Mostrando 381 - 400 Resultados de 1,060 Para Buscar 'Firefall~', tiempo de consulta: 1.54s Limitar resultados
  1. 381
    Publicado 2014
    “…This video tutorial will also look at the devices that make up the network infrastructure, including firewalls, routers, Virtual Private Networks (VPNs), client systems, and virtual machines. …”
    Video
  2. 382
    Publicado 2024
    “…The course wraps up with a deep dive into vSphere security, including SELinux management and firewalld configuration. You'll also learn about virtual machine management, CPU and memory concepts in a virtualized environment, creating a vSphere DRS cluster, vSphere HA architecture, and updates using vSphere Lifecycle Manager, rounding out a complete skill set for managing vSphere environments. …”
    Video
  3. 383
    Publicado 2008
    “…Perimeter Security 3. Cisco IOS Firewalls 4. Site-to-Site VPNs 5. Cisco IOS IPS 6. …”
    Libro electrónico
  4. 384
    Publicado 2008
    “…Configure IPv4 and IPv6 addressing and services Work efficiently with Dynamic Host Configuration Protocol (DHCP) Manage advanced server features such as Server Core and Hyper-V Configure routing, including RIP and OSPF-based routing Secure networks with firewalls, policies, IPSec, authentication, Network Access Protection, and the Baseline Security Analyzer Configure DNS servers, zones, records, replication, and client computer name resolution Manage remote access, from NAT and VPNs to RRAS and RADIUS services Implement secure wireless access using SSID, WEP, WPA, WPA2, and group policies Configure file and print services, including disk quotas, DFS, and EFS Establish efficient automated backups and manage restores Monitor network performance and events Streamline updates with Windows Server Update Services (WSUS) CD Features MeasureUp Practice Questions! …”
    Libro electrónico
  5. 385
    Publicado 2019
    “…. • Build and maintain an internal IT audit function with maximum effectiveness and value • Audit entity-level controls and cybersecurity programs • Assess data centers and disaster recovery • Examine switches, routers, and firewalls • Evaluate Windows, UNIX, and Linux operating systems • Audit Web servers and applications • Analyze databases and storage solutions • Review big data and data repositories • Assess end user computer devices, including PCs and mobile devices • Audit virtualized environments • Evaluate risks associated with cloud computing and outsourced operations • Drill down into applications and projects to find potential control weaknesses • Learn best practices for auditing new technologies • Use standards and frameworks, such as COBIT, ITIL, and ISO • Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI • Implement proven risk management practices…”
    Libro electrónico
  6. 386
    Publicado 2018
    “…You will learn how to secure infrastructure, such as wireless access points, firewalls, and servers. Moving ahead, learn to secure applications and data by vulnerability scanning and patching, encryption, data loss prevention, and backups. …”
    Video
  7. 387
    Publicado 2013
    “…Compared with other Linux books, A Practical Guide to FedoraTMand Red Hat®Enterprise Linux ®, Seventh Edition, delivers Complete, up-to-the-minute coverage of Fedora 19 and RHEL 7 (beta) New programming chapters that cover Python and MariaDB/MySQL, plus a new tutorial on using GnuPG to encrypt communications Information on state-of-the-art security: SELinux, ACLs, firewalld ( firewall-config and firewall-cmd ), iptables ( system-config-firewall ), GnuPG, and OpenSSH New chapter on VMs (virtual machines) and cloud computing, including VMware, QEMU/KVM, virt-manager , virsh , GNOME Boxes, and AWS (Amazon Web Services) Expanded command-line coverage, including a new chapter that details 32 important utilities Practical information on Internet server configuration, including Apache, sendmail , NFSv4, DNS/BIND, the new LDAP Dynamic Server, and IPv..…”
    Libro electrónico
  8. 388
    Publicado 2024
    “…You'll learn to manage SELinux, configure firewalld, secure SSH, and implement LUKS Disk Encryption. …”
    Video
  9. 389
    por Fabbri, Rosato
    Publicado 2013
    Tabla de Contenidos: “…Filters, Policies, and Endpoint Security -- Processing a data packet inside a FortiGate -- Firewall features -- Interfaces and zones -- Firewall objects -- Addresses -- Services -- Schedules -- UTM profiles -- Antivirus -- Intrusion protection -- Web filter -- Client reputation -- Traffic shaping -- Security policies -- FortiClient -- FortiClient management -- Bring Your Own Device (BYOD) -- Summary -- 3. …”
    Libro electrónico
  10. 390
    Tabla de Contenidos: “…Setting Up the Mac OS X Firewall -- 12. Securing a Wireless Network -- 13.File Services -- 14. …”
    Libro electrónico
  11. 391
    Publicado 2002
    Tabla de Contenidos: “…Cover; Contents; Foreword; Chapter 1 Introduction to Check Point Next Generation; Chapter 2 Installing and Configuring VPN-1/FireWall-1 Next Generation; Chapter 3 Using the Graphical Interface; Chapter 4 Creating a Security Policy; Chapter 5 Applying Network Address Translation; Chapter 6 Authenticating Users; Chapter 7 Open Security (OPSEC) and Content Filtering; Chapter 8 Managing Policies and Logs; Chapter 9 Tracking and Alerts; Chapter 10 Configuring Virtual Private Networks; Chapter 11 Securing Remote Clients; Chapter 12 Advanced Configurations; Appendix A Class C Subnet Mask Cheat Sheet…”
    Libro electrónico
  12. 392
    Publicado 2013
    “…Bio-inspired algorithms such as ant colony algorithms, bat algorithms, bee algorithms, firefly algorithms, cuckoo search and particle swarm optimization have been applied in almost every area of science and engineering with a dramatic increase of number of relevant publications. …”
    Libro electrónico
  13. 393
    Publicado 2017
    “…You will get up-to-date coverage of intrusion detection, firewall, honeynet, antivirus, and anti-rootkit technology. • Learn how malware infects, survives, and propagates across an enterprise • See how hackers develop malicious code and target vulnerable systems • Detect, neutralize, and remove user-mode and kernel-mode rootkits • Use hypervisors and honeypots to uncover and kill virtual rootkits • Defend against keylogging, redirect, click fraud, and identity theft • Block spear phishing, client-side, and embedded-code exploits • Effectively deploy the latest antivirus, pop-up blocker, and firewall software • Identify and stop malicious processes using IPS solutions…”
    Libro electrónico
  14. 394
    por Carter, Ryan
    Publicado 2012
    “…You’ll discover how easy it is to reach beyond the enterprise firewall for a host of Internet resources. Discover the advantages of using Mule Cloud Connect over typical web service clients and protocols Learn how Cloud Connectors eliminate the need to understand the underlying API of each service Get started with the latest real-time technologies, including REST, WebHooks, and Streaming APIs Integrate OAuth secure APIs and understand their role in authorization and information sharing Delve into advanced topics such as multi-tenancy and connection management Build your own custom connectors with the Mule DevKit…”
    Libro electrónico
  15. 395
    Publicado 2017
    “…The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. …”
    Libro electrónico
  16. 396
    Publicado 2006
    “…Official self-study test preparation guide for the Cisco SNRS exam 642-502 Attack threats Router management and administration Authentication, Authorization, and Accounting (AAA) and Cisco Secure Access Control Server RADIUS and TACACS+ Cisco IOS® Firewall feature set Securing networks with Cisco routers Mitigating Layer 2 attacks IPsec and Easy Virtual Private Network (VPN) Security Device Manager (SDM) CCSP SNRS Exam Certification Guide is a best-of-breed Cisco® exam study guide that focuses specifically on the objectives for the SNRS exam. …”
    Libro electrónico
  17. 397
    Publicado 2021
    “…Learn how the Linux ecosystem is structured Set up a local area network (LAN) Enable smartphones and tablets to safely connect to your LAN Manage fundamental subsystems and essential tasks Secure remote access and build a firewall/internet gateway Manage users and groups, and filesystems and partitions Rescue nonbooting systems Manage name services and the Dynamic Host Configuration Protocol (DHCP)…”
    Libro electrónico
  18. 398
    por Palamar, Todd
    Publicado 2010
    Tabla de Contenidos: “…Chapter 6: Playing with FireFuel; Making Fire; Chapter 7: Explosions; Creating Explosive Forces; Pyrotechnics; Chapter 8: Floods; Water; City Flood; Water Turbulence; Appendix: About the Companion DVD; What You'll Find on the DVD; System Requirements; Using the DVD; Troubleshooting; Customer Care; Index…”
    Libro electrónico
  19. 399
    por Gucer, Vasfi
    Publicado 2005
    Tabla de Contenidos: “…OMEGAMON XE/DE Distributed Architecture -- 2.1 Overview -- 2.2 Terminology -- 2.3 Communications -- 2.4 Deployment scenarios -- 2.4.1 Simple deployment with no firewall -- 2.4.2 Simple deployment with firewall -- 2.4.3 Complex deployment: CMS, RMS, and a firewall -- 2.5 Scalability -- Chapter 3. …”
    Libro electrónico
  20. 400
    Publicado 2022
    Tabla de Contenidos: “…A combined diamond model and kill chain intrusion analysis -- Attribution -- Summary -- Questions -- Part 2: Evidence Acquisition -- Chapter 5: Collecting Network Evidence -- An overview of network evidence -- Preparation -- A network diagram -- Configuration -- Firewalls and proxy logs -- Firewalls -- Web application firewalls -- Web proxy servers -- NetFlow -- Packet capture -- tcpdump -- WinPcap and RawCap -- Wireshark -- Evidence collection -- Summary -- Questions -- Further reading -- Chapter 6: Acquiring Host-Based Evidence -- Preparation -- Order of volatility -- Evidence acquisition -- Evidence collection procedures -- Acquiring volatile memory -- FTK Imager -- WinPmem -- RAM Capturer -- Virtual systems -- Acquiring non-volatile evidence -- FTK obtaining protected files -- The CyLR response tool -- Kroll Artifact Parser and Extractor -- Summary -- Questions -- Further reading -- Chapter 7: Remote Evidence Collection -- Enterprise incident response challenges -- Endpoint detection and response -- Velociraptor overview and deployment -- Velociraptor server -- Velociraptor Windows collector -- Velociraptor scenarios -- Velociraptor evidence collection -- CyLR -- WinPmem -- Summary -- Questions -- Chapter 8: Forensic Imaging -- Understanding forensic imaging -- Image versus copy -- Logical versus physical volumes -- Types of image files -- SSD versus HDD -- Tools for imaging -- Preparing a staging drive -- Using write blockers -- Imaging techniques -- Dead imaging -- Live imaging -- Virtual systems -- Linux imaging -- Summary -- Questions -- Further reading -- Part 3: Evidence Analysis -- Chapter 9: Analyzing Network Evidence -- Network evidence overview -- Analyzing firewall and proxy logs -- SIEM tools -- The Elastic Stack -- Analyzing NetFlow -- Analyzing packet captures -- Command-line tools -- Real Intelligence Threat Analytics…”
    Libro electrónico