Mostrando 221 - 240 Resultados de 1,060 Para Buscar 'Firefall~', tiempo de consulta: 1.69s Limitar resultados
  1. 221
    Publicado 2019
    Tabla de Contenidos: “…Azure Virtual Network -- Virtual Machine Networking -- Network Security Groups -- Managing IP Addresses -- Local and Virtual Network Gateways -- Creating Hybrid Connections -- DNS and Routing -- Load Balancers -- Traffic Manager -- Azure Firewall…”
    Libro electrónico
  2. 222
    por Deveriya, Anand
    Publicado 2005
    “…The all-in-one practical guide to supporting your Cisco network Provides detailed tips for using freeware and open-source tools readily available from the Internet, including the reasons behind choosing a particular tool Refer to a single source for common Cisco network administration issues Dedicated section for network security aids administrators in effectively dealing with security issues Deploy fully functional RADIUS and TACACS+ for servers for controlling access to Cisco devices Deploy Linux- and Windows-based syslog servers to centrally collect syslog information generated by Cisco devices Deploy Linux- and Windows-based network monitoring systems to monitor interface traffic through Cisco devices including routers, switches, VPN concentrators, and Cisco PIX® firewalls Use the trending feature of network monitoring systems for long-term network analysis and capacity planning Automatically detect and report configuration changes on Cisco IOS® Software-based devices and Cisco PIX firewalls Deploy Cisco-based VPNs in mixed environments using Linux- and Windows-based VPN servers Network Administrators Survival Guide solves many common network administration problems by providing administrators with an all-in-one practical guide to supporting Cisco® networks using freeware tools. …”
    Libro electrónico
  3. 223
    por O'Leary, Mike. author
    Publicado 2015
    “…You will develop situational awareness of your network and will build a complete defensive infrastructure—including log servers, network firewalls, web application firewalls, and intrusion detection systems. …”
    Libro electrónico
  4. 224
    por Roland, John F.
    Publicado 2004
    “…Cisco authorized self-study book for CCSP 642-501 foundation learning Identify the lineup of Cisco Systems network security products and enumerate the components of a complete security policy Use Cisco Secure ACS for Windows and Cisco Secure ACS for UNIX to implement TACACS+ and RADIUS AAA support in Cisco router networks Configure AAA support on perimeter Cisco routers and Cisco IOS Firewalls Implement standard practices to secure administrative access and disable unused router protocols, services, and interfaces Use AutoSecure to configure security parameters on Cisco routers Configure Cisco IOS Firewalls for CBAC, Authentication Proxy, and AAA support Configure and manage Cisco IOS IDS router signatures and audit rules Monitor Cisco IOS IDS routers using Security Monitor or Syslog servers Configure IPSec VPN tunnels on Cisco routers using preshared keys or RSA signatures Configure Cisco routers to use IPSec with Network Address Translation Use Security Device Manager and Router Management Center to configure and manage Cisco IOS VPN and Cisco IOS Firewall policies Mitigate common router security threats with access control lists (ACLs) CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is a complete reference for security practices, protocols, software, and equipment that work on or in conjunction with Cisco IOS equipment to provide layers of security to networks. …”
    Libro electrónico
  5. 225
    Publicado 2012
    “…These hands-on video lessons cover hardening network devices with Cisco Configuration Professional (CCP), implementing secure management and monitoring, using ACS and TACACS+, implementing layer 2 protection for switches, packet filtering ACLs, configuring Cisco IOS zone-based firewalls and Cisco ASA firewalls, adding IPS to Cisco routers, connecting IPsec site to site VPN tunnels on Cisco routers, and implementing SSL VPNs on the Cisco ASA. …”
    Video
  6. 226
    Publicado 2018
    Tabla de Contenidos: “…Shared narratives: intermediality in fandom -- Fan membership: traditional and digital fieldwork -- Naturalizing Sherlock: Dutch fans interpret the famous detective -- Queer teen drama: rewriting and narrative closure in Glee fan fiction -- Transmedia play: approaching the possible worlds of Firefly -- Embodied characters: the affective process of cosplay -- Conclusion: prospects for fan studies…”
    Libro electrónico
  7. 227
    Publicado 2010
    “…Get the focused, scenario-based guidance you need to plan and deploy Forefront Threat Management Gateway (TMG) as your network perimeter firewall. The evolution of Microsoft ISA Server, Forefront TMG provides multiple layers of continuously updated protections against the latest Web-based threats, including URL filtering, antimalware inspection, and intrusion prevention. …”
    Libro electrónico
  8. 228
    Publicado 2022
    Tabla de Contenidos: “…Birds: Particle Swarm and Cuckoo Search Optimization -- 4. Insects: Firefly Optimization -- 5. Sea Creatures: Salp Swarm Optimization…”
    Libro electrónico
  9. 229
    por Jellow, D. H. L. (h. c. ).
    Publicado 2023
    Tabla de Contenidos: “…Moving a VM to a different network segment -- Summary -- Part 3: Configuring Your AVS -- Chapter 7: Creating and Configuring a Secure vWAN Hub for Internet Connectivity -- Azure vWAN in Azure -- Advantages of a vWAN -- vWAN types -- Creating a vWAN in Azure -- Prerequisites -- Creating a virtual hub and an ExpressRoute Gateway in the vWAN -- Connecting the AVS ExpressRoute circuit to the hub gateway -- Changing the size of the gateway -- Deploying Azure Firewall to secure the vWAN -- Prerequisites -- Deploying Azure Firewall -- Creating an Azure Firewall policy for the AVS internet connection -- Adding a rule to the firewall policy -- Associating the Firewall policy with the hub -- Routing the AVS traffic to the vWAN hub -- Summary -- Chapter 8: Inspecting Traffic for AVS -- Internet consideration design options for AVS -- SNAT managed from AVS -- Public IP to the AVS NSX Edge -- Some considerations for which option you choose to utilize -- Implementing an NVA solution for traffic inspection -- Prerequisites -- Creating a virtual network -- Deploying an Azure Route Server -- Deploying a Quagga using an NVA -- Configuring the Route Server peering -- Checking the learned routes on the Route Server and the Quagga NVA -- Summary -- CChapter 9: Storage Concepts in AVS -- Fault tolerance and storage policies -- Configuring a storage policy -- Prerequisites -- Listing all storage policies -- Setting a storage policy for a VM -- Specifying the default storage policy for an AVS cluster -- Encryption of data at rest -- Azure NetApp Files -- Prerequisites -- Creating a NetApp Files volume for AVS -- Creating a NetApp account -- Creating a capacity pool for Azure NetApp Files -- Delegating a subnet to Azure NetApp Files -- Creating an NFS volume for Azure NetApp Files -- Attaching an Azure NetApp Files volume to an AVS cluster -- Supported regions…”
    Libro electrónico
  10. 230
    Publicado 2022
    “…Learn to build networks, load balancers, and firewalls using Python and Terraform, and confidently update infrastructure while your software is running. …”
    Grabación no musical
  11. 231
    por Porter, Thomas, PhD
    Publicado 2007
    Tabla de Contenidos: “…Skype SecuritySecurity; Chapter 11. Skype Firewall and Network Setup; A Word about Network Address Translation and Firewalls; What You Need to Know About Configuring Your Network Devices; Ports Required for Skype; Using Proxy Servers and Skype; How to Block Skype in the Enterprose; Endnote; Appendix A. …”
    Libro electrónico
  12. 232
    Publicado 2013
    Tabla de Contenidos: “…UTM vs Other Security ArchitecturesUTM vs Best-of-Breed; UTM vs Next-Generation Firewalls; UTM vs XTM; Solving Problems with UTM; Better Security; Consistent Security Policy; Protecting against Blended Threats; Implementing Clean Pipes; More Efficient Security; Higher Performance; Enhancing Operational Response Times (Meeting and Enhancing SLAs); Getting a better Support Experience; Increasing Network Availability; Cost Effectiveness; Easier Investment Justification; Licensing Simplicity; Lowering Operational Costs; Current UTM Market Landscape; UTM a-lá Fortinet; Reliable Performance…”
    Libro electrónico
  13. 233
    por Russel, Charlie
    Publicado 2009
    Tabla de Contenidos:
    Libro electrónico
  14. 234
    Publicado 2022
    Tabla de Contenidos: “…Table of Contents Getting Started with Microsoft Defender for Cloud Multi-Cloud Connectivity Workflow Automation and Continuous Export Secure Score and Recommendations Security Alerts Regulatory Compliance and Security Policy Microsoft Defender for Cloud Workload Protection Firewall Manager Information Protection Workbooks…”
    Libro electrónico
  15. 235
    por Stewart, Eric L.
    Publicado 2009
    Tabla de Contenidos: “…Network insecurity -- Building a secure network using security controls -- Security at the network perimeter -- Implementing secure management and hardening the router -- Using Cisco IOS firewalls to implement a network security policy -- Introducing cryptographic services -- Virtual private networks with IPsec -- Network security using Cisco IOS IPS -- Introduction to Endpoint, SAN, and Voice Security -- Protecting switch infrastructure…”
    CDROM
  16. 236
    Publicado 2022
    Tabla de Contenidos: “…Network Design -- 3. Firewalls -- 4. Distributed Denial of Service -- 5. …”
    Libro electrónico
  17. 237
    Publicado 2022
    “…Next, you will understand security concepts, defense-in-depth, and key security services such as Network Security Groups and Azure Firewall, as well as security operations tooling such as Azure Security Center and Azure Sentinel…”
    Libro electrónico
  18. 238
    Publicado 2018
    Tabla de Contenidos: “…Running Linux in a Virtual Environment ; Securing User Accounts ; Securing Your Server with a Firewall - Part 1 ; Securing Your Server with a Firewall - Part 2 ; Encryption Technologies ; SSH Hardening -- Section 2: Mastering File and Directory Access Control. …”
    Libro electrónico
  19. 239
    por Yang, Xin-She
    Publicado 2014
    Tabla de Contenidos: “…6.3 Variants6.4 Choice of Parameters; 6.5 Convergence Analysis; 6.6 Implementation; References; 7 Particle Swarm Optimization; 7.1 Swarm Intelligence; 7.2 PSO Algorithm; 7.3 Accelerated PSO; 7.4 Implementation; 7.5 Convergence Analysis; 7.5.1 Dynamical System; 7.5.2 Markov Chain Approach; 7.6 Binary PSO; References; 8 Firefly Algorithms; 8.1 The Firefly Algorithm; 8.1.1 Firefly Behavior; 8.1.2 Standard Firefly Algorithm; 8.1.3 Variations of Light Intensity and Attractiveness; 8.1.4 Controlling Randomization; 8.2 Algorithm Analysis; 8.2.1 Scalings and Limiting Cases…”
    Libro electrónico
  20. 240
    Publicado 2010
    “…The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great Firewall of China" is one of the first national Internet filtering systems. …”
    Libro electrónico