFO surveillance of, and occasional interference with, our nuclear weapons. …”
    Libro electrónico
  13. 1133
    Publicado 2024
    “…In doing so, the authors draw key lessons for other democracies, showing in detail how robust major and micro-institutions can guard against democratic ‘backsliding’ and policy failures.This comprehensive audit also highlights scope for potential democratic improvements. …”
    Libro electrónico
  14. 1134
    por Sessions, Roger
    Publicado 2003
    “…Key topics include: The fundamental concepts and terminology of software fortresses Documentation techniques, including Fortress Ally Responsibility Cards (based on Class Responsibility Cards) and Sequence Ally Diagrams (based on UML's Class Sequence Diagrams) The proper use of drawbridges to provide fortress interoperability The innovative software fortress model for enterprise security Correct design approaches to fortress walls, which keep intruders out, and to guards, which let allies in. The role of loosely coupled and tightly coupled transactions in a software fortress architecture Design and technology issues associated with the six major software fortress types This book is a must-read for all enterprise software professionals, whether you are a manager seeking to rein in run-away enterprise system complexity, an architect seeking to design interoperable, scalable, and highly secure systems, a consultant expected to give advice on how .NET and J2EE fit into the enterprise space, an implementer wanting to understand how your system relates to a larger enterprise architecture, or a business analyst needing to know that your system requirements will be translated into a successful software implementation. 0321166086B12202002…”
    Libro electrónico
  15. 1135
    Publicado 2020
    “…This important book: Gives a simple quantum mechanics primer Explains how quantum computing will break current cryptography Offers practical advice for preparing for a post-quantum world Presents the latest information on new cryptographic methods Describes the appropriate steps leaders must take to implement existing solutions to guard against quantum-computer security threats Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto is a must-have guide for anyone in the InfoSec world who needs to know if their security is ready for the day crypto break and how to fix it…”
    Libro electrónico
  16. 1136
    Publicado 2020
    “…. • Optimize the full Windows Server 2019 lifecycle, from planning and configuration through rollout and administration • Leverage new configuration options including App Compatibility Features on Demand (FOD) or Desktop Experience • Ensure fast, reliable upgrades and migrations • Manage Windows servers, clients, and services through Windows Admin Center • Seamlessly deliver and administer core DNS, DHCP, fi le, print, storage, and Internet services • Use the Storage Migration Service to simplify storage moves and configuration at the destination • Seamlessly integrate Azure IaaS and hybrid services with Windows Server 2019 • Improve agility with advanced container technologies, including container networking and integration into Kubernetes orchestration clusters • Deliver Active Directory identity, certifi cate, federation, and rights management services • Protect servers, clients, VMs, assets, and users with advanced Windows Server 2019 security features, from Just Enough Administration to shielded VMs and guarded virtualization fabrics • Monitor performance, manage event logs, confi gure advanced auditing, and perform backup/recovery Windows Server 2019 For Experienced Windows Server Users and IT Professionals • Your role: Experienced intermediate to-advanced level Windows Server user or IT professional • Prerequisites: Basic understanding of Windows Server procedures, techniques, and navigation…”
    Libro electrónico
  17. 1137
    Publicado 2015
    “…New coverage includes A full chapter on securing cloud environments and managing their unique risks Extensive new coverage of security issues associated with user—web interaction New risks and techniques for safeguarding the Internet of Things A new primer on threats to privacy and how to guard it An assessment of computers and cyberwarfare–recent attacks and emerging risks Security flaws and risks associated with electronic voting systems…”
    Libro electrónico
  18. 1138
    Publicado 2023
    “…Evil Twins and the Ultimate Insight mounts this critical intervention into the Blue/Red blood feud and contemplates, in the cognitive challenges of Nabokov’s fiction, a remedy for its polarized politics.To guard against grandstanding, axe-grinding, deck-stacking, inaccuracy, or obfuscation, Stone’s book proceeds by indirection, exploring four scholarly books that all speak to the peculiar relationship between Rand and Nabokov: Gene Bell-Villada’s On Nabokov, Ayn Rand and the Libertarian Mind (2013), Adam Weiner’s How Bad Writing Destroyed the World: Ayn Rand and the Literary Origins of the Financial Crisis (2016), Michael Rodgers’s Nabokov and Nietzsche: Problems and Perspectives (2018), and Peter Roberts and Herner Saeverot’s Education and the Limits of Reason: Reading Dostoevsky, Tolstoy and Nabokov (2018). …”
    Libro electrónico
  19. 1139
  20. 1140