Mostrando 181 - 200 Resultados de 1,060 Para Buscar 'Firefall~', tiempo de consulta: 1.72s Limitar resultados
  1. 181
    por Lockhart, Andrew
    Publicado 2007
    Tabla de Contenidos: “…Protect Your Computer with the Windows Firewall; Tracking Firewall Activity with a Windows Firewall Log; Problems with Email and the Windows Firewall; Hacking the Hack; See Also; 47. …”
    Libro electrónico
  2. 182
    Publicado 2013
    Tabla de Contenidos: “…7.6 Certificate Revocation List 282 -- 7.7 Certification Path Validation 287 -- 8 Network Layer Security 291 -- 8.1 IPsec Protocol 291 -- 8.2 IP Authentication Header 299 -- 8.3 IP ESP 301 -- 8.4 Key Management Protocol for IPsec 308 -- 9 Transport Layer Security: SSLv3 and TLSv1 325 -- 9.1 SSL Protocol 325 -- 9.2 Cryptographic Computations 338 -- 9.3 TLS Protocol 339 -- 10 Electronic Mail Security: PGP, S/MIME 353 -- 10.1 PGP 353 -- 10.2 S/MIME 372 -- 11 Internet Firewalls for Trusted Systems 387 -- 11.1 Role of Firewalls 387 -- 11.2 Firewall-Related Terminology 388 -- 11.3 Types of Firewalls 392 -- 11.4 Firewall Designs 398 -- 11.5 IDS Against Cyber Attacks 401 -- 11.6 Intrusion Detections Systems 404 -- 12 SET for E-Commerce Transactions 415 -- 12.1 Business Requirements for SET 415 -- 12.2 SET System Participants 417 -- 12.3 Cryptographic Operation Principles 418 -- 12.4 Dual Signature and Signature Verification 420 -- 12.5 Authentication and Message Integrity 424 -- 12.6 Payment Processing 427 -- 13 4G Wireless Internet Communication Technology 439 -- 13.1 Mobile WiMAX 440 -- 13.2 WiBro (Wireless Broadband) 448 -- 13.3 UMB (Ultra Mobile Broadband) 452 -- 13.4 LTE (Long Term Evolution) 457 -- Acronyms 467 -- Bibliography 473 -- Index 481.…”
    Libro electrónico
  3. 183
    Publicado 2007
    Tabla de Contenidos: “…Protecting Your Perimeter; Introduction; Firewall Types; Firewall Architectures; Implementing Firewalls; Providing Secure Remote Access; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. …”
    Libro electrónico
  4. 184
    por Babbin, Jacob
    Publicado 2006
    Tabla de Contenidos: “…Tracking Users' Web Activities with BroUsing Bro to Gather DNS and Web Traffic Data; Using Bro for Blackholing Traffic to Malware-Infested Domains; Using Bro to Identify Top E-Mail Senders/Receivers; Chapter 3 Firewall Reporting; Firewall Reporting: A Reflection of the Effectiveness of Security Policies; The Supporting Infrastructure for Firewall Log Management; Chapter 4 Systems and Network Device Reporting; Web Server Logs; Recon and Attack Information; Correlating Data with the Host System; Chapter 5 Creating a Reporting Infrastructure…”
    Libro electrónico
  5. 185
    Publicado 2010
    Tabla de Contenidos: “…Cover -- Contents -- Getting Started -- Part 1 Providing Network Services -- Chapter 1 Understanding the Domain Name System -- Using the DNS: The Big Picture -- Configuring a DNS Service -- Configuring the DNS with Server Admin -- Configuring DNS with BIND -- Creating Secure and Private DNS Servers -- Troubleshooting a DNS -- What You've Learned -- References -- Chapter Review -- Chapter 2 Using DHCP -- Understanding How DHCP Works -- Configuring a DHCP Service -- Configuring DHCP Using Server Admin -- Troubleshooting DHCP -- What You've Learned -- References -- Chapter Review -- Chapter 3 Network Address Translation/Gateway -- Using NAT -- Configuring a NAT Gateway -- Configuring NAT Using the Gateway Setup Assistant -- Using Server Admin to Configure NAT -- Troubleshooting NAT on Mac OS X Server -- What You've Learned -- References -- Chapter Review -- Part 2 Securing Systems and Services -- Chapter 4 Using a Firewall -- Understanding the Mac OS X Firewall -- Understanding the Mac OS X Server Firewall -- Configuring Client Systems Remotely -- Troubleshooting Your Firewall -- Security Considerations -- What You've Learned -- References -- Chapter Review -- Chapter 5 Virtual Private Networks -- Understanding VPNs -- Configuring VPN Service on Mac OS X Server -- Understanding Mac OS X Client VPN Connections -- Understanding iPhone VPN Connectivity -- Troubleshooting VPN Clients -- Troubleshooting VPN Servers -- Using Other VPN Options -- Security Considerations -- What You've Learned -- References -- Chapter Review -- Chapter 6 Keys and Certificates -- Using SSH and SSH Keys -- Understanding Certificates and PKI Basics -- Creating Certificates -- Using Certificates with Services -- Creating a CA to Sign Certificates -- Signing and Encrypting Email -- Troubleshooting Certificates -- Using 802.1x Network Authentication -- Using Smart Cards…”
    Libro electrónico
  6. 186
    por Conlan, Patrick J., 1978-
    Publicado 2009
    Tabla de Contenidos: “…; AAA; Securing Management Functions; Summary; Review Questions; Answers to Review Questions; Chapter 14: Switch Security; Introduction to Layer 2 Security; Securing Layer 2; Summary; Review Questions; Answers to Review Questions; Chapter 15: Cisco IOS Firewall; Function of the Cisco IOS Firewall; Configure Cisco IOS Firewall with SDM; Verify Cisco IOS Firewall Configurations; Summary; Review Questions; Answers to Review Questions; Chapter 16: Cisco IOS IPS; Securing Networks with IDS and IPS; Configuring IOS IPS…”
    Libro electrónico
  7. 187
    Publicado 2018
    “…Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? …”
    Libro electrónico
  8. 188
    Publicado 2016
    Tabla de Contenidos: “…Chapter 3: Managing User AccountsExploring What User Accounts Consist Of; Looking at Built-In Accounts; Assigning User Rights; Controlling User Access with Permissions (Who Gets What); Assigning Permissions to Groups; Understanding User Profiles; Automating Tasks with Logon Scripts; Chapter 4: Firewalls and Virus Protection; Firewalls; The Many Types of Firewalls; The Built-In Windows Firewall; Virus Protection; Using Windows Action Center; Chapter 5: Blocking Spam; Defining Spam; Sampling the Many Flavors of Spam; Using Antispam Software; Understanding Spam Filters…”
    Libro electrónico
  9. 189
    Tabla de Contenidos: “…Infrastructure Security; Anecdote; Introduction; E-commerce; Just Checking; Summary; Chapter 8. Firewalls; Anecdote; Introduction; Firewall Structure and Design; Other Types of Firewalls; Commercial Firewalls; Summary; Chapter 9. …”
    Libro electrónico
  10. 190
    Publicado 2015
    Tabla de Contenidos: “…Creating a Project with a Zone-Based Firewall…”
    Libro electrónico
  11. 191
    Publicado 2017
    “…Current network infrastructures are designed to protect your internal network with a firewall, and everything behind that firewall being "trusted" by default. zero trust networks are based on the philosophy that no network is trusted, be it external or internal. …”
    Video
  12. 192
    Publicado 2018
    Tabla de Contenidos: “…-- Time to say goodbye to SSL and early TLS -- SSL certificate component -- Root certificate -- Intermediate certificate -- SSL certificates classes -- TLS versus SSL -- Public Key Infrastructure -- Symmetric encryption -- Asymmetric encryption -- Hash function -- Attacks against PKI -- Microsoft Windows and IIS -- OpenSSL -- SSL Management tools -- Summary -- Questions -- Further reading -- Chapter 10: Firewall Placement and Detection Techniques -- Technical requirements -- Firewall and design considerations -- Firewall terminology -- Firewall generations -- Firewall performance -- Firewall placement and design network topology -- Single firewall architecture -- Single firewall architecture with a single IP subnet -- Single firewall architecture with multiple IP subnets -- Multilayer firewall architecture -- Firewall sandwich design -- Demilitarized Zone -- DMZ to Internal Access Policy -- OSI model versus TCP/IP model -- Firewall performance, capabilities, and function -- Firewall management -- Application proxies -- Detecting firewalls -- Debugging tools -- Summary -- Questions -- Further Reading -- Chapter 11: VPN and WAN Encryption -- Overview -- Classes of VPN -- Type of VPN protocol -- Point-to-Point tunneling protocol -- Layer 2 Tunneling Protocol -- Secure Socket Tunneling protocol -- Internet Protocol Security -- SSL VPN…”
    Libro electrónico
  13. 193
    por Dilger, Daniel Eran
    Publicado 2009
    Tabla de Contenidos:
    Libro electrónico
  14. 194
    Publicado 2020
    Tabla de Contenidos: “…MAP X -- LIST OF FIGURES XI -- LIST OF TABLES XIII -- FOREWORD XV Sipiriano Nemani -- PREFACE XIX -- CHAPTER 1 NA VILAVILAIREVO: THE FIJIAN FIREWALKING CEREMONY -- CHAPTER 2 "ARE THEY EVIL?": DENOMINATIONAL COMPETITION AND CULTURAL DEMONIZATION ON A FIJIAN ISLAND -- CHAPTER 3 FROM COLONIAL POMP TO TOURISM REALITY: COMMODIFICATION AND CANNIBALIZATION OF THE FIJIAN FIREWALKING CEREMONY -- CHAPTER 4 WE BRANDED OURSELVES LONG AGO: INTANGIBLE CULTURAL PROPERTY AND -- COMMODIFICATION OF FIJIAN FIREWALKING -- CHAPTER 5 INTANGIBLE CULTURAL PROPERTY, TANGIBLE DATABASES, VISIBLE DEBATES: THE SAWAU PROJECT -- CHAPTER 6 THE SAWAU PROJECT GOES SOCIAL, OR, THE UNEXPECTED DILEMMAS OF THE DIGITAL AGE OF ENLIGHTENMENT -- AFTERWORD: GIFTS OF HERITAGE AND THE LIFE OF THE LAND 153 Matt Tomlinson -- REFERENCES 157 -- INDEX 191 -- ABOUT THE AUTHOR…”
    Libro electrónico
  15. 195
    por Bhaiji, Fahim Hussain Yusuf
    Publicado 2004
    “…Seven comprehensive CCIE security labs to hone configuration and troubleshooting skills Prepare for the CCIE Security lab exam and hone your security configuration and troubleshooting skills with seven complete practice scenarios that cover: Basic device configuration Routing configuration ISDN configuration Cisco PIX Firewall configuration VPN configuration, including IPSec, GRE, L2TP, and PPTP VPN-3000 Concentrator configuration Intrusion Detection System (IDS) 42xx Appliance configuration Cisco IOS Firewall configuration AAA configuration Advanced security issues IP services and protocol-independent features Security violations The explosive growth of the Internet economy over the past several years and new IP-based enterprise applications has heightened requirements for continuous availability of mission-critical data. …”
    Libro electrónico
  16. 196
    Publicado 2021
    Tabla de Contenidos: “…-- History and Evolution -- Forrester's Zero Trust eXtended (ZTX) Model -- Gartner's Approach to Zero Trust -- Our Perspective on Zero Trust -- Core Principles -- Expanded Principles -- A Working Definition -- Zero Trust Platform Requirements -- Summary -- Chapter 3: Zero Trust Architectures -- A Representative Enterprise Architecture -- Identity and Access Management -- Network Infrastructure (Firewalls, DNS, Load Balancers) -- Jump Boxes -- Privileged Access Management -- Network Access Control -- Intrusion Detection/Intrusion Prevention -- Virtual Private Network -- Next-Generation Firewalls -- Security Information and Event Management -- Web Server and Web Application Firewall -- Infrastructure as a Service -- Software as a Service and Cloud Access Security Brokers -- A Zero Trust Architecture -- The NIST Zero Trust Model -- A Conceptual Zero Trust Architecture -- Policy Components -- Types of Policy Enforcement Points -- What Is a Policy Enforcement Point? …”
    Libro electrónico
  17. 197
    Publicado 2015
    Tabla de Contenidos: “…-- Chapter 2 - Securing the Network -- Information in this chapter -- Securing the network -- Network Firewalls -- Web Server on the Public Internet Network -- Web Server on the Internal Side of the Network -- Web Server in the Demilitarized Zone -- Server Firewalls -- Windows Firewall Inbound Rules -- Windows Firewall Outbound Rules -- Special Requirements for Clustering -- Direct Internet Access -- Public IP addresses versus private IP addresses -- vLANs -- Accessing SQL server from home -- Setting up Routing and Remote Access -- Allowing Users to VPN in to the Network -- Setting up Client VPN Connection -- Physical security -- Keep Your Hands Off My Box -- Open Network Ports -- Unlocked Workstations -- Automatically Locking Computers -- Social engineering -- Finding the instances -- Testing the network security -- Antivirus installation on SQL servers -- Summary -- References -- Chapter 3 - Key Management -- Information in this chapter -- Service master key -- Database master key -- Encryption password management -- Enterprise key management -- High availability and disaster recovery for key management -- Conclusions -- Chapter 4 - Database Encryption -- Information in this chapter: -- Database encryption -- Hashing versus Encryption -- Triple DES -- RC Algorithms -- Advanced Encryption Standard -- Hashing -- SHA2 and SQL Server -- Encrypting Objects -- Encrypting data within tables -- Encrypting within Microsoft SQL Server…”
    Libro electrónico
  18. 198
    por Kirch, Olaf
    Publicado 2000
    Tabla de Contenidos: “…More Advanced PPP Configurations TCP/IP Firewall Methods of Attack What Is a Firewall? What Is IP Filtering? …”
    Libro electrónico
  19. 199
    Publicado 2015
    “…Advanced services such as routers, firewall, and load balancers use building blocks such as network and subnets. …”
    Libro electrónico
  20. 200
    por Broll, Brandon
    Publicado 2007
    Libro