Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
201Publicado 2014“…Dive straight into hot Fire phone features you won’t find in any other device—like Firefly, Mayday, and Dynamic Perspective—with this concise hands-on guide. …”
Libro electrónico -
202Publicado 2017Tabla de Contenidos: “…The Industrial Demilitarized Zone -- Communication conduits -- Resiliency and redundancy -- Architectural overview -- Firewalls -- Configuring the active-standby pair of firewalls -- Security monitoring and logging -- Network packet capturing -- Event logging -- Security information and event management -- Firewall logs -- Configuring the Cisco ASA firewall to send log data to the OSSIM server -- Setting the syslog logging level for Cisco devices -- Network intrusion detection logs -- Why not intrusion prevention? …”
Libro electrónico -
203por Mackin, J. C.Tabla de Contenidos: “…When to Prepare and Plan for DeploymentWindows EBS 2008 Installation Discs and Tools; Planning the Deployment Steps; Step 2: Plan Your Deployment; Steps 3, 4, and 5: Install the Software; Step 6: Complete the Configuration and Migration Tasks; Installing the Preparation and Planning Wizards; Running the Windows EBS Preparation Wizard; Windows Essential Business Server Readiness Checks; ForcePass Switch; Running the Windows EBS Planning Wizard; Providing Firewall Information; Deciding to Replace or Keep Your Existing Firewall; Determining Windows EBS Security Server Addresses…”
Publicado 2009
Libro electrónico -
204Publicado 2021Tabla de Contenidos: “…Understanding UFW -- Configuring UFW -- The Bottom Line -- Chapter 18 Exploring Red Hat Security -- Working with Root Access -- Keeping Track of Root Logins -- Disabling Root Access from SSH -- Enabling Automatic Logout -- Blocking Root Access -- Using SELinux -- Enabling SELinux -- Understanding Security Context -- Using Policies -- Network Security Using Firewalls -- Red Hat Firewall Concepts -- Checking the Firewall Status -- Working with Zones -- Working with Firewall Rules -- The Bottom Line -- Chapter 19 Writing Scripts -- Beginning a Shell Script -- Creating a Script File -- Displaying Messages -- Using Variables -- Environment Variables -- User Variables -- Command Substitution -- Exiting the Script with Status -- Passing Parameters -- Adding Conditional Expressions -- Working with the if-then Statement -- Using Compound Tests -- Working with the if-then-else Statement -- Trying the case Statement -- Using Loops -- Looking at the for Command -- Working with the while Format -- Using the until Command -- Using Functions -- Creating Functions -- Calling Functions -- The Bottom Line -- Chapter 20 Managing Web Servers -- Linux Web Servers -- Apache -- nginx -- The Apache Web Server -- Installing an Apache Server -- Configuring the Apache Server -- Hosting Dynamic Web Applications -- Creating a Secure Web Server -- The nginx Server -- Installing nginx -- Configuring nginx -- The Bottom Line -- Chapter 21 Managing Database Servers -- Linux Database Servers -- Organizing the Data -- Querying the Data -- Controlling the Data -- Installing and Using MySQL/MariaDB -- Conducting a MariaDB Installation -- Accessing a MariaDB Database -- Populating and Using MariaDB Database -- Installing and Using PostgreSQL -- Conducting a PostgreSQL Installation -- Accessing a PostgreSQL Database -- Populating and Using a PostgreSQL Database -- The Bottom Line…”
Libro electrónico -
205
-
206por Brito, Michael“…However, behind the firewall, chaos, anarchy, and conflict reign. In Smart Business, Social Business , leading enterprise social business consultant shows how to build an internal framework based on change management that will lead to success with social media: one that will make external engagement more effective, meaningful, and sustainable. …”
Publicado 2011
Libro electrónico -
207por Young, MarcusTabla de Contenidos: “…Monitoring integration patternWeb storage archive pattern; Weighted transition pattern; Hybrid backup pattern; Summary; Chapter 10: Patterns for Networking; OnDemand NAT pattern; Management network pattern; Functional firewall pattern; Operational firewall pattern; Web application firewall pattern; Multiple load balancer pattern; Summary; Chapter 11: Throw-away Environments; Infrastructure as code; CloudFormation; Packer; Fugue; Temporary development environments; Continuous integration; Summary; Index…”
Publicado 2015
Libro electrónico -
208
-
209por Ratliff, BudTabla de Contenidos: “…Cover; Copyright page; Contents at a Glance; Table of Contents; Acknowledgements; Introduction; Support; Chapter 1: Overview of Microsoft ISA Server 2004 Administration; ISA Server Capabilities; How ISA Server Operates as a Caching and Firewall Server; Firewall: The Secure Server; Caching: The Acceleration Server; Differences Between ISA Server 2000 and ISA Server 2004; Choosing the Right ISA Server for Your Environment; Product Editions and Requirements; ISA Server Tools and Utilities; The ISA Server 2004 Management Console; ISA Server Wizards; Tools; Extending ISA Server…”
Publicado 2006
Libro electrónico -
210por O'Leary, Mike. authorTabla de Contenidos: “…Web Attacks -- Chapter 17. Firewalls -- Chapter 18. MySQL and MariaDB -- Chapter 19. …”
Publicado 2019
Libro electrónico -
211Publicado 2024Tabla de Contenidos: “…Cover -- Title page -- Copyright and credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: VMware Cloud on AWS Foundations and VMware HCX as a Migration Tool -- Chapter 1: Foundation of VMware Cloud on AWS -- Introduction to VMware Cloud on AWS -- Introduction to cloud deployment models -- Hybrid cloud challenges -- Describing the challenges of the hybrid cloud -- Understanding VMware Cloud on AWS use cases -- Data center extension -- Cloud migration -- Next-generation apps -- Disaster recovery -- Understanding the VMware Cloud on AWS high-level architecture -- Tanzu Kubernetes with VMware Cloud on AWS -- SDDC cluster design -- Elastic Distributed Resource Scheduler -- Understanding Cloud Service Platform and VMware Cloud Console -- Cloud Service Platform and VMware Cloud Console -- VMware Cloud console -- VMware vCenter Server -- Restrictive access model -- Demystifying vSAN and host storage architecture -- VMware vSAN overview -- Summary -- Chapter 2: Exploring Networking, Security, and AWS Integrations -- Exploring VMware NSX -- A VMware NSX overview -- VMware NSX architecture -- Understanding the network architecture of the VMware Cloud on AWS SDDC -- AWS networking -- External connectivity options -- Connected VPC -- Understanding hybrid connectivity options -- Layer 2 VPNs -- Complimentary networking services -- Understanding connectivity to the AWS cloud -- VMware Transit Connect -- vTGW routing tables -- vTGW firewalling -- Connectivity best practices -- Unsupported flow -- Transit VPCs/security VPCs -- TGW connectivity over VPN -- Exploring NSX and AWS security architecture and capabilities -- AWS security groups -- Security -- GW firewalls -- Learning NSX micro-segmentation -- The benefits of micro-segmentation architecture -- Understanding NSX Distributed Firewall…”
Libro electrónico -
212Publicado 2009“…Anhand der im Buch skizzierten, hetereogenen Test-Umgebung, bestehend aus Linux-Webservern und Mailrelays, einem Firewall-System und einer Windows-Umgebung wird Schritt für Schritt ein Netzwerkmonitoring-System implementiert…”
Libro electrónico -
213Publicado 2007Tabla de Contenidos: “…Front Cover; Juniper(r) Networks Secure Access SSL VPN Configuration Guide; Copyright Page; Technical Editor and Contributing Author; Contents; Introduction; Chapter 1 : Defining a Firewall; Introduction; Why Have Different Types of Firewalls?…”
Libro electrónico -
214por Wiles, JackTabla de Contenidos: “…; Determining the Risks in Your SCADA System; Risk Mitigation for SCADA; Firewall Considerations for SCADA; Negative and Positive Security Models in Firewalls; Multi-Network Connectivity; Reactive and Proactive Solutions; Firewall Inspection Methods; Static Packet Filter; The Stateful Packet Filter; The Circuit-Level Gateway; Application-Level Gateway (Proxy); Intrusion Prevention Gateway…”
Publicado 2007
Libro electrónico -
215por Dissmeyer, JoeTabla de Contenidos: “…Cover; Copyright; Credits; About the Author; Acknowledgement; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Installation; System requirements; Windows Server setup; Internet Information Services (IIS); Microsoft SQL Server; SQL Server setup; Service accounts; Installing SQL Server 2008 R2 Express; Configuring the SQL Server services; Verifying SQL Server authentication settings; Configuring the Windows Firewall; Installing SolarWinds Orion NPM; Summary; Chapter 2: Orion NPM Configuration; Orion Configuration Wizard; Orion Website Administration…”
Publicado 2013
Libro electrónico -
216Publicado 2023Tabla de Contenidos: “…-- Common types of attacks -- Main advanced attacks that a firewall will not defend you from -- General good advice against all regular attacks -- Firewall types -- Setting up your firewall from A to Z -- ufw and firewall-cmd -- Configuring ufw -- Configuring firewalld -- VPNs -- The benefits for a single home user -- For a business use case -- Countries in which using a VPN is illegal -- What are the potential drawbacks of using a VPN connection? …”
Libro electrónico -
217Publicado 2018Tabla de Contenidos: “…Stateless Firewalls -- Summary -- Exam Essentials -- Review Questions -- Chapter 14 Configuring NAT and Zone-Based Firewalls -- Implementing NAT on ASA 9.x -- Configuring Zone-Based Firewalls -- Summary -- Exam Essentials -- Review Questions -- Chapter 15 Configuring the Firewall on an ASA -- Understanding Firewall Services -- Understanding Modes of Deployment -- Understanding Methods of Implementing High Availability -- Understanding Security Contexts -- Configuring ASA Management Access -- Configuring Cisco ASA Interface Security Levels -- Configuring Security Access Policies -- Configuring Default Cisco Modular Policy Framework (MPF) -- Summary -- Exam Essentials -- Review Questions -- Chapter 16 Intrusion Prevention -- IPS Terminology -- Evasion Techniques…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
218Publicado 2015Tabla de Contenidos: “…Firefly algorithm; 3.2.1. Algorithm Complexity…”
Libro electrónico -
219Publicado 2018Tabla de Contenidos: “…Activity: Perform Back-ups -- Summary -- Restoring an Azure SQL Database -- Restore Types -- Point-In-Time Restore -- Long-Term Database Restore -- Restoring Deleted Databases -- Geo-Restore Database -- Importing a Database -- Activity: Perform PITR -- Activity: Perform Geo-Restore -- Summary -- Securing an Azure SQL Database -- Access Control -- Firewall Rules -- Managing the Server-Level Firewall Rules using the Azure Portal -- Managing the Server-Level Firewall Rules using Transact-SQL -- Managing Database-Level Firewall Rules using Transact-SQL -- Authentication -- SQL Authentication -- Azure Active Directory Authentication -- Using Active Directory - Password to Authenticate to an Azure SQL Database -- Azure SQL Database Authentication Structure -- Azure SQL Database Authentication Considerations -- Authorization -- Creating Contained Database Users for Azure AD Authentication -- Groups and Roles -- Row-Level Security -- Dynamic Data Masking -- Proactive Security -- Auditing -- Configure Auditing for Azure SQL Server -- Threat Detection -- Configure Threat Detection for Azure SQL Server -- Activity: Implement Row-Level Security -- Activity: Implement Dynamic Data Masking -- Summary -- Scaling Out Azure SQL Database -- Vertical Scaling -- Scale Up or Scale Down Service Tiers -- Using T-SQL to Change the Service Tier -- Vertical Partitioning -- Horizontal Scaling -- Shard Map Manager -- Data Dependent Routing -- Multi-Tenant Data Models -- Single Tenant (database-per-tenant) -- Shared Database - Sharded -- Activity: Creating Alerts -- Activity: Creating Shards -- Activity: Split Data between Shard -- Activity: Using Elastic Queries -- Summary -- Elastic Pools -- Introducing Elastic Pools -- When Should You Consider Elastic Pools? …”
Libro electrónico -
220Publicado 2015Tabla de Contenidos: “…""Do not use old passwords that have been used before""""Using at least a 10 char complex password""; ""Expiring password expires in 90 days""; ""Locking account lock""; ""Using SSH with key file to connect""; ""Creating the public and private key""; ""Getting the key to your computer and converting it into the PuTTY format""; ""Connecting from Linux""; ""Disabling the SSH logins with a password""; ""The firewall rules""; ""Checking which ports to keep open""; ""Defining firewall rules""; ""Making the iptables rules persistent""; ""Summary""; ""Chapter 2: Installing Puppet Agents""…”
Libro electrónico