Mostrando 241 - 260 Resultados de 1,060 Para Buscar 'Firefall~', tiempo de consulta: 1.67s Limitar resultados
  1. 241
    Publicado 2023
    Tabla de Contenidos: “…-- Chapter 1 The New Gold-Cybersecurity 101 -- The battle over data -- Gold on the cloud -- The Internet of Things -- Chapter 2 The Keyboard War-How Global Militaries Exploited the New Domain -- The new Trojan horse -- Hacking public opinion -- Chapter 3 "Hello, It's Me, a Nigerian Prince"-New Crime -- Fraud -- Extortion -- Hacktivism -- Chapter 4 The New Money-Catalysts of Cybercrime -- The dark web -- Bitcoin -- Section 2 Cybernation -- Chapter 5 The Pioneer-The Story of Check Point -- Before cyber was fully cyber -- Chapter 6 The Love Letter That Leaked-From Personal Security to Systems Security -- Sanctum: Firewalls for browsers -- "You idiot!" -- Imperva: A firewall for websites -- The man who walked away -- The love letter that leaked: CyberArk and the digital wallet -- Cyber: A booming market -- Chapter 7 From Security to Defense-The Cyber "Iron Dome" -- The turning point of 2010 -- Paradigm shift -- From inertia to growth -- Chapter 8 The Best Defense-"Daddy, What Do You Do?" …”
    Libro electrónico
  2. 242
    Publicado 2008
    Tabla de Contenidos: “…Control your email -- Organize your data -- Trick yourself into getting done -- Clear your mind -- Firewall your attention -- Streamline common jobs -- Automate repetitive tasks -- Get your data to go -- Master the web -- Hone your computer survival skills -- Manage multiple computers…”
    Libro electrónico
  3. 243
    Publicado 2023
    Tabla de Contenidos: “…Bat algorithm with double mutation -- Time factor modification -- Cauchy mutation operator modification -- Gaussian mutation operator -- References -- 6. Firefly Algorithm, Harmony Search and Cat Swarm Algorithm -- Firefly algorithm -- Firefly algorithm variants -- Firefly algorithm with Lévy flights -- Chaotic firefly algorithms -- Harmony search algorithm -- Harmony search example -- Harmony search variants -- Improved harmony search algorithm -- Chaotic harmony search -- Cat swarm Optimization -- Cat swarm algorithm -- Basic description of Cat Swarm Algorithm -- Cat algorithm variants -- Binary discrete Cat algorithm -- Improved cat swarm optimization -- References -- 7. …”
    Libro electrónico
  4. 244
    Publicado 2016
    Tabla de Contenidos: “…5.1.2 DNS Operation -- 5.1.3 Top-Level Domain Labels -- 5.1.4 DNS Security -- 5.2 Firewalls -- 5.2.1 Network Perimeter Control -- 5.2.2 Stateless Firewalls -- 5.2.3 Stateful Firewalls -- 5.2.4 Application-Layer Firewalls -- 5.3 NAT Boxes -- 5.3.1 Allocation of Private IP Addresses -- 5.3.2 Architecture and Operation of the NAT Boxes -- 5.3.3 Living with NAT -- 5.3.4 Carrier-Grade NAT -- 5.4 Load Balancers -- 5.4.1 Load Balancing in a Server Farm -- 5.4.2 A Practical Example: A Load-Balanced Web Service -- 5.4.3 Using DNS for Load Balancing -- References -- 6 Cloud Storage and the Structure of a Modern Data Center -- 6.1 Data Center Basics -- 6.1.1 Compute -- 6.1.2 Storage -- 6.1.3 Networking -- 6.2 Storage-Related Matters -- 6.2.1 Direct-Attached Storage -- 6.2.2 Network-Attached Storage -- 6.2.3 Storage Area Network -- 6.2.4 Convergence of SAN and Ethernet -- 6.2.5 Object Storage -- 6.2.6 Storage Virtualization -- 6.2.7 Solid-State Storage -- References -- 7 Operations, Management, and Orchestration in the Cloud -- 7.1 Orchestration in the Enterprise -- 7.1.1 The Service-Oriented Architecture -- 7.1.2 Workflows -- 7.2 Network and Operations Management -- 7.2.1 The OSI Network Management Framework and Model -- 7.2.2 Policy-Based Management -- 7.3 Orchestration and Management in the Cloud -- 7.3.1 The Life Cycle of a Service -- 7.3.2 Orchestration and Management in OpenStack -- 7.4 Identity and Access Management -- 7.4.1 Implications of Cloud Computing -- 7.4.2 Authentication -- 7.4.3 Access Control -- 7.4.4 Dynamic Delegation -- 7.4.5 Identity Federation -- 7.4.6 OpenStack Keystone (A Case Study) -- References -- Appendix: Selected Topics -- A.1 The IETF Operations and Management Standards -- A.1.1 SNMP -- A.1.2 COPS -- A.1.3 Network Configuration (NETCONF) Model and Protocol -- A.2 Orchestration with TOSCA -- A.3 The REST Architectural Style…”
    Libro electrónico
  5. 245
    por Kermani, S. Zohreh
    Publicado 2013
    Tabla de Contenidos: “…Crafting history -- Old souls: pagan childhood -- Parenting in Neverland -- Don't eat the incense: children in ritual -- A room full of fireflies -- My dream come true -- Building fairy houses -- American pagan families & family values, online survey -- Second-generation pagans: experiences and opinions, online survey…”
    Click para texto completo desde fuera UPSA
    Click para texto completo desde UPSA
    Libro electrónico
  6. 246
    por Kermani, S. Zohreh
    Publicado 2013
    Tabla de Contenidos: “…Crafting history -- Old souls: pagan childhood -- Parenting in Neverland -- Don't eat the incense: children in ritual -- A room full of fireflies -- My dream come true -- Building fairy houses -- American pagan families & family values, online survey -- Second-generation pagans: experiences and opinions, online survey…”
    Libro electrónico
  7. 247
    Publicado 2018
    Tabla de Contenidos: “…Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels…”
    Libro electrónico
  8. 248
    por Brown, Jason
    Publicado 2023
    Tabla de Contenidos: “…Building trust into the network -- Virtual private networking and remote access -- Getting to know the "zero trust" concept -- Understanding firewall functionality -- Web application firewalls -- DNS firewalls -- Distributed denial of service -- Summary -- References -- Chapter 10: Computer and Server Security -- The history of operating systems -- Exploring server hardening steps -- Operating system patching -- Least privilege -- Removing unneeded services -- Host-based security -- Picking the right password -- MFA -- Secure software configurations -- Changing system defaults -- Remote management -- Zero trust -- Dangers of TOFU -- The IoT -- Understanding encryption -- Digital signatures -- Protecting the private key -- Summary -- References -- Chapter 11: Securing Software Development through DevSecOps -- Why introduce cybersecurity early? …”
    Libro electrónico
  9. 249
    Publicado 2024
    Tabla de Contenidos: “…-- Linux server multi-factor authentication (MFA) -- Server patching -- Enabling TLS/SSL -- Installing an SSL certificate -- Configuring SSL/TLS client connections -- SSL certificate validation -- Alternatives to Let's Encrypt SSL certificates -- Investigating firewalls -- Linux server firewalls -- Uncomplicated Firewall -- fail2ban -- Learning about exfiltration -- Exploring server immutability -- CI/CD with GitLab -- An introduction to containerization -- Summary -- Chapter 5: Endpoint Protection -- Technical requirements -- Malware -- What are rootkits? …”
    Libro electrónico
  10. 250
    Publicado 2007
    “…Offering in-depth coverage of all significant new security technologies in Windows Vista, this book addresses User Account Control, the new Firewall, Internet Explorer 7.0, Windows Defender, Service Hardening, and BitLocker…”
    Libro electrónico
  11. 251
    por Klein, Scott, 1966-
    Publicado 2012
    Tabla de Contenidos: “…; About Geographic Locations; Storing Data in Azure; SQL Database Primer; Registering for Azure; Creating a SQL Database Instance; Configuring the Firewall; Connecting with SQL Server Management Studio; Creating Logins and Users…”
    Libro electrónico
  12. 252
    Publicado 2015
    “…Shoot HD video, too. Shop with ease. Use Firefly to identify music, videos, and other items, and go straight to the product’s Amazon page. …”
    Libro electrónico
  13. 253
    por Heuermann, Lewis
    Publicado 2024
    Tabla de Contenidos:
    Libro electrónico
  14. 254
    por Maximo, Rui
    Publicado 2009
    Tabla de Contenidos: “…Configuring the Subject Alternative NameConfiguring the CRL Distribution Points; Configuring for Enhanced Key Usage; Client Authentication; Configuring the Certification Path; Scaling with SQL Server; Building Redundancy with Hardware Load Balancing; Bridging VoIP to the PSTN Network by Using a Media Gateway; Firewall Scenarios and Configuration; Three-Legged Firewall; Port and Protocol Configuration for Edge Servers; Examining Rules for Access Edge Servers; Examining Rules for Web Conferencing Edge Servers; Examining Rules for A/V Edge Servers; Examining Rules for the Web Components Server…”
    Libro electrónico
  15. 255
    por Speed, Tim
    Publicado 2003
    Tabla de Contenidos: “…Protecting Your Intranet from the Extranet and Internet; 5.1 So many choices!; 5.2 Firewall product functional summaries; 5.3 Firewall buyer's assessment form; 5.4 Firewall vendors: Picking the products that are right for you; 5.5 SSL network appliance overview; 5.6 Secure access-SSL based extranet appliances; 5.7 Understanding air gap-based filtering proxies and their benefits when used for deploying web applications…”
    Libro electrónico
  16. 256
    Publicado 2015
    Tabla de Contenidos:
    Libro electrónico
  17. 257
    Publicado 2020
    Tabla de Contenidos: “…-- The Three Pillars of Cybersecurity -- Two Approaches to Security -- Physical Security: Locking Your Doors -- Securing User Accounts -- Obfuscating your usernames -- Using passwords wisely -- Generating passwords For Dummies -- Secure the Administrator account -- Managing User Security -- User accounts -- Built-in accounts -- User rights -- Permissions (who gets what) -- Group therapy -- User profiles -- Logon scripts -- Securing the Human Firewall -- Chapter 20 Hardening Your Network -- Firewalls -- The Many Types of Firewalls -- Packet filtering -- Stateful packet inspection (SPI) -- Circuit-level gateway -- Application gateway -- Next-generation firewall -- Virus Protection -- What is a virus? …”
    Libro electrónico
  18. 258
    Publicado 2016
    Tabla de Contenidos: “…Cover; Contents; List of Figures; List of Tables; Preface; 1: Introduction; 2: Bat Algorithm (BA); 3: Artificial Fish Swarm; 4: Cuckoo Search Algorithm; 5: Firefly Algorithm (FFA); 6: Flower Pollination Algorithm; 7: Artificial Bee Colony Optimization; 8: Wolf-Based Search Algorithms; 9: Bird's-Eye View; Back Cover…”
    Libro electrónico
  19. 259
    Publicado 2021
    “…By the end of this Palo Alto Networks book, you will have mastered the skills needed to design and configure SASE-compliant remote connectivity and prevent credential theft with credential detection.What you will learn* Understand how log forwarding is configured on the firewall* Focus on effectively enabling remote access* Explore alternative ways for connecting users and remote networks* Protect against phishing with credential detection* Understand how to troubleshoot complex issues confidently* Strengthen the security posture of your firewallsWho this book is forThis book is for anyone who wants to learn more about remote access for users and remote locations by using GlobalProtect and Prisma access and by deploying Large Scale VPN. …”
    Libro electrónico
  20. 260
    Publicado 2009
    “…The report is richly illustrated with 241 full-color screenshots, giving readers the unique opportunity to see good intranet designs that are usually hidden behind a firewall. These intranets represent big companies with large amounts of documents and mission-critical applications such as sales force support. …”
    Libro electrónico