Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
261Publicado 2024“…Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. …”
Libro electrónico -
262Publicado 2004Tabla de Contenidos: “…I. Living Sync -- 1. Fireflies and the Inevitability of Sync -- 2. Brain Waves and the Conditions for Sync -- 3. …”
Libro -
263Publicado 2022“…Learn to build networks, load balancers, and firewalls using Python and Terraform, and confidently update infrastructure while your software is running. …”
Vídeo online -
264por Barrett, Daniel J.Tabla de Contenidos: “…2.10 Blocking Remote Access, but Permitting LocalProblem; Solution; Discussion; See Also; 2.11 Controlling Access by MAC Address; Problem; Solution; Discussion; See Also; 2.12 Permitting SSH Access Only; Problem; Solution; Discussion; See Also; 2.13 Prohibiting Outgoing Telnet Connections; Problem; Solution; Discussion; See Also; 2.14 Protecting a Dedicated Server; Problem; Solution; Discussion; See Also; 2.15 Preventing pings; Problem; Solution; Discussion; See Also; 2.16 Listing Your Firewall Rules; Problem; Solution; Discussion; See Also; 2.17 Deleting Firewall Rules; Problem; Solution…”
Publicado 2003
Libro electrónico -
265por Tulloch, MitchTabla de Contenidos: “…Configuring WER Settings Using an Answer FileParticipating in the Customer Experience Improvement Program; Configuring CEIP Settings Using an Answer File; Activating Windows; Activating Windows Using an Answer File; Enabling Remote Desktop; Configuring Remote Desktop to Require Network Level Authentication; Enabling Remote Desktop Using an Answer File; Enabling Remote Administration of Windows Firewall; Configuring Windows Firewall from the Command Prompt; Enabling Remote Administration of Windows Firewall Using an Answer File; Joining a Domain; Joining a Domain Using an Answer File…”
Publicado 2009
Libro electrónico -
266Publicado 2014Tabla de Contenidos: “…Configuring SSL Security for Web ManagerConfiguring Single Sign-On; Configuring user accounts and roles; Configuring services and service groups; Chapter 8: Configuring vShield App; Introduction; Installing vShield App; Configuring vShield App; Configuring vShield App Flow Monitoring; Configuring vShield App Firewall; Configuring vShield App SpoofGuard; Chapter 9: Configuring vShield Edge; Introduction; Installing vShield Edge; Managing appliances; Managing interfaces; Managing certificates and revocation lists; Managing firewall rules; Managing NAT rules and static routes…”
Libro electrónico -
267Publicado 2022Tabla de Contenidos: “…Table of Contents Understanding Ethical Hacking Introduction to Reconnaissance Reconnaissance – A Deeper Dive Scanning Networks Enumeration Vulnerability Analysis System Hacking Social Engineering Malware and Other Digital Attacks Sniffing and Evading IDS, Firewalls, and Honeypots Hacking Wireless Networks Hacking Mobile Platforms Hacking Web Servers and Web Apps Hacking IoT and OT Cloud Computing Using Cryptography CEH Exam Practice Questions…”
Libro electrónico -
268Publicado 2009“…Using a mix of test cases, case studies, use cases, and tangential answers to real-world problems, this book covers: Enterprise switching and virtual LANs (VLANs) The Spanning tree protocol and why it's needed Inter-VLAN routing, including route tables and preferences Routing policy and firewall filters Switching security, such as DHCP snooping Telephony integration, including VLAN voice Part of the Juniper Networks Technical Library, JUNOS Enterprise Switching provides all-inclusive coverage of the Juniper Networks EX product platform, including architecture and packet flow, management options, user interface options, and complete details on JUNOS switch deployment…”
Libro electrónico -
269Publicado 2010“…With this document as your guide, you will review topics on layer 2 security, Network Address Translation (NAT), Cisco IOS firewall, Cisco IOS IPS, VPNs, and Cisco network foundation protection. …”
Libro electrónico -
270Publicado 2023Tabla de Contenidos: “…Creating the BP_Enemy blueprint -- Testing the game -- Summary -- Chapter 8: Handling Collisions -- Technical requirements -- Understanding collision detection -- Setting the collision presets -- Using collisions for game interactions -- Downloading and creating the weapon, defense tower, and fireball actors -- Picking up weapons -- Spawning a weapon for the enemy -- Defense tower firing fireballs -- Moving the fireball and checking whether the target is hit -- Processing a defense tower hit -- Summary -- Chapter 9: Improving C++ Code Quality -- Technical requirements -- Refactoring code -- Combining the PlayerAvatarAnimInstance and EnemyAnimInstance classes -- Making PangaeaCharacter the parent class of APlayerAvatar and AEnemy -- Refining code -- Using caching variables -- Creating a fireball pool -- Outputting debug messages -- Using the UE_LOG macro -- Printing debug messages to the screen -- Checking an Actor instance's actual class type -- Summary -- Part 3 - Making a Complete Multiplayer Game -- Chapter 10: Making Pangaea a Network Multiplayer Game -- Technical requirements -- Comparing single-player and multiplayer games -- Launching the multiplayer Pangaea game in the editor -- Understanding multiplayer game network modes -- Handling network synchronizations -- Notifying player attacks with RPCs -- Syncing actor variables to clients with replications -- Updating the character health bar with RepNotify -- Processing hits on the server -- Spawning fireballs on the server side -- Summary -- Chapter 11: Controlling the Game Flow -- Technical requirements -- Designing the Pangaea game's flow -- Creating the UI widgets -- Creating BP_LobbyWidget -- Creating BP_HUDWidget -- Creating BP_GameOverWidget -- Adding networking functions to PangaeaGameInstance -- Adding UI widgets to game levels -- Adding the game timer…”
Libro electrónico -
271por Mueller, John, 1958-“…Topics range from: * Installation of Windows XP * Whether to upgrade and if so, how to do it * Configuring services and setting up users * Navigation of the new menus * Explanation of the new internet options, such as third party cookie alert, firewalls, and web publishing wizard * Registry configurations * Integration ideas for home networks and explanations about using the networking wizards * Accessory overview * Using XP on laptops * Working with Linux Maintaining the system & productivity tips…”
Publicado 2002
Libro electrónico -
272por Bautts, TonyTabla de Contenidos: “…Introduction to networking -- Issues of TCP/IP networking -- Configuring the serial hardware -- Configuring TCP/IP networking -- Name service and configuration -- The point-to-point protocol -- TCP/IP firewall -- IP accounting -- IP masquerade and network address translation -- Important network features -- Administration issues with electronic mail -- Sendmail -- Configuring IPv6 networks -- Configuring the Apache Web server -- IMAP -- Samba -- OpenLDAP -- Wireless networking -- Example network : the virtual brewery…”
Publicado 2005
Libro electrónico -
273por Murakami, Haruki, 1949-Tabla de Contenidos: “…Introduction to the English edition -- Blind willow, sleeping woman -- Birthday girl -- New York mining disaster -- Airplane: or, how he talked to himself as if reciting poetry -- The mirror -- A folklore for my generation: a pre-history of late-stage capitalism -- Hunting knife -- A perfect day for kangaroos -- Dabchick -- Man-eating cats -- A "poor aunt" story -- Nausea 1979 -- The seventh man -- The year of spaghetti -- Tony Takitani -- The rise and fall of Sharpie cakes -- The ice man -- Crabs -- Firefly -- Chance traveler -- Hanalei Bay -- Where I'm likely to find it -- The kidney-shaped stone that moves every day -- A Shinagawa monkey…”
Publicado 2007
Libro -
274Publicado 2022Tabla de Contenidos: “…Saudi Arabia Monetary Authority (SAMA) Cybersecurity Framework -- Reserve Bank of India -- FIFA World Cup Qatar 2022 -- Monetary Authority of Singapore -- BDDK -- Others -- Summary -- Chapter 4: IT Security Technical Controls -- Off-Premises Unmanaged Devices -- MDM: Mobile Device Management -- MAM: Mobile Application Management -- NAC: Network Access Control -- Multi-Factor Authentication -- RASP for Mobile Applications -- Secure Connections -- OSI Model -- TCP/IP Model -- IPsec, SSH, and TLS -- IPsec -- SSH -- TLS -- Clean Pipes -- DDoS Mitigation -- Managed Devices -- Directory Service Integration -- Centralized Endpoint Management -- TPM: Trusted Platform Module -- VPN Client -- NAC: Network Access Control -- Data Classification -- UAM: User Activity Monitoring -- Endpoint Protection -- Phishing Reporting Tool -- Host IPS or EDR -- Desktop Firewall -- Antivirus -- Antispyware -- Full-Disk Encryption -- Application Control and Application Whitelisting -- Perimeter Security -- Firewalls -- Intrusion Detection and Intrusion Protection Systems -- Proxy and Content (URL) Filtering -- DLP: Data Loss Prevention -- Honeypot -- WAF: Web Application Firewall -- SSL VPN -- DNS -- Internal DNS Servers -- External DNS Servers -- Message Security -- Directory Integration for External Applications -- Sandbox -- File Integrity -- Encrypted Email -- On-Premises Support Controls -- Access Control -- Secure VLAN Segmentation -- Security Baselines -- Redundancy -- Load Balancing -- Encryption -- Multi-tier and Multi-layer -- Multi-layering -- Multi-tiering -- TLS Decryption -- Perimeter Static Routing -- Heartbeat Interfaces -- Disaster Recovery -- Time Synchronization -- Log Concentrator -- Routing and Management Networks -- Management Networks -- Perimeter Routing Networks -- Centralized Management -- Physical Network Segmentation -- Sinkhole…”
Libro electrónico -
275por Kale, David W., 1943-Tabla de Contenidos: “…""Cover Page ""; ""Title Page ""; ""Copyright Page ""; ""Table of Contents ""; ""Preface""; ""1 Conflict in Action""; ""2 A Christian View of Healthy Conflict""; ""3 Sources of Church Conflict""; ""4 Conflict Levels""; ""5 Early Warning Signals and Creating Firewalls""; ""6 The Roles People Play""; ""7 The Church as a Communication System""; ""8 Fair Fighting; Dirty Fighting""; ""9 Communication Skills for Conflict Managers""; ""10 Mediation""; ""11 Negotiation""; ""12 Conflict Resolved""; ""Bibliography""…”
Publicado 2003
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
276por Sangbin Park, Calvin, authorTabla de Contenidos: “…Table of Contents Jenkins Infrastructure with TLS/SSL and Reverse Proxy Jenkins with Docker on HTTPS on AWS and inside a Corporate Firewall GitOps-Driven CI Pipelines with GitHub GitOps-Driven CD Pipelines with Docker Hub and More Jenkinsfile Features Headfirst AWS for Jenkins Jenkins Configuration as Code (JCasC) Backup and Restore and Disaster Recovery Upgrading the Jenkins Controller, Agents, and Plugins Reducing Bottlenecks Shared Libraries Script Security…”
Publicado 2021
Libro electrónico -
277Publicado 2015Tabla de Contenidos: “…Introducing Windows 8.1 -- Planning the Windows 8.1 installation -- Installing Windows 8.1 -- Using virtualization technologies -- Networking -- Windows Firewall and remote access -- Managing Windows 8.1 in a domain -- Users and groups -- Managing security -- Managing files and disks on Windows 8.1 -- Managing Windows 8.1 hardware and printers -- Monitoring system performance and recovery -- Recovery and backup options -- Installing and configuring applications -- Appendix A. …”
Libro electrónico -
278Publicado 2019“…From there you will gain a basic understanding of firewall security, and discover how to leverage it using Network Security Groups and Application Security Groups. …”
Vídeo online -
279Publicado 2020“…Focusing on business benefits throughout, Gai shows how to provide essential shared services such as segment routing, NAT, firewall, micro-segmentation, load balancing, SSL/TLS termination, VPNs, RDMA, and storage–including storage compression and encryption. …”
Libro electrónico -
280Publicado 2021“…You'll then move on to Linux network diagnostics, setting up a Linux firewall, and using Linux as a host for network services. …”
Libro electrónico