Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 185
- Historia 161
- Management 84
- Development 82
- Operating systems (Computers) 75
- Filosofía 74
- Social aspects 64
- Computer networks 63
- Application software 62
- Engineering & Applied Sciences 61
- Philosophy 60
- Linux 58
- RELIGION 54
- Security measures 54
- Data processing 50
- Leadership 49
- Computer security 47
- Computer Science 43
- Computer software 40
- Politics and government 40
- Política y gobierno 39
- Mathematics 37
- Computer programming 36
- Crítica e interpretación 35
- Cloud computing 34
- History and criticism 34
- Psychological aspects 34
- Research & information: general 34
- Business & Economics 31
- Computer programs 31
-
2921Publicado 2017Tabla de Contenidos: “…Intro -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Understanding the Serverless Model -- Introducing serverless -- Thinking serverless -- Serverless and PaaS -- IaaS and On-Premises -- The main goals of serverless -- Scalability -- Availability -- Cost efficiency -- The pros and cons of serverless -- Pros -- Reduced operational costs -- Focus on business -- System security -- Continuous delivery -- Microservices friendly -- Cost model -- Cons -- Higher latency -- Constraints -- Hidden inefficiencies -- Vendor dependency -- Debugging difficulties -- Atomic deploys -- Uncertainties -- Use cases -- Static websites -- Lean websites -- Small e-commerce websites -- Temporary websites -- Triggered processing -- Chatbots -- IoT backends -- Scheduled events -- Big Data -- What you should avoid -- Summary -- Chapter 2: Getting Started with AWS -- Amazon Web Services -- Handling user accounts and security -- AWS IAM -- Creating users and groups -- Sign in with a non-root user account -- Amazon Cognito -- Managing AWS resources -- AWS Management Console -- AWS SDKs -- AWS CLI -- AWS CloudFormation -- Amazon CloudWatch -- Frontend services -- Amazon S3 -- Using S3 with the CLI -- Amazon Route 53 -- Amazon CloudFront -- AWS Certificate Manager -- Messaging and notifications -- Amazon SNS -- AWS IoT -- Backend services -- AWS Lambda -- Creating a Lambda function -- Amazon API Gateway -- Expose your Lambda function using API Gateway -- Database services -- Amazon SimpleDB -- Amazon DynamoDB -- The serverless architecture of our online store -- Estimating costs -- Assumptions -- Route 53 pricing -- S3 pricing -- CloudFront pricing -- Certificate Manager pricing -- IAM pricing -- Cognito pricing -- IoT pricing -- SNS pricing -- CloudWatch pricing…”
Libro electrónico -
2922Publicado 2024Tabla de Contenidos: “…Written Lab -- Review Questions -- Chapter 9 Security Vulnerabilities, Threats, and Countermeasures -- Shared Responsibility -- Data Localization and Data Sovereignty -- Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements -- Hardware -- Firmware -- Client-Based Systems -- Mobile Code -- Local Caches -- Server-Based Systems -- Large-Scale Parallel Data Systems -- Grid Computing -- Peer to Peer -- Industrial Control Systems -- Distributed Systems -- High-Performance Computing (HPC) Systems -- Real-Time Operating Systems -- Internet of Things -- Edge and Fog Computing -- Embedded Devices and Cyber-Physical Systems -- Static Systems -- Cyber-Physical Systems -- Security Concerns of Embedded and Static Systems -- Microservices -- Infrastructure as Code -- Immutable Architecture -- Virtualized Systems -- Virtual Software -- Virtualized Networking -- Software-Defined Everything -- Virtualization Security Management -- Containerization -- Mobile Devices -- Mobile Device Security Features -- Mobile Device Deployment Policies -- Essential Security Protection Mechanisms -- Process Isolation -- Hardware Segmentation -- Root of Trust -- System Security Policy -- Common Security Architecture Flaws and Issues -- Covert Channels -- Attacks Based on Design or Coding Flaws -- Rootkits -- Incremental Attacks -- Summary -- Study Essentials -- Written Lab -- Review Questions -- Chapter 10 Physical Security Requirements -- Apply Security Principles to Site and Facility Design -- Secure Facility Plan -- Site Selection -- Facility Design -- Implement Site and Facility Security Controls -- Equipment Failure -- Wiring Closets -- Server Rooms/Data Centers -- Intrusion Detection Systems -- Cameras -- Access Abuses -- Media Storage Facilities -- Evidence Storage -- Work Area Security -- Utility Considerations…”
Libro electrónico -
2923Publicado 2003Tabla de Contenidos: “…Using WebSphere with Oracle9i -- 11.1 Overview -- 11.2 Installing the repository database -- 11.3 Configuration of the repository database -- 11.4 Installing IBM HTTP server -- 11.5 Installing WebSphere -- 11.6 Running WebSphere as non-root user -- 11.7 Starting the application server -- 11.8 Testing the installation -- Appendix A. …”
Libro electrónico -
2924por Guthrie, ForbesTabla de Contenidos: “…Choosing a Protocol -- Fibre Channel -- iSCSI -- NFS -- Protocol Choice -- Multipathing -- SAN Multipathing -- NAS Multipathing -- vSphere Storage Features -- vSphere Storage APIs -- Performance and Capacity -- Storage Management -- Summary -- Chapter 7 Virtual Machines -- Components of a Virtual Machine -- Base Virtual Machine Hardware -- Hardware Versions -- Virtual Machine Maximums -- Hardware Choices -- Removing or Disabling Unused Hardware -- Virtual Machine Options -- SDRS Rules -- vApp Options -- vServices -- Naming Virtual Machines -- VMware Tools -- Notes, Custom Attributes, and Tagging -- Sizing Virtual Machines -- Virtual Machine CPU Design -- Cores per Socket -- CPU Hot Plug -- Resources -- Additional CPU Settings -- Virtual Machine Memory Design -- Resources -- Additional Memory Settings -- Virtual Machine Storage Design -- Disks -- Disk Types -- Disk Shares and IOPS Limits -- Disk Modes -- SCSI Controllers -- RDMs -- Storage vMotion -- Cross-Host vMotion -- VM Storage Profile -- Virtual Machine Network Design -- vNIC Drivers -- MAC Addresses -- VLAN Tagging -- Guest Software -- Selecting an OS -- Guest OS and Application Licensing -- Disk Alignment -- Defragmentation -- Optimizing the Guest for the Hypervisor -- Clones, Templates, and vApps -- Clones -- Templates -- Preparing a Template -- Virtual Appliances -- OVF Standard -- vApps -- Virtual Machine Availability -- vSphere VM Availability -- Third-Party VM Clustering -- Microsoft Application Clustering -- vCenter Infrastructure Navigator -- Summary -- Chapter 8 Datacenter Design -- vSphere Inventory Structure -- Inventory Root -- Folders -- Datacenters -- Clusters -- Resource Pools -- Hosts -- Virtual Machines -- Templates -- Storage -- Networks -- Why and How to Structure -- Clusters -- EVC -- Swapfile Policy -- Cluster Sizing -- Resource Pools -- Resource Pool Settings…”
Publicado 2013
Libro electrónico -
2925Publicado 2018Tabla de Contenidos: “…-- Entities, value objects, and aggregates -- Entities -- Value objects -- Aggregates and root entities -- Separating the domain into subdomains -- What are bounded contexts? …”
Libro electrónico -
2926Publicado 2018Tabla de Contenidos: “…-- Time to say goodbye to SSL and early TLS -- SSL certificate component -- Root certificate -- Intermediate certificate -- SSL certificates classes -- TLS versus SSL -- Public Key Infrastructure -- Symmetric encryption -- Asymmetric encryption -- Hash function -- Attacks against PKI -- Microsoft Windows and IIS -- OpenSSL -- SSL Management tools -- Summary -- Questions -- Further reading -- Chapter 10: Firewall Placement and Detection Techniques -- Technical requirements -- Firewall and design considerations -- Firewall terminology -- Firewall generations -- Firewall performance -- Firewall placement and design network topology -- Single firewall architecture -- Single firewall architecture with a single IP subnet -- Single firewall architecture with multiple IP subnets -- Multilayer firewall architecture -- Firewall sandwich design -- Demilitarized Zone -- DMZ to Internal Access Policy -- OSI model versus TCP/IP model -- Firewall performance, capabilities, and function -- Firewall management -- Application proxies -- Detecting firewalls -- Debugging tools -- Summary -- Questions -- Further Reading -- Chapter 11: VPN and WAN Encryption -- Overview -- Classes of VPN -- Type of VPN protocol -- Point-to-Point tunneling protocol -- Layer 2 Tunneling Protocol -- Secure Socket Tunneling protocol -- Internet Protocol Security -- SSL VPN…”
Libro electrónico -
2927Publicado 2024Tabla de Contenidos: “…-- .NET to JavaScript -- Global JavaScript (the old way) -- JavaScript Isolation -- JavaScript to .NET -- Static .NET method call -- Instance method call -- Implementing an existing JavaScript library -- JavaScript interop in WebAssembly -- .NET to JavaScript -- JavaScript to .NET -- Summary -- Chapter 11: Managing State - Part 2 -- Technical requirements -- Storing data on the server side -- Storing data in the URL -- Route constraints -- Using a query string -- Implementing browser storage -- Creating an interface -- Implementing Blazor Server (InteractiveServer) -- Implementing WebAssembly (InteractiveWebAssembly) -- Implementing the shared code -- Using an in-memory state container service -- Implementing real-time updates on Blazor Server -- Implementing real-time updates on Blazor WebAssembly -- State management frameworks -- Root-level cascading values -- Summary -- Chapter 12: Debugging the Code -- Technical requirements -- Making things break -- Debugging Blazor Server -- Debugging Blazor WebAssembly -- Debugging Blazor WebAssembly in the web browser -- Hot Reload -- Summary -- Chapter 13: Testing -- Technical requirements -- What is bUnit? …”
Libro electrónico -
2928Publicado 2023Tabla de Contenidos: “…-- Components of an IRP -- Preparation of an IRP -- Understanding what is important -- Prioritization -- Determining what normal network activity looks like -- Observe, orient, decide, and act -- Incident response procedure development -- Identification - detection and analysis -- Identification - incident response tools -- Observational technical tools -- Orientation tools -- Decision tools -- Remediation - containment/recovery/mitigation -- Remediation - incident response tools -- Act (response) tools -- Post-incident activity -- Remediation - root cause analysis -- Lessons-learned sessions -- IRP testing -- Summary -- Chapter 9: Developing a Security Operations Center -- What is a SOC? …”
Libro electrónico -
2929por Knights, DavidTabla de Contenidos: “…What critical leadership studies can learn from (reading) Plato -- Introduction -- The Platonic roots of leadership studies -- Two Platos -- A critical reading of the Republic on leadership -- Epistemological doubt in establishing the ideal of leadership -- Ideals of leadership and the necessity of violence -- Implications for critical leadership studies -- Note -- References -- 5. …”
Publicado 2024
Libro electrónico -
2930por Jakobsen, Adam TilmarTabla de Contenidos: “…6.4.9.8 Browser Password -- 6.4.9.9 Supercookies -- 6.4.10 Mail -- 6.4.10.1 Mail Archives -- 6.4.10.2 Offline Folder Files -- 6.4.10.3 Unread Mail -- 6.4.11 Persistence -- 6.4.11.1 Auto Start Programs -- 6.4.11.2 Scheduled Tasks -- 6.4.11.3 Service -- 6.4.12 Evidence Destruction -- 6.4.12.1 Log Clearing -- 6.4.12.2 File Deletion Detection Using J -- 6.5 Summary -- Chapter 7 macOS Forensics -- 7.1 File System -- 7.1.1 Native File Types -- 7.2 Security -- 7.3 Acquisition -- 7.3.1 Memory -- 7.3.1.1 Hibernation and RAM -- 7.4 Analysis -- 7.5 Evidence Location -- 7.5.1 System Configuration -- 7.5.2 User Accounts and Activity -- 7.5.2.1 Keychain -- 7.5.2.2 Notes -- 7.5.2.3 Recent Items -- 7.5.3 System Logs -- 7.5.4 Browser Usage -- 7.5.5 Email -- 7.5.6 Persistence Mechanisms -- 7.5.6.1 Login Item -- 7.5.6.2 Launch Items (Agents and Daemons) -- 7.5.6.3 Log In/Log Out Hooks -- 7.5.6.4 Dynamic Libraries (dylib) -- 7.5.6.5 At Tasks -- 7.5.6.6 Event Monitor Rules -- 7.5.6.7 Re‐opened Applications -- 7.5.7 Evidence of Destruction -- 7.6 Summary -- Chapter 8 Linux Forensics -- 8.1 File System -- 8.1.1 File System Timestamps -- 8.2 Security -- 8.3 Acquisition -- 8.3.1 Dump Memory -- 8.4 Analysis -- 8.4.1 chroot -- 8.5 Evidence Location -- 8.5.1 System Info -- 8.5.1.1 System Version -- 8.5.1.2 Computer Name -- 8.5.1.3 Localtime Settings -- 8.5.1.4 Boot Logs -- 8.5.1.5 Kernel Logs -- 8.5.1.6 Apt Install Repository Sources -- 8.5.1.7 Hosts File -- 8.5.1.8 Root UUID -- 8.5.1.9 Services -- 8.5.1.10 Syslogs -- 8.5.1.11 Background Processes -- 8.5.1.12 Disk Partitions -- 8.5.2 User Activity -- 8.5.2.1 Accounts and Groups -- 8.5.2.2 Group Information -- 8.5.2.3 Command History -- 8.5.2.4 Authentication -- 8.5.2.5 Last Login -- 8.5.2.6 Failed Logon Attempts -- 8.5.2.7 Installation of Software -- 8.5.2.8 File Edit -- 8.5.3 Network -- 8.5.3.1 Interfaces…”
Publicado 2024
Libro electrónico -
2931Publicado 2021Tabla de Contenidos: “…-- The testing pyramid -- Non-functional testing -- Regression testing -- Root cause analysis -- The groundwork for further improvement -- Introducing testing frameworks -- GTest examples -- Catch2 examples -- CppUnit examples -- Doctest examples -- Testing compile-time code -- Understanding mocks and fakes -- Different test doubles -- Other uses for test doubles -- Writing test doubles -- GoogleMock example -- Trompeloeil example -- Test-driven class design -- When tests and class design clash -- Defensive programming -- The boring refrain - write your tests first -- Automating tests for continuous integration/continuous deployment -- Testing the infrastructure -- Testing with Serverspec -- Testing with Testinfra -- Testing with Goss -- Summary -- Questions -- Further reading -- Chapter 9: Continuous Integration and Continuous Deployment -- Technical requirements -- Understanding CI -- Release early, release often -- Merits of CI -- Gating mechanism -- Implementing the pipeline with GitLab -- Reviewing code changes…”
Libro electrónico -
2932Publicado 2018Tabla de Contenidos: “…Chapter 4: Endpoint Security and Trustworthiness -- Defining an IIoT endpoint -- Motivation and risk-based endpoint protection -- Resource-constrained endpoint protection -- Brownfield scenario considerations -- Endpoint security enabling technologies -- IIoT endpoint vulnerabilities -- Case study - White hack exposes smart grid meter vulnerability -- Use case -- Developing the exploit -- Demonstration -- Establishing trust in hardware -- Hardware security components -- Root of trust - TPM, TEE, and UEFI -- Securing secrets, or sealing -- Endpoint identity and access control -- Initialization and boot process integrity -- Establishing endpoint trust during operations -- Secure updates -- A trustworthy execution ecosystem -- Endpoint data integrity -- Endpoint configuration and management -- Endpoint visibility and control -- Endpoint security using isolation techniques -- Process isolation -- Container isolation -- Virtual isolation -- Physical isolation -- Endpoint physical security -- Machine learning enabled endpoint security -- Endpoint security testing and certification -- Endpoint protection industry standards -- Summary -- Chapter 5: Securing Connectivity and Communications -- Definitions - networking, communications, and connectivity -- Distinguishing features of IIoT connectivity -- Deterministic behavior -- Interoperability - proprietary versus open standards -- Performance characteristics - latency, jitter, and throughput -- Legacy networks with disappearing air gaps -- Access to resource-constrained networks -- Massive transition by connecting the unconnected -- IIoT connectivity architectures -- Multi-tier IIoT-secured connectivity architecture -- Layered databus architecture -- Controls for IIoT connectivity protection -- Secure tunnels and VPNs -- Cryptography controls -- Network segmentation -- Industrial demilitarized zones…”
Libro electrónico -
2933Publicado 2023Tabla de Contenidos: “…System-State Backup -- Restore Methods -- Backup Validation -- Media Inventory Before Restoration -- Explain the Importance of Disaster Recovery -- Site Types -- Replication -- Testing -- Summary -- Exam Essentials -- Review Questions -- Chapter 10 Troubleshooting Hardware and Software Issues -- Explain the Troubleshooting Theory and Methodology -- Identify the Problem and Determine the Scope -- Establish a Theory of Probable Cause (Question the Obvious) -- Test the Theory to Determine the Cause -- Establish a Plan of Action to Resolve the Problem -- Implement the Solution or Escalate -- Verify Full System Functionality and, if Applicable, Implement Preventive Measures -- Perform a Root Cause Analysis -- Document Findings, Actions, and Outcomes Throughout the Process -- Given a Scenario, Troubleshoot Common Hardware Failures -- Common Problems -- Causes of Common Problems -- Tools and Techniques -- Given a Scenario, Troubleshoot Common OS and Software Problems -- Common Problems -- Causes of Common Problems -- OS and Software Tools and Techniques -- Summary…”
Libro electrónico -
2934por Lee, ThomasTabla de Contenidos: “…. -- Chapter 4: Managing Active Directory -- Introduction -- The systems used in the chapter -- Installing a Forest Root Domain -- Getting ready -- How to do it... -- How it works... -- There's more... -- Testing an AD installation -- Getting ready -- How to do it... -- How it works... -- There's more... -- Installing a Replica Domain Controller -- Getting ready -- How to do it... -- How it works... -- There's more... -- Installing a Child Domain -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating and Managing AD Users and Groups -- Getting ready -- How to do it... -- How it works... -- There's more... -- Managing AD Computers -- Getting ready -- How to do it... -- How it works... -- There's more... -- Adding/Removing Users Using a CSV Files -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating Group Policy Objects -- Getting ready -- How to do it... -- How it works... -- There's more... -- Reporting on AD Users -- Getting ready -- How to do it... -- How it works…”
Publicado 2023
Libro electrónico -
2935Publicado 2023Tabla de Contenidos: “…Understanding Research-Based Techniques -- Starting with document analysis -- Understanding the benefits of document analysis -- Perusing examples of documents you can review -- Distributing surveys -- Dressing for the occasion: Types of surveys -- Maximizing the chances of getting a response -- Compiling and using the data -- Doing interface analysis -- Reverse engineering -- Choosing competitive analysis -- Mining for data -- Understanding Collaborative Techniques -- Conducting interviews -- Preparing for the interview -- Interviewing the stakeholder -- Documenting the interview -- Brainstorming techniques -- Crazy 8s -- Mind mapping -- Reverse brainstorming -- Edward de Bono's Six Thinking Hats -- Getting to know requirements workshops -- Identifying the participants -- Scheduling a workshop -- Managing the session -- Considering focus groups -- Using personas for empathy -- Walking through the customer journey -- Employing collaborative games -- Understanding Experimental Techniques -- Looking out for observation -- Knowing when to use observation -- Choosing your observation method and completing the process -- Prototyping -- Throwaway prototypes -- Evolutionary prototypes -- Simulation prototypes -- Chapter 8 Uncovering and Analyzing Needs -- Investigating the Needs -- Discovering a company's specific business needs -- Breaking down obstacles -- Asking performance-related questions -- Searching out stakeholder needs -- Identifying what stakeholders need -- Understanding how stakeholders work together -- Uncovering the Root Cause -- Evaluating the Problem -- Choosing a good problem to solve -- Figuring out whether the problem matters -- Determining the impact of the problem -- Establishing the costs and benefits -- Creating the Problem Statement -- Creating the Solution Position Statement -- Knowing When You Have the Right Solution…”
Libro electrónico -
2936Publicado 2024Tabla de Contenidos: “…-- Configuring SageMaker roles -- Deploying the LLM Twin model to AWS SageMaker -- Calling the AWS SageMaker Inference endpoint -- Building the business microservice using FastAPI -- Autoscaling capabilities to handle spikes in usage -- Registering a scalable target -- Creating a scalable policy -- Minimum and maximum scaling limits -- Cooldown period -- Summary -- References -- Chapter 11: MLOps and LLMOps -- The path to LLMOps: Understanding its roots in DevOps and MLOps -- DevOps -- The DevOps lifecycle -- The core DevOps concepts -- MLOps…”
Libro electrónico -
2937por Hahn, Marcelo GuerraTabla de Contenidos: “…Singleton -- Factory -- Adapter -- Composite -- Observer -- Command -- Applying design patterns -- The problem -- Trade-offs -- Systemwide impact -- Users -- Using domain-driven design -- An example of a real-world project -- Summary -- Questions -- Further reading -- Chapter 12: Incorporating Design Patterns in C++ Applications -- Technical requirements -- Design patterns in game development -- The singleton pattern -- The factory pattern -- The flyway pattern -- Design patterns in data-intensive applications -- The proxy pattern -- The decorator pattern -- The iterator pattern -- Design patterns in enterprise applications -- SOA -- Summary -- Questions -- Further reading -- Chapter 13: Networking and Security -- Technical requirements -- Introduction to networks, the OSI model, and network programming using sockets -- The OSI model -- Network applications under the hood -- Programming network applications using sockets -- Understanding network protocols -- Designing an echo server -- Securing applications -- Securing network applications -- Summary -- Questions -- Further reading -- Chapter 14: Debugging and Testing -- Technical requirements -- Understanding the root cause of an issue -- RCA overview -- Prevention is better than cure - good coding behavior -- The uninitialized variable problem -- Side effects in compound expressions -- Mixed signed and unsigned problems -- Order of evaluation problem -- Compile-time checking versus runtime checking -- Avoiding memory leaks -- Debugging programs -- Tools for debugging a C/C++ program -- GDB overview -- Examples of GDB -- Setting breakpoints and inspection variable values -- Practical debugging strategies -- Static and dynamic analysis -- Static analysis -- Dynamic analysis -- Testing, TDD, and BDD -- Unit testing -- TDD -- BDD -- Summary -- Further reading…”
Publicado 2023
Libro electrónico -
2938por Manoel, EdsonTabla de Contenidos: “…Troubleshooting overview -- Communication between end-to-end components -- Location of the root directories -- Tivoli common directory -- Log and trace files -- End-to-end Automation Management Component automation engine -- End-to-end Automation Management Component automation manager -- End-to-end Automation Adapter -- IBM Tivoli System Automation for Multiplatforms Operations Console -- The log viewer tool -- The TraceWizard utility -- Appendix B. …”
Publicado 2005
Libro electrónico -
2939por Liberty, JesseTabla de Contenidos: “…Use of Logical Operators with Conditionals -- Operator Precedence -- The Ternary Operator -- Preprocessor Directives -- Defining Identifiers -- Undefining Identifiers -- #if, #elif, #else, and #endif -- #region -- Classes and Objects -- Defining Classes -- Access Modifiers -- Method Arguments -- Creating Objects -- Constructors -- Initializers -- The ICloneable Interface -- The this Keyword -- Using Static Members -- Invoking Static Methods -- Using Static Constructors -- Static Classes -- Using Static Fields -- Destroying Objects -- The C# Destructor -- Destructors Versus Dispose -- Implementing the Close() Method -- The using Statement -- Passing Parameters -- Passing by Reference -- Overcoming Definite Assignment with out Parameters -- Overloading Methods and Constructors -- Encapsulating Data with Properties -- The get Accessor -- The set Accessor -- Property Access Modifiers -- readonly Fields -- Inheritance and Polymorphism -- Specialization and Generalization -- Inheritance -- Implementing Inheritance -- Polymorphism -- Creating Polymorphic Types -- Creating Polymorphic Methods -- Calling Base Class Constructors -- Controlling Access -- Versioning with the new and override Keywords -- Abstract Classes -- Limitations of Abstract -- Sealed Class -- The Root of All Classes: Object -- Boxing and Unboxing Types -- Boxing Is Implicit -- Unboxing Must Be Explicit -- Nesting Classes -- Operator Overloading -- Using the operator Keyword -- Supporting Other .NET Languages -- Creating Useful Operators -- Logical Pairs -- The Equality Operator -- Conversion Operators -- Structs -- Defining Structs -- Creating Structs -- Structs as Value Types -- Creating Structs Without new -- Interfaces -- Defining and Implementing an Interface -- Implementing More Than One Interface -- Extending Interfaces -- Combining Interfaces -- Casting to extended interfaces…”
Publicado 2001
Libro electrónico -
2940Publicado 2017Tabla de Contenidos: “…Approach for automatic security updates installation -- Developing a process to update servers regularly -- Knowledge base -- Challenges on a larger scale -- Partitioning and LUKS -- Partitioning schemes -- A separate partition for /boot -- A separate partition for /tmp -- A separate partition for /home -- Conclusion -- LUKS -- Introduction to LUKS -- Solution -- Conclusion -- Access control list -- Use case -- Introduction to Access Control List -- Set ACL -- Show ACL -- Special permissions in Linux -- SUID -- Use case for SUID -- Understanding the permission associated with ping -- Setting a SUID bit for files -- Removing the SUID bit for files -- SETGID -- Associating the SGID for files -- SELinux -- Introduction to SELinux -- Permission sets in SELinux -- SELinux modes -- Confinement of Linux users to SELinux users -- Process confinement -- Conclusion -- Hardening system services and applications -- Hardening services -- Guide for hardening SSH -- Enable multi-factor authentication -- Associated configuration -- Changing the SSH default port -- Associate configuration -- Disabling the root login -- Associated configuration -- Conclusion -- Pluggable authentication modules -- Team Screen application -- File Sharing Application -- Understanding PAM -- The architecture of PAM -- The PAM configuration -- The PAM command structure -- Implementation scenario -- Forcing strong passwords -- Log all user commands -- Conclusion -- System auditing with auditd -- Introduction to auditd -- Use case 1 - tracking activity of important files -- Use case -- Solution -- First field -- Use case 2 - monitoring system calls -- Introduction to system calls -- Use case -- Solution -- Conclusion -- Conclusion -- Central identity server -- Use Case 1 -- Use case 2 -- The architecture of IPA -- Client-server architecture -- User access management…”
Libro electrónico