Mostrando 401 - 420 Resultados de 1,060 Para Buscar 'Firefall~', tiempo de consulta: 1.76s Limitar resultados
  1. 401
    Publicado 2015
    Tabla de Contenidos: “…Setting the Encryption for Your Wireless NetworkSecurity Networks with Firewalls and Gateways; Using a Firewall; Understanding the Gateway Concept; Measuring the Speed of Your Internet Connection; Factors Limiting the Speed of Your Internet Connection; Wireless Networking Standards and Speeds; Understanding the Different Types of Internet Connections; Dial-up Internet Access; Broadband Internet Access; Virtual Private Networks; Principles for Troubleshooting Networking Problems; Troubleshooting Network Problems with the Help of Windows Troubleshooting Tools…”
    Libro electrónico
  2. 402
    por Russel, Charlie
    Publicado 2006
    Tabla de Contenidos: “…Securing Client ComputersSecuring Wireless Networks; Securing Internet Firewalls; Summary; Part II :Installation and Setup; Chapter 3: Installing Windows Small Business Server 2003; Planning Partitions; Preparing the Server; Installing Windows Small Business Server; Installing the Operating System; Using the Windows Small Business Server Setup Wizard; Summary; Chapter 4: Upgrading or Migrating to Windows Small Business Server 2003; Choosing Between Upgrading and Migrating; What's Involved in a Conventional Migration; What's Involved in a Swing Migration; Advantages of Swing Migration…”
    Libro electrónico
  3. 403
    por A., Jesin
    Publicado 2014
    Tabla de Contenidos: “…VLAN DatabaseInterface settings; Summary; Chapter 3: Generic IP End Devices; Desktops and laptops; Servers; HTTP; DHCP; TFTP; DNS; SYSLOG; AAA; NTP; EMAIL; FTP; Firewall / IPv6 Firewall; Other end devices; Configuring end devices; IP Configuration; Dial-up; Terminal; Command Prompt; Web Browser; PC Wireless; VPN; Traffic Generator; MIB Browser; Cisco IP Communicator; E Mail; PPPoE Dialer; Text Editor; Summary; Chapter 4: Creating a Network Topology; Connecting devices; Link status; Testing connectivity with PDUs; Simple PDU; Complex PDU; Using the simulation mode; Clustering a topology…”
    Libro electrónico
  4. 404
    por Shapiro, Jeffrey R.
    Publicado 2008
    Tabla de Contenidos: “…Windows Server 2008 for Database Services with SQL Server Windows Server 2008 for IIS and ASP.NET; Windows Server 2008 for Application Services; Windows Server 2008 for Resolutions Services; Summary; Chapter 2: Configuring Windows Server 2008; Using the Microsoft Management Console; Windows Firewall Changes for MMC Tools; Getting to Know the MMC Tools; Using the Security Configuration Wizard; Working with Data Sources (ODBC); Understanding Control Panel Applets; Windows PowerShell; Summary; Chapter 3: Networking Windows Server 2008; TCP/IP on Windows Server 2008; TCP/IP Basics (IPv4)…”
    Libro electrónico
  5. 405
    Publicado 2014
    “…Loaded with innovative features like Dynamic Perspective, Firefly, and Mayday, your Amazon Fire Phone is a truly unique offering in the Android market, and veteran For Dummies author Dan Gookin is here to offer his truly unique advice on how to blaze through your Fire Phone like a pro. …”
    Libro electrónico
  6. 406
    por Durand, Benoit
    Publicado 2001
    Tabla de Contenidos: “…1928994237.pdf; 1928994237.pdf; Cover; Table of Contents; Introduction; Chapter 1: Understanding the Threats: E-mail Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers; Chapter 2: Securing Outlook 2000; Chapter 3: Securing Outlook Express 5.0 and Eudora 4.3; Chapter 4: Web-based Mail Issues; Chapter 5: Client-Side Anti-Virus Applications; Chapter 6: Mobile Code Protection; Chapter 7: Personal Firewalls; Chapter 8: Securing Windows 2000 Advanced Server and Red Hat Linux 6 for E-mail Services; Chapter 9: Microsoft Exchange Server 5.5; Chapter 10: Sendmail and IMAP Security…”
    Libro electrónico
  7. 407
    Publicado 2019
    Tabla de Contenidos: “…Street -- Chris Truncer -- Carl Vincent -- Georgia Weidman -- Adam Willard -- Jake Williams -- Robert Willis -- Robin Wood -- Wirefall -- Phillip Wylie…”
    Libro electrónico
  8. 408
    por Fehily, Chris
    Publicado 2010
    “…Author Chris Fehily also walks you through setting up a network or homegroup, connecting to the internet, configuring routers and firewalls, and hooking up printers and other devices. …”
    Libro electrónico
  9. 409
    Publicado 2015
    “…Finally, you will learn advanced topics, including firewalls, EC2 security groups, and building on CoreOS. …”
    Video
  10. 410
    Publicado 2019
    Libro electrónico
  11. 411
    Publicado 2019
    “…This title explores how to accomplish advanced system administration tasks, such as writing shell scripts, troubleshooting a server boot procedure, working with SELinux and firewalls, and configuring different network services.¬† Red Hat Certified Engineer (RHCE) Complete Video Course contains 17 individual video lessons divided into four modules, for a total of more than 8 hours of training. …”
    Video
  12. 412
    Publicado 2023
    Tabla de Contenidos: “…-- Beyond and outside Cyber Essentials -- Structure of this book -- Part 1: Requirements for basic technical protection from cyber attacks -- Chapter 2: Types of attack -- Social engineering -- Denial of service (DoS) -- Password attacks -- Threats outside the perimeter -- Misconfiguration and unpatched vulnerabilities -- Ransomware -- Scoping -- Implementation and documentation -- Chapter 3: Technical control themes -- Technical control theme 1: Firewalls -- Technical control theme 2: Secure configuration -- Technical control theme 3: User access control -- Technical control theme 4: Malware protection -- Technical control theme 5: Security update management -- Further guidance from Cyber Essentials -- Part 2: Gaining cyber essentials certification -- Chapter 4: Certification -- Externally managed services and scope -- Cyber Essentials checklist -- Cyber Essentials certification process -- Getting certified - Cyber Essentials Plus -- Appendix 1: Further assistance -- Practical help and consultancy -- Useful documents and further information -- The next step - cyber security standards -- Staff training -- Cyber resilience -- Appendix 2: IT Governance resources -- Certification only -- Get A Little Help -- Get A Lot Of Help -- Cyber Essentials Plus Health Check -- Penetration testing -- Gap analysis -- GRC eLearning courses -- Further reading…”
    Libro electrónico
  13. 413
    Publicado 2004
    “…Expert guidance on designing secure networks Understand security best practices and how to take advantage of the networking gear you already have Review designs for campus, edge, and teleworker networks of varying sizes Learn design considerations for device hardening, Layer 2 and Layer 3 security issues, denial of service, IPsec VPNs, and network identity Understand security design considerations for common applications such as DNS, mail, and web Identify the key security roles and placement issues for network security elements such as firewalls, intrusion detection systems, VPN gateways, content filtering, as well as for traditional network infrastructure devices such as routers and switches Learn 10 critical steps to designing a security system for your network Examine secure network management designs that allow your management communications to be secure while still maintaining maximum utility Try your hand at security design with three included case studies Benefit from the experience of the principal architect of the original Cisco Systems SAFE Security Blueprint Written by the principal architect of the original Cisco Systems SAFE Security Blueprint, Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. …”
    Libro electrónico
  14. 414
    Publicado 2003
    “…The book delves into XP topics such as controlling the control panel, changing unchangeable icons, removing uninstallable XP components, stopping pop-up ads, taking a bite out of cookies, speeding up file downloads, protecting yourself with firewalls and proxy servers, and more. Users of both Windows XP Home Edition and Windows XP Pro Edition will find smart, timesaving, fun, and useful hacks for virtually every feature in their operating system. …”
    Libro electrónico
  15. 415
    Publicado 2016
    “…Master the key tasks typically performed by Linux systems administrators Discover what Linux is and how it's used in remote server management Learn to set-up a Linux environment in both Ubuntu and Centos Explore the Linux file system and how to run commands and programs Understand file manipulation, the VI text editor, and how to manage user groups Review the principles of Linux software management and service management Learn the basics of networking: tools, configuration, network services, and firewalls Understand common security functions and how to conform to security standards Mandi Walls is the Technical Community Manager for EMEA at Chef Software. …”
    Video
  16. 416
    Publicado 2015
    “…If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn’t working. …”
    Libro electrónico
  17. 417
    por McGraw, Gary, 1966-
    Publicado 2006
    “…--Avi Rubin, Director of the NSF ACCURATE Center; Professor, Johns Hopkins University; and coauthor of Firewalls and Internet Security Beginning where the best-selling book Building Secure Software left off, Software Security teaches you how to put software security into practice.The software security best practices, or touchpoints, described in this book have their basis in good software engineering and involve explicitly pondering security throughout the software development lifecycle. …”
    Libro electrónico
  18. 418
    por Hoda, Mynul
    Publicado 2005
    “…In Part II, the author explains the features of Cisco ASA and Cisco PIX® version 7.0 security platforms, Firewall Services Module (FWSM), and Cisco IOS® firewalls. …”
    Libro electrónico
  19. 419
    Publicado 2002
    “…Its advantages are clear: web services are platform-independent (like Java itself), language-agnostic (a clear advantage over Java RMI), can easily be tunneled through firewalls (an obvious benefit to anyone who has dealt with modern enterprise networks), object-oriented (we all know about that), and tends to be loosely coupled (allowing more flexible application development). …”
    Libro electrónico
  20. 420
    Publicado 2009
    “…Voice over IP Security Security best practices derived from deep analysis of the latest VoIP network threats Patrick Park VoIP security issues are becoming increasingly serious because voice networks and services cannot be protected from recent intelligent attacks and fraud by traditional systems such as firewalls and NAT alone. After analyzing threats and recent patterns of attacks and fraud, consideration needs to be given to the redesign of secure VoIP architectures with advanced protocols and intelligent products, such as Session Border Controller (SBC). …”
    Libro electrónico