Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
221Publicado 2019Tabla de Contenidos: “…Azure Virtual Network -- Virtual Machine Networking -- Network Security Groups -- Managing IP Addresses -- Local and Virtual Network Gateways -- Creating Hybrid Connections -- DNS and Routing -- Load Balancers -- Traffic Manager -- Azure Firewall…”
Libro electrónico -
222por Deveriya, Anand“…The all-in-one practical guide to supporting your Cisco network Provides detailed tips for using freeware and open-source tools readily available from the Internet, including the reasons behind choosing a particular tool Refer to a single source for common Cisco network administration issues Dedicated section for network security aids administrators in effectively dealing with security issues Deploy fully functional RADIUS and TACACS+ for servers for controlling access to Cisco devices Deploy Linux- and Windows-based syslog servers to centrally collect syslog information generated by Cisco devices Deploy Linux- and Windows-based network monitoring systems to monitor interface traffic through Cisco devices including routers, switches, VPN concentrators, and Cisco PIX® firewalls Use the trending feature of network monitoring systems for long-term network analysis and capacity planning Automatically detect and report configuration changes on Cisco IOS® Software-based devices and Cisco PIX firewalls Deploy Cisco-based VPNs in mixed environments using Linux- and Windows-based VPN servers Network Administrators Survival Guide solves many common network administration problems by providing administrators with an all-in-one practical guide to supporting Cisco® networks using freeware tools. …”
Publicado 2005
Libro electrónico -
223por O'Leary, Mike. author“…You will develop situational awareness of your network and will build a complete defensive infrastructure—including log servers, network firewalls, web application firewalls, and intrusion detection systems. …”
Publicado 2015
Libro electrónico -
224por Roland, John F.“…Cisco authorized self-study book for CCSP 642-501 foundation learning Identify the lineup of Cisco Systems network security products and enumerate the components of a complete security policy Use Cisco Secure ACS for Windows and Cisco Secure ACS for UNIX to implement TACACS+ and RADIUS AAA support in Cisco router networks Configure AAA support on perimeter Cisco routers and Cisco IOS Firewalls Implement standard practices to secure administrative access and disable unused router protocols, services, and interfaces Use AutoSecure to configure security parameters on Cisco routers Configure Cisco IOS Firewalls for CBAC, Authentication Proxy, and AAA support Configure and manage Cisco IOS IDS router signatures and audit rules Monitor Cisco IOS IDS routers using Security Monitor or Syslog servers Configure IPSec VPN tunnels on Cisco routers using preshared keys or RSA signatures Configure Cisco routers to use IPSec with Network Address Translation Use Security Device Manager and Router Management Center to configure and manage Cisco IOS VPN and Cisco IOS Firewall policies Mitigate common router security threats with access control lists (ACLs) CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is a complete reference for security practices, protocols, software, and equipment that work on or in conjunction with Cisco IOS equipment to provide layers of security to networks. …”
Publicado 2004
Libro electrónico -
225Publicado 2012“…These hands-on video lessons cover hardening network devices with Cisco Configuration Professional (CCP), implementing secure management and monitoring, using ACS and TACACS+, implementing layer 2 protection for switches, packet filtering ACLs, configuring Cisco IOS zone-based firewalls and Cisco ASA firewalls, adding IPS to Cisco routers, connecting IPsec site to site VPN tunnels on Cisco routers, and implementing SSL VPNs on the Cisco ASA. …”
-
226Publicado 2018Tabla de Contenidos: “…Shared narratives: intermediality in fandom -- Fan membership: traditional and digital fieldwork -- Naturalizing Sherlock: Dutch fans interpret the famous detective -- Queer teen drama: rewriting and narrative closure in Glee fan fiction -- Transmedia play: approaching the possible worlds of Firefly -- Embodied characters: the affective process of cosplay -- Conclusion: prospects for fan studies…”
Libro electrónico -
227Publicado 2010“…Get the focused, scenario-based guidance you need to plan and deploy Forefront Threat Management Gateway (TMG) as your network perimeter firewall. The evolution of Microsoft ISA Server, Forefront TMG provides multiple layers of continuously updated protections against the latest Web-based threats, including URL filtering, antimalware inspection, and intrusion prevention. …”
Libro electrónico -
228Publicado 2022Tabla de Contenidos: “…Birds: Particle Swarm and Cuckoo Search Optimization -- 4. Insects: Firefly Optimization -- 5. Sea Creatures: Salp Swarm Optimization…”
Libro electrónico -
229por Jellow, D. H. L. (h. c. ).Tabla de Contenidos: “…Moving a VM to a different network segment -- Summary -- Part 3: Configuring Your AVS -- Chapter 7: Creating and Configuring a Secure vWAN Hub for Internet Connectivity -- Azure vWAN in Azure -- Advantages of a vWAN -- vWAN types -- Creating a vWAN in Azure -- Prerequisites -- Creating a virtual hub and an ExpressRoute Gateway in the vWAN -- Connecting the AVS ExpressRoute circuit to the hub gateway -- Changing the size of the gateway -- Deploying Azure Firewall to secure the vWAN -- Prerequisites -- Deploying Azure Firewall -- Creating an Azure Firewall policy for the AVS internet connection -- Adding a rule to the firewall policy -- Associating the Firewall policy with the hub -- Routing the AVS traffic to the vWAN hub -- Summary -- Chapter 8: Inspecting Traffic for AVS -- Internet consideration design options for AVS -- SNAT managed from AVS -- Public IP to the AVS NSX Edge -- Some considerations for which option you choose to utilize -- Implementing an NVA solution for traffic inspection -- Prerequisites -- Creating a virtual network -- Deploying an Azure Route Server -- Deploying a Quagga using an NVA -- Configuring the Route Server peering -- Checking the learned routes on the Route Server and the Quagga NVA -- Summary -- CChapter 9: Storage Concepts in AVS -- Fault tolerance and storage policies -- Configuring a storage policy -- Prerequisites -- Listing all storage policies -- Setting a storage policy for a VM -- Specifying the default storage policy for an AVS cluster -- Encryption of data at rest -- Azure NetApp Files -- Prerequisites -- Creating a NetApp Files volume for AVS -- Creating a NetApp account -- Creating a capacity pool for Azure NetApp Files -- Delegating a subnet to Azure NetApp Files -- Creating an NFS volume for Azure NetApp Files -- Attaching an Azure NetApp Files volume to an AVS cluster -- Supported regions…”
Publicado 2023
Libro electrónico -
230Publicado 2022“…Learn to build networks, load balancers, and firewalls using Python and Terraform, and confidently update infrastructure while your software is running. …”
Grabación no musical -
231por Porter, Thomas, PhDTabla de Contenidos: “…Skype SecuritySecurity; Chapter 11. Skype Firewall and Network Setup; A Word about Network Address Translation and Firewalls; What You Need to Know About Configuring Your Network Devices; Ports Required for Skype; Using Proxy Servers and Skype; How to Block Skype in the Enterprose; Endnote; Appendix A. …”
Publicado 2007
Libro electrónico -
232Publicado 2013Tabla de Contenidos: “…UTM vs Other Security ArchitecturesUTM vs Best-of-Breed; UTM vs Next-Generation Firewalls; UTM vs XTM; Solving Problems with UTM; Better Security; Consistent Security Policy; Protecting against Blended Threats; Implementing Clean Pipes; More Efficient Security; Higher Performance; Enhancing Operational Response Times (Meeting and Enhancing SLAs); Getting a better Support Experience; Increasing Network Availability; Cost Effectiveness; Easier Investment Justification; Licensing Simplicity; Lowering Operational Costs; Current UTM Market Landscape; UTM a-lá Fortinet; Reliable Performance…”
Libro electrónico -
233
-
234Publicado 2022Tabla de Contenidos: “…Table of Contents Getting Started with Microsoft Defender for Cloud Multi-Cloud Connectivity Workflow Automation and Continuous Export Secure Score and Recommendations Security Alerts Regulatory Compliance and Security Policy Microsoft Defender for Cloud Workload Protection Firewall Manager Information Protection Workbooks…”
Libro electrónico -
235por Stewart, Eric L.Tabla de Contenidos: “…Network insecurity -- Building a secure network using security controls -- Security at the network perimeter -- Implementing secure management and hardening the router -- Using Cisco IOS firewalls to implement a network security policy -- Introducing cryptographic services -- Virtual private networks with IPsec -- Network security using Cisco IOS IPS -- Introduction to Endpoint, SAN, and Voice Security -- Protecting switch infrastructure…”
Publicado 2009
CDROM -
236Publicado 2022Tabla de Contenidos: “…Network Design -- 3. Firewalls -- 4. Distributed Denial of Service -- 5. …”
Libro electrónico -
237Publicado 2022“…Next, you will understand security concepts, defense-in-depth, and key security services such as Network Security Groups and Azure Firewall, as well as security operations tooling such as Azure Security Center and Azure Sentinel…”
Libro electrónico -
238Publicado 2018Tabla de Contenidos: “…Running Linux in a Virtual Environment ; Securing User Accounts ; Securing Your Server with a Firewall - Part 1 ; Securing Your Server with a Firewall - Part 2 ; Encryption Technologies ; SSH Hardening -- Section 2: Mastering File and Directory Access Control. …”
Libro electrónico -
239por Yang, Xin-SheTabla de Contenidos: “…6.3 Variants6.4 Choice of Parameters; 6.5 Convergence Analysis; 6.6 Implementation; References; 7 Particle Swarm Optimization; 7.1 Swarm Intelligence; 7.2 PSO Algorithm; 7.3 Accelerated PSO; 7.4 Implementation; 7.5 Convergence Analysis; 7.5.1 Dynamical System; 7.5.2 Markov Chain Approach; 7.6 Binary PSO; References; 8 Firefly Algorithms; 8.1 The Firefly Algorithm; 8.1.1 Firefly Behavior; 8.1.2 Standard Firefly Algorithm; 8.1.3 Variations of Light Intensity and Attractiveness; 8.1.4 Controlling Randomization; 8.2 Algorithm Analysis; 8.2.1 Scalings and Limiting Cases…”
Publicado 2014
Libro electrónico -
240Publicado 2010“…The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great Firewall of China" is one of the first national Internet filtering systems. …”
Libro electrónico