Mostrando 1 - 6 Resultados de 6 Para Buscar '"RSA Security"', tiempo de consulta: 0.07s Limitar resultados
  1. 1
    Revista digital
  2. 2
  3. 3
    Publicado 2011
    Tabla de Contenidos: “…External Databases/Identity Stores in Cisco Secure Access Control System 5.1 -- Configuring Active Directory -- Active Directory Configuration on Cisco Secure Access Control Server 4.2 -- Active Directory Configuration on Cisco Secure Access Control System 5.1 -- Configuring LDAP -- LDAP Configuration on Cisco Secure Access Control Server 4.2 -- Domain Filtering -- Common LDAP Configuration -- Primary and Secondary LDAP Server -- LDAP Configuration on Cisco Secure Access Control System 5.1 -- Configuring RSA SecureID -- RSA SecureID Configuration on Cisco Secure Access Control Server 4.2 -- RSA SecureID Configuration on Cisco Secure Access Control System 5.1 -- Group Mapping -- Group Mapping on Cisco Secure Access Control Server 4.2 -- Group Mapping on Cisco Secure Access Control System 5.1 -- Group Mapping with LDAP Identity Stores -- Group Mapping with AD Identity Stores -- Group Mapping with RADIUS Identity Stores -- Group Mapping Conditions for LDAP, AD, and RADIUS Identity Databases -- Summary -- Chapter 6 Administrative AAA on IOS -- Local Database -- Privilege Levels -- Lab Scenario #1: Local Authentication and Privilege Levels -- Lab Setup -- Lab Solution -- Lab Verification -- Using AAA -- Configuring Authentication on IOS Using AAA -- Configuring ACS 4.2 and 5.1 for Authentication -- Verifying and Troubleshooting Authentication -- Authorization of Administrative Sessions -- Configuring ACS 4.2 and 5.1 for EXEC Authorization -- Verifying and Troubleshooting EXEC Authorization -- Command Authorization -- Configuring ACS 4.2 and 5.1 for Command Authorization -- Verifying and Troubleshooting Command Authorization -- Accounting of Administrative Sessions -- Configuring ACS for Accounting -- Lab Scenario #2: Authentication, Authorization, and Accounting of Administrative Sessions Using TACACS+ -- Lab Setup -- Lab Solution -- Lab Verification…”
    Libro electrónico
  4. 4
    Publicado 2023
    Tabla de Contenidos: “…Resiliency Planning -- Herding the Cats: Responsibility Assignment Matrices -- How to Think About Resilience -- Crisis Handling: A Tactic for Resilience -- RSA Security: A Case Study in Crisis Communications -- Equifax: A Case Study in Crisis Communications -- Desired Outcomes -- Executives Are Busy: Exercise Them Efficiently -- Backups: A Tactic for Resilience -- Backups As a Strategy Against Ransomware -- Option 1: Centralized Backup Platforms for All Data Islands -- Option 2: One-Off Decentralized Backup Systems -- Option 3: DevOps (DevSecOps) for Each Application -- How Do You Get to Carnegie Hall? …”
    Libro electrónico
  5. 5
    Publicado 2017
    Tabla de Contenidos: “…-- Monitoring a virtual environment -- CLI usage -- ESXCLI commands -- ESXCFG- -- vSphere Management Assistant -- Ruby vSphere console -- VIM-CMD -- VCSA - CLI -- PowerCLI -- Logs -- ESXi host logs -- GUI Tools -- vRealize Operations Manager -- Troubleshooting -- Troubleshooting the vCenter Server -- TRBL with ESXi host -- Troubleshooting cluster HA or DRS -- Troubleshooting virtual network -- Troubleshooting storage -- Troubleshooting VMs -- Summary -- Chapter 10: Securing and Protecting Your Environment -- Regulations and compliance -- Security and hardening concepts in vSphere -- Hardening vSphere -- Host hardening -- Lockdown Mode -- Networking -- Transparent Page Sharing (TPS) -- VIB acceptance levels -- VM hardening -- VMware vCenter hardening -- Authentication and identity -- Password management -- AD authentication -- Multi-factor authentication (MFA) -- Smart cards -- RSA SecurID -- Other security aspects -- Log management -- Monitoring protocols -- Certification management -- New security options in vSphere 6.5 -- VMware vCenter federations -- Protecting the data at rest -- VM encryption -- Protecting data in motion -- Encrypted vMotion -- Secure boot -- ESXi secure boot -- VM secure boot -- Enhanced logging -- Summary -- Chapter 11: Lifecycle Management, Patching, and Upgrading…”
    Libro electrónico
  6. 6
    por Steel, Christopher, 1968-
    Publicado 2005
    “…--Joe Uniejewski, Chief Technology Officer and Senior Vice President, RSA Security, Inc. This book makes an important case for taking a proactive approach to security rather than relying on the reactive security approach common in the software industry. …”
    Libro electrónico