Mostrando 281 - 300 Resultados de 1,060 Para Buscar 'Firefall~', tiempo de consulta: 1.43s Limitar resultados
  1. 281
    Publicado 2018
    “…As you progress through the chapters, you will learn how to carry out various key scanning tasks, such as firewall detection, OS detection, and access management, and will look at problems related to vulnerability scanning and exploitation in the network. …”
    Libro electrónico
  2. 282
    Publicado 2020
    “…Gain access to all the information you need to get started with this exciting, cutting-edge operating system Key Features Start with installation and explore advanced topics, such as file sharing using both Samba and NFS Gain insight into using logical volume management and firewall configuration on a Fedora 31 system Get an overview of network management, including using the NetworkManager service Book Description Linux kernel development is perhaps the world's largest collaborative project to date. …”
    Libro electrónico
  3. 283
    Publicado 2020
    “…Learn how to install, use, and administer CentOS 8 with the help of expert guidance and engaging examples Key Features Become familiar with a popular and stable Red Hat Enterprise Linux distribution Gain a thorough overview of the operating system by learning concepts such as disk partitioning, KVM virtualization, and more Explore advanced topics such as logical volume management and firewall configuration Book Description Linux kernel development is perhaps the world's largest collaborative project to date. …”
    Libro electrónico
  4. 284
    por Mancuso, Paul
    Publicado 2008
    “…Install and upgrade Windows Vista in the Enterprise Configure and troubleshoot Windows security features including User Account Control, Windows Defender, dynamic security for Internet Explorer 7, and Windows Firewall Configure and troubleshoot Group Policy Object settings Configure and troubleshoot Windows Server Update Services Configure and troubleshoot network connectivity Troubleshoot performance and reliability issues Install and maintain desktop applications WRITTEN BY LEADING EXPERTS: Paul A. …”
    Libro electrónico
  5. 285
    Publicado 2023
    “…The book also explores commands frequently used by system administrators to check network card statistics and firewall rules. Whether you're a beginner or an experienced administrator, this book is an invaluable resource, filling in the gaps in your skill set and helping you improve your skills and expertise in Linux administration. …”
    Libro electrónico
  6. 286
    Publicado 2007
    “…Only the most valuable tips tecnhiques and tips made the cut to improve your efficiency, take total control of your digital media and data; use Internet Explorer 7, Windows Mail, and Calendar; configure Windows Defender and Firewall; avoid, troubleshoot, and fix problems; make Windows Vista work better, faster, smarter, safer, and more fun too! …”
    Libro electrónico
  7. 287
    por Miller, Michael, 1958-
    Publicado 2008
    “…In years past, you could protect your computer from malicious activity by installing an antivirus program and activating a firewall utility. Unfortunately, that’s no longer good enough; the Internet has become a much darker place, plagued not only by rogue software but also by dangerous criminals and shadowy government agencies. …”
    Libro electrónico
  8. 288
    Publicado 2012
    “…Neben den Tipps und Tricks zu Planung und Betrieb profitieren Sysadmins vor allem von den Erläuterungen typischer Szenarien wie einer hochverfügbaren Firewall und einem zentralen Fileserver, der Plattenplatz mittels iSCSI vergibt. …”
    Libro electrónico
  9. 289
    Publicado 2022
    “…The first section will teach you how to segment a network into protected zones, set up a firewall, and mitigate wireless network security risks. …”
    Libro electrónico
  10. 290
    Publicado 2019
    “…He follows a celebrated Chinese AI researcher who leaves Google to challenge his former employer from behind the Great Firewall. Sheehan joins a tour bus of wealthy Chinese families shopping for homes in the Bay Area, revealing disgruntled neighbors and raising important questions about California's own prejudices. …”
    Grabación no musical
  11. 291
    Publicado 2024
    “…What's Inside Set up secure access policies Implement a Web Application Firewall Deploy MS Sentinel for monitoring and threat detection Establish compliance with business rules About the Reader For software and security engineers building and securing Azure applications. …”
    Libro electrónico
  12. 292
    Publicado 2024
    “…The curriculum covers a broad spectrum of content, including tcpdump and NetFlow analysis, firewall data interpretation, and mastering the complexities of application visibility and control. …”
    Video
  13. 293
    Publicado 2024
    “…What's Inside Set up secure access policies Implement a Web Application Firewall Deploy MS Sentinel for monitoring and threat detection Establish compliance with business rules About the Reader For software and security engineers building and securing Azure applications. …”
    Grabación no musical
  14. 294
    Publicado 2024
    “…What's Inside Set up secure access policies Implement a Web Application Firewall Deploy MS Sentinel for monitoring and threat detection Establish compliance with business rules About the Reader For software and security engineers building and securing Azure applications. …”
    Vídeo online
  15. 295
    Publicado 2015
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Introduction -- About the Author -- About the Technical Editor -- Acknowledgments -- Chapter 1 - Understanding the threat -- Information in This Chapter: -- Introduction -- A brief of history of network security -- The Morris worm -- Firewalls -- Intrusion detection systems -- The desktop -- The mail filter and the proxy -- Distributed denial of service attacks -- Unified threat management -- Understanding the current threat -- The business of malware -- Commoditization of malware -- The king phish -- The attack surface is expanding -- The rise of the cloud -- The coming threats -- Conclusion -- References -- Chapter 2 - What is intelligence? …”
    Libro electrónico
  16. 296
    Publicado 2008
    “…Auch die Sicherheitsvorkehrungen für ein sorgloses Surfen, Antivirensoftware und Firewalls werden nicht vergessen…”
    Libro electrónico
  17. 297
    por Both, David. author
    Publicado 2020
    Tabla de Contenidos: “…Remote access with SSH -- 6. Routing and Firewalls -- 7. Introducing Email -- 8. Email clients -- 9. …”
    Libro electrónico
  18. 298
    Publicado 2017
    Tabla de Contenidos: “…Overview of optimization -- Introduction to meta-heuristic and evolutionary algorithms -- Pattern search -- Genetic algorithm -- Simulated annealing -- Tabu search -- Ant colony optimization -- Particle swarm optimization -- Differential evolution -- Harmony search -- Shuffled frog-leaping algorithm -- Honey-bee mating optimization -- Invasive weed optimization -- Central force optimization -- Biogeography-based optimization -- Firefly algorithm -- Gravity search algorithm -- Bat algorithm -- Plant propagation algorithm -- Water cycle algorithm -- Symbiotic organisms search -- Comprehensive evolutionary algorithm…”
    Libro electrónico
  19. 299
    Publicado 2022
    Tabla de Contenidos: “…Chapter 1: Understanding the Importance of Data/Application Security -- Chapter 2: Overview of Basic Azure Security Components -- Chapter 3: Introduction to Azure Active Directory -- Chapter 4: Working with Azure Key Vault -- Chapter 5: Ensure Azure Application Security -- Chapter 6: Ensure Data Security with Azure Storages -- Chapter 7: Ensure Security using Azure Virtual Networks -- Chapter 8: Azure Virtual Machine Security -- Chapter 9: Securing resources with Azure Firewall -- Chapter 10: App Service Environments…”
    Libro electrónico
  20. 300
    Publicado 2002
    Tabla de Contenidos: “…Cover; Table of Contents; Foreword; Introduction to IP Network Security; What Are We Trying to Prevent?; Cisco PIX Firewall; Traffic Filtering in the Cisco Internetwork Operating System; Network Address Translation/Port Address Translation; Cryptography; Cisco LocalDirector and DistributedDirector; Virtual Private Networks and Remote Access; Cisco Authentication, Authorization, and Accounting Mechanisms; Cisco Content Services Switch; Cisco Secure Scanner; Cisco Secure Policy Manager; Intrusion Detection; Network Security Management; Looking Ahead: Cisco Wireless Security; Index…”
    Libro electrónico