Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
421por Purdy, Gregor N.“…Firewalls, Network Address Translation (NAT), network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables . …”
Publicado 2004
Libro electrónico -
422por Held, Gilbert, 1943-“…Unfortunately the manuals that accompany the equipment do not address topics such as site selection, equipment interoperability with products from different vendors, how to acquire and configure different firewalls, network address translation, and router software that becomes necessary when connecting to the internet. …”
Publicado 2003
Libro electrónico -
423Publicado 1996“…Today, BSD is found in nearly every variant of UNIX, and is widely used for Internet services and firewalls, timesharing, and multiprocessing systems. …”
Libro electrónico -
424Publicado 2007“…Configure Fedora or Red Hat Enterprise Linux to: Explore your computer or the Internet from GNOME(r) and KDE(r) desktops Manage and use documents, spreadsheets, presentations, music, and images Draw from online software repositories with Package Manager and Package Updater Build an Internet server with e-mail, Web, DNS, FTP, and database services Secure your computer with firewalls, password protection, and SELinux Try out cutting edge Fedora 7 features: Boot up the first official Fedora 7 desktop live CD to try before you install Play with the latest 3D-desktop technology with AIGLX and Compiz Run virtualized versions of Fedora on your desktop, using KVM and QEMU What's on the DVD and CD-ROM? …”
Libro electrónico -
425Publicado 2002“…The appendixes include tips on firewalls, Network Dispatcher, Solaris, Oracle8i, AIX, DB2, Domino, IBM HTTP Server, log files, and Commerce Analyzer…”
Libro electrónico -
426Publicado 2012“…Poprawna konfiguracja firewalla, list ACL i autoryzacji to klucz do niezawodności Twojej sieci i poufności przetwarzanych w niej danych. …”
Libro electrónico -
427Publicado 2019“…Evade antiviruses and bypass firewalls with the most widely used penetration testing frameworks Key Features Gain insights into the latest antivirus evasion techniques Set up a complete pentesting environment using Metasploit and virtual machines Discover a variety of tools and techniques that can be used with Kali Linux Book Description Penetration testing or ethical hacking is a legal and foolproof way to identify vulnerabilities in your system. …”
Libro electrónico -
428Publicado 2015“…Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter. …”
Libro electrónico -
429Publicado 2013“…From malware and DDoS attacks to firewalls and encryption, Chuck Easttom blends theoretical foundations with up-to-the-minute best-practice techniques. …”
Libro electrónico -
430Publicado 2018Grabación no musical
-
431Publicado 2024“…Easttom thoroughly introduces the core technologies of modern network security, including firewalls, intrusion-detection systems, and VPNs. Next, he shows how encryption can be used to safeguard data as it moves across networks. …”
Libro electrónico -
432Publicado 2020“…"Explore the latest features of Unity and build VR experiences including first-person interactions, audio fireball games, 360-degree media, art gallery tours, and VR storytelling Key Features Discover step-by-step instructions and best practices to begin your VR development journey Explore Unity features such as URP rendering, XR Interaction Toolkit, and ProBuilder Build impressive VR-based apps and games that can be experienced using modern devices like Oculus Rift and Oculus Quest Book Description This third edition of the Unity Virtual Reality (VR) development guide is updated to cover the latest features of Unity 2019.4 or later versions - the leading platform for building VR games, applications, and immersive experiences for contemporary VR devices. …”
Libro electrónico -
433Publicado 2017Tabla de Contenidos: “…3 Handling Evidence 4 Cryptographic Hashes 5 Chain of Custody 8 Incident Response 8 The Need for Network Forensic Practitioners 10 Summary 11 References 12 2 Networking Basics 13 Protocols 14 Open Systems Interconnection (OSI) Model 16 TCP/IP Protocol Suite 18 Protocol Data Units 19 Request for Comments 20 Internet Registries 23 Internet Protocol and Addressing 25 Internet Protocol Addresses 28 Internet Control Message Protocol (ICMP) 31 Internet Protocol Version 6 (IPv6) 31 Transmission Control Protocol (TCP) 33 Connection-Oriented Transport 36 User Datagram Protocol (UDP) 38 Connectionless Transport 39 Ports 40 Domain Name System 42 Support Protocols (DHCP) 46 Support Protocols (ARP) 48 Summary 49 References 51 3 Host-Side Artifacts 53 Services 54 Connections 60 Tools 62 netstat 63 nbstat 66 ifconfi g/ipconfi g 68 Sysinternals 69 ntop 73 Task Manager/Resource Monitor 75 ARP 77 /proc Filesystem 78 Summary 79 4 Packet Capture and Analysis 81 Capturing Packets 82 Tcpdump/Tshark 84 Wireshark 89 Taps 91 Port Spanning 93 ARP Spoofi ng 94 Passive Scanning 96 Packet Analysis with Wireshark 98 Packet Decoding 98 Filtering 101 Statistics 102 Following Streams 105 Gathering Files 106 Network Miner 108 Summary 110 5 Attack Types 113 Denial of Service Attacks 114 SYN Floods 115 Malformed Packets 118 UDP Floods 122 Amplifi cation Attacks 124 Distributed Attacks 126 Backscatter 128 Vulnerability Exploits 130 Insider Threats 132 Evasion 134 Application Attacks 136 Summary 140 6 Location Awareness 143 Time Zones 144 Using whois 147 Traceroute 150 Geolocation 153 Location-Based Services 156 WiFi Positioning 157 Summary 158 7 Preparing for Attacks 159 NetFlow 160 Logging 165 Syslog 166 Windows Event Logs 171 Firewall Logs 173 Router and Switch Logs 177 Log Servers and Monitors 178 Antivirus 180 Incident Response Preparation 181 Google Rapid Response 182 Commercial Offerings 182 Security Information and Event Management 183 Summary 185 8 Intrusion Detection Systems 187 Detection Styles 188 Signature-Based 188 Heuristic 189 Host-Based versus Network-Based 190 Snort 191 Suricata and Sagan 201 Bro 203 Tripwire 205 OSSEC 206 Architecture 206 Alerting 207 Summary 208 9 Using Firewall and Application Logs 211 Syslog 212 Centralized Logging 216 Reading Log Messages 220 LogWatch 222 Event Viewer 224 Querying Event Logs 227 Clearing Event Logs 231 Firewall Logs 233 Proxy Logs 236 Web Application Firewall Logs 238 Common Log Format 240 Summary 243 10 Correlating Attacks 245 Time Synchronization 246 Time Zones 246 Network Time Protocol 247 Packet Capture Times 249 Log Aggregation and Management 251 Windows Event Forwarding 251 Syslog 252 Log Management Offerings 254 Timelines 257 Plaso 258 PacketTotal 259 Wireshark 261 Security Information and Event Management 262 Summary 263 11 Network Scanning 265 Port Scanning 266 Operating System Analysis 271 Scripts 273 Banner Grabbing 275 Ping Sweeps 278 Vulnerability Scanning 280 Port Knocking 285 Tunneling 286 Passive Data Gathering 287 Summary 289 12 Final Considerations 291 Encryption 292 Keys 293 Symmetric 294 Asymmetric 295 Hybrid 296 SSL/TLS 297 Cloud Computing 306 Infrastructure as a Service 306 Storage as a Service 309 Software as a Service 310 Other Factors 311 The Onion Router (TOR) 314 Summary 317 Index 319.…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
434Publicado 2022Tabla de Contenidos: “…Risk Management -- Hardening and Security Policies -- Change Management -- Patching and Updates -- Training -- Common Agreements -- Security Preparedness -- Contingency Planning -- Incident Response -- Disaster Recovery -- Business Continuity -- Forensics -- Chapter 18 Review -- Chapter 19 Protecting Your Network -- Test Specific -- Security Concepts -- CIA -- Zero Trust -- Defense in Depth -- Separation of Duties -- Network Threats -- Threat Terminology -- Spoofing -- Packet/Protocol Abuse -- Zero-Day Attacks -- Rogue Devices -- ARP Cache Poisoning -- Denial of Service -- On-Path Attack -- Session Hijacking -- Password Attacks -- Physical/Local Access -- Malware -- Social Engineering -- Common Vulnerabilities -- Unnecessary Running Services -- Unpatched/Legacy Systems -- Unencrypted Channels -- Cleartext Credentials -- RF Emanation -- Hardening Your Network -- Physical Security -- Network Security -- Device Hardening -- Host Security -- Firewalls -- Types of Firewalls -- Implementing and Configuring Firewalls -- Troubleshooting Firewalls -- Chapter 19 Review -- Chapter 20 Network Monitoring -- Test Specific -- SNMP -- Monitoring Tools -- Packet Sniffers -- Protocol Analyzers -- Sensors -- Interface Monitors -- Performance Monitors -- Putting It All Together -- Scenario: Monitoring and Managing -- SIEM -- Chapter 20 Review -- Chapter 21 Network Troubleshooting -- Test Specific -- Troubleshooting Tools -- Hardware Tools -- Software Tools -- The Troubleshooting Process -- Identify the Problem -- Establish a Theory of Probable Cause -- Test the Theory to Determine the Cause -- Establish a Plan of Action and Identify Potential Effects -- Implement the Solution or Escalate as Necessary -- Verify Full System Functionality and Implement Preventive Measures -- Document Findings, Actions, Outcomes, and Lessons Learned…”
Libro electrónico -
435Publicado 2015Tabla de Contenidos: “…Mounting multidisk btrfs volumes from /etc/fstabCreating a RAID1 mirror; Using btrfs snapshots; Optimizing btrfs for solid state drives; Managing snapshots with snapper; Summary; Chapter 6: File Sharing with NFS; An overview of NFS; Overview of the lab environment ; The NFS server configuration; Simple exports; Advanced exports; Pseudo-root; Using exportfs to create temporary exports; Hosting NFSv4 behind a firewall; Hosting NFSv3 behind a firewall; Diagnosing NFSv3 issues; Using static ports for NFSv3; Configuring the NFS client; Auto-mounting NFS with autofs; Summary…”
Libro electrónico -
436Publicado 2016Tabla de Contenidos: “…Miscellaneous evasion techniquesReader challenge; Summary; Record now - sort later; Old school - the text editor method; Dradis framework for collaboration; The report; Reader challenge; Summary; Firewall lab setup; The scenario; The virtual lab setup; The challenge; The walkthrough; Reporting; Summary; Penetration testing framework; Penetration Testing Execution Standard; Pre-engagement interactions; Intelligence gathering; Threat modeling; Vulnerability analysis; Exploitation; Post exploitation; Reporting; Final thoughts; Why VMware Workstation?…”
Libro electrónico -
437Publicado 2008Tabla de Contenidos: “…Using the Network and Sharing CenterManaging Wired Connections; Managing Wireless Connections; IPv4; IP v6; Troubleshooting Network Connectivity; Using Network Map; Other Troubleshooting Methods; Summary of Exam Objectives; Exam Objectives Fast Track; Exam Objectives Frequently Asked Questions; Self Test; Self Test Quick Answer Key; Chapter 4: Configuring the Vista Security Features; Introduction; User Account Control; Understanding User Account Control; Configuring User Account Control; Disabling User Account Control; Configuring the Security Center; Windows Defender; Windows Firewall…”
Libro electrónico -
438Publicado 2017Tabla de Contenidos: “…Disabling and Managing Pop-UpsWi-fi Security and Safety; A Basic Understanding of Components Used to Connect to the Internet; Configuring Your Router; Changing the administrator username/password; Service set identifier; Security mode; SSID passphrase; Using Other People's Wi-Fi; Sharing Your Wi-Fi With Others; Setting up a guest network; Passwords; Strong Passwords; Changing Passwords; Password Policies; Setting Up Security Questions; Remembering Passwords; Tools; Password generators; Password vaults; Passwords stored in IE; Passwords stored in Chrome; Google smart lock; Firewalls…”
Libro electrónico -
439Publicado 2014Tabla de Contenidos:Libro electrónico
-
440Publicado 2022Tabla de Contenidos: “…. -- Chapter 4: Using Shell to Configure and Troubleshoot a Network -- Technical requirements -- Using nmcli and netplan -- Getting ready -- How to do it -- How it works -- There's more -- Using firewall-cmd and ufw -- Getting ready -- How to do it -- How it works -- There's more -- Working with open ports and connections -- Getting ready -- How to do it -- How it works -- There's more -- Configuring /etc/hosts and DNS resolving…”
Libro electrónico