Mostrando 481 - 500 Resultados de 696 Para Buscar '"TCP/IP"', tiempo de consulta: 0.09s Limitar resultados
  1. 481
    Publicado 2006
    Tabla de Contenidos: “…Extending OSI to Network Security; Introduction; Our Approach to This Book; Common Stack Attacks; Mapping OSI to TCP/IP; The Current State of IT Security; Using the Information in This Book; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. …”
    Libro electrónico
  2. 482
    por Bhardwaj, Pawan
    Publicado 2006
    Tabla de Contenidos: “…Configuring and Renaming PrintersManaging Printer Drivers; Creating and Configuring TCP/IP Printer Ports; Managing Print Queues and Print Jobs; Summary; Part IV: Working with Active Directory; Chapter 10. …”
    Libro electrónico
  3. 483
    por Beijnum, Iljitsch van
    Publicado 2002
    Tabla de Contenidos: “…; How to Read This Book; Conventions Used in This Book; How to Contact Us; Acknowledgments; The Internet, Routing, and BGP; Topology of the Internet; The NSFNET Backbone; Commercial Backbones and NAPs; The Rest of the World; Transit and Peering; Classification of ISPs; TCP/IP Design Philosophy; The IP Protocol; The Routing Table; Routing Protocols; Multihoming; IP Addressing and the BGP Protocol; IP Addresses; Subnetting and VLSM; CIDR: Classless Inter-Domain Routing; Interdomain Routing History; The BGP Protocol; Open Message…”
    Libro electrónico
  4. 484
    por Gregg, Michael H.
    Publicado 2012
    Tabla de Contenidos: “…Cryptographic AttacksSummary; Exam Essentials; Review Questions; Chapter 2: Comprehensive Security Solutions; Advanced Network Design; TCP/IP; Secure Communication Solutions; Secure Facility Solutions; Secure Network Infrastructure Design; Summary; Exam Essentials; Review Questions; Chapter 3: Securing Virtualized, Distributed, and Shared Computing; Enterprise Security; Cloud Computing; Virtualization; Virtual LANs; Enterprise Storage; Summary; Exam Essentials; Review Questions; Chapter 4: Host Security; Firewalls and Access Control Lists; Host-Based Firewalls; Trusted Operating System…”
    Libro electrónico
  5. 485
    Publicado 2007
    Tabla de Contenidos: “…Attack Detection and Defense; Introduction; The Juniper Security Research Team; Understanding Attacks; Worms, Viruses, and Other Automated Malware; TCP/IP Protocol Anomaly Detection; Using Attack Objects; Antivirus Rules…”
    Libro electrónico
  6. 486
    Publicado 2023
    Tabla de Contenidos: “…Do Bad Things -- Elements of a Typical Security Program -- Risk Management -- Security Governance and Management -- Security Controls -- Professional Ethics -- Chapter Review -- Quick Review -- Questions -- Questions and Answers -- Chapter 2 Access Controls Concepts -- Access Control Fundamentals -- Access Control Concepts -- Access Control Practices -- Identification, Authentication, Authorization, and Accountability -- Identity and Access Management -- Identity and Access Management Lifecycle -- Privileged Accounts -- Logical Access Controls -- Access Control Models -- Identity Management Technologies -- Monitoring Logical Access -- Physical Access Control -- Preventing and Controlling Physical Access -- Monitoring Physical Access -- Chapter Review -- Quick Review -- Questions -- Questions and Answers -- Chapter 3 Network Security -- Network Fundamentals -- Network Types -- Wired and Wireless Networks -- System Addresses -- Network Devices and Terminology -- Networking in Action -- Protocols -- Ports -- OSI Model -- TCP/IP -- IP Addressing -- Network Threats and Attacks -- Conducting Research -- Identifying Targets -- Exploiting Targets -- Doing Bad Things -- Network Defenses -- Firewalls -- Network Security Architecture Elements -- Network Access Control -- E-mail and Web Application Filtering -- Network Operations Elements -- Wireless Security -- Internet of Things Security -- Security Assessments and Testing…”
    Libro electrónico
  7. 487
    Publicado 2004
    Tabla de Contenidos:
    Libro electrónico
  8. 488
    por Gutiérrez Salazar, Pablo
    Publicado 2019
    Tabla de Contenidos: “…FUNDAMENTOS -- LINUX -- TERMINAL DE LINUX -- INSTALANDO HERRAMIENTAS -- INTERFAZ DE RED -- REDES, PROTOCOLOS Y PUERTOS -- MODELO OSI -- TCP / IP -- PUERTOS -- FIREWALL -- COOKIES -- SEGURIDAD INFORMÁTICA -- FILOSOFÍAS DE HACKING -- SEGURIDAD DE LA INFORMACIÓN Y SEGURIDAD INFORMÁTICA -- CUALIDADES DE LA SEGURIDAD DE LA INFORMACIÓN -- METODOLOGÍA PARA MEJORAR LA SEGURIDAD DE LA INFORMACIÓN -- RETOS EN LA SEGURIDAD DE LA INFORMACIÓN -- INGENIERÍA SOCIAL -- PRUEBA DE PENETRACIÓN -- FORMAS DE OCULTAR INFORMACIÓN -- CRIPTOGRAFÍA -- CIFRADO EN ARCHIVOS -- ESTEGANOGRAFÍA -- PRACTICA -- PREPARACIÓN DEL LABORATORIO -- VIRTUALIZACIÓN -- WINDOWS &amp -- MACINTOSH -- SISTEMAS OPERATIVOS -- INSTALANDO LINUX VULNERABLE DE PRUEBAS -- INSTALANDO EMULADOR ANDROID -- INSTALANDO SERVIDOR WEB VULNERABLE -- 2. …”
    Libro electrónico
  9. 489
    Publicado 2012
    “…A class of Delay Tolerant Networks (DTN), which may violate one or more of the assumptions regarding the overall performance characteristics of the underlying links in order to achieve smooth operation, is rapidly growing in importance but may not be well served by the current end-to-end TCP/IP model. Delay Tolerant Networks: Protocols and Applications takes you on a systematic exploration of DTN concepts, architectures, protocols, enabling technologies, and applications.Containing a wealth of illustrative material for ease of understanding, this one-stop reference discusses the various challenges associated with DTN. …”
    Libro electrónico
  10. 490
    por Lammle, Todd
    Publicado 2014
    “…The book includes an easy-to-navigate table of commands broken into the following topic areas: Internetworking and TCP/IP Cisco command line interface (CLI) and Security Device Manager (SDM) Router Configuration LAN Switch Configuration Advanced IOS and Troubleshooting Access Lists Network Address Translation Wireless Wide Area Networks Security IPv6 Whether you are studying for your CCENT or CCNA certification, or are a seasoned Cisco networking administrator, this IOS Commands Survival Guide is the perfect reference to help you achieve your goals…”
    Libro electrónico
  11. 491
    Publicado 2012
    Tabla de Contenidos: “…-- Tweaking Files Inside of /proc -- Some Useful /proc Entries -- Enumerated /proc Entries -- Common proc Settings and Reports -- SYN Flood Protection -- Issues on High-Volume Servers -- Debugging Hardware Conflicts -- SysFS -- cgroupfs -- Summary -- Part III: Networking and Security -- Chapter 11: TCP/IP for System Administrators -- The Layers -- Packets -- TCP/IP Model and the OSI Model -- Layer 1 (The Wire) -- Layer 2 (Ethernet) -- Layer 3 (IP) -- Layer 4 (TCP, UDP) -- Layers 5-7 (HTTP, SSL, XML) -- Headers -- Ethernet -- Viewing Ethernet Headers -- IP (IPv4) -- tcpdump and IP -- TCP -- UDP -- A Complete TCP Connection -- Opening a Connection -- Transferring Data -- Closing the Connection -- How ARP Works -- The ARP Header: ARP Works with Other Protocols, Too! …”
    Libro electrónico
  12. 492
    Publicado 2024
    Tabla de Contenidos: “…Timing out HTTP connections -- Using SetDeadline() -- Setting the timeout period on the client side -- Setting the timeout period on the server side -- Summary -- Exercises -- Additional resources -- Chapter 10: Working with TCP/IP and WebSocket -- TCP/IP -- The nc(1) command line utility -- The net package -- Developing a TCP client -- Developing a TCP client with net.Dial() -- Developing a TCP client that uses net.DialTCP() -- Developing a TCP server -- Developing a TCP server with net.Listen() -- Developing a TCP server that uses net.ListenTCP() -- Developing a UDP client -- Developing a UDP server -- Developing concurrent TCP servers -- Creating a WebSocket server -- The implementation of the server -- Using websocat -- Creating a WebSocket client -- Working with RabbitMQ -- Running RabbitMQ -- Writing to RabbitMQ -- Reading from RabbitMQ -- How to remove a module -- Summary -- Exercises -- Additional resources -- Chapter 11: Working with REST APIs -- An introduction to REST -- Developing RESTful servers and clients -- A RESTful server -- A RESTful client -- Creating a functional RESTful server -- The REST API -- Using gorilla/mux -- The use of subrouters -- The Gin HTTP framework -- Gin versus Gorilla -- Working with the database -- Implementing the RESTful server -- Testing the RESTful server -- Testing GET handlers -- Testing POST handlers -- Testing the PUT handler -- Testing the DELETE handler -- Creating a RESTful client -- Creating the structure of the command line client -- Implementing the RESTful client commands -- Using the RESTful client -- Working with multiple REST API versions -- Summary -- Exercises -- Additional resources -- Chapter 12: Code Testing and Profiling -- Optimizing code -- Rewriting the main() function for better testing -- Profiling code -- Profiling a command line application -- Profiling an HTTP server…”
    Libro electrónico
  13. 493
    por Cardador Cabello, Antonio Luis
    Publicado 2014
    Tabla de Contenidos: “…La tecnología de Internet -- 5. Redes TCP/IP -- 6. Resumen -- Ejercicios de repaso y autoevaluación -- Capítulo 2 La World Wide Web -- 1. …”
    Libro electrónico
  14. 494
    por Lammle, Todd
    Publicado 2007
    Tabla de Contenidos: “…Chapter 2: Introduction to TCP/IPTCP/IP and the DoD Model; IP Addressing; Broadcast Addresses; Summary; Exam Essentials; Written Lab 2; Review Questions; Answers to Review Questions; Answers to Written Lab 2; Chapter 3: Subnetting, Variable Length Subnet Masks (VLSMs), and Troubleshooting TCP/IP; Subnetting Basics; Variable Length Subnet Masks (VLSMs); Summarization; Troubleshooting IP Addressing; Summary; Exam Essentials; Written Labs 3; Review Questions; Answers to Review Questions; Answers to Written Lab 3.1; Answers to Written Lab 3.2; Answers to Written Lab 3.3…”
    Libro electrónico
  15. 495
    Publicado 2015
    Tabla de Contenidos: “…Redirection and Interception with ICMPPreventing Packet Capture; Dynamic Address Inspection; DHCP Snooping; Preventing VLAN Hopping; Detecting Packet Capture; Wireshark; Wireshark Basics; Filtering and Decoding Traffic; Basic Data Capture-A Layer-by-Layer Review; Physical-Data-Link Layer; Network-Internet Layer; Transport-Host-Host Layer; Application Layer; Other Network Analysis Tools; Summary; Key Terms; Exercises; Fun with Packets; Packet Analysis with tcpdump; Packet Filters; Making a One-Way Data Cable; Chapter 4 Detecting Live Systems and Analyzing Results; TCP/IP Basics…”
    Libro electrónico
  16. 496
    Publicado 2016
    Tabla de Contenidos: “…Surmising SwitchesPlanning the Network Topology; Planning the TCP/IP Implementation; Drawing Diagrams; More Questions Your Network Plan Should Address; Chapter 3: Installing Network Hardware; Working with Cable; Installing Switches; Daisy-Chaining Switches; Chapter 4: Setting Up a Server; The Many Ways to Install a Server Operating System; Gathering Your Stuff; Making Informed Decisions; Final Preparations; Installing a Server operating system; Configuring Your Server; Chapter 5: Configuring Windows Clients; Configuring Network Connections; Joining a Domain; Chapter 6: Mac Networking…”
    Libro electrónico
  17. 497
    Publicado 2016
    Tabla de Contenidos: “…Chapter 2: Networking2.1 Identify the Various Types of Network Cables and Connectors; 2.2 Compare and Contrast the Characteristics of Connectors and Cabling; 2.3 Explain the Properties and Characteristics of TCP/IP; 2.4 Explain Common TCP and UDP Ports, Protocols, and Their Purpose; 2.5 Compare and Contrast Various Wi-Fi Networking Standards and Encryption Types; 2.6 Given a Scenario, Install and Configure a SOHO Wireless/Wired Router and Apply Appropriate Settings; 2.7 Compare and Contrast Internet Connection Types, Network Types, and Their Features…”
    Libro electrónico
  18. 498
    Publicado 2016
    Tabla de Contenidos: “…Drawing DiagramsChapter 5: Dealing with TCP/IP; Understanding Binary; Introducing IP Addresses; Classifying IP Addresses; Subnetting; Understanding Network Address Translation; Configuring Your Network for DHCP; Managing a Windows Server 2016 DHCP Server; Configuring a Windows DHCP Client; Using DNS; Working with the Windows DNS Server; Configuring a Windows DNS Client; Chapter 6: Oh, What a Tangled Web We Weave: Cables, Switches, and Routers; What Is Ethernet?…”
    Libro electrónico
  19. 499
    Publicado 2014
    Tabla de Contenidos: “…Enterprise data centersCloud data centers; Virtualized data centers; Computer Networks; Dedicated lines; ARPANET; TCP/IP; Multi-Protocol Label Switching; SONET/SDH; Asynchronous Transfer Mode; Token Ring/Token Bus; Ethernet; Fibre Channel; InfiniBand; Ethernet; Ethernet history; Ethernet overview; Carrier Ethernet; Enterprise versus Cloud Data Centers; Enterprise data center networks; Cloud data center networks; Movement to the Cloud; Driving forces; Security concerns; Cloud types; Private cloud; Public cloud; Hybrid cloud; Public cloud services; Infrastructure as a Service…”
    Libro electrónico
  20. 500
    Publicado 2007
    Tabla de Contenidos: “…Microsoft Vista: Networking Essentials; Introduction; Not Your Father's TCP/IP Stack; Using the Network and Sharing Center; Using the Network Map; Working with the Windows Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. …”
    Libro electrónico