Mostrando 461 - 480 Resultados de 1,060 Para Buscar 'Firefall~', tiempo de consulta: 1.65s Limitar resultados
  1. 461
    por Smoot, Stephen R.
    Publicado 2012
    Tabla de Contenidos: “…FCoE control planeFCoE VLAN discovery; FCoE entities discovery; Virtual link instantiation; Virtual link maintenance; I/O Consolidation with FCoE; Cable considerations; Rack topologies; Summary; Chapter 3: Next-Generation WAN and Service Integration; Introduction; Service Integration in the Data Center; Firewall virtualization; Firewall modes; Server load balancing and virtualization; SLB bridged and routed modes; SLB one-arm mode; Infrastructure Segmentation; Layer 2 and layer 3 segmentations; L3 control-plane virtualization: the VRF approach…”
    Libro electrónico
  2. 462
    Publicado 2015
    Tabla de Contenidos: “…""Network Security""""Network Segmentation""; ""Network Firewalls""; ""Intrusion Detection and Prevention""; ""Hadoop Roles and Separation Strategies""; ""Master Nodes""; ""Worker Nodes""; ""Management Nodes""; ""Edge Nodes""; ""Operating System Security""; ""Remote Access Controls""; ""Host Firewalls""; ""SELinux""; ""Summary""; ""Chapter 4. …”
    Libro electrónico
  3. 463
    por Zone, Ray
    Publicado 2012
    Libro electrónico
  4. 464
    Publicado 2004
    Tabla de Contenidos: “…The ITSO EWLM scenario -- 5.1 Overview of the process -- 5.1.1 Business scenario -- 5.1.2 Naming convention -- 5.2 Assessment -- 5.2.1 Defining the EWLM domain -- 5.2.2 Identifying all servers and middleware -- 5.2.3 Identifying all applications -- 5.3 Planning -- 5.3.1 Naming the domain policy -- 5.3.2 Defining the user information -- 5.3.3 Defining the directory and port configuration -- 5.4 Design -- 5.4.1 Identifying the transactions that request business functions -- 5.4.2 Identifying the processes that request business functions -- 5.4.3 Grouping service classes into a workload -- 5.4.4 Setting service class goals -- 5.5 Classifying the work -- 5.5.1 Defining classification filters for each transaction and process class -- 5.5.2 Creating the domain policy at the EWLM Control Center -- 5.6 Verification -- 5.6.1 Verifying transaction request classification filters -- 5.6.2 Verifying service class definition -- 5.6.3 Defining and implementing service policy -- 5.7 Reporting -- Chapter 6. Using a firewall and securing EWLM -- 6.1 Firewalls -- 6.1.1 General firewall overview -- 6.1.2 EWLM firewall support -- 6.1.3 Our EWLM firewall configurations -- 6.2 Security -- 6.2.1 Browser to Control Center -- 6.2.2 Control Center to domain manager -- 6.2.3 Domain manager to managed servers -- 6.2.4 EWLM processes -- 6.2.5 Instrumented applications -- Chapter 7. …”
    Libro electrónico
  5. 465
    Publicado 2017
    Tabla de Contenidos: “…-- Acts of god risk -- Cybersecurity : the threat from outside and inside the firewall -- Turning the tables on risk -- Building the right culture : values, organization, and culture -- The 360-degree risk management function -- What we talk about when we talk about risk -- The future is unknowable, the present burdensome : only the past can be understood -- The new tools of the trade -- Cognitive technologies -- The role of government and regulators in managing risk -- Case studies and guiding principles in planning for disaster -- The risk management society and its friends -- The rogue trader -- Index…”
    Libro electrónico
  6. 466
    por Pogue, David, 1963-
    Publicado 2005
    Tabla de Contenidos: “…The Mac OS X Desktop -- Folders and windows -- Organizing your stuff -- Spotlight -- Dock, desktop, and toolbar -- Applications in Mac OS X -- Documents, programs, and dashboard -- Mac OS 9 programs-and windows programs -- Moving data -- Automator and AppleScript -- The components of Mac OS X -- System preferences -- The free programs -- CDs, DVDs, and iTunes -- The technologies of Mac OS X --Accounts, firewalls, and security -- Networking -- Graphics, fonts, printing, and faxing -- Sound, movies, speech, and handwriting -- Terminal: doorway to Unix -- Fun with terminal -- Hacking Mac OS X -- Internet setup, .Mac, and iSync -- Mail and address book -- Safari, iChat and Sherlock -- SSH, FTP, VPN, and web sharing -- Appendix A: Installing Mac OS X 10.4 -- Appendix B: Troubleshooting -- Appendix C: The "Where'd it go?" …”
    Libro electrónico
  7. 467
    por Garbis, Jason
    Publicado 2024
    Tabla de Contenidos: “…-- Kapitel 3: Zero-Trust-Architekturen -- Kapitel 4: Zero Trust in der Praxis -- Teil II: Zero Trust und Komponenten der Unternehmensarchitektur -- Kapitel 5: Identitäts- und Zugriffsmanagement -- Kapitel 6: Netzwerkinfrastruktur -- Kapitel 7: Netzwerkzugangskontrolle -- Kapitel 8: Intrusion Detection and Prevention Systems -- Kapitel 9: Virtual Private Networks -- Kapitel 10: Firewalls der nächsten Generation -- Kapitel 11: Security Operations -- Kapitel 12: Privileged Access Management -- Kapitel 13: Data Protection -- Kapitel 14: Infrastructure and Platform as a Service -- Kapitel 15: Software as a Service -- Kapitel 16: IoT Devices and "Things" -- Teil III: Putting It All Together -- Kapitel 17: A Zero Trust Policy Model -- Kapitel 18: Zero Trust Scenarios -- Kapitel 19: Making Zero Trust Successful -- Kapitel 20: Conclusion -- Kapitel 21: Afterword -- Appendix A: Further Reading…”
    Libro electrónico
  8. 468
    Publicado 2011
    “…Drawing on his extensive experience as a security instructor and consultant, Easttom thoroughly covers core topics, such as vulnerability assessment, virus attacks, hacking, spyware, network defense, passwords, firewalls, VPNs, and intrusion detection. Writing clearly and simply, he fully addresses crucial issues that many introductory security books ignore, from industrial espionage to cyberbullying. …”
    Libro electrónico
  9. 469
    por Kipper, Gregory
    Publicado 2006
    “…Intrusion detection systems, firewalls, and forensics are just a few of the key areas that must be understood and applied to proactively solve the wireless problem. …”
    Libro electrónico
  10. 470
    Publicado 2009
    Tabla de Contenidos: “…Configure Enterprise Manager for firewall -- Chapter 16. Maintain, tune, troubleshoot Grid Control -- Chapter 17. …”
    Libro electrónico
  11. 471
    Publicado 2015
    Tabla de Contenidos: “…Multiple Redis databasesKeys without a namespace; Using Swap; Not planning and configuring the memory properly; An inappropriate persistence strategy; Summary; Chapter 7: Security Techniques (Guard Your Data); The basic security; Obfuscating critical commands; Networking security; Protecting Redis with firewall rules; Running Redis on the loopback network interface; Running Redis in a Virtual Private Cloud; Encrypting client-to-server communication; Running stunnel on both the server and the client; Running stunnel on the server and using a Redis client that supports SSL; Summary…”
    Libro electrónico
  12. 472
    Publicado 2016
    Tabla de Contenidos: “…Location informationNetworks and Location; Document tracking; eXtensible Markup Language; Office Documents; PDF; Image files; Shortcuts; Conclusions; Exercises; Chapter 8 - Log Files; Introduction; Windows event logs; Windows Server Services; Parsing XML-based Log Files; Unix syslog; Application logs; Mac OS X logs; Security logs; Firewall Logs; Windows Firewall Logs; Antivirus Logs; Auditing; Summary; Exercises; Chapter 9 - Executable Programs; Introduction; Stacks and heaps; Memory Space; Portable executables; ProcMon; ProcExp; Sysmon; Prefetch; Linux executable and linkable format (ELF)…”
    Libro electrónico
  13. 473
    por Orzach, Yoram
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and credits -- Contributors -- About the reviewers -- Table of Contents -- Preface -- Part 1: Protecting the Network - Technologies, Protocols, Vulnerabilities, and Tools -- Chapter 1: Data Centers and the Enterprise Network Architecture and its Components -- Exploring networks and data flows -- The data center, core, and user networks -- Switching (L2) and routing (L3) topologies -- Switching (L2) and routing (L3) -- L2 and L3 architectures -- L2 and L3 architecture data flow -- L2 and L3 architecture data flow with redundancy -- L2 and L3 topologies with firewalls -- L2 and L3 topologies with overlays -- The network perimeter -- The data, control, and management planes -- The data plane -- The control plane -- The management plane -- SDN and NFV -- Software-defined networking (SDN) -- Network function virtualization (NFV) -- Cloud connectivity -- Type of attacks and where they are implemented -- Attacks on the internet -- Attacks from the internet targeting organizational networks -- Attacks on firewalls -- Attacks on servers -- Attacks on local area networks (LANs) -- Attacks on network routers and routing protocols -- Attacks on wireless networks -- Summary -- Questions -- Chapter 2: Network Protocol Structures and Operations -- Data network protocols and data structures -- Layer 2 protocols - STP, VLANs, and security methods -- The Ethernet protocols -- LAN switching -- VLANs and VLAN tagging -- Spanning tree protocols -- Layer 3 protocols - IP and ARP -- Routers and routing protocols -- Routing operations -- Routing protocols -- Layer 4 protocols - UDP, TCP, and QUIC -- UDP -- TCP -- QUIC -- Vulnerabilities in layer 4 protocols -- Encapsulation and tunneling -- Summary -- Questions -- Chapter 3: Security Protocols and Their Implementation -- Security pillars - confidentiality, integrity, and availability…”
    Libro electrónico
  14. 474
    Publicado 2009
    Tabla de Contenidos: “…11. Tools of your tradeFirewalls; Intrusion Prevention Systems; Application Firewalls; Access Control Systems; Unified Threat Management; 12. …”
    Libro electrónico
  15. 475
    por Calderon Pale, Paulino
    Publicado 2012
    Tabla de Contenidos: “…installations; Detecting web application firewalls; Detecting possible XST vulnerabilities; Detecting Cross Site Scripting vulnerabilities in web applications; Finding SQL injection vulnerabilities in web applications…”
    Libro electrónico
  16. 476
    por Gregg, Michael H.
    Publicado 2012
    Tabla de Contenidos: “…Cryptographic AttacksSummary; Exam Essentials; Review Questions; Chapter 2: Comprehensive Security Solutions; Advanced Network Design; TCP/IP; Secure Communication Solutions; Secure Facility Solutions; Secure Network Infrastructure Design; Summary; Exam Essentials; Review Questions; Chapter 3: Securing Virtualized, Distributed, and Shared Computing; Enterprise Security; Cloud Computing; Virtualization; Virtual LANs; Enterprise Storage; Summary; Exam Essentials; Review Questions; Chapter 4: Host Security; Firewalls and Access Control Lists; Host-Based Firewalls; Trusted Operating System…”
    Libro electrónico
  17. 477
    Publicado 2018
    Tabla de Contenidos: “…Group management -- Login management -- Summary -- Questions -- Further reading -- Chapter 4: Managing Azure -- Technical requirements -- Storage services -- Storage accounts -- Managed disks -- Azure Files -- Blob storage -- Networking -- Virtual network -- Subnets -- Network Security Group -- Public IP address and network interface -- Components for your virtual machine -- Azure profile -- Resource group -- Storage account -- Virtual network -- NSG -- Public IP address and network interface -- Summary -- Questions -- Further reading -- Chapter 5: Advanced Linux Administration -- Technical requirements -- Software management -- The RPM software manager -- The DPKG software manager -- Software management with YUM -- Software management with Zypp -- Software management with apt -- Networking -- Identifying the network interfaces -- Identifying the IP address -- Showing the route table -- Network configuration -- Changes in the network configuration -- Hostname -- DNS -- Storage -- Storage provided by block devices -- Adding a data disk -- Partitioning -- Filesystems in Linux -- Ext4 filesystem -- XFS filesystem -- ZFS filesystem -- BTRFS filesystem -- Swap filesystem -- Linux software RAID -- Systemd -- Working with units -- Services -- Targets -- Scheduled tasks -- Mounting local filesystems -- Mounting remote filesystems -- Summary -- Questions -- Further reading -- Chapter 6: Managing Linux Security and Identities -- Linux security tips -- Technical requirements -- Linux firewall -- Firewalld zones -- Firewalld services -- Firewalld network sources -- Linux Security Modules -- SELinux -- SELinux configuration -- SELinux context on ports -- SELinux context on files -- SELinux Boolean -- AppArmor -- AppArmor status -- Generating AppArmor profiles -- Systemd security -- Restricting access to the filesystem -- Restricting network access…”
    Libro electrónico
  18. 478
    Publicado 2011
    “…Los dos primeros capítulos están dedicados a una presentación avanzada de la arquitectura del sistema, al modo de compatibilidad con Windows XP y a las nuevas herramientas, como AppLocker o la herramienta de eliminación de software malintencionado. El Firewall avanzado de Windows, reescrito por completo, se integra completamente en IPSEC y es el tema central del capítulo 3. …”
    Acceso con credenciales UPSA.
    Libro electrónico
  19. 479
    por Heiderich, Mario
    Publicado 2011
    Tabla de Contenidos: “…Nonalphanumeric JavaScriptUse Cases; Summary; Endnotes; Chapter 5: CSS; Syntax; Algorithms; Attacks; Summary; Chapter 6: PHP; History and Overview; Obfuscation in PHP; Summary; Endnotes; Chapter 7: SQL; SQL: A Short Introduction; Summary; Endnotes; Chapter 8: Web application firewalls and client-side filters; Bypassing WAFs; Client-Side Filters; Summary; Endnotes; Chapter 9: Mitigating bypasses and attacks; Protecting Against Code Injections; Protecting The DOM; Summary; Chapter 10: Future developments; Impact On Current Applications; HTML5; Other Extensions; Plug-Ins; Summary; Index…”
    Libro electrónico
  20. 480
    por Yang, Fan, 1977-
    Publicado 2024
    “…Disorienting Politics mines 21st-century media artifacts--including films like The Martian and TV/streaming media shows such as Firefly and House of Cards--to make visible the economic, cultural, political, and ecological entanglements of China and the United States. …”
    Libro electrónico