Mostrando 261 - 280 Resultados de 1,060 Para Buscar 'Firefall~', tiempo de consulta: 1.61s Limitar resultados
  1. 261
    Publicado 2024
    “…Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. …”
    Libro electrónico
  2. 262
    Publicado 2004
    Tabla de Contenidos: “…I. Living Sync -- 1. Fireflies and the Inevitability of Sync -- 2. Brain Waves and the Conditions for Sync -- 3. …”
    Libro
  3. 263
    Publicado 2022
    “…Learn to build networks, load balancers, and firewalls using Python and Terraform, and confidently update infrastructure while your software is running. …”
    Vídeo online
  4. 264
    por Barrett, Daniel J.
    Publicado 2003
    Tabla de Contenidos: “…2.10 Blocking Remote Access, but Permitting LocalProblem; Solution; Discussion; See Also; 2.11 Controlling Access by MAC Address; Problem; Solution; Discussion; See Also; 2.12 Permitting SSH Access Only; Problem; Solution; Discussion; See Also; 2.13 Prohibiting Outgoing Telnet Connections; Problem; Solution; Discussion; See Also; 2.14 Protecting a Dedicated Server; Problem; Solution; Discussion; See Also; 2.15 Preventing pings; Problem; Solution; Discussion; See Also; 2.16 Listing Your Firewall Rules; Problem; Solution; Discussion; See Also; 2.17 Deleting Firewall Rules; Problem; Solution…”
    Libro electrónico
  5. 265
    por Tulloch, Mitch
    Publicado 2009
    Tabla de Contenidos: “…Configuring WER Settings Using an Answer FileParticipating in the Customer Experience Improvement Program; Configuring CEIP Settings Using an Answer File; Activating Windows; Activating Windows Using an Answer File; Enabling Remote Desktop; Configuring Remote Desktop to Require Network Level Authentication; Enabling Remote Desktop Using an Answer File; Enabling Remote Administration of Windows Firewall; Configuring Windows Firewall from the Command Prompt; Enabling Remote Administration of Windows Firewall Using an Answer File; Joining a Domain; Joining a Domain Using an Answer File…”
    Libro electrónico
  6. 266
    Publicado 2014
    Tabla de Contenidos: “…Configuring SSL Security for Web ManagerConfiguring Single Sign-On; Configuring user accounts and roles; Configuring services and service groups; Chapter 8: Configuring vShield App; Introduction; Installing vShield App; Configuring vShield App; Configuring vShield App Flow Monitoring; Configuring vShield App Firewall; Configuring vShield App SpoofGuard; Chapter 9: Configuring vShield Edge; Introduction; Installing vShield Edge; Managing appliances; Managing interfaces; Managing certificates and revocation lists; Managing firewall rules; Managing NAT rules and static routes…”
    Libro electrónico
  7. 267
    Publicado 2022
    Tabla de Contenidos: “…Table of Contents Understanding Ethical Hacking Introduction to Reconnaissance Reconnaissance – A Deeper Dive Scanning Networks Enumeration Vulnerability Analysis System Hacking Social Engineering Malware and Other Digital Attacks Sniffing and Evading IDS, Firewalls, and Honeypots Hacking Wireless Networks Hacking Mobile Platforms Hacking Web Servers and Web Apps Hacking IoT and OT Cloud Computing Using Cryptography CEH Exam Practice Questions…”
    Libro electrónico
  8. 268
    Publicado 2009
    “…Using a mix of test cases, case studies, use cases, and tangential answers to real-world problems, this book covers: Enterprise switching and virtual LANs (VLANs) The Spanning tree protocol and why it's needed Inter-VLAN routing, including route tables and preferences Routing policy and firewall filters Switching security, such as DHCP snooping Telephony integration, including VLAN voice Part of the Juniper Networks Technical Library, JUNOS Enterprise Switching provides all-inclusive coverage of the Juniper Networks EX product platform, including architecture and packet flow, management options, user interface options, and complete details on JUNOS switch deployment…”
    Libro electrónico
  9. 269
    Publicado 2010
    “…With this document as your guide, you will review topics on layer 2 security, Network Address Translation (NAT), Cisco IOS firewall, Cisco IOS IPS, VPNs, and Cisco network foundation protection. …”
    Libro electrónico
  10. 270
    Publicado 2023
    Tabla de Contenidos: “…Creating the BP_Enemy blueprint -- Testing the game -- Summary -- Chapter 8: Handling Collisions -- Technical requirements -- Understanding collision detection -- Setting the collision presets -- Using collisions for game interactions -- Downloading and creating the weapon, defense tower, and fireball actors -- Picking up weapons -- Spawning a weapon for the enemy -- Defense tower firing fireballs -- Moving the fireball and checking whether the target is hit -- Processing a defense tower hit -- Summary -- Chapter 9: Improving C++ Code Quality -- Technical requirements -- Refactoring code -- Combining the PlayerAvatarAnimInstance and EnemyAnimInstance classes -- Making PangaeaCharacter the parent class of APlayerAvatar and AEnemy -- Refining code -- Using caching variables -- Creating a fireball pool -- Outputting debug messages -- Using the UE_LOG macro -- Printing debug messages to the screen -- Checking an Actor instance's actual class type -- Summary -- Part 3 - Making a Complete Multiplayer Game -- Chapter 10: Making Pangaea a Network Multiplayer Game -- Technical requirements -- Comparing single-player and multiplayer games -- Launching the multiplayer Pangaea game in the editor -- Understanding multiplayer game network modes -- Handling network synchronizations -- Notifying player attacks with RPCs -- Syncing actor variables to clients with replications -- Updating the character health bar with RepNotify -- Processing hits on the server -- Spawning fireballs on the server side -- Summary -- Chapter 11: Controlling the Game Flow -- Technical requirements -- Designing the Pangaea game's flow -- Creating the UI widgets -- Creating BP_LobbyWidget -- Creating BP_HUDWidget -- Creating BP_GameOverWidget -- Adding networking functions to PangaeaGameInstance -- Adding UI widgets to game levels -- Adding the game timer…”
    Libro electrónico
  11. 271
    por Mueller, John, 1958-
    Publicado 2002
    “…Topics range from: * Installation of Windows XP * Whether to upgrade and if so, how to do it * Configuring services and setting up users * Navigation of the new menus * Explanation of the new internet options, such as third party cookie alert, firewalls, and web publishing wizard * Registry configurations * Integration ideas for home networks and explanations about using the networking wizards * Accessory overview * Using XP on laptops * Working with Linux Maintaining the system & productivity tips…”
    Libro electrónico
  12. 272
    por Bautts, Tony
    Publicado 2005
    Tabla de Contenidos: “…Introduction to networking -- Issues of TCP/IP networking -- Configuring the serial hardware -- Configuring TCP/IP networking -- Name service and configuration -- The point-to-point protocol -- TCP/IP firewall -- IP accounting -- IP masquerade and network address translation -- Important network features -- Administration issues with electronic mail -- Sendmail -- Configuring IPv6 networks -- Configuring the Apache Web server -- IMAP -- Samba -- OpenLDAP -- Wireless networking -- Example network : the virtual brewery…”
    Libro electrónico
  13. 273
    por Murakami, Haruki, 1949-
    Publicado 2007
    Tabla de Contenidos: “…Introduction to the English edition -- Blind willow, sleeping woman -- Birthday girl -- New York mining disaster -- Airplane: or, how he talked to himself as if reciting poetry -- The mirror -- A folklore for my generation: a pre-history of late-stage capitalism -- Hunting knife -- A perfect day for kangaroos -- Dabchick -- Man-eating cats -- A "poor aunt" story -- Nausea 1979 -- The seventh man -- The year of spaghetti -- Tony Takitani -- The rise and fall of Sharpie cakes -- The ice man -- Crabs -- Firefly -- Chance traveler -- Hanalei Bay -- Where I'm likely to find it -- The kidney-shaped stone that moves every day -- A Shinagawa monkey…”
    Libro
  14. 274
    Publicado 2022
    Tabla de Contenidos: “…Saudi Arabia Monetary Authority (SAMA) Cybersecurity Framework -- Reserve Bank of India -- FIFA World Cup Qatar 2022 -- Monetary Authority of Singapore -- BDDK -- Others -- Summary -- Chapter 4: IT Security Technical Controls -- Off-Premises Unmanaged Devices -- MDM: Mobile Device Management -- MAM: Mobile Application Management -- NAC: Network Access Control -- Multi-Factor Authentication -- RASP for Mobile Applications -- Secure Connections -- OSI Model -- TCP/IP Model -- IPsec, SSH, and TLS -- IPsec -- SSH -- TLS -- Clean Pipes -- DDoS Mitigation -- Managed Devices -- Directory Service Integration -- Centralized Endpoint Management -- TPM: Trusted Platform Module -- VPN Client -- NAC: Network Access Control -- Data Classification -- UAM: User Activity Monitoring -- Endpoint Protection -- Phishing Reporting Tool -- Host IPS or EDR -- Desktop Firewall -- Antivirus -- Antispyware -- Full-Disk Encryption -- Application Control and Application Whitelisting -- Perimeter Security -- Firewalls -- Intrusion Detection and Intrusion Protection Systems -- Proxy and Content (URL) Filtering -- DLP: Data Loss Prevention -- Honeypot -- WAF: Web Application Firewall -- SSL VPN -- DNS -- Internal DNS Servers -- External DNS Servers -- Message Security -- Directory Integration for External Applications -- Sandbox -- File Integrity -- Encrypted Email -- On-Premises Support Controls -- Access Control -- Secure VLAN Segmentation -- Security Baselines -- Redundancy -- Load Balancing -- Encryption -- Multi-tier and Multi-layer -- Multi-layering -- Multi-tiering -- TLS Decryption -- Perimeter Static Routing -- Heartbeat Interfaces -- Disaster Recovery -- Time Synchronization -- Log Concentrator -- Routing and Management Networks -- Management Networks -- Perimeter Routing Networks -- Centralized Management -- Physical Network Segmentation -- Sinkhole…”
    Libro electrónico
  15. 275
    por Kale, David W., 1943-
    Publicado 2003
    Tabla de Contenidos: “…""Cover Page ""; ""Title Page ""; ""Copyright Page ""; ""Table of Contents ""; ""Preface""; ""1 Conflict in Action""; ""2 A Christian View of Healthy Conflict""; ""3 Sources of Church Conflict""; ""4 Conflict Levels""; ""5 Early Warning Signals and Creating Firewalls""; ""6 The Roles People Play""; ""7 The Church as a Communication System""; ""8 Fair Fighting; Dirty Fighting""; ""9 Communication Skills for Conflict Managers""; ""10 Mediation""; ""11 Negotiation""; ""12 Conflict Resolved""; ""Bibliography""…”
    Click para texto completo desde fuera UPSA
    Click para texto completo desde UPSA
    Libro electrónico
  16. 276
    por Sangbin Park, Calvin, author
    Publicado 2021
    Tabla de Contenidos: “…Table of Contents Jenkins Infrastructure with TLS/SSL and Reverse Proxy Jenkins with Docker on HTTPS on AWS and inside a Corporate Firewall GitOps-Driven CI Pipelines with GitHub GitOps-Driven CD Pipelines with Docker Hub and More Jenkinsfile Features Headfirst AWS for Jenkins Jenkins Configuration as Code (JCasC) Backup and Restore and Disaster Recovery Upgrading the Jenkins Controller, Agents, and Plugins Reducing Bottlenecks Shared Libraries Script Security…”
    Libro electrónico
  17. 277
    Publicado 2015
    Tabla de Contenidos: “…Introducing Windows 8.1 -- Planning the Windows 8.1 installation -- Installing Windows 8.1 -- Using virtualization technologies -- Networking -- Windows Firewall and remote access -- Managing Windows 8.1 in a domain -- Users and groups -- Managing security -- Managing files and disks on Windows 8.1 -- Managing Windows 8.1 hardware and printers -- Monitoring system performance and recovery -- Recovery and backup options -- Installing and configuring applications -- Appendix A. …”
    Libro electrónico
  18. 278
    Publicado 2019
    “…From there you will gain a basic understanding of firewall security, and discover how to leverage it using Network Security Groups and Application Security Groups. …”
    Vídeo online
  19. 279
    Publicado 2020
    “…Focusing on business benefits throughout, Gai shows how to provide essential shared services such as segment routing, NAT, firewall, micro-segmentation, load balancing, SSL/TLS termination, VPNs, RDMA, and storage–including storage compression and encryption. …”
    Libro electrónico
  20. 280
    Publicado 2021
    “…You'll then move on to Linux network diagnostics, setting up a Linux firewall, and using Linux as a host for network services. …”
    Libro electrónico