Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 157
- Engineering & Applied Sciences 124
- TCP/IP (Computer network protocol) 118
- Examinations 82
- Certification 76
- Electrical & Computer Engineering 70
- Telecommunications 70
- Electronic data processing personnel 68
- Operating systems (Computers) 61
- Computer Science 57
- Security measures 50
- Internet 33
- Computer network protocols 32
- z/OS 30
- Client/server computing 28
- TCP-IP (Protocolos de comunicaciones) 28
- Linux 27
- Computer security 26
- Redes de ordenadores 26
- Management 25
- Microsoft Windows server 25
- TCP/IP (Protocol de xarxes d'ordinadors) 24
- Telecommunications engineers 23
- Microsoft Windows (Computer file) 20
- Routers (Computer networks) 18
- Computing Technology Industry Association 17
- Internetworking (Telecommunication) 17
- TFC 16
- Xarxes d'ordinadors 13
- Application software 12
-
481Publicado 2006Tabla de Contenidos: “…Extending OSI to Network Security; Introduction; Our Approach to This Book; Common Stack Attacks; Mapping OSI to TCP/IP; The Current State of IT Security; Using the Information in This Book; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. …”
Libro electrónico -
482por Bhardwaj, PawanTabla de Contenidos: “…Configuring and Renaming PrintersManaging Printer Drivers; Creating and Configuring TCP/IP Printer Ports; Managing Print Queues and Print Jobs; Summary; Part IV: Working with Active Directory; Chapter 10. …”
Publicado 2006
Libro electrónico -
483por Beijnum, Iljitsch vanTabla de Contenidos: “…; How to Read This Book; Conventions Used in This Book; How to Contact Us; Acknowledgments; The Internet, Routing, and BGP; Topology of the Internet; The NSFNET Backbone; Commercial Backbones and NAPs; The Rest of the World; Transit and Peering; Classification of ISPs; TCP/IP Design Philosophy; The IP Protocol; The Routing Table; Routing Protocols; Multihoming; IP Addressing and the BGP Protocol; IP Addresses; Subnetting and VLSM; CIDR: Classless Inter-Domain Routing; Interdomain Routing History; The BGP Protocol; Open Message…”
Publicado 2002
Libro electrónico -
484por Gregg, Michael H.Tabla de Contenidos: “…Cryptographic AttacksSummary; Exam Essentials; Review Questions; Chapter 2: Comprehensive Security Solutions; Advanced Network Design; TCP/IP; Secure Communication Solutions; Secure Facility Solutions; Secure Network Infrastructure Design; Summary; Exam Essentials; Review Questions; Chapter 3: Securing Virtualized, Distributed, and Shared Computing; Enterprise Security; Cloud Computing; Virtualization; Virtual LANs; Enterprise Storage; Summary; Exam Essentials; Review Questions; Chapter 4: Host Security; Firewalls and Access Control Lists; Host-Based Firewalls; Trusted Operating System…”
Publicado 2012
Libro electrónico -
485Publicado 2007Tabla de Contenidos: “…Attack Detection and Defense; Introduction; The Juniper Security Research Team; Understanding Attacks; Worms, Viruses, and Other Automated Malware; TCP/IP Protocol Anomaly Detection; Using Attack Objects; Antivirus Rules…”
Libro electrónico -
486Publicado 2023Tabla de Contenidos: “…Do Bad Things -- Elements of a Typical Security Program -- Risk Management -- Security Governance and Management -- Security Controls -- Professional Ethics -- Chapter Review -- Quick Review -- Questions -- Questions and Answers -- Chapter 2 Access Controls Concepts -- Access Control Fundamentals -- Access Control Concepts -- Access Control Practices -- Identification, Authentication, Authorization, and Accountability -- Identity and Access Management -- Identity and Access Management Lifecycle -- Privileged Accounts -- Logical Access Controls -- Access Control Models -- Identity Management Technologies -- Monitoring Logical Access -- Physical Access Control -- Preventing and Controlling Physical Access -- Monitoring Physical Access -- Chapter Review -- Quick Review -- Questions -- Questions and Answers -- Chapter 3 Network Security -- Network Fundamentals -- Network Types -- Wired and Wireless Networks -- System Addresses -- Network Devices and Terminology -- Networking in Action -- Protocols -- Ports -- OSI Model -- TCP/IP -- IP Addressing -- Network Threats and Attacks -- Conducting Research -- Identifying Targets -- Exploiting Targets -- Doing Bad Things -- Network Defenses -- Firewalls -- Network Security Architecture Elements -- Network Access Control -- E-mail and Web Application Filtering -- Network Operations Elements -- Wireless Security -- Internet of Things Security -- Security Assessments and Testing…”
Libro electrónico -
487Publicado 2004Tabla de Contenidos:Libro electrónico
-
488por Gutiérrez Salazar, PabloTabla de Contenidos: “…FUNDAMENTOS -- LINUX -- TERMINAL DE LINUX -- INSTALANDO HERRAMIENTAS -- INTERFAZ DE RED -- REDES, PROTOCOLOS Y PUERTOS -- MODELO OSI -- TCP / IP -- PUERTOS -- FIREWALL -- COOKIES -- SEGURIDAD INFORMÁTICA -- FILOSOFÍAS DE HACKING -- SEGURIDAD DE LA INFORMACIÓN Y SEGURIDAD INFORMÁTICA -- CUALIDADES DE LA SEGURIDAD DE LA INFORMACIÓN -- METODOLOGÍA PARA MEJORAR LA SEGURIDAD DE LA INFORMACIÓN -- RETOS EN LA SEGURIDAD DE LA INFORMACIÓN -- INGENIERÍA SOCIAL -- PRUEBA DE PENETRACIÓN -- FORMAS DE OCULTAR INFORMACIÓN -- CRIPTOGRAFÍA -- CIFRADO EN ARCHIVOS -- ESTEGANOGRAFÍA -- PRACTICA -- PREPARACIÓN DEL LABORATORIO -- VIRTUALIZACIÓN -- WINDOWS & -- MACINTOSH -- SISTEMAS OPERATIVOS -- INSTALANDO LINUX VULNERABLE DE PRUEBAS -- INSTALANDO EMULADOR ANDROID -- INSTALANDO SERVIDOR WEB VULNERABLE -- 2. …”
Publicado 2019
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
489Publicado 2012“…A class of Delay Tolerant Networks (DTN), which may violate one or more of the assumptions regarding the overall performance characteristics of the underlying links in order to achieve smooth operation, is rapidly growing in importance but may not be well served by the current end-to-end TCP/IP model. Delay Tolerant Networks: Protocols and Applications takes you on a systematic exploration of DTN concepts, architectures, protocols, enabling technologies, and applications.Containing a wealth of illustrative material for ease of understanding, this one-stop reference discusses the various challenges associated with DTN. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
490por Lammle, Todd“…The book includes an easy-to-navigate table of commands broken into the following topic areas: Internetworking and TCP/IP Cisco command line interface (CLI) and Security Device Manager (SDM) Router Configuration LAN Switch Configuration Advanced IOS and Troubleshooting Access Lists Network Address Translation Wireless Wide Area Networks Security IPv6 Whether you are studying for your CCENT or CCNA certification, or are a seasoned Cisco networking administrator, this IOS Commands Survival Guide is the perfect reference to help you achieve your goals…”
Publicado 2014
Libro electrónico -
491Publicado 2012Tabla de Contenidos: “…-- Tweaking Files Inside of /proc -- Some Useful /proc Entries -- Enumerated /proc Entries -- Common proc Settings and Reports -- SYN Flood Protection -- Issues on High-Volume Servers -- Debugging Hardware Conflicts -- SysFS -- cgroupfs -- Summary -- Part III: Networking and Security -- Chapter 11: TCP/IP for System Administrators -- The Layers -- Packets -- TCP/IP Model and the OSI Model -- Layer 1 (The Wire) -- Layer 2 (Ethernet) -- Layer 3 (IP) -- Layer 4 (TCP, UDP) -- Layers 5-7 (HTTP, SSL, XML) -- Headers -- Ethernet -- Viewing Ethernet Headers -- IP (IPv4) -- tcpdump and IP -- TCP -- UDP -- A Complete TCP Connection -- Opening a Connection -- Transferring Data -- Closing the Connection -- How ARP Works -- The ARP Header: ARP Works with Other Protocols, Too! …”
Libro electrónico -
492Publicado 2024Tabla de Contenidos: “…Timing out HTTP connections -- Using SetDeadline() -- Setting the timeout period on the client side -- Setting the timeout period on the server side -- Summary -- Exercises -- Additional resources -- Chapter 10: Working with TCP/IP and WebSocket -- TCP/IP -- The nc(1) command line utility -- The net package -- Developing a TCP client -- Developing a TCP client with net.Dial() -- Developing a TCP client that uses net.DialTCP() -- Developing a TCP server -- Developing a TCP server with net.Listen() -- Developing a TCP server that uses net.ListenTCP() -- Developing a UDP client -- Developing a UDP server -- Developing concurrent TCP servers -- Creating a WebSocket server -- The implementation of the server -- Using websocat -- Creating a WebSocket client -- Working with RabbitMQ -- Running RabbitMQ -- Writing to RabbitMQ -- Reading from RabbitMQ -- How to remove a module -- Summary -- Exercises -- Additional resources -- Chapter 11: Working with REST APIs -- An introduction to REST -- Developing RESTful servers and clients -- A RESTful server -- A RESTful client -- Creating a functional RESTful server -- The REST API -- Using gorilla/mux -- The use of subrouters -- The Gin HTTP framework -- Gin versus Gorilla -- Working with the database -- Implementing the RESTful server -- Testing the RESTful server -- Testing GET handlers -- Testing POST handlers -- Testing the PUT handler -- Testing the DELETE handler -- Creating a RESTful client -- Creating the structure of the command line client -- Implementing the RESTful client commands -- Using the RESTful client -- Working with multiple REST API versions -- Summary -- Exercises -- Additional resources -- Chapter 12: Code Testing and Profiling -- Optimizing code -- Rewriting the main() function for better testing -- Profiling code -- Profiling a command line application -- Profiling an HTTP server…”
Libro electrónico -
493por Cardador Cabello, Antonio LuisTabla de Contenidos: “…La tecnología de Internet -- 5. Redes TCP/IP -- 6. Resumen -- Ejercicios de repaso y autoevaluación -- Capítulo 2 La World Wide Web -- 1. …”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
494por Lammle, ToddTabla de Contenidos: “…Chapter 2: Introduction to TCP/IPTCP/IP and the DoD Model; IP Addressing; Broadcast Addresses; Summary; Exam Essentials; Written Lab 2; Review Questions; Answers to Review Questions; Answers to Written Lab 2; Chapter 3: Subnetting, Variable Length Subnet Masks (VLSMs), and Troubleshooting TCP/IP; Subnetting Basics; Variable Length Subnet Masks (VLSMs); Summarization; Troubleshooting IP Addressing; Summary; Exam Essentials; Written Labs 3; Review Questions; Answers to Review Questions; Answers to Written Lab 3.1; Answers to Written Lab 3.2; Answers to Written Lab 3.3…”
Publicado 2007
Libro electrónico -
495Publicado 2015Tabla de Contenidos: “…Redirection and Interception with ICMPPreventing Packet Capture; Dynamic Address Inspection; DHCP Snooping; Preventing VLAN Hopping; Detecting Packet Capture; Wireshark; Wireshark Basics; Filtering and Decoding Traffic; Basic Data Capture-A Layer-by-Layer Review; Physical-Data-Link Layer; Network-Internet Layer; Transport-Host-Host Layer; Application Layer; Other Network Analysis Tools; Summary; Key Terms; Exercises; Fun with Packets; Packet Analysis with tcpdump; Packet Filters; Making a One-Way Data Cable; Chapter 4 Detecting Live Systems and Analyzing Results; TCP/IP Basics…”
Libro electrónico -
496Publicado 2016Tabla de Contenidos: “…Surmising SwitchesPlanning the Network Topology; Planning the TCP/IP Implementation; Drawing Diagrams; More Questions Your Network Plan Should Address; Chapter 3: Installing Network Hardware; Working with Cable; Installing Switches; Daisy-Chaining Switches; Chapter 4: Setting Up a Server; The Many Ways to Install a Server Operating System; Gathering Your Stuff; Making Informed Decisions; Final Preparations; Installing a Server operating system; Configuring Your Server; Chapter 5: Configuring Windows Clients; Configuring Network Connections; Joining a Domain; Chapter 6: Mac Networking…”
Libro electrónico -
497Publicado 2016Tabla de Contenidos: “…Chapter 2: Networking2.1 Identify the Various Types of Network Cables and Connectors; 2.2 Compare and Contrast the Characteristics of Connectors and Cabling; 2.3 Explain the Properties and Characteristics of TCP/IP; 2.4 Explain Common TCP and UDP Ports, Protocols, and Their Purpose; 2.5 Compare and Contrast Various Wi-Fi Networking Standards and Encryption Types; 2.6 Given a Scenario, Install and Configure a SOHO Wireless/Wired Router and Apply Appropriate Settings; 2.7 Compare and Contrast Internet Connection Types, Network Types, and Their Features…”
Libro electrónico -
498Publicado 2016Tabla de Contenidos: “…Drawing DiagramsChapter 5: Dealing with TCP/IP; Understanding Binary; Introducing IP Addresses; Classifying IP Addresses; Subnetting; Understanding Network Address Translation; Configuring Your Network for DHCP; Managing a Windows Server 2016 DHCP Server; Configuring a Windows DHCP Client; Using DNS; Working with the Windows DNS Server; Configuring a Windows DNS Client; Chapter 6: Oh, What a Tangled Web We Weave: Cables, Switches, and Routers; What Is Ethernet?…”
Libro electrónico -
499Publicado 2014Tabla de Contenidos: “…Enterprise data centersCloud data centers; Virtualized data centers; Computer Networks; Dedicated lines; ARPANET; TCP/IP; Multi-Protocol Label Switching; SONET/SDH; Asynchronous Transfer Mode; Token Ring/Token Bus; Ethernet; Fibre Channel; InfiniBand; Ethernet; Ethernet history; Ethernet overview; Carrier Ethernet; Enterprise versus Cloud Data Centers; Enterprise data center networks; Cloud data center networks; Movement to the Cloud; Driving forces; Security concerns; Cloud types; Private cloud; Public cloud; Hybrid cloud; Public cloud services; Infrastructure as a Service…”
Libro electrónico -
500Publicado 2007Tabla de Contenidos: “…Microsoft Vista: Networking Essentials; Introduction; Not Your Father's TCP/IP Stack; Using the Network and Sharing Center; Using the Network Map; Working with the Windows Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. …”
Libro electrónico