Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Música popular 7
- Computer networks 6
- Música rock 6
- Engineering & Applied Sciences 5
- Eisenhower, Dwight D. 4
- Electrical & Computer Engineering 4
- Security measures 4
- Telecommunications 4
- Historia 3
- Access control 2
- Business & Economics 2
- Computers 2
- Documentales 2
- Education 2
- Equality 2
- Examinations 2
- Finance 2
- Internet 2
- Investment & Speculation 2
- Organizational change 2
- Periodismo 2
- Routers (Computer networks) 2
- AIX (Computer file) 1
- ART / History / Contemporary (1945-) 1
- Alimentos 1
- Antropometría 1
- Análisis 1
- Aspectos económicos 1
- Biografías 1
- Biography: historical, political & military 1
-
41por Ariganello, ErnestoTabla de Contenidos: “…7.7 FUNDAMENTOS PARA EL EXAMEN -- 8 CISCO IPS -- 8.1 CARACTERÍSTICAS DE LOS IDS E IPS -- 8.1.1 Implementaciones IPS basadas en red -- 8.2 FIRMAS IPS -- 8.2.1 Tipos de firmas -- 8.2.2 Alarmas de firmas -- 8.2.3 Acciones de firmas -- 8.2.4 Administración y monitorización IPS -- 8.3 CONFIGURACIÓN DE CISCO IOS IPS -- 8.3.1 Configuración de IPS con CLI -- 8.3.2 Configuración de IPS con CCP -- 8.3.3 Modificación de las firmas -- 8.3.4 Verificación y monitorización de Cisco IOS IPS -- 8.4 FUNDAMENTOS PARA EL EXAMEN -- 9 TECNOLOGÍAS VPN -- 9.1 REDES PRIVADAS VIRTUALES -- 9.2 TÚNELES GRE -- 9.2.1 Configuración básica de túneles GRE -- 9.3 IPsec -- 9.3.1 Características de IPsec -- 9.3.2 Modos de IPsec -- 9.3.3 Cabeceras IPsec -- 9.4 PROTOCOLOS DE IPsec -- 9.4.1 IKE -- 9.4.2 ESP -- 9.4.3 AH -- 9.4.4 Autenticación de vecinos -- 9.5 INTERNET KEY EXCHANGE -- 9.5.1 Protocolos IKE -- 9.5.2 Fases IKE -- 9.5.3 Modos IKE -- 9.5.4 Funciones adicionales IKE -- 9.6 ALGORITMOS DE ENCRIPTACIÓN -- 9.6.1 Encriptación simétrica -- 9.6.2 Encriptación asimétrica -- 9.7 PUBLIC KEY INFRASTRUCTURE -- 9.8 CONFIGURACIÓN DE VPN SITE-TO-SITE -- 9.8.1 Configuración de la política ISAKMP -- 9.8.2 Configuración de los IPsec transform sets -- 9.8.3 Configuración de la Crypto ACL -- 9.8.4 Configuración del Crypto Map -- 9.8.5 Aplicación del Crypto Map a una interfaz -- 9.8.6 Configuración de ACL en una interfaz -- 9.9 VERIFICACIÓN -- 9.10 CONFIGURACIÓN DE IPsec CON CCP -- 9.11 VPN DE ACCESO REMOTO -- 9.11.1 SSL VPN -- 9.11.2 Cisco Easy VPN -- 9.11.3 Servidor Cisco Easy VPN -- 9.12 FUNDAMENTOS PARA EL EXAMEN -- ANEXO 1 -- DIRECCIONAMIENTO IPv6 -- Formato del direccionamiento IPv6 -- Tipos de comunicación IPv6 -- ANEXO 2 -- PREPARATIVOS PARA EL EXAMEN -- Recomendaciones para la presentación al examen -- CUESTIONARIO TEMÁTICO -- ÍNDICE ALFABÉTICO…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
42por Lewis, Mark, CCIE“…Master advanced troubleshooting techniques for IPSec, MPLS Layer-3, MPLS Layer-2 (AToM), L2TPv3, L2TPv2, PPTP, and L2F VPNs Learn the step-by-step, end-to-end methodology essential for troubleshooting virtual private networks (VPNs) Gain the in-depth knowledge necessary for fast and efficient troubleshooting of IPSec, MPLS Layer-3, MPLS Layer-2 (AToM), L2TPv3, L2TPv2, PPTP, and L2F VPNs Master advanced troubleshooting tools and techniques for all applicable VPN types Debug and fix IPSec site-to-site and remote access VPN issues, such as IKE (ISAKMP) phase 1 and phase 2 negotiation failure, ESP and AH traffic drops, certificate enrollment failures, and maximum transmission unit (MTU) problems Locate and resolve MPLS Layer-3 VPN problems, such as those involving route exchange and label switched path (LSP) failure, MPLS VPN over traffic engineering tunnels, and Multicast VPNs (MVPN) Discover solutions for issues in AToM and L2TPv3-based Layer-2 VPNs, including pseudowire setup failures, attachment circuit problems, and MTU issues Obtain answers for L2TPv2, PPTP, and L2F control connection establishment, session setup, PPP negotiation, and VPN performance issues Refer to specially designed flowcharts to identify issues and find solutions fast Consolidate VPN troubleshooting knowledge through bonus hands-on labs Read and understand detailed analysis of all relevant VPN show and debug command output Troubleshooting Virtual Private Networks presents a systematic troubleshooting methodology for network engineers, administrators, and architects tasked with managing and deploying Cisco IOS VPNs. …”
Publicado 2004
Libro electrónico -
43Publicado 2007“…“Do not hesitate to buy this book, it will make you money!” --Ike Iossif, President/Chief Investment Officer, Aegean Capital Group, Inc. …”
Libro electrónico -
44Publicado 2005“…Dwight "Ike" David Eisenhower (n. 14 de octubre de 1890 - † 28 de marzo de 1969) fue un político y militar estadounidense, y el trigésimo cuarto Presidente de los Estados Unidos. …”
DVD -
45Publicado 2020Tabla de Contenidos: “…Crossing the Line: Pseudonyms and Snark in Post-Publication Peer Review -- Prologue-How I Got into This Mess -- The Blog -- The Legal Threats -- The Aftermath -- Notes -- References -- 14. Ike Antkare, His Publications, and Those of His Disciples -- Introduction -- The SCI Generators…”
Libro electrónico -
46
-
47
-
48
-
49
-
50Publicado 2010“…Marvin Appel has done an excellent job; I am truly impressed.” --Ike Iossif, President and Chief Investment Officer, Aegean Capital Group, Inc., and Executive Producer of “MarketViews.tv” Today, many risk-averse investors simply can’t meet their income needs with conventional bank CDs, money market funds, or bonds. …”
Libro electrónico -
51Publicado 2007Tabla de Contenidos: “…Port ScanningGoing behind the Scenes with Enumeration; Service Identifi cation; RPC Enumeration; Fingerprinting; Being Loud, Quiet, and All That Lies Between; Timing; Bandwidth Issues; Unusual Packet Formation; Open Source Tools; Scanning; Nmap; Netenum: Ping Sweep; Unicornscan: Port Scan and Fuzzing; Scanrand: Port Scan; Enumeration; Nmap: Banner Grabbing; Netcat; P0f: Passive OS Fingerprinting; Xprobe2: OS Fingerprinting; Httprint; Ike-scan: VPN Assessment; Amap: Application Version Detection; Windows Enumeration: Smbgetserverinfo/smbdumpusers/smbclient; Nbtscan…”
Libro electrónico -
52Publicado 2008Tabla de Contenidos: “…Going behind the Scenes with EnumerationService Identification; RPC Enumeration; Fingerprinting; Being Loud, Quiet, and All That Lies Between; Timing; Bandwidth Issues; Unusual Packet Formation; Open Source Tools; Scanning; Nmap; Nmap: Ping Sweep; Nmap: ICMP Options; Nmap: Output Options; Nmap: Stealth Scanning; Nmap: OS Fingerprinting; Nmap: Scripting; Nmap: Speed Options; Netenum: Ping Sweep; Unicornscan: Port Scan and Fuzzing; Scanrand: Port Scan; Enumeration; Nmap: Banner Grabbing; Netcat; P0f: Passive OS Fingerprinting; Xprobe2: OS Fingerprinting; Httprint; Ike-scan: VPN Assessment…”
Libro electrónico -
53
-
54Publicado 2018Tabla de Contenidos: “…MPLS VPN -- VPN Design -- IKE V1 versus IKE V2 -- WAN Encryption technique -- IPsec Layer-3 encryption -- MACsec-Layer-2 Encryption -- Optical Network-Layer-1 Encryption -- Summary -- Questions -- Further Reading -- Chapter 12: Summary and Scope of Security Technologies -- DDoS protection -- Remotely triggered black hole routing (RTBH) -- Black hole traffic from the source of the attack -- Black hole traffic to the destination of the attack -- BGP FlowSpec -- DDoS scrubbing -- Blockchain Technology for Fighting DDoS Attacks -- AI in cyber security -- Next Gen SIEM -- Software Defined Networking Firewall -- Bring-Your-Own-Identity (BYOI) -- Summary -- Further reading -- Assessment -- Other Books you may enjoy -- Index…”
Libro electrónico -
55
-
56
-
57Publicado 2019Tabla de Contenidos: “…Napoli, Matthew Weber & Kathleen McCollough -- Reconstructing the dynamics of the digital news ecosystem: a case study on news diffusion processes / Elisabeth Günther, Florian Buhl & Thorsten Quandt -- Testing the myth of enclaves: a discussion of research designs for assessing algorithmic curation / Jacob Ørmen -- Digital news users' and how to find them: theoretical and methodological innovations in news use studies / Ike Picone -- What if the future is not all digital?…”
Libro -
58Publicado 2017Tabla de Contenidos: “…. -- Dnscan -- Subbrute -- Dirsearch -- Pentesting VPN's ike-scan -- Getting ready -- How to do it... -- Cracking the PSK -- How it works... -- Setting up proxychains -- How to do it... -- Using proxychains with tor -- Going on a hunt with Routerhunter -- Getting ready -- How to do it... -- Chapter 2: Gathering Intel and Planning Attack Strategies -- Introduction -- Getting a list of subdomains -- Fierce -- How to do it... -- DNSdumpster -- How to do it... -- Using Shodan for fun and profit -- Getting ready -- How to do it... -- Shodan Honeyscore -- How to do it... -- Shodan plugins -- How to do it... -- See also -- Using Nmap to find open ports -- How to do it... -- Using scripts -- See also -- Bypassing firewalls with Nmap -- TCP ACK scan -- How to do it... -- How it works... -- TCP Window scan -- How to do it... -- Idle scan -- How to do it... -- How it works... -- Searching for open directories -- The dirb tool -- How to do it... -- There's more... -- See also -- Performing deep magic with DMitry -- How to do it... -- Hunting for SSL flaws -- How to do it... -- See also -- Exploring connections with intrace -- How to do it... -- Digging deep with theharvester -- How to do it... -- How it works…”
Libro electrónico -
59Publicado 2019Libro electrónico
-
60Tabla de Contenidos: “…12-2: Authentication, Authorization, and Accounting (AAA) -- 12-3: Dynamically Authenticate and Authorize Users with Authentication Proxy -- 12-4: Controlling Access with Lock and Key Security -- 12-5: Filtering IP Sessions with Reflexive Access Lists -- 12-6: Prevent DoS Attacks with TCP Intercept -- 12-7: Intelligent Filtering with Context-Based Access Control (CBAC) -- 12-8: Detect Attacks and Threats with the IOS Intrusion Prevention System -- 12-9: Control Plane Security -- 12-10: AutoSecure -- Chapter 13 Virtual Private Networks -- 13-1: Using Internet Key Exchange (IKE) for VPNs -- 13-2: IPSec VPN Tunnels -- 13-3: High Availability Features -- 13-4: Dynamic Multipoint VPN (DMVPN) -- 13-5: Secure Socket Layer VPNs -- Further Reading -- Chapter 14 Access Lists and Regular Expressions -- 14-1: IP Access Lists -- 14-2: MAC Address and Protocol Type Code Access Lists -- 14-3: IPv6 Access Lists -- 14-4: Regular Expressions -- Appendixes -- Appendix A: Cisco IOS Software Release and Filename Conventions -- Appendix B: Cabling Quick Reference -- Appendix C: SNMP MIB Structure -- Appendix D: Password Recovery -- Appendix E: Configuration Register Settings -- Appendix F: Well-Known IP Protocol Numbers -- Appendix G: Well-Known IP Port Numbers -- Appendix H: ICMP Type and Code Numbers -- Appendix I: Well-known IP Multicast Addresses -- Appendix J: Tool Command Language (TCL) Reference -- Appendix K: Ethernet Type Codes -- Index…”
Libro electrónico