Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer Science 2
- Computer networks 2
- Computer security 2
- Engineering & Applied Sciences 2
- Security measures 2
- Access control 1
- Authentication 1
- Computer crimes 1
- Computers 1
- Delictes informàtics 1
- Electrical & Computer Engineering 1
- Identification 1
- Internet 1
- Java (Computer program language) 1
- Mesures de seguretat 1
- Prevention 1
- Seguretat informàtica 1
- TFMP 1
- Telecommunications 1
- VMware vSphere 1
- Virtual computer systems 1
-
1
-
2
-
3Publicado 2011Tabla de Contenidos: “…External Databases/Identity Stores in Cisco Secure Access Control System 5.1 -- Configuring Active Directory -- Active Directory Configuration on Cisco Secure Access Control Server 4.2 -- Active Directory Configuration on Cisco Secure Access Control System 5.1 -- Configuring LDAP -- LDAP Configuration on Cisco Secure Access Control Server 4.2 -- Domain Filtering -- Common LDAP Configuration -- Primary and Secondary LDAP Server -- LDAP Configuration on Cisco Secure Access Control System 5.1 -- Configuring RSA SecureID -- RSA SecureID Configuration on Cisco Secure Access Control Server 4.2 -- RSA SecureID Configuration on Cisco Secure Access Control System 5.1 -- Group Mapping -- Group Mapping on Cisco Secure Access Control Server 4.2 -- Group Mapping on Cisco Secure Access Control System 5.1 -- Group Mapping with LDAP Identity Stores -- Group Mapping with AD Identity Stores -- Group Mapping with RADIUS Identity Stores -- Group Mapping Conditions for LDAP, AD, and RADIUS Identity Databases -- Summary -- Chapter 6 Administrative AAA on IOS -- Local Database -- Privilege Levels -- Lab Scenario #1: Local Authentication and Privilege Levels -- Lab Setup -- Lab Solution -- Lab Verification -- Using AAA -- Configuring Authentication on IOS Using AAA -- Configuring ACS 4.2 and 5.1 for Authentication -- Verifying and Troubleshooting Authentication -- Authorization of Administrative Sessions -- Configuring ACS 4.2 and 5.1 for EXEC Authorization -- Verifying and Troubleshooting EXEC Authorization -- Command Authorization -- Configuring ACS 4.2 and 5.1 for Command Authorization -- Verifying and Troubleshooting Command Authorization -- Accounting of Administrative Sessions -- Configuring ACS for Accounting -- Lab Scenario #2: Authentication, Authorization, and Accounting of Administrative Sessions Using TACACS+ -- Lab Setup -- Lab Solution -- Lab Verification…”
Libro electrónico -
4Publicado 2023Tabla de Contenidos: “…Resiliency Planning -- Herding the Cats: Responsibility Assignment Matrices -- How to Think About Resilience -- Crisis Handling: A Tactic for Resilience -- RSA Security: A Case Study in Crisis Communications -- Equifax: A Case Study in Crisis Communications -- Desired Outcomes -- Executives Are Busy: Exercise Them Efficiently -- Backups: A Tactic for Resilience -- Backups As a Strategy Against Ransomware -- Option 1: Centralized Backup Platforms for All Data Islands -- Option 2: One-Off Decentralized Backup Systems -- Option 3: DevOps (DevSecOps) for Each Application -- How Do You Get to Carnegie Hall? …”
Libro electrónico -
5Publicado 2017Tabla de Contenidos: “…-- Monitoring a virtual environment -- CLI usage -- ESXCLI commands -- ESXCFG- -- vSphere Management Assistant -- Ruby vSphere console -- VIM-CMD -- VCSA - CLI -- PowerCLI -- Logs -- ESXi host logs -- GUI Tools -- vRealize Operations Manager -- Troubleshooting -- Troubleshooting the vCenter Server -- TRBL with ESXi host -- Troubleshooting cluster HA or DRS -- Troubleshooting virtual network -- Troubleshooting storage -- Troubleshooting VMs -- Summary -- Chapter 10: Securing and Protecting Your Environment -- Regulations and compliance -- Security and hardening concepts in vSphere -- Hardening vSphere -- Host hardening -- Lockdown Mode -- Networking -- Transparent Page Sharing (TPS) -- VIB acceptance levels -- VM hardening -- VMware vCenter hardening -- Authentication and identity -- Password management -- AD authentication -- Multi-factor authentication (MFA) -- Smart cards -- RSA SecurID -- Other security aspects -- Log management -- Monitoring protocols -- Certification management -- New security options in vSphere 6.5 -- VMware vCenter federations -- Protecting the data at rest -- VM encryption -- Protecting data in motion -- Encrypted vMotion -- Secure boot -- ESXi secure boot -- VM secure boot -- Enhanced logging -- Summary -- Chapter 11: Lifecycle Management, Patching, and Upgrading…”
Libro electrónico -
6por Steel, Christopher, 1968-“…--Joe Uniejewski, Chief Technology Officer and Senior Vice President, RSA Security, Inc. This book makes an important case for taking a proactive approach to security rather than relying on the reactive security approach common in the software industry. …”
Publicado 2005
Libro electrónico