Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 14
- Computer networks 10
- Electrical & Computer Engineering 10
- Telecommunications 10
- Security measures 9
- Extranets (Computer networks) 6
- Certification 5
- Examinations 5
- Computer Science 4
- Electronic data processing personnel 4
- Computer security 3
- Firewalls (Computer security) 3
- Internet 3
- Computing Technology Industry Association 2
- Telecommunications engineers 2
- DHCP 1
- DNS 1
- IFCT0410 1
- IPSec 1
- LNRIT08TCP 1
- libro Microsoft 1
- libro TCP/IP 1
- libro red 1
- nap 1
- nat 1
- vpn 1
- Broadband communication systems 1
- Business enterprises 1
- Cloud computing 1
- Computer interfaces 1
-
21por Meyers, Michael, 1961-Tabla de Contenidos: “…Bad Communications -- Common TCP/IP Applications -- The World Wide Web -- Telnet -- E-mail -- FTP -- Internet Applications -- Chapter Review -- Questions -- Answers -- Chapter 10 Network Naming -- Historical/Conceptual -- DNS -- Test Specific -- How DNS Works -- Name Spaces -- DNS Servers -- Troubleshooting DNS -- WINS -- Configuring WINS Clients -- Troubleshooting WINS -- Diagnosing TCP/IP Networks -- Chapter Review -- Questions -- Answers -- Chapter 11 Securing TCP/IP -- Test Specific -- Making TCP/IP Secure -- Encryption -- Nonrepudiation -- Authentication -- Authorization -- TCP/IP Security Standards -- Authentication Standards -- Encryption Standards -- Combining Authentication and Encryption -- Secure TCP/IP Applications -- HTTPS -- SCP -- SFTP -- SNMP -- LDAP -- NTP -- Chapter Review -- Questions -- Answers -- Chapter 12 Advanced Networking Devices -- Client/Server and Peer-to-Peer Topologies -- Historical/Conceptual -- Client/Server -- Peer-to-Peer -- Test Specific -- Client/Server and Peer-to-Peer Today -- Virtual Private Networks -- PPTP VPNs -- L2TP VPNs…”
Publicado 2012
Libro electrónico -
22Publicado 2012Tabla de Contenidos: “…-- Going Connection Shopping -- Objective 8.03 Using Remote Access -- Dial-up to the Internet -- Private Dial-Up -- Dedicated Connection -- DSL and Cable -- Cable Issues -- Remote Terminal -- VoIP -- RTP -- SIP and H.323 -- Skype -- Streaming Media with RSTP -- Checkpoint -- Review Questions -- Review Answers -- Chapter 9: Network Security -- Objective 9.01 Common Threats -- System Crash/Hardware Failure -- Administrative Access Control -- Malware -- Virus -- Worm -- Macro Virus -- Trojan -- Rootkit -- Adware/Spyware -- Dealing with Malware -- Antimalware Programs -- Social Engineering -- Phishing -- Man in the Middle -- Denial of Service -- Physical Intrusion -- Attacks on Wireless Connections -- Leeching -- Cracking Wireless Encryption -- Rogue Access Points -- Evil Twin -- Objective 9.02 Securing User Accounts -- Authentication -- Authentication Principles -- Authentication Protocols -- Authorization -- Logon and Access Security -- Implementing Share-Level Security -- Implementing User-Level Security -- Using Passwords -- Objective 9.03 Firewalls -- Hiding the IPs -- Port Filtering -- Packet Filtering -- MAC Filtering -- Personal Firewalls -- Network Zones -- Vulnerability Scanners -- Objective 9.04 Securing Remote Connections -- IPsec -- Virtual Private Networks -- PPTP VPNs -- L2TP VPNs -- SSL VPNs -- Checkpoint -- Review Questions -- Review Answers -- Chapter 10: The Complete Network -- Objective 10.01 Designing and Implementing a SOHO Network -- Define the Network Needs -- Network Design -- Compatibility Issues…”
Libro electrónico -
23por Guerra Soto, MarioTabla de Contenidos: “…CIFRADO HÍBRIDO -- 9.7 RESUMEN (HASHING) -- 10 AUTENTICACIÓN Y CONTROL DE ACCESO -- 10.1 FILTRADO DE SEGURIDAD -- 10.1.1 LISTAS DE CONTROL DE ACCESOS DE RED (ACL) -- 10.1.2 FILTRADO DE PUERTOS -- 10.2 CONTROLES DE SEGURIDAD EN EL MODELO TCP/IP -- 10.2.1 SEGURIDAD EN LA CAPA DE RED -- 10.2.2 VPN -- 10.2.3 SSL y -- 10.2.4 L2TP -- 10.2.5. PPTP -- 10.2.6 IPSEC -- 10.2.7.ISAKMP -- 10.3 ACCESO REMOTO -- 10.3.1 RAS (Remote Access -- 10.3.2 RDP (REMOTE DESKTOP PROTOCOL) -- 10.3.3 PPP (POINT-TO-POINT PROTOCOL) -- 10.3.4.PPPOE (POINT-TO-POINT PROTOCOL OVER ETHERNET) -- 10.3.5 SSH (SECURE SHELL) -- 10.4 MÉTODOS DE AUTENTICACIÓN DE USUARIO -- 10.4.1 INFRAESTRUCTURA DE CLAVE PÚBLICA (PKI) -- 10.4.2 KERBEROS -- 10.4.3 AAA Y AAAA -- 10.4.4 RADIUS -- 10.4.5 TACACS+ -- 10.4.6 NAC -- 10.4.7 CHAP -- 10.4.8 MS-CHAP -- 10.4.9 EAP -- 10.4.10 AUTENTICACIÓN MULTIFACTOR -- 10.4.11 SSO -- 11 REDES DE ÁREA EXTENSA (WAN) -- 11.1 PROPIEDADES WAN -- 11.1.1 DEFINICIÓN DE TÉRMINOS WAN -- 11.1.2 TIPOS DE CONEXIÓN WAN -- 11.1.3 VELOCIDAD DE CONEXIÓN EN WAN -- 11.1.4 MEDIO FÍSICO DEL CANAL EN WAN -- 11.2 TECNOLOGÍAS DE BANDA ANCHA -- 11.2.1.PLAIN OLD TELEPHONE SYSTEM (POTS) -- 11.2.2 PROTOCOLO PUNTO A PUNTO (PPP) -- 11.2.3 TECNOLOGÍAS DSL Y XDSL -- 11.2.4 CABLE MÓDEM -- 11.3 TECNOLOGÍAS WAN -- 11.3.1 RED DIGITAL DE SERVICIOS INTEGRADOS (RDSI) -- 11.3.2 FRAME RELAY (FR) -- 11.3.3 ASYNCHRONOUS TRANSFER MODE (ATM) -- 11.3.4 MULTIPROTOCOL LABEL SWITCH (MPLS) -- 12 SISTEMAS DEFENSIVOS -- 12.1 DETECCIÓN Y PREVENCIÓN DE MALWARE -- 12.2 EQUIPO BASTIÓN -- 12.4 SISTEMAS DE DETECCIÓN DE VULNERABILIDADES…”
Publicado 2016
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
24por Lewis, Mark, CCIE“…With eight self-contained chapters designed to facilitate rapid and straightforward troubleshooting, this book provides detailed information on addressing all common and not-so-common issues with IPSec VPNs, MPLS Layer-3 VPNs, Any Transport over MPLS (AToM)-based Layer-2 VPNs, L2TP Version 3 (L2TPv3)-based Layer-2 VPNs, L2TP Version 2 (L2TPv2) VPNs, PPTP VPNs, and L2F VPNs. …”
Publicado 2004
Libro electrónico -
25por Kaeo, Merike“…This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. …”
Publicado 2004
Libro electrónico -
26Publicado 2010“…El penúltimo capítulo está dedicado a los servicios de red avanzados, como la administración del cortafuegos avanzado, el uso del protocolo IPSec con su nueva consola, la implantación de NAT, del acceso remoto y de las VPNs (PPTP, L2TP y SSTP), el uso de servidores Radius, la implantación de NAP y el uso de redes inalámbricas. …”
Acceso con credenciales UPSA.
Libro electrónico