Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
401Publicado 2015Tabla de Contenidos: “…Setting the Encryption for Your Wireless NetworkSecurity Networks with Firewalls and Gateways; Using a Firewall; Understanding the Gateway Concept; Measuring the Speed of Your Internet Connection; Factors Limiting the Speed of Your Internet Connection; Wireless Networking Standards and Speeds; Understanding the Different Types of Internet Connections; Dial-up Internet Access; Broadband Internet Access; Virtual Private Networks; Principles for Troubleshooting Networking Problems; Troubleshooting Network Problems with the Help of Windows Troubleshooting Tools…”
Libro electrónico -
402por Russel, CharlieTabla de Contenidos: “…Securing Client ComputersSecuring Wireless Networks; Securing Internet Firewalls; Summary; Part II :Installation and Setup; Chapter 3: Installing Windows Small Business Server 2003; Planning Partitions; Preparing the Server; Installing Windows Small Business Server; Installing the Operating System; Using the Windows Small Business Server Setup Wizard; Summary; Chapter 4: Upgrading or Migrating to Windows Small Business Server 2003; Choosing Between Upgrading and Migrating; What's Involved in a Conventional Migration; What's Involved in a Swing Migration; Advantages of Swing Migration…”
Publicado 2006
Libro electrónico -
403por A., JesinTabla de Contenidos: “…VLAN DatabaseInterface settings; Summary; Chapter 3: Generic IP End Devices; Desktops and laptops; Servers; HTTP; DHCP; TFTP; DNS; SYSLOG; AAA; NTP; EMAIL; FTP; Firewall / IPv6 Firewall; Other end devices; Configuring end devices; IP Configuration; Dial-up; Terminal; Command Prompt; Web Browser; PC Wireless; VPN; Traffic Generator; MIB Browser; Cisco IP Communicator; E Mail; PPPoE Dialer; Text Editor; Summary; Chapter 4: Creating a Network Topology; Connecting devices; Link status; Testing connectivity with PDUs; Simple PDU; Complex PDU; Using the simulation mode; Clustering a topology…”
Publicado 2014
Libro electrónico -
404por Shapiro, Jeffrey R.Tabla de Contenidos: “…Windows Server 2008 for Database Services with SQL Server Windows Server 2008 for IIS and ASP.NET; Windows Server 2008 for Application Services; Windows Server 2008 for Resolutions Services; Summary; Chapter 2: Configuring Windows Server 2008; Using the Microsoft Management Console; Windows Firewall Changes for MMC Tools; Getting to Know the MMC Tools; Using the Security Configuration Wizard; Working with Data Sources (ODBC); Understanding Control Panel Applets; Windows PowerShell; Summary; Chapter 3: Networking Windows Server 2008; TCP/IP on Windows Server 2008; TCP/IP Basics (IPv4)…”
Publicado 2008
Libro electrónico -
405Publicado 2014“…Loaded with innovative features like Dynamic Perspective, Firefly, and Mayday, your Amazon Fire Phone is a truly unique offering in the Android market, and veteran For Dummies author Dan Gookin is here to offer his truly unique advice on how to blaze through your Fire Phone like a pro. …”
Libro electrónico -
406por Durand, BenoitTabla de Contenidos: “…1928994237.pdf; 1928994237.pdf; Cover; Table of Contents; Introduction; Chapter 1: Understanding the Threats: E-mail Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers; Chapter 2: Securing Outlook 2000; Chapter 3: Securing Outlook Express 5.0 and Eudora 4.3; Chapter 4: Web-based Mail Issues; Chapter 5: Client-Side Anti-Virus Applications; Chapter 6: Mobile Code Protection; Chapter 7: Personal Firewalls; Chapter 8: Securing Windows 2000 Advanced Server and Red Hat Linux 6 for E-mail Services; Chapter 9: Microsoft Exchange Server 5.5; Chapter 10: Sendmail and IMAP Security…”
Publicado 2001
Libro electrónico -
407Publicado 2019Tabla de Contenidos: “…Street -- Chris Truncer -- Carl Vincent -- Georgia Weidman -- Adam Willard -- Jake Williams -- Robert Willis -- Robin Wood -- Wirefall -- Phillip Wylie…”
Libro electrónico -
408por Fehily, Chris“…Author Chris Fehily also walks you through setting up a network or homegroup, connecting to the internet, configuring routers and firewalls, and hooking up printers and other devices. …”
Publicado 2010
Libro electrónico -
409Publicado 2015“…Finally, you will learn advanced topics, including firewalls, EC2 security groups, and building on CoreOS. …”
-
410Publicado 2019Libro electrónico
-
411Publicado 2019“…This title explores how to accomplish advanced system administration tasks, such as writing shell scripts, troubleshooting a server boot procedure, working with SELinux and firewalls, and configuring different network services.¬† Red Hat Certified Engineer (RHCE) Complete Video Course contains 17 individual video lessons divided into four modules, for a total of more than 8 hours of training. …”
-
412Publicado 2023Tabla de Contenidos: “…-- Beyond and outside Cyber Essentials -- Structure of this book -- Part 1: Requirements for basic technical protection from cyber attacks -- Chapter 2: Types of attack -- Social engineering -- Denial of service (DoS) -- Password attacks -- Threats outside the perimeter -- Misconfiguration and unpatched vulnerabilities -- Ransomware -- Scoping -- Implementation and documentation -- Chapter 3: Technical control themes -- Technical control theme 1: Firewalls -- Technical control theme 2: Secure configuration -- Technical control theme 3: User access control -- Technical control theme 4: Malware protection -- Technical control theme 5: Security update management -- Further guidance from Cyber Essentials -- Part 2: Gaining cyber essentials certification -- Chapter 4: Certification -- Externally managed services and scope -- Cyber Essentials checklist -- Cyber Essentials certification process -- Getting certified - Cyber Essentials Plus -- Appendix 1: Further assistance -- Practical help and consultancy -- Useful documents and further information -- The next step - cyber security standards -- Staff training -- Cyber resilience -- Appendix 2: IT Governance resources -- Certification only -- Get A Little Help -- Get A Lot Of Help -- Cyber Essentials Plus Health Check -- Penetration testing -- Gap analysis -- GRC eLearning courses -- Further reading…”
Libro electrónico -
413Publicado 2004“…Expert guidance on designing secure networks Understand security best practices and how to take advantage of the networking gear you already have Review designs for campus, edge, and teleworker networks of varying sizes Learn design considerations for device hardening, Layer 2 and Layer 3 security issues, denial of service, IPsec VPNs, and network identity Understand security design considerations for common applications such as DNS, mail, and web Identify the key security roles and placement issues for network security elements such as firewalls, intrusion detection systems, VPN gateways, content filtering, as well as for traditional network infrastructure devices such as routers and switches Learn 10 critical steps to designing a security system for your network Examine secure network management designs that allow your management communications to be secure while still maintaining maximum utility Try your hand at security design with three included case studies Benefit from the experience of the principal architect of the original Cisco Systems SAFE Security Blueprint Written by the principal architect of the original Cisco Systems SAFE Security Blueprint, Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. …”
Libro electrónico -
414Publicado 2003“…The book delves into XP topics such as controlling the control panel, changing unchangeable icons, removing uninstallable XP components, stopping pop-up ads, taking a bite out of cookies, speeding up file downloads, protecting yourself with firewalls and proxy servers, and more. Users of both Windows XP Home Edition and Windows XP Pro Edition will find smart, timesaving, fun, and useful hacks for virtually every feature in their operating system. …”
Libro electrónico -
415Publicado 2016“…Master the key tasks typically performed by Linux systems administrators Discover what Linux is and how it's used in remote server management Learn to set-up a Linux environment in both Ubuntu and Centos Explore the Linux file system and how to run commands and programs Understand file manipulation, the VI text editor, and how to manage user groups Review the principles of Linux software management and service management Learn the basics of networking: tools, configuration, network services, and firewalls Understand common security functions and how to conform to security standards Mandi Walls is the Technical Community Manager for EMEA at Chef Software. …”
-
416Publicado 2015“…If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn’t working. …”
Libro electrónico -
417por McGraw, Gary, 1966-“…--Avi Rubin, Director of the NSF ACCURATE Center; Professor, Johns Hopkins University; and coauthor of Firewalls and Internet Security Beginning where the best-selling book Building Secure Software left off, Software Security teaches you how to put software security into practice.The software security best practices, or touchpoints, described in this book have their basis in good software engineering and involve explicitly pondering security throughout the software development lifecycle. …”
Publicado 2006
Libro electrónico -
418por Hoda, Mynul“…In Part II, the author explains the features of Cisco ASA and Cisco PIX® version 7.0 security platforms, Firewall Services Module (FWSM), and Cisco IOS® firewalls. …”
Publicado 2005
Libro electrónico -
419Publicado 2002“…Its advantages are clear: web services are platform-independent (like Java itself), language-agnostic (a clear advantage over Java RMI), can easily be tunneled through firewalls (an obvious benefit to anyone who has dealt with modern enterprise networks), object-oriented (we all know about that), and tends to be loosely coupled (allowing more flexible application development). …”
Libro electrónico -
420Publicado 2009“…Voice over IP Security Security best practices derived from deep analysis of the latest VoIP network threats Patrick Park VoIP security issues are becoming increasingly serious because voice networks and services cannot be protected from recent intelligent attacks and fraud by traditional systems such as firewalls and NAT alone. After analyzing threats and recent patterns of attacks and fraud, consideration needs to be given to the redesign of secure VoIP architectures with advanced protocols and intelligent products, such as Session Border Controller (SBC). …”
Libro electrónico