Mostrando 24,741 - 24,760 Resultados de 25,897 Para Buscar '"internet"', tiempo de consulta: 0.18s Limitar resultados
  1. 24741
    Tabla de Contenidos: “…Standards overview -- Open source -- Standards organizations -- IETF - Internet Engineering Task Force -- W3C - World Wide Web Consortium -- JCP - Java Community Process -- OASIS - Organization for the Advancement of Structured Information Standards -- WS-I - Web Services Interoperability Organization -- DMTF - Distributed Management Task Force -- GGF - Global Grid Forum -- OMG - Object Management Group -- Key standards -- XML standards…”
    Libro electrónico
  2. 24742
    por Doll-Steinberg, Daniel
    Publicado 2023
    Tabla de Contenidos: “…Cover Page -- Title Page -- Copyright Page -- Contents -- Foreword -- Preface -- Tracking the Exponential -- A World Rebooting -- Introduction -- Where the World Is Now -- 2030: A New Future -- 1998: So Last Century -- Humans 2.0 -- Devices -- People Going Binary-Computers Going Quantum -- Part I Important Technologies You Cannot Ignore -- Chapter 1 Foundational Technologies -- Artificial Intelligence -- GPT -- Benefits of GPT -- Risks of GPT -- AI Foundation Models -- Other Key Players -- Quantum Computing -- Quantum Theory -- Quantum Computing -- Sources of Data -- Advanced Communications -- Wired -- Wireless -- Cellular -- Moving into the Future -- Satellite -- Key Takeaways -- Chapter 2 Enabling Technology -- Blockchain -- Blockchain Mechanisms -- Proof of Work -- Proof of Stake -- Proof of Assignment -- Mining -- Forking and 51 Percent Attacks -- The Future of the Blockchain -- Smart Contracts -- Decentralized Autonomous Organizations -- Tokenization -- Types of Tokens -- Functional Types and Uses of Tokens -- The Benefits of Tokenization -- Bitcoin and Cryptocurrency -- Structure -- Systemic Constraints -- User Constraints -- Other Cryptocurrencies -- The Future of the Cryptocurrency Industry -- Key Takeaways -- Chapter 3 Consumer-Facing Hardware Technologies -- Robotics -- Industrial Automation -- Additive Manufacturing (3D and 4D Printing) -- Internet of Things -- Virtual Reality and Augmented Reality -- Virtual Reality -- Augmented Reality -- Key Takeaways -- Chapter 4 Important Uses of Technologies You Cannot Ignore -- The Metaverse -- Energy -- Sourcing -- Solar -- Wind -- Geothermal -- Hydrogen Fuel Cells -- Nuclear Fission and Fusion -- Energy Storage -- Energy Transmission and Distribution -- Use of Frontier Technologies in the Up-Front Design and Planning of the Grid -- Use -- The Bioeconomy and Biodigital Convergence…”
    Libro electrónico
  3. 24743
    Publicado 2021
    Tabla de Contenidos: “…Discussion and outlook -- 9.1 Summary and new insights -- 9.1.1 New insights into the mandate period -- 9.1.2 New insights into the post‐mandate period -- 9.2 Implications for other human rights NGOs -- 9.3 The study's theoretical contribution -- 9.3.1 Ways that comparatively powerless actors can influence norm emergence -- 9.3.2 Reasons for limited norm diffusion -- 9.4 Outlook -- Appendix -- Appendix 1: Coordinators of the Intersectional Women's Network IWN -- Appendix 2: Additional graphs and figures -- Appendix 3: AI's statute, mandate, and mission -- Sources and Literature -- Sources -- Amnesty International archive -- Archive of the Swiss section of Amnesty International, Bern -- Archive of the German section of Amnesty International, Berlin -- Private archives -- Archival Material -- Interview Material -- Internet Documents -- Literature -- List of abbreviations…”
    Libro electrónico
  4. 24744
    Publicado 2021
    Tabla de Contenidos: “…Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Foreword I -- Foreword II -- Preface -- Teams -- Acknowledgments -- Author -- Part I: Introduction -- Chapter 1 ◾ SRv6 Background -- 1.1 OVERVIEW OF INTERNET DEVELOPMENT -- 1.2 START OF ALL IP 1.0: A COMPLETE VICTORY FOR IP -- 1.2.1 Competition between ATM and IP -- 1.2.2 MPLS: The Key to All IP 1.0 -- 1.3 CHALLENGES FACING ALL IP 1.0: IP/MPLS DILEMMA -- 1.3.1 MPLS Dilemma -- 1.3.2 IPv4 Dilemma -- 1.3.3 Challenges for IPv6 -- 1.4 OPPORTUNITIES FOR ALL IP 1.0: SDN AND NETWORK PROGRAMMING -- 1.4.1 OpenFlow -- 1.4.2 POF -- 1.4.3 P4 -- 1.4.4 SR -- 1.5 KEY TO ALL IP 2.0: SRv6 -- 1.6 STORIES BEHIND SRv6 DESIGN -- REFERENCES -- Part II: SRv6 1.0 -- Chapter 2 ◾ SRv6 Fundamentals -- 2.1 SRv6 OVERVIEW -- 2.2 NETWORK INSTRUCTIONS: SRv6 SEGMENTS -- 2.3 NETWORK NODES: SRv6 NODES -- 2.3.1 SRv6 Source Node -- 2.3.2 Transit Node -- 2.3.3 Endpoint Node -- 2.4 NETWORK PROGRAM: SRv6 EXTENSION HEADER -- 2.4.1 SRv6 Extension Header Design -- 2.4.2 SRH TLVs -- 2.4.2.1 Padding TLV -- 2.4.2.2 HMAC TLV -- 2.4.3 SRv6 Instruction Set: Endpoint Node Behaviors -- 2.4.3.1 End SID -- 2.4.3.2 End.X SID -- 2.4.3.3 End.T SID -- 2.4.3.4 End.DX6 SID -- 2.4.3.5 End.DX4 SID -- 2.4.3.6 End.DT6 SID -- 2.4.3.7 End.DT4 SID -- 2.4.3.8 End.DT46 SID -- 2.4.3.9 End.DX2 SID -- 2.4.3.10 End.DX2V SID -- 2.4.3.11 End.DT2U SID -- 2.4.3.12 End.DT2M SID -- 2.4.3.13 End.B6.Insert SID -- 2.4.3.14 End.B6.Encaps SID -- 2.4.3.15 End.BM SID -- 2.4.4 SRv6 Instruction Set: Source Node Behaviors -- 2.4.4.1 H.Insert -- 2.4.4.2 H.Encaps -- 2.4.4.3 H.Encaps.L2 -- 2.4.5 SRv6 Instruction Set: Flavors -- 2.4.5.1 PSP -- 2.4.5.2 USP -- 2.4.5.3 USD -- 2.5 NETWORK PROGRAM EXECUTION: SRv6 PACKET FORWARDING -- 2.5.1 Local SID Table -- 2.5.2 Packet Forwarding Process -- 2.5.2.1 Step 1: Processing on SRv6 Source Node A.…”
    Libro electrónico
  5. 24745
    Publicado 2022
    Tabla de Contenidos: “…253 Table of Contents ntroduction 1 About This Book 1 Foolish Assumptions 2 Icons Used in This Book 3 Beyond the Book 3 Where to Go from Here 4 Part 1: Getting to Know Security Awareness 5 Chapter 1: Knowing How Security Awareness Programs Work 7 Understanding the Benefits of Security Awareness 8 Reducing losses from phishing attacks 8 Reducing losses by reducing risk 9 Grasping how users initiate loss 10 Knowing How Security Awareness Programs Work 11 Establishing and measuring goals 12 Showing users how to "do things right" 14 Recognizing the Role of Awareness within a Security Program 15 Disputing the Myth of the Human Firewall 16 Chapter 2: Starting On the Right Foot: Avoiding What Doesn't Work 19 Making a Case Beyond Compliance Standards 20 Treating Compliance as a Must 21 Motivating users to take action 22 Working within the compliance budget 22 Limiting the Popular Awareness Theories 23 Applying psychology to a diverse user base 23 Differentiating between marketing and awareness 24 Distinguishing Social Engineering from Security Awareness 26 Addressing Mental Models That Don't Work 27 Making Perfection the Stated Goal 28 Measuring from the Start 29 Prioritizing Program Over Product 29 Choosing Substance Over Style 30 Understanding the Role of Security Awareness 31 Chapter 3: Applying the Science Behind Human Behavior and Risk Management 33 Achieving Common Sense through Common Knowledge 34 Borrowing Ideas from Safety Science 35 Recognizing incidents as system failures 36 Responding to incidents 37 Applying Accounting Practices to Security Awareness 37 Applying the ABCs of Awareness 39 Benefiting from Group Psychology 40 The ABCs of behavioral science 41 The Fogg Behavior Model 42 Relating B:MAP to the ABCs of awareness and behavior 43 The Forgetting Curve 44 Remembering That It's All About Risk 45 Optimizing risk 46 The risk formula 46 Part 2: Building a Security Awareness Program 51 Chapter 4: Creating a Security Awareness Strategy 53 Identifying the Components of an Awareness Program 54 Choosing effective communications tools 55 Picking topics based on business drivers 56 Knowing when you're a success 57 Figuring Out How to Pay for It All 58 Chapter 5: Determining Culture and Business Drivers 61 Understanding Your Organization's Culture 62 Determining security culture 64 Recognizing how culture relates to business drivers 65 Identifying Subcultures 65 Interviewing Stakeholders 67 Requesting stakeholder interviews 67 Scheduling the interviews 70 Creating interview content 70 Taking names 72 Partnering with Other Departments 72 Chapter 6: Choosing What to Tell The Users 75 Basing Topics on Business Drivers 76 Incorporating Personal Awareness Topics 76 Motivating Users to Do Things "Right" 77 Common Topics Covered in Security Awareness Programs 79 Phishing 79 Social engineering 80 Texting and instant messaging security 80 Physical security 81 Malware 81 Ransomware 81 Password security 82 Cloud security 82 USB device security 82 Internet of Things 83 Travel security 83 Wi-Fi security 84 Mobile devices 84 Work from home 84 Basic computer security 85 Insider threat 85 Protecting children on the internet 85 Social media security 86 Moving security 86 Compliance topics 87 Chapter 7: Choosing the Best Tools for the Job 89 Identifying Security Ambassadors 90 Finding ambassadors 90 Maintaining an ambassador program 91 Knowing the Two Types of Communications Tools 92 Reminding users to take action 93 Requiring interaction from users 93 Exploring Your Communications Arsenal 95 Knowledgebase 95 Posters 96 Hardcopy newsletters 97 Monitor displays 97 Screen savers 98 Pamphlets 98 Desk drops 99 Table tents 99 Coffee cups or sleeves 99 Stickers 100 Mouse pads 100 Pens and other useful giveaways 100 Camera covers 101 Squishy toys and other fun giveaways 101 Active communications tools 101 Chapter 8: Measuring Performance 107 Knowing the Hidden Cost of Awareness Efforts 108 Meeting Compliance Requirements 109 Collecting Engagement Metrics 111 Attendance metrics 111 Likability metrics 112 Knowledge metrics 112 Measuring Improved Behavior 113 Tracking the number of incidents 113 Examining behavior with simulations 114 Tracking behavior with gamification 116 Demonstrating a Tangible Return on Investment 116 Recognizing Intangible Benefits of Security Awareness 117 Knowing Where You Started: Day 0 Metrics 118 Part 3: Putting Your Security Awareness Program Into Action 119 Chapter 9: Assembling Your Security Awareness Program 121 Knowing Your Budget 122 Finding additional sources for funding 123 Allocating for your musts 125 Limiting your discretionary budget 126 Appreciating your team as your most valuable resource 126 Choosing to Implement One Program or Multiple Programs 127 Managing multiple programs 128 Beginning with one program 128 Gaining Support from Management 129 Devising a Quarterly Delivery Strategy 131 Ensuring that your message sticks 133 Distributing topics over three months 133 Deciding Whether to Include Phishing Simulations 136 Planning Which Metrics to Collect and When 137 Considering metrics versus topics 137 Choosing three behavioral metrics 138 Incorporating Day 0 metrics 138 Scheduling periodic updates 138 Biasing your metrics 139 Branding Your Security Awareness Program 139 Creating a theme 139 Maintaining brand consistency 140 Coming up with a catchphrase and logo 140 Promoting your program with a mascot 140 Chapter 10: Running Your Security Awareness Program 143 Nailing the Logistics 144 Determining sources or vendors 144 Scheduling resources and distribution 145 Contracting vendors 145 Recognizing the role of general project management 146 Getting All Required Approvals 146 Getting the Most from Day 0 Metrics 147 Creating Meaningful Reports 149 Presenting reports as a graphical dashboard 149 Adding index scores 152 Creating an awareness index 152 Reevaluating Your Program 153.…”
    Libro electrónico
  6. 24746
    por Núria Vilanova
    Publicado 2017
    “…Con prólogo de la ministra de Sanidad , Servicios Sociales e Igualdad e introducción del presidente de MapfreTodo lo que necesitas saber sobre los jóvenes que han dejado viejos a los millennialsSi no encuentras ninguna relación entre Justin Bieber y los ingenieros que diseñaron los complejos protocolos de la World Wide Web; si te parece que un muro invisible di culta la comunicación con tus hijos, sobrinos, trabajadores o alumnos menores de 23 años, es hora de que conozcas a la generación Z -la de los hombres y las mujeres nacidos a mediados de la década de 1990- y la manera en que internet ha cambiado su forma de ser.Generación Z te ayudará a no sentirte como un extraño cuando hables con tus amigos más jóvenes, a entender la jerga de la prensa económica y a situar a las personas con las que te relacionas en las distintas generaciones: baby boomers, generación X o millennials, entre otras.Aunque los autores de estas páginas son conscientes del riesgo de presentar una perspectiva de un grupo de personas compuesto por más de dos mil millones, con casi ocho millones de personas en España y algo más del 25 % de la población mundial, esta obra, basada en investigaciones académicas -algunas dirigidas por ellos mismos-, es una tentativa de dar rostro a esta generación.Esperamos que nos acompañes en este viaje…”
    Texto completo en Odilo
    Otros
  7. 24747
    por José Pérez Chávez
    Publicado 2017
    “…Para que puedan deducir en el ISR los pagos de sueldos, salarios y conceptos asimilados a estos, los mismos deberán estar amparados con comprobantes fiscales digitales por Internet o factura electrónica (CFDI). 2. Los pagos que a su vez sean ingresos exentos para los trabajadores no serán deducibles en el ISR hasta por la cantidad que resulte de aplicar el factor de 0.53 al monto de dichos pagos; el factor será de 0.47 cuando las prestaciones que otorguen a favor de sus trabajadores que a su vez sean ingresos exentos para los mismos, en el ejercicio de que se trate, no disminuyan con respecto a las otorgadas en el ejercicio inmediato anterior. …”
    Texto completo en Odilo
    Otros
  8. 24748
    por Martínez, José M.
    Publicado 2018
    “…Mediante la realidad virtual, podemos adentrarnos en mundos y entornos inexistentes y mediante la realidad aumentada podemos combinar el mundo real con el virtual, añadiendo todo tipo de experiencias interactivas al mundo que nos rodea.Debido a la Transformación Digital que actualmente se produce en todos los aspectos de la sociedad y en especial en el mundo empresarial, las llamadas tecnologías de visión (Realidad Virtual, Aumentada y Mixta) son junto con otros habilitadores digitales como el Internet de las Cosas (IoT) o la Impresión Aditiva, protagonistas de la nueva revolución industrial que se está desarrollando a partir del concepto llamado Industria 4.0Con este libro aprenderás a desarrollar aplicaciones que permiten utilizar la realidad virtual y aumentada haciendo uso de las distintas tecnologías creadas por los principales fabricantes, tales como Microsoft Windows Mixed Reality, Google ARCore, Apple ARKit o Vuforia, además de conocer los conceptos específicos de diseño de este tipo de aplicaciones.Cada capítulo va acompañado de consejos y contenidos descargables para que aceleres al máximo tu aprendizaje…”
    Libro electrónico
  9. 24749
    por Martín Martos, Rosario
    Publicado 2022
    Tabla de Contenidos: “…Ordenadores personales: internet y correo electrónico -- 3. Ayudas técnicas para los ordenadores -- 4. …”
    Libro electrónico
  10. 24750
    Publicado 2011
    Tabla de Contenidos: “…-- Polis XXI, governância e planemanento urbano no norte de Portugal: impactos do programa de regeneração urbana -- Os impactos, provenientes da implantação de dois novos centros comerciais, para a cidade de Braga -- Algarve: dinâmicas sociodemográficas e políticas públicas -- Sociedade do conhecimento e territórios inteligentes: o sistema de conhecimento de Coimbra -- Infra-estrutura digital e inteligência dos territórios em Portugal: a internet, a world wide web e as empresas -- Carta de equipamentos desportivos da amadora -- Alta velocidade: as estratégias de implementação e os efeitos da estação -- Aplicação do conceito de eco-bairro num bairro do município da Amadora: uma abordagem experimental -- A casa da ilha e a casa do bairro municipal: dois módulos na construção de morfologias de padrão geométrico -- Planeamento e gestão urbanística municipal: repercussões no desenvolvimento recente da cidade de Setúbal -- Modelação em sistemas de informação geográfica da avaliação da susceptibilidade a movimentos de vertente na área amostra de Lousa-Loures (Região a norte de Lisboa) -- A implementação de equipamentos estruturantes como factor de desenvolvimento do sistema urbano -- Modelação de redes territoriais: o caso do Interreg III C -- Memórias africanas, lugar europeu: a identidade do <<retornado>> -- Infra-estruturas de dados espaciais nos municípios: contributo para a definição de um modelo de implementação -- Aplicação de índices quantitativos na caracterização morfológica das cidades -- Modelação geográfica em Sig do risco de re-emergência de malária em Portugal Continental -- Licenciamento em águas públicas e cartografia: o caso do Rio Ave no início do século XX -- Políticas de prevenção rodoviária: um caso de geo-referenciação -- A geografia da criminalidade -- Orlando Ribeiro, a cidade e a transição paradigmática da geografia portuguesa nos anos sessenta -- Construção de modelos de avaliação de vulnerabilidade social a riscos naturais e tecnológicos: o desafio das escalas -- Os Sig e a construção de modelos territoriais no âmbito do planeamento municipal -- O rural em mudança: breve nota sobre os processos de urbanização -- Capital humano e desenvolvimento territorial: diferenças de género -- SIGMDL: portal de informação geográfica -- Nova métrica focal do acidentado do terreno: avaliação dos efeitos de escala e de contexto -- Imigração em Portugal -- A emigração na ilha Graciosa: estudo de caso dos emigrantes graciosenses nos estados da Califórnia e Massachusetts (EUA) -- Os SIG na fiscalidade municipal: aplicação ao cálculo e gestão da TRMIU -- Centralidades urbanas: tempos e processos do noroeste de Portugal: a área central de Viana do Castelo -- Modelação da distribuição espaço-temporal da população da área metropolitana de Lisboa com recurso a parâmetros empíricos -- Classificação de imagens de satélite de alta resolução com introdução de dados lidar: aplicação à cidade de Lisboa -- Evolução dos caudais no rio…”
    Libro electrónico
  11. 24751
    Publicado 2016
    “…Wireless networks represent an inexpensive and convenient way to connect to the Internet. However, despite their applications across several technologies, one challenge still remains: to understand the behavior of wireless sensor networks and assess their performance in large-scale scenarios. …”
    Libro electrónico
  12. 24752
    Publicado 2019
    “…The text discusses, for example, the Internet of Things (IoT) and how to keep networks reliable and secure when they are constantly accessed by many different devices with varying levels of user involvement and competence. 5G Explained is primarily designed for specialists who need rapid acclimation to the possibilities and concerns presented by 5G adoption. …”
    Libro electrónico
  13. 24753
    Publicado 2017
    Tabla de Contenidos: “…-- 2.1.2 Streaming -- 2.1.3 Related Network Models -- 2.1.4 Physical Network Considerations -- 2.1.5 Internet Layer Considerations -- 2.1.6 Transport Layer Considerations -- 2.1.7 Applications -- Transport Protocols -- 2.1.8 Protocol Evolution -- 2.1.9 Format Evolution -- 2.2 Industry Evolution -- 2.2.1 "Stack Creep" -- 2.2.2 Real World -- Blue Chips and Video Delivery Networks -- 2.3 Consumer Adoption -- 2.3.1 The Audience -- 2.3.2 Traditional Ratings Companies and Audience Measurement -- 2.3.3 Streaming Media and Measurement -- 2.3.4 Predictions of Others -- 2.3.5 The Pending Collapse of the Value of Broadcasting to Advertisers -- 2.3.6 "Device Effect" and Formats -- 2.3.7 Video Formats (in Particular, Multicast and UDP) and Network Architecture -- 2.3.8 Discovery, Curation, and Social Media -- 2.4 Encode> Serve> Play -- 2.4.1 The Basic Building Blocks -- 2.4.2 The Acacia Patent -- 2.4.3 Akamai vs. …”
    Libro electrónico
  14. 24754
    Tabla de Contenidos: “…Die Verzahnung zwischen Wissenschaft und Wirtschaft verbessern -- Soziale Mobilität und Teilhabe durch Bildung sichern -- Ein dynamischeres Geschäftsumfeld und Unternehmertum fördern -- Wachstum und Innovationen von KMU unterstützen -- Clusterpolitik zur Förderung einer intelligenten Spezialisierung -- Unternehmertum in der MRH fördern -- Die Digitalisierung optimal nutzen -- Guter Zugang zu schnellem Internet -- E-Government: Die Digitalisierung nutzen, um den Zugang zu Dienstleistungen in der MRH zu verbessern -- Die Digitalisierung für intelligente Verkehrslösungen nutzen -- Anmerkungen -- Literaturverzeichnis -- Anhang 2.A Vergleich mit internationalen und deutschen Metropolregionen -- Kapitel 3 Förderung einer nachhaltigen und ausgewogenen Entwicklung in der Metropolregion Hamburg -- Einführung -- Wohnraum bezahlbarer machen und die Raumplanung effizienter gestalten -- Bezahlbaren Wohnraum schaffen und Lösungen für die wachsende Flächenkonkurrenz finden -- Mehr bezahlbaren Wohnraum zur Verfügung stellen -- Die fragmentierte Raumplanung überwinden, um Infrastrukturen langfristig zu planen -- Die Bezahlbarkeit von Wohnraum durch bessere Verzahnung und Abstimmung von Maßnahmen gewährleisten -- Das Wohnraumangebot auf den Bedarf abstimmen -- Eine kompakte Siedlungsentwicklung fördern -- Die Planung in der MRH noch besser abstimmen -- Das Mobilitätsmanagement verbessern und neue Technologien für eine bessere Verkehrsanbindung nutzen -- Unterschiede in der Verkehrsanbindung abbauen -- Die Anbindung ländlicher Räume verbessern -- Die Engpässe verringern und die Verbindungen nach Skandinavien ausbauen -- Auf regionaler Ebene zusammenarbeiten -- Die Mobilität in der MRH verbessern -- Verkehrs-, Wohnungsbau- und Flächennutzungsplanung integrieren -- Die Tarifsysteme in der Region harmonisieren…”
    Libro electrónico
  15. 24755
    Publicado 2018
    “…Die Ängste sehen etwa so aus: »Häufiger Internetkonsum macht süchtig, Kinder sind Cybermobbing und Betrügern ausgesetzt, sie werden eh nur abgezockt.« Online-Verbote für den Nachwuchs sind sicher keine gute Option, denn das lässt sich weder kontrollieren, noch wird es dem heutigen Mediennutzungsverhalten junger Menschen gerecht.Aufklärung tut also Not, denn nur wer versteht, was die sozialen Medien Kindern und Jugendlichen bieten und welche Gefahren sie tatsächlich bergen, kann bei ihrer Nutzung hilfreich zur Seite stehen.Das Buch erklärt alles, was Eltern, aber auch Lehrer und Pädagogen, wissen müssen: Was tun Kinder und Jugendliche eigentlich im Internet? Wie lassen sich persönliche Daten schützen? …”
    Libro electrónico
  16. 24756
    Publicado 2016
    “…Und alle Beispiele aus dem Buch, die Lösungen zu den Aufgaben sowie weiteres Material findest du als Download im Internet. Systemvoraussetzungen: Windows 7, 8 oder 10 Ab 10 Jahre, aber auch für Erwachsene, die eine wirklich einfache Einführung suchen…”
    Libro electrónico
  17. 24757
    Publicado 2016
    “…In addition, they detail the QOS management features found in modern routers used by Internet Service Providers (ISPs) and large enterprise companies and networks, all in an effort to enable network managers and engineers to configure production networks with a quality of service guarantee. …”
    Libro electrónico
  18. 24758
    Publicado 2018
    Tabla de Contenidos: “…-- How to Use This Book -- Contact Me -- Chapter 1: The Basics of Networking -- Network Architecture and Protocols -- The Internet Protocol Suite -- Data Encapsulation -- Headers, Footers, and Addresses -- Data Transmission -- Network Routing -- My Model for Network Protocol Analysis -- Final Words -- Chapter 2: Capturing Application Traffic -- Passive Network Traffic Capture -- Quick Primer for Wireshark -- Alternative Passive Capture Techniques -- System Call Tracing -- The strace Utility on Linux -- Monitoring Network Connections with DTrace -- Process Monitor on Windows -- Advantages and Disadvantages of Passive Capture -- Active Network Traffic Capture -- Network Proxies -- Port-Forwarding Proxy -- SOCKS Proxy -- HTTP Proxies -- Forwarding an HTTP Proxy -- Reverse HTTP Proxy -- Final Words -- Chapter 3: Network Protocol Structures -- Binary Protocol Structures -- Numeric Data -- Booleans -- Bit Flags -- Binary Endian -- Text and Human-Readable Data -- Variable Binary Length Data -- Dates and Times -- POSIX/Unix Time -- Windows FILETIME -- Tag, Length, Value Pattern -- Multiplexing and Fragmentation -- Network Address Information -- Structured Binary Formats -- Text Protocol Structures -- Numeric Data -- Text Booleans -- Dates and Times -- Variable-Length Data -- Structured Text Formats -- Encoding Binary Data -- Hex Encoding -- Base64 -- Final Words -- Chapter 4: Advanced Application Traffic Capture -- Rerouting Traffic -- Using Traceroute -- Routing Tables -- Configuring a Router -- Enabling Routing on Windows -- Enabling Routing on *nix -- Network Address Translation -- Enabling SNAT…”
    Libro electrónico
  19. 24759
    por Wesselius, Jaap
    Publicado 2023
    Tabla de Contenidos: “…Managing Workloads for Individual Users -- Summary -- Part II: Office 365 Integration -- Chapter 4: Azure AD Identities -- Cloud Identities -- Synchronized Identities -- Federated Identities -- Azure AD Connect -- AD Connect Deployment -- AD Connect Health -- Chapter 5: Exchange Online -- Exchange Hybrid Topologies -- Deploying Exchange Hybrid -- Hybrid Configuration Wizard -- PowerShell: Connecting to Office 365 -- Connecting to Exchange Online -- Connecting to Azure Active Directory -- OAuth -- Autodiscover in Exchange Hybrid -- Mailbox Migration -- Managing Remote Mailboxes -- Federation with Azure Active Directory -- Sharing of Information -- Organizational Relationships -- Sharing Policies -- Internet Calendar Publishing -- Mail Transport -- Inbound Mail -- Centralized Mail Transport -- Outbound Mail -- Enhanced Filtering -- Exchange Online Archiving -- Message Tracking -- Recipient Management Only -- Summary -- Part III: Security -- Chapter 6: Publishing Exchange Server -- Virtual Directories -- Namespaces -- Split DNS -- Certificates -- Requesting Certificates -- Exporting Certificates -- Importing Certificates -- Autodiscover -- Domain-Joined Clients -- Non-Domain-Joined Clients -- Autodiscover Redirect -- Autodiscover SRV Records -- Autodiscover V2 -- Client Connectivity -- Outlook -- MAPI over HTTP -- Web-Based Clients -- Offline Settings -- Outlook Apps -- Exchange Admin Center -- Exchange Web Services -- REST API -- Mobile Clients -- IMAP and POP -- High Availability -- Load Balancing -- Health Check Monitors -- SSL Offloading -- Load Balancer Transparency -- Up-Level and Down-Level Proxying -- Azure AD Application Proxy -- Azure Front Door -- Chapter 7: Email Authentication -- Sender Policy Framework -- Constructing the SPF Record -- Checking the SPF Record -- DKIM -- Exchange and DKIM -- DKIM and Exchange Online Protection -- DMARC…”
    Libro electrónico
  20. 24760
    Publicado 2017
    “…What You Will Learn Understand the REST API architecture and its benefits Write RESTful API web services in PHP 7 Address security-elated issues in a REST API Leverage the importance of automated testing and write tests for API endpoints Identify security flaws in our current API endpoints and tackle them effectively Observe the working of Lumen microframeworks and write RESTful web services in it In Detail REST is the most wide spread and effective standard to develop APIs for internet services. With the way PHP and its eco-system has modernized the way code is written by simplifying various operations, it is useful to develop RESTful APIs with PHP 7 and modern tools. …”
    Libro electrónico