Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
281Publicado 2018“…As you progress through the chapters, you will learn how to carry out various key scanning tasks, such as firewall detection, OS detection, and access management, and will look at problems related to vulnerability scanning and exploitation in the network. …”
Libro electrónico -
282Publicado 2020“…Gain access to all the information you need to get started with this exciting, cutting-edge operating system Key Features Start with installation and explore advanced topics, such as file sharing using both Samba and NFS Gain insight into using logical volume management and firewall configuration on a Fedora 31 system Get an overview of network management, including using the NetworkManager service Book Description Linux kernel development is perhaps the world's largest collaborative project to date. …”
Libro electrónico -
283Publicado 2020“…Learn how to install, use, and administer CentOS 8 with the help of expert guidance and engaging examples Key Features Become familiar with a popular and stable Red Hat Enterprise Linux distribution Gain a thorough overview of the operating system by learning concepts such as disk partitioning, KVM virtualization, and more Explore advanced topics such as logical volume management and firewall configuration Book Description Linux kernel development is perhaps the world's largest collaborative project to date. …”
Libro electrónico -
284por Mancuso, Paul“…Install and upgrade Windows Vista in the Enterprise Configure and troubleshoot Windows security features including User Account Control, Windows Defender, dynamic security for Internet Explorer 7, and Windows Firewall Configure and troubleshoot Group Policy Object settings Configure and troubleshoot Windows Server Update Services Configure and troubleshoot network connectivity Troubleshoot performance and reliability issues Install and maintain desktop applications WRITTEN BY LEADING EXPERTS: Paul A. …”
Publicado 2008
Libro electrónico -
285Publicado 2023“…The book also explores commands frequently used by system administrators to check network card statistics and firewall rules. Whether you're a beginner or an experienced administrator, this book is an invaluable resource, filling in the gaps in your skill set and helping you improve your skills and expertise in Linux administration. …”
Libro electrónico -
286Publicado 2007“…Only the most valuable tips tecnhiques and tips made the cut to improve your efficiency, take total control of your digital media and data; use Internet Explorer 7, Windows Mail, and Calendar; configure Windows Defender and Firewall; avoid, troubleshoot, and fix problems; make Windows Vista work better, faster, smarter, safer, and more fun too! …”
Libro electrónico -
287por Miller, Michael, 1958-“…In years past, you could protect your computer from malicious activity by installing an antivirus program and activating a firewall utility. Unfortunately, that’s no longer good enough; the Internet has become a much darker place, plagued not only by rogue software but also by dangerous criminals and shadowy government agencies. …”
Publicado 2008
Libro electrónico -
288Publicado 2012“…Neben den Tipps und Tricks zu Planung und Betrieb profitieren Sysadmins vor allem von den Erläuterungen typischer Szenarien wie einer hochverfügbaren Firewall und einem zentralen Fileserver, der Plattenplatz mittels iSCSI vergibt. …”
Libro electrónico -
289Publicado 2022“…The first section will teach you how to segment a network into protected zones, set up a firewall, and mitigate wireless network security risks. …”
Libro electrónico -
290Publicado 2019“…He follows a celebrated Chinese AI researcher who leaves Google to challenge his former employer from behind the Great Firewall. Sheehan joins a tour bus of wealthy Chinese families shopping for homes in the Bay Area, revealing disgruntled neighbors and raising important questions about California's own prejudices. …”
Grabación no musical -
291Publicado 2024“…What's Inside Set up secure access policies Implement a Web Application Firewall Deploy MS Sentinel for monitoring and threat detection Establish compliance with business rules About the Reader For software and security engineers building and securing Azure applications. …”
Libro electrónico -
292Publicado 2024“…The curriculum covers a broad spectrum of content, including tcpdump and NetFlow analysis, firewall data interpretation, and mastering the complexities of application visibility and control. …”
Video -
293Publicado 2024“…What's Inside Set up secure access policies Implement a Web Application Firewall Deploy MS Sentinel for monitoring and threat detection Establish compliance with business rules About the Reader For software and security engineers building and securing Azure applications. …”
Grabación no musical -
294Publicado 2024“…What's Inside Set up secure access policies Implement a Web Application Firewall Deploy MS Sentinel for monitoring and threat detection Establish compliance with business rules About the Reader For software and security engineers building and securing Azure applications. …”
Vídeo online -
295Publicado 2015Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Introduction -- About the Author -- About the Technical Editor -- Acknowledgments -- Chapter 1 - Understanding the threat -- Information in This Chapter: -- Introduction -- A brief of history of network security -- The Morris worm -- Firewalls -- Intrusion detection systems -- The desktop -- The mail filter and the proxy -- Distributed denial of service attacks -- Unified threat management -- Understanding the current threat -- The business of malware -- Commoditization of malware -- The king phish -- The attack surface is expanding -- The rise of the cloud -- The coming threats -- Conclusion -- References -- Chapter 2 - What is intelligence? …”
Libro electrónico -
296Publicado 2008“…Auch die Sicherheitsvorkehrungen für ein sorgloses Surfen, Antivirensoftware und Firewalls werden nicht vergessen…”
Libro electrónico -
297por Both, David. authorTabla de Contenidos: “…Remote access with SSH -- 6. Routing and Firewalls -- 7. Introducing Email -- 8. Email clients -- 9. …”
Publicado 2020
Libro electrónico -
298Publicado 2017Tabla de Contenidos: “…Overview of optimization -- Introduction to meta-heuristic and evolutionary algorithms -- Pattern search -- Genetic algorithm -- Simulated annealing -- Tabu search -- Ant colony optimization -- Particle swarm optimization -- Differential evolution -- Harmony search -- Shuffled frog-leaping algorithm -- Honey-bee mating optimization -- Invasive weed optimization -- Central force optimization -- Biogeography-based optimization -- Firefly algorithm -- Gravity search algorithm -- Bat algorithm -- Plant propagation algorithm -- Water cycle algorithm -- Symbiotic organisms search -- Comprehensive evolutionary algorithm…”
Libro electrónico -
299Publicado 2022Tabla de Contenidos: “…Chapter 1: Understanding the Importance of Data/Application Security -- Chapter 2: Overview of Basic Azure Security Components -- Chapter 3: Introduction to Azure Active Directory -- Chapter 4: Working with Azure Key Vault -- Chapter 5: Ensure Azure Application Security -- Chapter 6: Ensure Data Security with Azure Storages -- Chapter 7: Ensure Security using Azure Virtual Networks -- Chapter 8: Azure Virtual Machine Security -- Chapter 9: Securing resources with Azure Firewall -- Chapter 10: App Service Environments…”
Libro electrónico -
300Publicado 2002Tabla de Contenidos: “…Cover; Table of Contents; Foreword; Introduction to IP Network Security; What Are We Trying to Prevent?; Cisco PIX Firewall; Traffic Filtering in the Cisco Internetwork Operating System; Network Address Translation/Port Address Translation; Cryptography; Cisco LocalDirector and DistributedDirector; Virtual Private Networks and Remote Access; Cisco Authentication, Authorization, and Accounting Mechanisms; Cisco Content Services Switch; Cisco Secure Scanner; Cisco Secure Policy Manager; Intrusion Detection; Network Security Management; Looking Ahead: Cisco Wireless Security; Index…”
Libro electrónico