Mostrando 201 - 220 Resultados de 1,060 Para Buscar 'Firefall~', tiempo de consulta: 1.69s Limitar resultados
  1. 201
    Publicado 2014
    “…Dive straight into hot Fire phone features you won’t find in any other device—like Firefly, Mayday, and Dynamic Perspective—with this concise hands-on guide. …”
    Libro electrónico
  2. 202
    Publicado 2017
    Tabla de Contenidos: “…The Industrial Demilitarized Zone -- Communication conduits -- Resiliency and redundancy -- Architectural overview -- Firewalls -- Configuring the active-standby pair of firewalls -- Security monitoring and logging -- Network packet capturing -- Event logging -- Security information and event management -- Firewall logs -- Configuring the Cisco ASA firewall to send log data to the OSSIM server -- Setting the syslog logging level for Cisco devices -- Network intrusion detection logs -- Why not intrusion prevention? …”
    Libro electrónico
  3. 203
    por Mackin, J. C.
    Publicado 2009
    Tabla de Contenidos: “…When to Prepare and Plan for DeploymentWindows EBS 2008 Installation Discs and Tools; Planning the Deployment Steps; Step 2: Plan Your Deployment; Steps 3, 4, and 5: Install the Software; Step 6: Complete the Configuration and Migration Tasks; Installing the Preparation and Planning Wizards; Running the Windows EBS Preparation Wizard; Windows Essential Business Server Readiness Checks; ForcePass Switch; Running the Windows EBS Planning Wizard; Providing Firewall Information; Deciding to Replace or Keep Your Existing Firewall; Determining Windows EBS Security Server Addresses…”
    Libro electrónico
  4. 204
    Publicado 2021
    Tabla de Contenidos: “…Understanding UFW -- Configuring UFW -- The Bottom Line -- Chapter 18 Exploring Red Hat Security -- Working with Root Access -- Keeping Track of Root Logins -- Disabling Root Access from SSH -- Enabling Automatic Logout -- Blocking Root Access -- Using SELinux -- Enabling SELinux -- Understanding Security Context -- Using Policies -- Network Security Using Firewalls -- Red Hat Firewall Concepts -- Checking the Firewall Status -- Working with Zones -- Working with Firewall Rules -- The Bottom Line -- Chapter 19 Writing Scripts -- Beginning a Shell Script -- Creating a Script File -- Displaying Messages -- Using Variables -- Environment Variables -- User Variables -- Command Substitution -- Exiting the Script with Status -- Passing Parameters -- Adding Conditional Expressions -- Working with the if-then Statement -- Using Compound Tests -- Working with the if-then-else Statement -- Trying the case Statement -- Using Loops -- Looking at the for Command -- Working with the while Format -- Using the until Command -- Using Functions -- Creating Functions -- Calling Functions -- The Bottom Line -- Chapter 20 Managing Web Servers -- Linux Web Servers -- Apache -- nginx -- The Apache Web Server -- Installing an Apache Server -- Configuring the Apache Server -- Hosting Dynamic Web Applications -- Creating a Secure Web Server -- The nginx Server -- Installing nginx -- Configuring nginx -- The Bottom Line -- Chapter 21 Managing Database Servers -- Linux Database Servers -- Organizing the Data -- Querying the Data -- Controlling the Data -- Installing and Using MySQL/MariaDB -- Conducting a MariaDB Installation -- Accessing a MariaDB Database -- Populating and Using MariaDB Database -- Installing and Using PostgreSQL -- Conducting a PostgreSQL Installation -- Accessing a PostgreSQL Database -- Populating and Using a PostgreSQL Database -- The Bottom Line…”
    Libro electrónico
  5. 205
    por Stiglitz, Joseph E.
    Publicado 2010
    991007167329706719
  6. 206
    por Brito, Michael
    Publicado 2011
    “…However, behind the firewall, chaos, anarchy, and conflict reign. In Smart Business, Social Business , leading enterprise social business consultant shows how to build an internal framework based on change management that will lead to success with social media: one that will make external engagement more effective, meaningful, and sustainable. …”
    Libro electrónico
  7. 207
    por Young, Marcus
    Publicado 2015
    Tabla de Contenidos: “…Monitoring integration patternWeb storage archive pattern; Weighted transition pattern; Hybrid backup pattern; Summary; Chapter 10: Patterns for Networking; OnDemand NAT pattern; Management network pattern; Functional firewall pattern; Operational firewall pattern; Web application firewall pattern; Multiple load balancer pattern; Summary; Chapter 11: Throw-away Environments; Infrastructure as code; CloudFormation; Packer; Fugue; Temporary development environments; Continuous integration; Summary; Index…”
    Libro electrónico
  8. 208
    por Bott, Ed
    Publicado 2009
    Tabla de Contenidos:
    Libro electrónico
  9. 209
    por Ratliff, Bud
    Publicado 2006
    Tabla de Contenidos: “…Cover; Copyright page; Contents at a Glance; Table of Contents; Acknowledgements; Introduction; Support; Chapter 1: Overview of Microsoft ISA Server 2004 Administration; ISA Server Capabilities; How ISA Server Operates as a Caching and Firewall Server; Firewall: The Secure Server; Caching: The Acceleration Server; Differences Between ISA Server 2000 and ISA Server 2004; Choosing the Right ISA Server for Your Environment; Product Editions and Requirements; ISA Server Tools and Utilities; The ISA Server 2004 Management Console; ISA Server Wizards; Tools; Extending ISA Server…”
    Libro electrónico
  10. 210
    por O'Leary, Mike. author
    Publicado 2019
    Tabla de Contenidos: “…Web Attacks -- Chapter 17. Firewalls -- Chapter 18. MySQL and MariaDB -- Chapter 19. …”
    Libro electrónico
  11. 211
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title page -- Copyright and credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: VMware Cloud on AWS Foundations and VMware HCX as a Migration Tool -- Chapter 1: Foundation of VMware Cloud on AWS -- Introduction to VMware Cloud on AWS -- Introduction to cloud deployment models -- Hybrid cloud challenges -- Describing the challenges of the hybrid cloud -- Understanding VMware Cloud on AWS use cases -- Data center extension -- Cloud migration -- Next-generation apps -- Disaster recovery -- Understanding the VMware Cloud on AWS high-level architecture -- Tanzu Kubernetes with VMware Cloud on AWS -- SDDC cluster design -- Elastic Distributed Resource Scheduler -- Understanding Cloud Service Platform and VMware Cloud Console -- Cloud Service Platform and VMware Cloud Console -- VMware Cloud console -- VMware vCenter Server -- Restrictive access model -- Demystifying vSAN and host storage architecture -- VMware vSAN overview -- Summary -- Chapter 2: Exploring Networking, Security, and AWS Integrations -- Exploring VMware NSX -- A VMware NSX overview -- VMware NSX architecture -- Understanding the network architecture of the VMware Cloud on AWS SDDC -- AWS networking -- External connectivity options -- Connected VPC -- Understanding hybrid connectivity options -- Layer 2 VPNs -- Complimentary networking services -- Understanding connectivity to the AWS cloud -- VMware Transit Connect -- vTGW routing tables -- vTGW firewalling -- Connectivity best practices -- Unsupported flow -- Transit VPCs/security VPCs -- TGW connectivity over VPN -- Exploring NSX and AWS security architecture and capabilities -- AWS security groups -- Security -- GW firewalls -- Learning NSX micro-segmentation -- The benefits of micro-segmentation architecture -- Understanding NSX Distributed Firewall…”
    Libro electrónico
  12. 212
    Publicado 2009
    “…Anhand der im Buch skizzierten, hetereogenen Test-Umgebung, bestehend aus Linux-Webservern und Mailrelays, einem Firewall-System und einer Windows-Umgebung wird Schritt für Schritt ein Netzwerkmonitoring-System implementiert…”
    Libro electrónico
  13. 213
    Publicado 2007
    Tabla de Contenidos: “…Front Cover; Juniper(r) Networks Secure Access SSL VPN Configuration Guide; Copyright Page; Technical Editor and Contributing Author; Contents; Introduction; Chapter 1 : Defining a Firewall; Introduction; Why Have Different Types of Firewalls?…”
    Libro electrónico
  14. 214
    por Wiles, Jack
    Publicado 2007
    Tabla de Contenidos: “…; Determining the Risks in Your SCADA System; Risk Mitigation for SCADA; Firewall Considerations for SCADA; Negative and Positive Security Models in Firewalls; Multi-Network Connectivity; Reactive and Proactive Solutions; Firewall Inspection Methods; Static Packet Filter; The Stateful Packet Filter; The Circuit-Level Gateway; Application-Level Gateway (Proxy); Intrusion Prevention Gateway…”
    Libro electrónico
  15. 215
    por Dissmeyer, Joe
    Publicado 2013
    Tabla de Contenidos: “…Cover; Copyright; Credits; About the Author; Acknowledgement; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Installation; System requirements; Windows Server setup; Internet Information Services (IIS); Microsoft SQL Server; SQL Server setup; Service accounts; Installing SQL Server 2008 R2 Express; Configuring the SQL Server services; Verifying SQL Server authentication settings; Configuring the Windows Firewall; Installing SolarWinds Orion NPM; Summary; Chapter 2: Orion NPM Configuration; Orion Configuration Wizard; Orion Website Administration…”
    Libro electrónico
  16. 216
    Publicado 2023
    Tabla de Contenidos: “…-- Common types of attacks -- Main advanced attacks that a firewall will not defend you from -- General good advice against all regular attacks -- Firewall types -- Setting up your firewall from A to Z -- ufw and firewall-cmd -- Configuring ufw -- Configuring firewalld -- VPNs -- The benefits for a single home user -- For a business use case -- Countries in which using a VPN is illegal -- What are the potential drawbacks of using a VPN connection? …”
    Libro electrónico
  17. 217
    Publicado 2018
    Tabla de Contenidos: “…Stateless Firewalls -- Summary -- Exam Essentials -- Review Questions -- Chapter 14 Configuring NAT and Zone-Based Firewalls -- Implementing NAT on ASA 9.x -- Configuring Zone-Based Firewalls -- Summary -- Exam Essentials -- Review Questions -- Chapter 15 Configuring the Firewall on an ASA -- Understanding Firewall Services -- Understanding Modes of Deployment -- Understanding Methods of Implementing High Availability -- Understanding Security Contexts -- Configuring ASA Management Access -- Configuring Cisco ASA Interface Security Levels -- Configuring Security Access Policies -- Configuring Default Cisco Modular Policy Framework (MPF) -- Summary -- Exam Essentials -- Review Questions -- Chapter 16 Intrusion Prevention -- IPS Terminology -- Evasion Techniques…”
    Libro electrónico
  18. 218
    Publicado 2015
    Tabla de Contenidos: “…Firefly algorithm; 3.2.1. Algorithm Complexity…”
    Libro electrónico
  19. 219
    Publicado 2018
    Tabla de Contenidos: “…Activity: Perform Back-ups -- Summary -- Restoring an Azure SQL Database -- Restore Types -- Point-In-Time Restore -- Long-Term Database Restore -- Restoring Deleted Databases -- Geo-Restore Database -- Importing a Database -- Activity: Perform PITR -- Activity: Perform Geo-Restore -- Summary -- Securing an Azure SQL Database -- Access Control -- Firewall Rules -- Managing the Server-Level Firewall Rules using the Azure Portal -- Managing the Server-Level Firewall Rules using Transact-SQL -- Managing Database-Level Firewall Rules using Transact-SQL -- Authentication -- SQL Authentication -- Azure Active Directory Authentication -- Using Active Directory - Password to Authenticate to an Azure SQL Database -- Azure SQL Database Authentication Structure -- Azure SQL Database Authentication Considerations -- Authorization -- Creating Contained Database Users for Azure AD Authentication -- Groups and Roles -- Row-Level Security -- Dynamic Data Masking -- Proactive Security -- Auditing -- Configure Auditing for Azure SQL Server -- Threat Detection -- Configure Threat Detection for Azure SQL Server -- Activity: Implement Row-Level Security -- Activity: Implement Dynamic Data Masking -- Summary -- Scaling Out Azure SQL Database -- Vertical Scaling -- Scale Up or Scale Down Service Tiers -- Using T-SQL to Change the Service Tier -- Vertical Partitioning -- Horizontal Scaling -- Shard Map Manager -- Data Dependent Routing -- Multi-Tenant Data Models -- Single Tenant (database-per-tenant) -- Shared Database - Sharded -- Activity: Creating Alerts -- Activity: Creating Shards -- Activity: Split Data between Shard -- Activity: Using Elastic Queries -- Summary -- Elastic Pools -- Introducing Elastic Pools -- When Should You Consider Elastic Pools? …”
    Libro electrónico
  20. 220
    Publicado 2015
    Tabla de Contenidos: “…""Do not use old passwords that have been used before""""Using at least a 10 char complex password""; ""Expiring password expires in 90 days""; ""Locking account lock""; ""Using SSH with key file to connect""; ""Creating the public and private key""; ""Getting the key to your computer and converting it into the PuTTY format""; ""Connecting from Linux""; ""Disabling the SSH logins with a password""; ""The firewall rules""; ""Checking which ports to keep open""; ""Defining firewall rules""; ""Making the iptables rules persistent""; ""Summary""; ""Chapter 2: Installing Puppet Agents""…”
    Libro electrónico