Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
361Publicado 2008“…Am meisten lernt man doch von Menschen mit reicher Praxiserfahrung: Neben den Tipps und Tricks zu Planung und Betrieb ist das Kapitel mit typischen konkreten Szenarien wie einer hochverfügbaren Firewall und einem zentralen Fileserver, der Plattenplatz mittels iSCSI vergibt, besonders wertvoll…”
Libro electrónico -
362Publicado 2019“…Through demos and whiteboard discussion, these features are explained along with nftables, the drop-in replacement for the iptables firewall solution. The course also discusses how Red Hat Enterprise Linux 8 has become an operating system that focuses on working with containers. …”
-
363Publicado 2020“…Musik, Fotos, Videos und Dokumente zentral speichern und mit anderen teilen Benutzer verwalten, Backups erstellen und Daten vor unerlaubten Zugriffen schützen Fortgeschrittene Themen wie Konfiguration von Firewall und VPN, Einrichtung eines Webservers und Einsatz von Nextcloud Zahlreiche Schritt-für-Schritt-Anleitungen und Praxis-Tipps Mit diesem Buch lernen Sie umfassend alles, was Sie brauchen, um Ihr Synology NAS an Ihre persönlichen Bedürfnisse anzupassen und das Potenzial Ihres Geräts voll auszuschöpfen. …”
Libro electrónico -
364Publicado 2020“…Explore the potential of Ubuntu 20.04 to manage your local machine and external servers with ease Key Features Learn how to install Ubuntu on a clean disk drive and with the network installer Find out how to set up a firewall to protect your system from vulnerable attacks Explore file-sharing services such as Samba and NFS to share files from Ubuntu to third-party systems Book Description Ubuntu is undeniably one of the most highly regarded and widely used Debian-based Linux distributions available today. …”
Libro electrónico -
365Publicado 2009“…Hardware Security . Personal Firewall About the Shon Harris Security Series This online video is part of a complete library of books, online services, and videos designed to help security professionals enhance their skills and prepare for their certification exams. …”
Vídeo online -
366por Whitaker, Andrew“…The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. …”
Publicado 2005
Libro electrónico -
367Publicado 2024“…Hier lernen Sie anhand leicht verständlicher Schritt-für-Schritt-Anleitungen, wie Sie Ihr System mit einer Firewall und zusätzlichen Tools absichern, Ihre Daten und E-Mails verschlüsseln, privat surfen, eine sichere VPN-Verbindung herstellen, eine eigene private Cloud betreiben und vieles mehr. …”
Libro electrónico -
368Publicado 2006“…The book then reviews each technology individually, discussing the security options that are available, the security architectures such as basic authentication, firewalls, and the use of Secure Sockets Layer (SSL) and public key infrastructure (PKI)…”
Libro electrónico -
369por Thomas, Thomas M.“…Learn about hackers and their attacks Understand security tools and technologies Defend your network with firewalls, routers, and other devices Explore security for wireless networks Learn how to prepare for security incidents Welcome to the world of network security! …”
Publicado 2004
Libro electrónico -
370Publicado 2023“…Key security infrastructure elements, including firewalls and secure communication, are discussed. …”
Video -
371Publicado 2006“…It covers the latest updates in Windows XP Service Pack 2, as well as Gigabit Ethernet, virtual LANs, Bluetooth, WAP, security, firewalls, and VPN use…”
Libro electrónico -
372Publicado 2022Tabla de Contenidos: “…Force Tunneling -- Split Tunnel -- Force Tunnel -- Firewall Configuration -- IKEv2 -- SSTP -- NAT Configuration -- Client Provisioning -- Microsoft Endpoint Manager -- PowerShell -- MECM -- Co-management -- Summary -- Chapter 3: Prepare the Infrastructure -- Security Groups -- Certificates -- Certificate Templates -- VPN Server -- NPS Server -- User Authentication -- Device Authentication -- Kerberos Authentication -- Issue Certificate Templates -- Issuing CA Servers -- Certificate Autoenrollment -- Autoenrollment GPO -- Summary -- Chapter 4: Configure Windows Server for Always On VPN -- Network Policy Server -- Preparation -- Install NPS -- Configure NPS -- RADIUS Client -- Network Policy -- Routing and Remote Access Service Server -- Preparation -- Network Configuration -- Single NIC -- Dual NIC -- External Interface -- Internal Interface -- Static Routes -- Certificates -- IKEv2 IPsec Certificate…”
Libro electrónico -
373Publicado 2022Tabla de Contenidos: “…System Routes -- User-Defined Routes -- Service Endpoints -- Supported Services -- Private Endpoint -- Azure DNS -- Record Management -- Private DNS Zones -- Network Security Groups -- NSG Concepts -- NSG Effective Rules -- Azure Firewall -- Azure Firewall Rules -- Implementing Azure Firewall -- Summary -- Exam Essentials -- Review Questions -- Chapter 4 Intersite Connectivity -- Azure-to-Azure Connectivity -- Internet -- Virtual Network Peering -- VPN Gateway -- Virtual Network Peering vs. …”
Libro electrónico -
374Publicado 2012Tabla de Contenidos: “…HyperText Transfer Protocol and HyperText Transfer Protocol Secure -- Domain Name System -- Network File System -- File Transfer Protocols -- Tunneling Protocols -- Routing Protocols -- Telnet -- Secure Shell -- Internet Protocol Security -- Secure Sockets Layer and Transport Layer Security -- E-mail Protocols -- Network News Transfer Protocol -- Electronic Data Interchange -- Mapping Well-Known Ports to Protocols -- Comparing Internetwork Architectures -- Comparing Public and Private IP Addresses -- Using NAT -- Exploring Wireless Technologies -- Comparing WEP, WPA, and WPA2 -- Wireless Device Administrator Password -- Wireless Service Set Identifier -- MAC Filtering -- Bluetooth -- Radio-Frequency Identification -- GSM -- 3G -- WiMAX -- NFC -- Protecting Mobile Devices -- Questions -- Answers -- Chapter 4 Advanced Networking and Communications -- Understanding Telecommunications -- Internet Connections -- VoIP -- Securing Phones -- Understanding Firewalls -- Packet Filtering Firewall -- Stateful Inspection Firewall -- Application Firewall -- Defense Diversity -- Comparing Network-based and Host-based Firewalls -- Using Proxy Servers -- Exploring Remote Access Solutions -- Risks and Vulnerabilities -- Tunneling Protocols -- Authentication -- Access and Admission Control -- Questions -- Answers -- Chapter 5 Attacks -- Comparing Attackers -- Hackers and Crackers -- Insiders -- Script Kiddies -- Phreaks -- Exploring Attack Types -- DoS -- DDoS -- Botnets and Zombies -- Spam -- Sniffing Attack -- Ping Sweep -- Port Scan -- Salami -- Man-in-the-Middle -- Session Hijacking -- Replay -- Buffer Overflow Attacks -- Scareware and Ransomware -- Password Attacks -- Covert Channel -- Cramming -- Zero Day Exploits -- Advanced Persistent Threat -- Understanding Social Engineering -- Piggybacking -- Impersonation -- Dumpster Diving -- Shoulder Surfing -- Phishing…”
Libro electrónico -
375Publicado 2018Tabla de Contenidos: “…-- Features of OpenStack Networking -- Switching -- Routing -- Load balancing -- Firewalling -- Virtual private networks -- Network functions virtualization -- OpenStack Networking resources -- Virtual network interfaces -- Virtual network switches -- Overlay networks -- Virtual Extensible Local Area Network (VXLAN) -- Generic Router Encapsulation (GRE) -- Generic Network Virtualization Encapsulation (GENEVE) -- Preparing the physical infrastructure -- Configuring the physical infrastructure -- Management network -- API network -- External network -- Guest network -- Physical server connections -- Single interface -- Multiple interfaces -- Bonding -- Separating services across nodes -- Using a single controller node -- Using a dedicated network node -- Summary -- Installing OpenStack -- System requirements -- Operating system requirements -- Initial network configuration -- Example networks -- Interface configuration -- Initial steps -- Permissions -- Configuring the OpenStack repository -- Upgrading the system -- Setting the hostnames -- Installing and configuring Network Time Protocol -- Rebooting the system -- Installing OpenStack -- Installing and configuring the MySQL database server -- Installing and configuring the messaging server -- Installing and configuring memcached -- Installing and configuring the identity service -- Configuring the database -- Installing Keystone -- Configuring tokens and drivers -- Bootstrap the Identity service -- Configuring the Apache HTTP server -- Setting environment variables -- Defining services and API endpoints in Keystone -- Defining users, projects, and roles in Keystone -- Installing and configuring the image service…”
Libro electrónico -
376por Antón Fernández, Antonio J.Tabla de Contenidos: “…Workhouses espaciales, o la larga sombrade los campos de trabajo victorianosUn Dalek en la oficina:explotación en los Call Centers «postmodernos»; Democracia Made in Silicon Valley: sombras de la revolución 2.0; Capítulo IV; Kant Cochrane; Mistery Science Theater 2015; Encuentros cercanos en la tercera fase del idealismo; Capítulo V; Termitas gigantes; Pulgones financieros; Escarabajos metálicos y mosquitos tigre; Enjambres (I): puertas, bolsas y esquemas piramidales; Enjambres (II): enjambres de libros; Marabuntas de nanobots arácnidos; Luciérnagas: nostalgia for Firefly; Moscas de fuego…”
Publicado 2015
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
377por Hofmann, AndreasTabla de Contenidos: “…10.2 Physische Sicherheit -- 10.3 Freigegebene Ordner -- 10.4 Benutzerverwaltung -- 10.5 Passwörter -- 10.6 Verschlüsselung -- 10.6.1 Freigegebene Ordner nachträglich verschlüsseln -- 10.6.2 Umgang mit verschlüsselten Ordnern -- 10.6.3 Der Schlüssel-Manager -- 10.6.4 Die Verschlüsselung von freigegebenen Ordnern aufheben -- 10.7 Firewall -- 10.7.1 Firewall-Regeln -- 10.7.2 Die Firewall aktivieren -- 10.7.3 Regel-Prioritäten -- 10.7.4 Eine Regel anlegen -- 10.7.5 Die Firewall richtig nutzen -- 10.8 Standardports ändern -- 10.9 2-Faktor-Authentifizierung -- 10.10 Weitere Sicherheitsmaßnahmen -- 10.10.1 DSM absichern -- 10.10.2 HTTPS erzwingen -- 10.10.3 Software aktuell halten -- 10.10.4 Das System sauber halten -- 10.10.5 Antivirus Essentials nutzen -- 10.10.6 Den Sicherheitsberater nutzen -- Kapitel 11: Den Betrieb anpassen und überwachen -- 11.1 Das Anmeldeportal -- 11.1.1 Benutzerdefinierte Ports -- 11.1.2 Aliasnamen -- 11.1.3 Benutzerdefinierte Domains -- 11.1.4 Zugangskontrolle -- 11.1.5 Reverse Proxy -- 11.1.6 Zugriffskontrolle - eine Übersicht -- 11.1.7 Login-Stil anpassen -- 11.2 System und Betrieb optimieren -- 11.2.1 Automatisches Abmelden verzögern -- 11.2.2 Energiemanagement -- 11.3 System und Betrieb überwachen -- 11.3.1 Systembenachrichtigungen aktivieren -- 11.3.2 Die Systemauslastung auf einem Blick - der Ressourcen-Monitor -- 11.3.3 Speicher-Analysator -- 11.3.4 Tipps zur Systementlastung -- Teil IV: Das NAS als Heimserver -- Kapitel 12: Bildermanagement mit Synology Photos -- 12.1 Synology Photos installieren und einrichten -- 12.1.1 Freigegebener Bereich -- 12.1.2 Medienindizierung -- 12.2 Bilder zu Synology Photos hinzufügen -- 12.2.1 Bilder direkt über Synology Photos hochladen -- 12.3 Bilder im Reiter »Fotos« verwalten -- 12.3.1 Ansichten -- 12.3.2 Bilder kopieren, verschieben, downloaden oder löschen…”
Publicado 2022
Libro electrónico -
378por Syngress Media, Inc. StaffTabla de Contenidos: “…Network Address Translation; Introduction; Hiding Behind the Router/Firewall; How Does NAT Work?; What Are the Advantages?…”
Publicado 2000
Libro electrónico -
379Publicado 2015Tabla de Contenidos: “…Ceph""; ""Summary""; ""Chapter 5: Implementing OpenStack Networking and Security""; ""The story of an API""; ""Security groups""; ""Managing the security groups using Horizon""; ""Managing the security groups using the Neutron CLI""; ""Managing the security groups using the Nova CLI""; ""An example of a web server DMZ""; ""Firewall as a Service""; ""Coupling a firewall with Neutron""; ""The Neutron plugin""…”
Libro electrónico -
380Publicado 2006“…It also includes updated discussion of the architecture of the Linux kernel 2.6, USB, KDE, GNOME, Broadband access issues, routing, gateways, firewalls, disk tuning, GCC, Perl, Python, printing services (CUPS), and security…”
Libro electrónico