Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
321por Chen, Zhiqun, 1969-“…Specific topics covered include: Smart card basics Java Card virtual machine Persistent and transient objects Atomicity and transactions Handling APDUs Applet firewall and object sharing Java Card platform security A step-by-step applet development guide Applet optimization guidelines A comprehensive reference to Java Card APIs With Java Card technology, smart card programming will finally enter the mainstream of application development. …”
Publicado 2000
Libro electrónico -
322Publicado 2008“…This IBM Redbooks publication provides a practical guide to implementing, using and optimizing IBM Tivoli Monitoring, including best practices for performance tuning, sizing, high availability, scalability, reporting, IBM Change and Configuration Management Database integration and firewall considerations. You will find a great deal of information about IBM Tivoli Universal Agents, including versioning, remote deployment and management, and meta servers. …”
Libro electrónico -
323Publicado 2011“…Maximize your performance on the exam by learning to: Configure IPv4 and IPv6 addressing Deploy and configure DHCP servers, DNS servers, and DNS zones Implement Ipsec, Windows Firewall, and Network Access Protection (NAP) Plan and manage Windows Server Update Services Manage file and print services in Windows Server 2008 R2 Enable remote and wireless access, including DirectAccess Monitor and troubleshoot network performance PRACTICE TESTS Assess your skills with practice tests. …”
Libro electrónico -
324por Mueller, John Paul Dennis“…Veteran author John Paul Mueller shows you how to work with security policies as well as manage the Windows Firewall in every way conceivable-both of which are topics you won't find anywhere else. …”
Publicado 2011
Libro electrónico -
325Publicado 2017“…What You Will Learn Understand software-defined networks Deploy and configure VXLAN-enabled logical switches Secure your environment using Distributed Firewall and Data Security Configure third-party services in NSX Manage, configure, and deploy edge gateway services Perform various Edge operations including configuring CA certificates Explore the different monitoring options to check their traffic flow In Detail VMware NSX is a platform for the software-defined data center. …”
Libro electrónico -
326Publicado 2010“…Covering topics ranging from installing the Snow Leopard Server for the first time, through configuring the Firewall, Chris throughly covers the management of Server 10.6. …”
-
327Publicado 2012“…This book focuses on using Cisco IOS routers to protect the network by capitalizing on their advanced features as a perimeter router, firewall, intrusion prevention system, and site-to-site VPN device. …”
Libro electrónico -
328por Ariganello, ErnestoTabla de Contenidos: “…6.2 UBICACIÓN DE LAS ACL -- 6.2.1 Lista de acceso entrante -- 6.2.2 Lista de acceso saliente -- 6.3 RECOMENDACIONES EN EL DISEÑO DE LAS ACL -- 6.4 CONFIGURACIÓN DE ACL NUMERADA -- 6.4.1 Configuración de ACL estándar -- 6.4.2 Configuración de ACL extendida -- 6.4.3 Asociación de las ACL a una interfaz -- 6.4.4 Aplicación de una ACL a la línea de telnet -- 6.5 LISTAS DE ACCESO CON NOMBRE -- 6.6 MENSAJES DE REGISTRO EN LAS ACL -- 6.7 CONFIGURACIÓN DE ACL CON CCP -- 6.8 LISTAS DE ACCESO REFLEXIVAS -- 6.9 LISTAS DE ACCESO DINÁMICAS -- 6.10 LISTAS DE ACCESO BASADAS EN TIEMPO -- 6.11 VERIFICACIÓN DE LISTAS DE ACCESO -- 6.12 LISTAS DE ACCESO IPV6 -- 6.13 OBJECT GROUP -- 6.13.1 Características de los object group -- 6.13.2 Configuración de los object group -- 6.14 FUNDAMENTOS PARA EL EXAMEN -- 7 FIREWALLS -- 7.1 REDES SEGURAS CON FIREWALLS -- 7.1.1 Características de los firewalls -- 7.1.2 Tipos de firewall -- 7.1.3 Diseño de redes con firewalls -- 7.2 CONTROL DE ACCESO BASADO EN EL CONTEXTO -- 7.2.1 Funcionamiento de CBAC -- 7.2.2 Configuración de CBAC -- 7.2.3 Verificación de CBAC -- 7.3 FIREWALL BASADO EN ZONAS -- 7.3.1 Funcionamiento del firewall basado en zonas -- 7.3.2 Configuración del firewall basado en zonas -- 7.3.3 Configuración del firewall basado en zonas con CCP -- 7.3.4 Configuración manual del firewall basado en zonas con CCP -- 7.4 RESOLUCIÓN DE PROBLEMAS (...) -- 7.5 CISCO ADAPTIVE SECURITY APPLIANCE -- 7.5.1 Características del Cisco ASA -- 7.5.2 Configuración básica del firewall Cisco ASA -- 7.5.3 Configuración del firewall Cisco ASA con ASDM -- 7.6 CONFIGURACIÓN AVANZADA DEL FIREWALL CISCO ASA -- 7.6.1 Configuración de object groups -- 7.6.2 Configuración de ACL -- 7.6.3 Configuración de NAT -- 7.6.4 Configuración de control de acceso -- 7.6.5 Configuración de políticas -- 7.6.6 Configuración de acceso remoto y VPN…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
329por Minoli, Daniel, 1952-Tabla de Contenidos: “…IPsec and Its Use in IPv6 Environments; Chapter 7. Firewall Use in IPv6 Environments; Chapter 8. Security Considerations for Migration/Mixed IPv4-IPv6 Networks; Index; Back cover…”
Publicado 2009
Libro electrónico -
330por Pash, AdamTabla de Contenidos: “…Lifehacker; Contents; Introduction; Chapter 1: Control Your Email; Chapter 2: Organize Your Data; Chapter 3: Trick Yourself into Getting Done; Chapter 4: Clear Your Mind; Chapter 5: Firewall Your Attention; Chapter 6: Streamline Common Tasks; Chapter 7: Automate Repetitive Tasks; Chapter 8: Get Your Data to Go; Chapter 9: Work Smarter on Your Smart Phone; Chapter 10: Master the Web; Chapter 11: Hone Your Computer Survival Skills; Chapter 12: Manage Multiple Computers; Index…”
Publicado 2011
Libro electrónico -
331Publicado 2014Tabla de Contenidos: “…Tools of Your Trade; Intrusion Detection Systems (IDSs); Firewalls; Intrusion Prevention Systems; Application Firewalls; Access Control Systems; Unified Threat Management; 12. …”
Libro electrónico -
332Publicado 2021Tabla de Contenidos: “…Table of Contents Installing RHEL8 RHEL8 Advanced Installation Options Basic Commands and Simple Shell Scripts Tools for Regular Operations Securing Systems with Users, Groups, and Permissions Enabling Network Connectivity Adding, Patching, and Managing Software Administering Systems Remotely Securing Network Connectivity with firewalld Keeping Your System Hardened with SELinux System Security Profiles with OpenSCAP Managing Local Storage and Filesystems Flexible Storage Management with LVM Advanced Storage Management with Stratis and VDO Understanding the Boot Process Kernel Tuning and Managing Performance Profiles with tuned Managing Containers with Podman, Buildah, and Skopeo Practice Exercises – 1 Practice Exercise – 2.…”
Libro electrónico -
333Publicado 2022Tabla de Contenidos: “…Table of Contents Getting RHEL Up and Running RHEL 9 Advanced Installation Options Basic Commands and Simple Shell Scripts Tools for Regular Operations Securing Systems with Users, Groups, and Permissions Enabling Network Connectivity Adding, Patching, and Managing Software Administering Systems Remotely Securing Network Connectivity with firewalld Keeping Your System Hardened with SELinux System Security Profiles with OpenSCAP Managing Local Storage and Filesystems Flexible Storage Management with LVM Advanced Storage Management with Stratis and VDO Understanding the Boot Process Kernel Tuning and Managing Performance Profiles with tuned Managing Containers with Podman, Buildah, and Skopeo Practice Exercises – 1 Practice Exercises – 2.…”
Libro electrónico -
334Publicado 2023Tabla de Contenidos: “…Azure Active Directory (AD) -- Microsoft Authenticator App -- Azure API Management -- Chapter 3, "Implementing Platform Protections" -- Azure Firewall -- Azure Firewall Manager -- Azure Application Gateway -- Azure Front Door -- Web Application Firewall -- Azure Service Endpoints -- Azure Private Links -- Azure DDoS Protection -- Microsoft Defender for Cloud -- Azure Container Registry -- Azure App Service -- Chapter 4, "Managing Security Operations" -- Azure Policy -- Microsoft Threat Modeling Tool -- Microsoft Sentinel -- How Does Microsoft Sentinel Work? …”
Libro electrónico -
335Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Troubleshooting Basics -- A recommended toolkit -- Log search and filtering -- grep -- less, more, and most -- Regular expressions -- Network sniffing and analysis -- tcpdump -- traceroute -- mtr -- ping -- Wireshark -- X.509 verification and inspection -- OpenSSL -- Wireshark -- Troubleshooting basics -- Summary -- Chapter 2: Common Problems -- Narrowing the focus -- Sample scenarios -- Scenario 1-unable to access VPN -- Scenario 2-cannot access external web when on VPN -- Suspecting recent changes -- Supported operating systems -- Embedded devices -- Semi-embedded systems -- Virtual servers -- IP addresses -- Firewalls -- Duplicate client certificates -- Overcomplication -- Summary -- Chapter 3: Installing OpenVPN -- Common installation problems -- Compiling OpenVPN -- Packages and installers -- The advantages of precompiled installers -- Driver installation -- Alternative clients -- Summary -- Chapter 4: The Log File -- Logging options -- Logging levels -- Verbosity 0 -- Verbosity 1 -- Verbosity 4 -- Verbosity 7 -- Common log messages -- Startup messages -- Version and compile string -- Option warnings -- Configuration parameters -- Operational messages -- Certificate messages -- Summary -- Chapter 5: Client and Server Startup -- File and process permissions -- Privilege de-escalation -- Networking privileges -- Port assignment and use -- Multiple daemons -- Adapter and routing table changes -- Chroot -- Scripting -- Up and down scripts -- Connect and disconnect scripts -- UDP troubleshooting -- UDP and firewalls -- Summary -- Chapter 6: Certificates and Authentication -- File permissions -- Pre-shared keys -- Certificate authentication -- Certificate chain overview…”
Libro electrónico -
336Publicado 2023Tabla de Contenidos: “…20: Logical Volume Management (LVM) -- 21: File Managers -- 22: Everything is a File -- 23: Managing processes -- 24: Special Filesystems -- 25: Regular Expressions -- 26: Printing -- 27: Hardware detection -- 28: Command line programming -- 29: Automation with Bash Scripts -- 30: Automation with Ansible -- 31: Time and Automation -- 32: Networking -- 33: NetworkManager -- 34 The BTRFS Filesystem -- 35: Getting Started With systemd -- 36: Advanced systemd Functions -- 37: systemd Finale -- 38: D-Bus and udev -- 39: Using Traditional Logs -- 40: Managing Users -- 41: Managing the Firewall. …”
Libro electrónico -
337por Burns, BryanTabla de Contenidos: “…Proactive defense : firewalls -- Host hardening -- Securing communications -- Email security and anti-spam -- Device security testing -- Part 6. …”
Publicado 2007
Libro electrónico -
338por Sheikh, Ahmed F.Tabla de Contenidos: “…Hacking Wireless Networks -- Chapter 13. Evading IDS, Firewalls, and Honeypots -- Chapter 14. Buffer Overflow -- Chapter 15. …”
Publicado 2024
Libro electrónico -
339Publicado 2015“…Finally, you will learn about firewalls, such as iptables, targets, rate limiting, and zones and services. …”
-
340por Feldman, Jonathan“…It does not get into the specifics of protocols or specific applications, but provides short, concise overviews of topics like wireless networking, Unix, Windows 2000, Novell Netware, routers, and firewalls…”
Publicado 2003
Libro electrónico