Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
341por Danielyan, Edgar“…Coverage includes intrusion detection systems, network-level filtering, firewalls and other network-level systems…”
Publicado 2002
Libro electrónico -
342Publicado 2022“…You will then learn about cybersecurity professional methods to protect systems and networks from cyberattacks and how antiviruses, firewalls, encryptions, biometrics, and authentication methods work. …”
Video -
343Tabla de Contenidos: “…Startup and Services -- 7. Networking and Firewalls -- 8. Package Management -- 9. Storage Management and Disaster Recovery -- Part II. …”
Libro electrónico -
344Publicado 2006Tabla de Contenidos: “…Cover; Front Matter; Contents; Foreword; Part I: Getting; Chapter 1 An Overview; Chapter 2 Installing Skype; Chapter 3 Getting Started; Chapter 4 Basic Features; Chapter 5 Common; Part II: Taking; Chapter 6 Advanced; Chapter 7 Software; Chapter 8 Hardware Add-ons; Chapter 9 Getting the; Chapter 10 Being Mobile; Part III:; Chapter 11 Setting Up Skype; Chapter 12 Business; Chapter 13 Skype Firewall; Part IV: Customizing Skype; Chapter 14 The Skype API; Part V: Skype; Chapter 15 Future Skype-; Index…”
Libro electrónico -
345por Choi, BrendanTabla de Contenidos: “…Palo Alto Security Policy Creation Playbook -- Chapter 21: Palo Alto Firewall upgrading Ansible playbook…”
Publicado 2023
Libro electrónico -
346Publicado 2021“…Musik, Fotos, Videos und Dokumente zentral speichern und mit anderen teilen Benutzer verwalten, Backups erstellen und Daten vor unerlaubten Zugriffen sch|tzen Fortgeschrittene Themen wie Konfiguration von Firewall und VPN, Einrichtung eines Webservers, Einsatz von Nextcloud und Docker Zahlreiche Schritt-f|r-Schritt-Anleitungen und wertvolle Praxis-Tipps Mit diesem Buch lernen Sie umfassend alles, was Sie brauchen, um Ihr Synology NAS an Ihre pers̲nlichen Bed|rfnisse anzupassen und das Potenzial Ihres Ger̃ts voll auszusch̲pfen. …”
Libro electrónico -
347Publicado 2018“…This ebook explains: Why rules-based, signature-based, and firewall solutions have fallen short How automated bots enable cybercriminals and nation-state actors to attack your network The evolution of the botnet: how threat actors constantly change their attack strategy How AI and ML techniques in web applications help you observe, quantify, and classify inbound requests How to detect insider threats and advanced persistent threat actors with AI and ML tools Case studies that show how a media company, an airline, and a university use AL and ML in security…”
Libro electrónico -
348Publicado 2018“…Authors Stephen Gates, edge security evangelist and SME at Oracle Dyn, and Allan Liska, threat intelligence architect at Recorded Future, explore how advanced DNS services, web application firewall (WAF) services, bot management, API security, DDoS defenses, and malware protection solutions combine to protect your sites and applications from malicious attacks and bad actors. …”
Libro electrónico -
349Publicado 2014“…You will then learn about networking command line tools and administrative tools, such as performance monitor, Windows firewall, and task manager. Mark will teach you about the control panel utilities, including folder and power options and user accounts. …”
-
350Publicado 2016“…You will start by learning how to build the Internet edge, including connecting branch offices, configuring firewall zones, and configuring static routes. From there, Martin will teach you how to create the IPSec VPN tunnel and build the core, including configuring VLANs, upgrading Junos, and routing with a switch. …”
-
351Publicado 2008“…Configure and troubleshoot Windows security features including User Account Control, Windows Defender, dynamic security for Internet Explorer 7, and Windows Firewall. Configure Windows Vista user applications including Windows Mail, Meeting Space, Calendar, Fax and Scan, and Windows Sidebar. …”
Libro electrónico -
352Publicado 2003“…Official self-study test preparation guide for the CCIE Security written exam Review all CCIE Security written exam topics, including: Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and SNMP Cisco IOS(r) Software specifics, including password security, password recovery, and standard and extended access lists Encryption technologies and security protocols, including TACACS+, RADIUS, and Kerberos Windows and UNIX operating system security issues Cisco security applications, including Cisco PIX(r) Firewall, VPN, IDS, and Cisco Policy Manager Basic security methods and the evolution of new secure networks including packet filtering, proxies, and NAT/PAT Network security policies, vulnerabilities, and protection techniques With increased reliance on networking resources to provide productivity gains and corporate revenue contributions, the need for network security has never been higher. …”
Libro electrónico -
353Publicado 2001“…This book covers setting up a DNS server and client, DNS domain zones, compiling and configuring BIND, dial-up connections, adding more domains, setting up root servers on private networks, firewall rules, Dynamic DNS (DDNS), subdomains and delegation, caching and name resolution, troubleshooting tools and techniques, debugging and logging, new features in BIND 8.2.2, and it offers introductory information on BIND 9.…”
Libro electrónico -
354Publicado 2004“…SP2 includes Windows Firewall, Pop-up Blocker for Internet Explorer, and the new Windows Security Center. …”
Libro electrónico -
355por Mason, Andrew G.“…Cisco authorized self-study book for CCSP 642-511 foundation learning Understand the underlying principles of VPNs Learn about and identify proper implementation of remote access and site-to-site VPNs Identify the features, functions, and benefits of the Cisco VPN 3000 Concentrator Series Configure and test a remote access VPN using preshared keys on the Cisco VPN 3000 Concentrator Work with the RIP and OSPF dynamic routing protocols Gain proficiency with the VPN Client Firewall Apply digital certificates on the Cisco VPN 3000 Concentrator Use the Cisco 3002 Hardware Client to configure and test a remote access VPN Implement advanced VPN client features such as load balancing, reverse route injection, and the appropriate use of backup servers Configure LAN-to-LAN VPNs on the Cisco 3000 Concentrator Offer granular user-level security with user and unit authentication Learn how to use VPN through NAT and resolve real-world implementation challenges Provide a sound level of support and administration skills for day-to-day management of a VPN 3000 Concentrator-based VPN by utilizing the tools resident in the Concentrator CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN) , Second Edition, is a complete reference for professionals who intend to work with virtual private networks (VPNs) using IPSec. …”
Publicado 2004
Libro electrónico -
356por Lee, Donald C.“…This book offers a practical guide to implementing IPsec, the IOS Firewall, and IOS Intrusion Detection System. Also included are advanced routing principles and quality of service features that focus on improving the capability of your network. …”
Publicado 1999
Libro electrónico -
357por McClure, Stuart“…Boni, Chief Information Security Officer, Motorola "Just because you have a firewall and IDS sensor does not mean you aresecure; this book shows you why." …”
Publicado 2002
Libro electrónico -
358Publicado 2008“…You get detailed information about all major networking and network security services, including the all-new Network Access Protection (NAP), authentication infrastructure, IPv4 and IPv6, remote access, virtual private networks, IP security, quality of service, scalable networking, wireless infrastructure and security, DNS, DHCP, Windows® Firewall, and more. You also get a companion DVD with a fully searchable eBook version of the book, plus eBook samples from Understanding IPv6 2nd Edition, Windows Server 2008 TCP/IP Protocols and Services, and TCP/IP Fundamentals. …”
Libro electrónico -
359por Calder, AlanTabla de Contenidos: “…INTRODUCTION; CHAPTER 1: RULE 1 - SAFEGUARD YOUR COMPUTER; CHAPTER 2: RULE 2 - USE STRONG PASSWORDS AND A SCREENSAVER; CHAPTER 3: RULE 3 - UPDATE AND PATCH YOUR OPERATING SYSTEM; CHAPTER 4: RULE 4 - HAVE AN UP-TO-DATE FIREWALL; CHAPTER 5: RULE 5 - HAVE UP-TO-DATE ANTI-MALWARE SOFTWARE; CHAPTER 6: RULE 6 - ACT ANTI-SPAM; CHAPTER 7: RULE 7 - SECURE WIRELESS NETWORKS; CHAPTER 8: RULE 8 - BE SENSIBLE - DON'T TAKE UNNECESSARY RISKS; CHAPTER 9: RULE 9 - BACK IT UP; CHAPTER 10: RULE 10 - FIX PROBLEMS AS SOON AS THEY ARISE; GLOSSARY; FURTHER READING; USEFUL WEBSITES; ITG RESOURCES…”
Publicado 2008
Libro electrónico -
360por Himmel, Maria Azua, 1960-“…Business leaders and strategists can drive immense value from social networking “inside the firewall.” Drawing on her unsurpassed experience deploying innovative social networking systems within IBM ® and for customers, Maria Azua demonstrates how to establish social networking communities, and then leverage those communities to drive extraordinary levels of innovation. …”
Publicado 2009
Libro electrónico