Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
181por Lockhart, AndrewTabla de Contenidos: “…Protect Your Computer with the Windows Firewall; Tracking Firewall Activity with a Windows Firewall Log; Problems with Email and the Windows Firewall; Hacking the Hack; See Also; 47. …”
Publicado 2007
Libro electrónico -
182Publicado 2013Tabla de Contenidos: “…7.6 Certificate Revocation List 282 -- 7.7 Certification Path Validation 287 -- 8 Network Layer Security 291 -- 8.1 IPsec Protocol 291 -- 8.2 IP Authentication Header 299 -- 8.3 IP ESP 301 -- 8.4 Key Management Protocol for IPsec 308 -- 9 Transport Layer Security: SSLv3 and TLSv1 325 -- 9.1 SSL Protocol 325 -- 9.2 Cryptographic Computations 338 -- 9.3 TLS Protocol 339 -- 10 Electronic Mail Security: PGP, S/MIME 353 -- 10.1 PGP 353 -- 10.2 S/MIME 372 -- 11 Internet Firewalls for Trusted Systems 387 -- 11.1 Role of Firewalls 387 -- 11.2 Firewall-Related Terminology 388 -- 11.3 Types of Firewalls 392 -- 11.4 Firewall Designs 398 -- 11.5 IDS Against Cyber Attacks 401 -- 11.6 Intrusion Detections Systems 404 -- 12 SET for E-Commerce Transactions 415 -- 12.1 Business Requirements for SET 415 -- 12.2 SET System Participants 417 -- 12.3 Cryptographic Operation Principles 418 -- 12.4 Dual Signature and Signature Verification 420 -- 12.5 Authentication and Message Integrity 424 -- 12.6 Payment Processing 427 -- 13 4G Wireless Internet Communication Technology 439 -- 13.1 Mobile WiMAX 440 -- 13.2 WiBro (Wireless Broadband) 448 -- 13.3 UMB (Ultra Mobile Broadband) 452 -- 13.4 LTE (Long Term Evolution) 457 -- Acronyms 467 -- Bibliography 473 -- Index 481.…”
Libro electrónico -
183Publicado 2007Tabla de Contenidos: “…Protecting Your Perimeter; Introduction; Firewall Types; Firewall Architectures; Implementing Firewalls; Providing Secure Remote Access; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. …”
Libro electrónico -
184por Babbin, JacobTabla de Contenidos: “…Tracking Users' Web Activities with BroUsing Bro to Gather DNS and Web Traffic Data; Using Bro for Blackholing Traffic to Malware-Infested Domains; Using Bro to Identify Top E-Mail Senders/Receivers; Chapter 3 Firewall Reporting; Firewall Reporting: A Reflection of the Effectiveness of Security Policies; The Supporting Infrastructure for Firewall Log Management; Chapter 4 Systems and Network Device Reporting; Web Server Logs; Recon and Attack Information; Correlating Data with the Host System; Chapter 5 Creating a Reporting Infrastructure…”
Publicado 2006
Libro electrónico -
185Publicado 2010Tabla de Contenidos: “…Cover -- Contents -- Getting Started -- Part 1 Providing Network Services -- Chapter 1 Understanding the Domain Name System -- Using the DNS: The Big Picture -- Configuring a DNS Service -- Configuring the DNS with Server Admin -- Configuring DNS with BIND -- Creating Secure and Private DNS Servers -- Troubleshooting a DNS -- What You've Learned -- References -- Chapter Review -- Chapter 2 Using DHCP -- Understanding How DHCP Works -- Configuring a DHCP Service -- Configuring DHCP Using Server Admin -- Troubleshooting DHCP -- What You've Learned -- References -- Chapter Review -- Chapter 3 Network Address Translation/Gateway -- Using NAT -- Configuring a NAT Gateway -- Configuring NAT Using the Gateway Setup Assistant -- Using Server Admin to Configure NAT -- Troubleshooting NAT on Mac OS X Server -- What You've Learned -- References -- Chapter Review -- Part 2 Securing Systems and Services -- Chapter 4 Using a Firewall -- Understanding the Mac OS X Firewall -- Understanding the Mac OS X Server Firewall -- Configuring Client Systems Remotely -- Troubleshooting Your Firewall -- Security Considerations -- What You've Learned -- References -- Chapter Review -- Chapter 5 Virtual Private Networks -- Understanding VPNs -- Configuring VPN Service on Mac OS X Server -- Understanding Mac OS X Client VPN Connections -- Understanding iPhone VPN Connectivity -- Troubleshooting VPN Clients -- Troubleshooting VPN Servers -- Using Other VPN Options -- Security Considerations -- What You've Learned -- References -- Chapter Review -- Chapter 6 Keys and Certificates -- Using SSH and SSH Keys -- Understanding Certificates and PKI Basics -- Creating Certificates -- Using Certificates with Services -- Creating a CA to Sign Certificates -- Signing and Encrypting Email -- Troubleshooting Certificates -- Using 802.1x Network Authentication -- Using Smart Cards…”
Libro electrónico -
186por Conlan, Patrick J., 1978-Tabla de Contenidos: “…; AAA; Securing Management Functions; Summary; Review Questions; Answers to Review Questions; Chapter 14: Switch Security; Introduction to Layer 2 Security; Securing Layer 2; Summary; Review Questions; Answers to Review Questions; Chapter 15: Cisco IOS Firewall; Function of the Cisco IOS Firewall; Configure Cisco IOS Firewall with SDM; Verify Cisco IOS Firewall Configurations; Summary; Review Questions; Answers to Review Questions; Chapter 16: Cisco IOS IPS; Securing Networks with IDS and IPS; Configuring IOS IPS…”
Publicado 2009
Libro electrónico -
187Publicado 2018“…Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? …”
Libro electrónico -
188Publicado 2016Tabla de Contenidos: “…Chapter 3: Managing User AccountsExploring What User Accounts Consist Of; Looking at Built-In Accounts; Assigning User Rights; Controlling User Access with Permissions (Who Gets What); Assigning Permissions to Groups; Understanding User Profiles; Automating Tasks with Logon Scripts; Chapter 4: Firewalls and Virus Protection; Firewalls; The Many Types of Firewalls; The Built-In Windows Firewall; Virus Protection; Using Windows Action Center; Chapter 5: Blocking Spam; Defining Spam; Sampling the Many Flavors of Spam; Using Antispam Software; Understanding Spam Filters…”
Libro electrónico -
189por Osborne, Mark (Chief information security officer)Tabla de Contenidos: “…Infrastructure Security; Anecdote; Introduction; E-commerce; Just Checking; Summary; Chapter 8. Firewalls; Anecdote; Introduction; Firewall Structure and Design; Other Types of Firewalls; Commercial Firewalls; Summary; Chapter 9. …”
Publicado 2006
Libro electrónico -
190Publicado 2015Tabla de Contenidos: “…Creating a Project with a Zone-Based Firewall…”
Libro electrónico -
191Publicado 2017“…Current network infrastructures are designed to protect your internal network with a firewall, and everything behind that firewall being "trusted" by default. zero trust networks are based on the philosophy that no network is trusted, be it external or internal. …”
-
192Publicado 2018Tabla de Contenidos: “…-- Time to say goodbye to SSL and early TLS -- SSL certificate component -- Root certificate -- Intermediate certificate -- SSL certificates classes -- TLS versus SSL -- Public Key Infrastructure -- Symmetric encryption -- Asymmetric encryption -- Hash function -- Attacks against PKI -- Microsoft Windows and IIS -- OpenSSL -- SSL Management tools -- Summary -- Questions -- Further reading -- Chapter 10: Firewall Placement and Detection Techniques -- Technical requirements -- Firewall and design considerations -- Firewall terminology -- Firewall generations -- Firewall performance -- Firewall placement and design network topology -- Single firewall architecture -- Single firewall architecture with a single IP subnet -- Single firewall architecture with multiple IP subnets -- Multilayer firewall architecture -- Firewall sandwich design -- Demilitarized Zone -- DMZ to Internal Access Policy -- OSI model versus TCP/IP model -- Firewall performance, capabilities, and function -- Firewall management -- Application proxies -- Detecting firewalls -- Debugging tools -- Summary -- Questions -- Further Reading -- Chapter 11: VPN and WAN Encryption -- Overview -- Classes of VPN -- Type of VPN protocol -- Point-to-Point tunneling protocol -- Layer 2 Tunneling Protocol -- Secure Socket Tunneling protocol -- Internet Protocol Security -- SSL VPN…”
Libro electrónico -
193
-
194Publicado 2020Tabla de Contenidos: “…MAP X -- LIST OF FIGURES XI -- LIST OF TABLES XIII -- FOREWORD XV Sipiriano Nemani -- PREFACE XIX -- CHAPTER 1 NA VILAVILAIREVO: THE FIJIAN FIREWALKING CEREMONY -- CHAPTER 2 "ARE THEY EVIL?": DENOMINATIONAL COMPETITION AND CULTURAL DEMONIZATION ON A FIJIAN ISLAND -- CHAPTER 3 FROM COLONIAL POMP TO TOURISM REALITY: COMMODIFICATION AND CANNIBALIZATION OF THE FIJIAN FIREWALKING CEREMONY -- CHAPTER 4 WE BRANDED OURSELVES LONG AGO: INTANGIBLE CULTURAL PROPERTY AND -- COMMODIFICATION OF FIJIAN FIREWALKING -- CHAPTER 5 INTANGIBLE CULTURAL PROPERTY, TANGIBLE DATABASES, VISIBLE DEBATES: THE SAWAU PROJECT -- CHAPTER 6 THE SAWAU PROJECT GOES SOCIAL, OR, THE UNEXPECTED DILEMMAS OF THE DIGITAL AGE OF ENLIGHTENMENT -- AFTERWORD: GIFTS OF HERITAGE AND THE LIFE OF THE LAND 153 Matt Tomlinson -- REFERENCES 157 -- INDEX 191 -- ABOUT THE AUTHOR…”
Libro electrónico -
195por Bhaiji, Fahim Hussain Yusuf“…Seven comprehensive CCIE security labs to hone configuration and troubleshooting skills Prepare for the CCIE Security lab exam and hone your security configuration and troubleshooting skills with seven complete practice scenarios that cover: Basic device configuration Routing configuration ISDN configuration Cisco PIX Firewall configuration VPN configuration, including IPSec, GRE, L2TP, and PPTP VPN-3000 Concentrator configuration Intrusion Detection System (IDS) 42xx Appliance configuration Cisco IOS Firewall configuration AAA configuration Advanced security issues IP services and protocol-independent features Security violations The explosive growth of the Internet economy over the past several years and new IP-based enterprise applications has heightened requirements for continuous availability of mission-critical data. …”
Publicado 2004
Libro electrónico -
196Publicado 2021Tabla de Contenidos: “…-- History and Evolution -- Forrester's Zero Trust eXtended (ZTX) Model -- Gartner's Approach to Zero Trust -- Our Perspective on Zero Trust -- Core Principles -- Expanded Principles -- A Working Definition -- Zero Trust Platform Requirements -- Summary -- Chapter 3: Zero Trust Architectures -- A Representative Enterprise Architecture -- Identity and Access Management -- Network Infrastructure (Firewalls, DNS, Load Balancers) -- Jump Boxes -- Privileged Access Management -- Network Access Control -- Intrusion Detection/Intrusion Prevention -- Virtual Private Network -- Next-Generation Firewalls -- Security Information and Event Management -- Web Server and Web Application Firewall -- Infrastructure as a Service -- Software as a Service and Cloud Access Security Brokers -- A Zero Trust Architecture -- The NIST Zero Trust Model -- A Conceptual Zero Trust Architecture -- Policy Components -- Types of Policy Enforcement Points -- What Is a Policy Enforcement Point? …”
Libro electrónico -
197Publicado 2015Tabla de Contenidos: “…-- Chapter 2 - Securing the Network -- Information in this chapter -- Securing the network -- Network Firewalls -- Web Server on the Public Internet Network -- Web Server on the Internal Side of the Network -- Web Server in the Demilitarized Zone -- Server Firewalls -- Windows Firewall Inbound Rules -- Windows Firewall Outbound Rules -- Special Requirements for Clustering -- Direct Internet Access -- Public IP addresses versus private IP addresses -- vLANs -- Accessing SQL server from home -- Setting up Routing and Remote Access -- Allowing Users to VPN in to the Network -- Setting up Client VPN Connection -- Physical security -- Keep Your Hands Off My Box -- Open Network Ports -- Unlocked Workstations -- Automatically Locking Computers -- Social engineering -- Finding the instances -- Testing the network security -- Antivirus installation on SQL servers -- Summary -- References -- Chapter 3 - Key Management -- Information in this chapter -- Service master key -- Database master key -- Encryption password management -- Enterprise key management -- High availability and disaster recovery for key management -- Conclusions -- Chapter 4 - Database Encryption -- Information in this chapter: -- Database encryption -- Hashing versus Encryption -- Triple DES -- RC Algorithms -- Advanced Encryption Standard -- Hashing -- SHA2 and SQL Server -- Encrypting Objects -- Encrypting data within tables -- Encrypting within Microsoft SQL Server…”
Libro electrónico -
198por Kirch, OlafTabla de Contenidos: “…More Advanced PPP Configurations TCP/IP Firewall Methods of Attack What Is a Firewall? What Is IP Filtering? …”
Publicado 2000
Libro electrónico -
199Publicado 2015“…Advanced services such as routers, firewall, and load balancers use building blocks such as network and subnets. …”
Libro electrónico -
200