Mostrando 641 - 660 Resultados de 702 Para Buscar '"TCP/IP"', tiempo de consulta: 0.14s Limitar resultados
  1. 641
    Publicado 2023
    Tabla de Contenidos: “…-- Deciding what to back up -- Backing up SW, rsync, and recovery -- Summary -- Chapter 11: Network Fundamentals, File Sharing, and SSH -- Network basics -- IPv4 address -- IPv6 address -- Hostname -- DNS and WWW -- Local network configuration basics -- Pinging a computer in our local network -- Router -- Static and dynamic IPs -- Local and public IP -- Scanning the network -- Subnet mask of a network -- Short network sharing introduction -- A bit of NFS history and characteristics -- Enabling time synchronization for NFS -- Sharing on the server side -- Essential commands for NFS status -- Getting access to a shared directory on the client side -- Synchronization on the client side -- Mounting permanently on the client side based on a static IP -- Automating all the commands -- Accessing NFS shared data by server name -- Accessing data via an encrypted connection -- Windows clients -- macOS clients -- Sharing via Samba Server -- Sharing directories by ourselves via Terminal and all configurations -- Secure Shell (SSH) and working remotely -- Enabling SSH on the server side -- Connecting from another Linux machine locally -- Connecting remotely from the internet -- Connecting remotely from the internet through a VPN -- Connecting from a Windows machine -- Sharing via SSHFS -- Summary -- Chapter 12: Internet, Network Security, Firewalls, and VPNs -- How the internet works, network protocols, and ports -- TCP/IP and OSI network models -- All types of network protocols and the ports for them -- UDP versus TCP and others -- A few other essential protocols -- The Linux basic network modules and a port-scan tool -- Attacks, security advice, and firewalls -- When is a Linux distribution in danger? …”
    Libro electrónico
  2. 642
    por Martínez Sánchez, Rubén
    Publicado 2014
    Tabla de Contenidos: “….) -- PÁGINA LEGAL -- ÍNDICE -- INTRODUCCIÓN -- 1 CONCEPTOS IMPRESCINDIBLES Y PROTOCOLO TCP/IP -- INTRODUCCIÓN -- 1.1 CÓMO SE ORGANIZA INTERNET -- 1.1.1 INTERNET SOCIETY -- 1.1.2 INTERNET ENGINEERING TASK FORCE -- 1.1.3 INTERNET ENGINEERING STEERING GROUP -- 1.1.4 INTERNET ARCHITECTURE BOARD -- 1.1.5 INTERNET ASSIGNED NUMBERS AUTHORITY -- 1.1.6 WORLD WIDE WEB CONSORTIUM -- 1.1.7 CERT UNIVERSITY OF CARNEGIE MELLON -- 1.2 EL USO DE DOCUMENTACIÓN RFC -- 1.3 LAS DIRECCIONES IP -- 1.4 TIPOS DE REDES -- 1.4.1 DIRECCIONES DE CLASE A -- 1.4.2 DIRECCIONES DE CLASE B -- 1.4.3 DIRECCIONES DE CLASE C -- 1.4.4 DIRECCIONES DE CLASE D -- 1.4.5 DIRECCIONES DE CLASE E -- 1.5 MÁSCARAS DE RED -- 1.5.1 SUBREDES -- 1.6 ENRUTAMIENTO -- 1.6.1 NATTING -- 1.6.2 REDES TRONCALES -- 1.7 WELL KNOWN PORTS -- 1.8 NOMBRES DE DOMINIO, DNS -- 1.9 PROTOCOLOS -- 1.10 PROTOCOLOS A NIVEL DE RED -- 1.10.1 PROTOCOLO IP -- 1.10.2 IPV4 -- v1.10.3 IPV6 -- 1.10.4 PROTOCOLO ARP -- 1.10.5 PROTOCOLO ICMP -- 1.11 PROTOCOLOS A NIVEL DE TRANSPORTE -- 1.11.1 PROTOCOLO TCP -- 1.11.2 PROTOCOLO UDP -- 1.12 PROTOCOLOS A NIVEL DE APLICACIÓN -- 1.12.1 PROTOCOLO SMB1.12.1 PROTOCOLO SMB -- 1.12.2 PROTOCOLO SNMB -- 1.13 CONCLUSIONES -- 2 BUSCAR UN VECTOR DE ATAQUE -- 2.1 SEGUIMIENTO DE UN OBJETIVO -- 2.2 RECOPILANDO INFORMACIÓN DESDE INTERNET -- 2.2.1 LAS PRIMERAS TÉCNICAS Y HERRAMIENTAS -- 2.2.2 BASES DE DATOS WHOIS, RIPE, NIC -- 2.2.3 TRANSFERENCIAS DNS NO AUTORIZADAS -- 2.2.4 TRAZADO DE RUTAS -- 2.2.5 BARRIDOS PING -- 2.2.6 CONSULTAS ICMP (INTERNET CONTROL MESSAGE PROTOCOL -- 2.2.7 ESCANEO DE PUERTOS -- 2.2.7.1 NMAP -- 2.2.7.2 NETCAT -- 2.2.7.3 HPING -- 2.3. …”
    Libro electrónico
  3. 643
    por Moeller, Morten
    Publicado 2005
    Tabla de Contenidos: “…. -- 3.4 Setup and configuration planning -- 3.4.1 Suggested Tivoli hardware requirements -- 3.4.2 Tivoli repeater architecture -- 3.4.3 Optimizing slow links connections -- 3.4.4 Managing endpoint behavior -- 3.4.5 Managing the TME Infrastructure -- 3.4.6 Tivoli and RDBMS Integration -- 3.5 Network communications and considerations -- 3.5.1 TCP/IP -- 3.6 Configuration management…”
    Libro electrónico
  4. 644
    Publicado 2005
    Tabla de Contenidos: “…High availability for OnDemand z/OS in a SYSPLEX environment -- 13.1 High availability on z/OS overview -- 13.1.1 z/OS the nucleus high availability component -- 13.1.2 High availability concept for OnDemand z/OS -- 13.2 HA strategies for an OnDemand z/OS application -- 13.2.1 A 4-tier logical model -- 13.2.2 Breaking out the data tier (Tier 4) -- 13.2.3 Intelligent routing of inbound traffic options -- 13.2.4 Achieving HA for OnDemand system -- 13.2.5 Availability strategy failure scenarios -- 13.3 Sysplex terminology -- 13.4 TCP/IP port sharing -- 13.5 The shared OnDemand server -- Chapter 14. …”
    Libro electrónico
  5. 645
    Publicado 2003
    Tabla de Contenidos: “…Performance -- A.1 Switch performance -- A.2 Adapter performance -- A.3 Node I/O slot performance -- A.4 Application performance -- A.5 MPI/user space -- A.6 TCP/IP -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Help from IBM -- Abbreviations and acronyms -- Index -- Back cover…”
    Libro electrónico
  6. 646
    Publicado 2010
    Tabla de Contenidos: “…. -- Before you run into trouble -- Troubleshooting step by step -- Identifying software configuration problems -- Identifying network hardware problems -- Troubleshooting Internet problems with Windows TCP/IP utilities -- Third-party utilities --…”
    Libro electrónico
  7. 647
    por Gucer, Vasfi
    Publicado 2004
    Tabla de Contenidos: “…Planning end-to-end scheduling with Tivoli Workload Scheduler 8.2 -- 3.1 Different ways to do end-to-end scheduling -- 3.2 The rationale behind end-to-end scheduling -- 3.3 Before you start the installation -- 3.3.1 How to order the Tivoli Workload Scheduler software -- 3.3.2 Where to find more information for planning -- 3.4 Planning end-to-end scheduling with Tivoli Workload Scheduler for z/OS -- 3.4.1 Tivoli Workload Scheduler for z/OS documentation -- 3.4.2 Service updates (PSP bucket, APARs, and PTFs) -- 3.4.3 Tivoli Workload Scheduler for z/OS started tasks for end-to-end scheduling -- 3.4.4 Hierarchical File System (HFS) cluster -- 3.4.5 Data sets related to end-to-end scheduling -- 3.4.6 TCP/IP considerations for end-to-end server in sysplex -- 3.4.7 Upgrading from Tivoli Workload Scheduler for z/OS 8.1 end-to-end scheduling -- 3.5 Planning for end-to-end scheduling with Tivoli Workload Scheduler -- 3.5.1 Tivoli Workload Scheduler publications and documentation -- 3.5.2 Tivoli Workload Scheduler service updates (fix packs) -- 3.5.3 System and software requirements -- 3.5.4 Network planning and considerations -- 3.5.5 Backup domain manager -- 3.5.6 Performance considerations -- 3.5.7 Fault-tolerant agent (FTA) naming conventions…”
    Libro electrónico
  8. 648
    Publicado 2003
    Tabla de Contenidos: “…SAP in an IASP -- 10.1 SAP in a non-clustered environment -- 10.2 Implementation overview -- 10.3 The cluster environment -- 10.4 Setting up the SAP system -- 10.4.1 Manually setting up the SAP system -- 10.5 Setting up the IASP -- 10.5.1 Setting up the libraries -- 10.5.2 User profile and job description changes -- 10.5.3 Journal and journal receiver -- 10.5.4 IFS files -- 10.5.5 TCP/IP for switchable disk pool -- 10.5.6 Control Language (CL) source and corresponding command…”
    Libro electrónico
  9. 649
    Publicado 2003
    Tabla de Contenidos: “…5.2.6 WebSphere Commerce Payments installation -- 5.2.7 Commerce Enhancement Pack installation -- 5.2.8 WebSphere Commerce instance creation -- 5.2.9 Commerce Enhancement Pack post-install configuration -- 5.2.10 WebSphere Commerce administration tools verification -- 5.2.11 WebSphere Commerce Payments configuration -- 5.2.12 Database backup -- 5.2.13 Enable WebSphere Commerce portal adapter -- 5.2.14 Disable the WebSphere Commerce cache -- 5.2.15 Commerce Enabled Portal - APAR JR18068 -- 5.3 Directory Server (LDAP) node implementation -- 5.3.1 Windows 2000 Server installation -- 5.3.2 DB2 Server installation -- 5.3.3 IBM HTTP Server installation -- 5.3.4 IBM Directory Server installation -- 5.3.5 IBM Directory Server configuration -- 5.3.6 IBM Directory Server verification -- 5.3.7 Import data for WebSphere Portal and WebSphere Commerce -- 5.3.8 Configure WebSphere Commerce for LDAP -- 5.3.9 Enable SSL between WebSphere Commerce and LDAP -- 5.4 WebSphere Portal node implementation -- 5.4.1 Windows 2000 Server installation -- 5.4.2 DB2 Server installation -- 5.4.3 IBM HTTP Server installation -- 5.4.4 WebSphere Application Server installation -- 5.4.5 WebSphere Portal installation -- 5.4.6 Commerce Enhancement Pack configuration -- 5.5 Enabling single sign-on between WebSphere Portal and WebSphere Commerce -- 5.5.1 Overview on single sign-on (SSO) -- 5.5.2 WebSphere Portal configuration for SSO -- 5.5.3 WebSphere Commerce configuration for SSO -- 5.5.4 Verify single sign-on (SSO) configuration -- 5.6 Deploying the ITSO B2B CEP store -- 5.7 DB2 Server node implementation -- 5.7.1 Windows 2000 Server installation -- 5.7.2 DB2 Server installation -- 5.7.3 Verify the DB2 instance TCP/IP connection port -- 5.7.4 Migrate WebSphere Commerce databases to remote DB2 Server -- 5.7.5 Migrate WebSphere Portal database to remote DB2 Server…”
    Libro electrónico
  10. 650
    por Allison, Steve
    Publicado 2005
    Tabla de Contenidos: “…The sandbox infrastructure -- 6.1 Physical integration into the network infrastructure -- 6.2 System setup and service levels -- 6.2.1 Operating system and program products -- 6.2.2 Distributed environments -- 6.2.3 Development environment -- 6.3 Naming conventions -- 6.3.1 WebSphere cells -- 6.3.2 Naming convention variables -- 6.3.3 Data sets and files -- 6.3.4 Component trace procedure names -- 6.3.5 Configuration objects -- 6.3.6 Development base servers started tasks and user IDs -- 6.3.7 Deployment manager started tasks and user IDs -- 6.3.8 Node agent started tasks and user IDs -- 6.3.9 Managed servers started tasks and user IDs -- 6.3.10 TCP/IP ports -- 6.3.11 Common information -- 6.3.12 Starting servers -- Chapter 7. …”
    Libro electrónico
  11. 651
    por Lakner, Gary
    Publicado 2004
    Tabla de Contenidos: “…Planning for Network Authentication Service and Enterprise Identity Mapping implementation -- 2.1 Required OS/400 components -- 2.2 Required network components -- 2.2.1 General TCP/IP considerations -- 2.2.2 Time / SNTP -- 2.3 Planning your EIM implementation -- 2.3.1 Selecting the system to act as the domain controller -- 2.3.2 Administering EIM -- 2.3.3 Naming conventions -- 2.3.4 EIM associations -- 2.4 Information to collect before you start -- Chapter 3. …”
    Libro electrónico
  12. 652
    por Goel, Anita
    Publicado 2012
    Tabla de Contenidos: “…10.9 Database Administrator (DBA) -- 10.10 Primary Key -- 10.11 Database Languages -- 10.11.1 Data Definition Language (DDL) -- 10.11.2 Data Manipulation Language (DML) -- 10.12 Database Applications -- Summary -- Key Words -- Questions -- Unit V: Computer Networking -- Chapter 11: Computer Networking -- 11.1 Introduction -- 11.2 Networking Goals -- 11.3 Computer Networks -- 11.3.1 Physical Structures -- 11.3.1.1 Switching -- 11.3.1.2 Circuit Switching -- 11.3.1.3 Message Switching -- 11.3.1.4 Packet Switching -- 11.3.2 LAN Topologies -- 11.3.2.1 Bus Topology -- 11.3.2.2 Ring Topology -- 11.3.2.3 Star Topology -- 11.3.2.4 Mesh topology -- 11.3.3 Categories of Networks -- 11.3.3.1 Local Area Network -- 11.3.3.2 Metropolitan Area Network -- 11.3.3.3 Wide Area Network -- 11.3.3.4 The Internet -- 11.4 Network Models -- 11.4.1 The ISO-OSI Model -- 11.4.1.1 Physical Layer -- 11.4.1.2 Data Link Layer -- 11.4.1.3 Network Layer -- 11.4.1.4 Transport Layer -- 11.4.1.5 Session Layer -- 11.4.1.6 Presentation Layer -- 11.4.1.7 Application Layer -- 11.4.2 TCP/IP Model -- 11.5 Internetworking Concepts -- 11.6 Network Devices -- 11.6.1 Network Interface Card -- 11.6.2 Repeater -- 11.6.3 Bridge -- 11.6.4 Hub -- 11.6.5 Switch -- 11.6.6 Router -- 11.6.7 Gateway -- 11.7 Introduction to the Internet -- 11.7.1 History of Internet -- 11.7.2 The Internet Architecture -- 11.7.3 Internetworking Protocol -- 11.7.4 Managing the Internet -- 11.7.5 Internet Services -- 11.7.5.1 World Wide Web (WWW) -- 11.7.6 Applications of the Internet -- 11.8 Network Security -- 11.8.1 Security Threat and Security Attack -- 11.8.2 Security Services -- 11.8.3 Security Mechanisms -- 11.8.3.1 Cryptography -- 11.8.3.2 Digital Signature -- 11.8.3.3 Firewall -- 11.9 Electronic-Commerce (E-Commerce) -- Summary -- Key Words -- Questions -- Solved Question Papers -- Appendices…”
    Libro electrónico
  13. 653
    por Tretau, Roland
    Publicado 2004
    Tabla de Contenidos: “…Subsequent configuration -- 8.1 Network configuration -- 8.1.1 Network interface description -- 8.1.2 TCP/IP configuration -- 8.2 Storage configuration -- 8.2.1 General storage concepts -- 8.2.2 What are Snapshots? …”
    Libro electrónico
  14. 654
    por Lewis, Ted G.
    Publicado 2023
    Tabla de Contenidos: “…-- 7.6 Discussion -- References -- Chapter 8 Communications and the Internet -- 8.1 Early Years -- 8.1.1 The Natural Monopoly -- 8.1.2 The Communications Act of 1996 -- 8.2 Regulatory Structure -- 8.2.1 The Most Important Person in Modern History -- 8.2.2 The First (Modern) Critical Infrastructure -- 8.3 The Architecture of the Communications Sector -- 8.3.1 Physical Infrastructure -- 8.3.2 Wireless Networks -- 8.3.3 Extra-Terrestrial Communication -- 8.3.4 Land Earth Stations -- 8.3.5 Cellular Networks -- 8.3.6 Cell Phone Generations -- 8.3.7 Wi-Fi Technology -- 8.4 Risk and Resilience Analysis -- 8.4.1 Importance of Carrier Hotels -- 8.4.2 The Submarine Cable Network -- 8.4.3 HPM Threats -- 8.4.4 Cellular Network Threats -- 8.4.5 Physical Threats -- 8.5 The Monoculture Internet -- 8.5.1 The Internet Self-Organized -- 8.5.2 The Original Sins -- 8.5.2.1 The DNS -- 8.5.2.2 More Original Sin -- 8.5.3 The Hierarchical Internet -- 8.5.4 Too Many Open Ports -- 8.6 Internet Governance -- 8.6.1 IAB and IETF -- 8.6.2 ICANN Wars -- 8.6.3 ISOC -- 8.6.4 W3C -- 8.6.5 Internationalization -- 8.6.6 Regulation and Balkanization -- 8.6.6.1 Rise of Regulation -- 8.6.6.2 Criticality of the Internet -- 8.7 Green Communications -- 8.7.1 Solar Computing -- 8.7.2 Quantum Communications -- 8.7.3 Adiabatic Logic -- 8.8 Discussion -- References -- Chapter 9 Cyber Threats -- 9.1 Threat Surface -- 9.1.1 Script-kiddies -- 9.1.2 Black Hats -- 9.1.3 Weaponized Exploits -- 9.1.4 Ransomware and the NSA -- 9.2 Basic Vulnerabilities -- 9.2.1 The First Exploit -- 9.2.2 TCP/IP Flaws -- 9.2.3 Open Ports -- 9.2.4 Buffer Overflow Exploits -- 9.2.5 DDoS Attacks -- 9.2.6 Email Exploits -- 9.2.7 Flawed Application and System Software -- 9.2.8 Trojans, Worms, Viruses, and Keyloggers…”
    Libro electrónico
  15. 655
    Publicado 2013
    “…Individuals seeking to learn more about the system administration discipline Individuals with some existing Linux command line experience looking to deepen their knowledge Users returning to Linux wishing to learn new tricks or refresh their skills What You Will Learn: How to use Vagrant and VirtualBox as a makeshift lab environment Linux’s history and background Shell shortcuts and basic bash scripting The Linux startup and shutdown procedures Management of user accounts The use of sudo to control access to privileged commands Interact with processes from the command line The filesystem layout File permissions and attributes Log file management with syslog and logrotate Linux on a TCP/IP network Network debugging with tcpdump and ping Using SSH for remote management The iptables host-based firewall How to secure a Linux system Course Requirements: Some existing familiarity with operating systems concepts The fundamentals of TCP/IP networking (what an IP address and subnet mask are, the purpose of DNS, ICMP)…”
    Video
  16. 656
    Publicado 2019
    “…You'll get to grips with the OSI and TCP/IP models as well as IPv4 and IPv6. The book also shows you how to recall IP addresses through name resolution. …”
    Libro electrónico
  17. 657
    Publicado 2010
    “…Get details on regulatory and technical organizations Learn about different wireless standards and the basics of RF technologies Understand and determine client-side hardware requirements, including chipsets and various wireless interfaces Select infrastructure-side wireless hardware, such as antennas, wireless access points (WAPs), residential gateways, switches/controllers, routers, and bridges Learn about WLANs, WWANs, WMANs, and WPANs Work with standard wireless network protocols--TCP/IP (IPv4 and IPv6) Understand DNS, DHCP, and other supporting infrastructure services Secure wireless networks using cryptography Configure infrastructure devices, including a wireless access point device and wireless network switches and controllers Configure and manage wireless Microsoft Windows, Mac OS X, and Linux clients Plan, design, survey, deploy, and troubleshoot your wireless network…”
    Libro electrónico
  18. 658
    por Holzmann, Gerald J., 1951-
    Publicado 2004
    “…Sum Design and verify both abstract and detailed verification models of complex systems software Sum Develop a solid understanding of the theory behind logic model checking Sum Become an expert user of the SPIN command line interface, the Xspin graphical user interface, and the TimeLine editing tool Sum Learn the basic theory of omega automata, linear temporal logic, depth-first and breadth-first search, search optimization, and model extraction from source code The SPIN software was awarded the prestigious Software System Award by the Association for Computing Machinery (ACM), which previously recognized systems such as UNIX, SmallTalk, TCP/IP, Tcl/Tk, and the World Wide Web…”
    Libro electrónico
  19. 659
    por Gibson, Darril
    Publicado 2011
    “…Serves as an ideal resource for gaining a solid understanding of fundamental networking concepts and skills Offers a straightforward and direct approach to networking basics and covers network management tools, TCP/IP, the name resolution process, and network protocols and topologies Reviews all the topics you need to know for taking the MTA 98-366 exam Provides an overview of networking components, discusses connecting computers to a network, and looks at connecting networks with routers If you're new to IT and interested in entering the IT workforce, then Microsoft Windows Networking Essentials is essential reading…”
    Libro electrónico
  20. 660
    Publicado 2018
    “…You'll then set up the lab and install Cisco Packet Tracer and learn about the TCP/IP stack and the different OSI layers. As you advance, you'll be taken through all the different OSI layers, including OSI layer 1- The Physical layer and OSI layer 2- The Data-Link layer, and get to grips with subnetting. …”
    Video