Mostrando 481 - 500 Resultados de 1,060 Para Buscar 'Firefall~', tiempo de consulta: 1.46s Limitar resultados
  1. 481
    Publicado 2016
    Libro electrónico
  2. 482
    por Waschke, Marvin. author
    Publicado 2017
    “…Traditional anti-virus software and personal firewalls no longer suffice to guarantee personal security. …”
    Libro electrónico
  3. 483
    Publicado 2011
    “…Build and maintain an internal IT audit function with maximum effectiveness and value Audit entity-level controls, data centers, and disaster recovery Examine switches, routers, and firewalls Evaluate Windows, UNIX, and Linux operating systems Audit Web servers and applications Analyze databases and storage solutions Assess WLAN and mobile devices Audit virtualized environments Evaluate risks associated with cloud computing and outsourced operations Drill down into applications to find potential control weaknesses Use standards and frameworks, such as COBIT, ITIL, and ISO Understand regulations, including Sarbanes-Oxley, HIPAA, and PCI Implement proven risk management practices…”
    Libro electrónico
  4. 484
    Publicado 2022
    “…You'll also explore how to leverage public resources to learn more about your target, discover potential targets, analyze them, and gain a foothold using a variety of exploitation techniques while dodging defenses like antivirus and firewalls. The book focuses on leveraging target resources, such as PowerShell, to execute powerful and difficult-to-detect attacks. …”
    Libro electrónico
  5. 485
    Publicado 2014
    Tabla de Contenidos: “…Virtual Networking and Security ComponentsEnterprise Storage; Summary; Exam Essentials; Review Questions; Chapter 4 Host Security; Firewalls and Network Access Control; Host-Based Firewalls; Trusted Operating Systems; Endpoint Security Solutions; Common Threats to Endpoint Security; Anti-malware; Antivirus; Anti-spyware; Spam Filters; Host Hardening; Asset Management; Data Exfiltration; Intrusion Detection and Prevention; Network Management, Monitoring, and Security Tools; Security Devices; Operational and Consumer Network-Enabled Devices; Summary; Exam Essentials; Review Questions…”
    Libro electrónico
  6. 486
    Publicado 2024
    Tabla de Contenidos: “…Chapter 11: Shield Right for APIs with Runtime Protection -- Technical requirements -- Securing and hardening environments -- Container images -- Operating systems -- Using WAFs -- Understanding the Next-Generation Firewall (NGWAF) and Web Application API Protection (WAAP) products -- Using API gateways and API management -- Implementing security patterns in the Kong API gateway -- Best practices for API gateway protection -- Deploying API firewalls -- API monitoring and alerting -- Selecting the correct protections for your APIs -- Summary -- Further reading -- Chapter 12: Securing Microservices -- Technical requirements -- Understanding microservices -- Securing the foundations of microservices -- Securing the connectivity of microservices -- Access control for microservices -- Running secure microservices in practice -- Summary -- Further reading -- Chapter 13: Implementing an API Security Strategy -- Ownership of API security -- Understanding your stakeholders -- Roles and responsibilities -- The 42Crunch maturity model -- Inventory -- Design -- Development -- Testing -- Protection -- Governance -- Planning your program -- Establishing your objectives -- Assessing your current state -- Building a landing zone for APIs -- Running your program -- Building your teams -- Tracking your progress -- Integrating with your existing AppSec program -- Your personal API security journey -- Summary -- Further reading -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  7. 487
    Tabla de Contenidos: “…Se la mia morte brami (3:26) -- Beltà poi che t'assenti (3:12) -- Tu piangi ò Filli mia (3:18) -- Resta di darmi noia (3:28) -- Chiaro risplender suole (4:05) -- Io parto e non più dissi (3:07) -- Mille volte il dì morò (3:23) -- O dolce mio tesoro (3:07) -- Deh come in van sospiro (3:07) -- Io pur respiro (2:58) -- Alme d'amor rubelle (2:20) -- Candido e verde fiore (2:11) -- Ardita zanzaretta (3:21) -- Ardo per te mio bene (3:27) -- Ancide sol la morte (2:17) -- Quel nò crudel (2:15) -- Moro al mio duolo (3:40) -- Volan quasi farfalle (2:43) -- Al mio gioir il ciel si fa sereno (2:41) -- Tu segui ò bella Clori (2:32) -- Ancor che per amarti (3:15) -- Già piansi nel dolore (2:32) -- Quando ridente e bella (2:31)…”
    CDROM
  8. 488
    Publicado 2018
    Tabla de Contenidos: “…5.5 Database Access Control -- 5.6 Inference -- 5.7 Database Encryption -- 5.8 Data Center Security -- 5.9 Key Terms, Review Questions, and Problems -- Chapter 6 Malicious Software -- 6.1 Types of Malicious Software (Malware) -- 6.2 Advanced Persistent Threat -- 6.3 Propagation-Infected Content-Viruses -- 6.4 Propagation-Vulnerability Exploit-Worms -- 6.5 Propagation-Social Engineering-Spam E-mail, Trojans -- 6.6 Payload-System Corruption -- 6.7 Payload-Attack Agent-Zombie, Bots -- 6.8 Payload-Information Theft-Keyloggers, Phishing, Spyware -- 6.9 Payload-Stealthing-Backdoors, Rootkits -- 6.10 Countermeasures -- 6.11 Key Terms, Review Questions, and Problems -- Chapter 7 Denial-of-Service Attacks -- 7.1 Denial-of-Service Attacks -- 7.2 Flooding Attacks -- 7.3 Distributed Denial-of-Service Attacks -- 7.4 Application-Based Bandwidth Attacks -- 7.5 Reflector and Amplifier Attacks -- 7.6 Defenses Against Denial-of-Service Attacks -- 7.7 Responding to a Denial-of-Service Attack -- 7.8 Key Terms, Review Questions, and Problems -- Chapter 8 Intrusion Detection -- 8.1 Intruders -- 8.2 Intrusion Detection -- 8.3 Analysis Approaches -- 8.4 Host-Based Intrusion Detection -- 8.5 Network-Based Intrusion Detection -- 8.6 Distributed or Hybrid Intrusion Detection -- 8.7 Intrusion Detection Exchange Format -- 8.8 Honeypots -- 8.9 Example System: Snort -- 8.10 Key Terms, Review Questions, and Problems -- Chapter 9 Firewalls and Intrusion Prevention Systems -- 9.1 The Need for Firewalls -- 9.2 Firewall Characteristics and Access Policy -- 9.3 Types of Firewalls -- 9.4 Firewall Basing -- 9.5 Firewall Location and Configurations -- 9.6 Intrusion Prevention Systems -- 9.7 Example: Unified Threat Management Products -- 9.8 Key Terms, Review Questions, and Problems -- Part Two Software and System Security -- Chapter 10 Buffer Overflow -- 10.1 Stack Overflows…”
    Libro electrónico
  9. 489
    Publicado 2015
    Tabla de Contenidos: “…Protecting yourself with Windows firewall ; Automatic updates ; Personalizing the Windows 10 interface ; Personalizing the desktop ; Customizing startup options -- Beyond the desktop. …”
    Libro electrónico
  10. 490
    por Lin, Carol Yeh-Yun
    Publicado 2013
    Libro electrónico
  11. 491
    por Lin, Carol Yeh-Yun
    Publicado 2013
    Libro electrónico
  12. 492
    Publicado 2016
    “…It then shows how to document assets—such as servers, switches, hypervisor hosts, routers, and firewalls—using publicly available tools for network inventory. …”
    Libro electrónico
  13. 493
    por Copeland, Marshall. author
    Publicado 2017
    “…Discover best practices to support network security groups, web application firewalls, and database auditing for threat protection. …”
    Libro electrónico
  14. 494
    Publicado 2007
    “…Author Chris Fehily also walks you through setting up a network, connecting to the Internet, configuring routers and firewalls, and hooking up printers and other devices. …”
    Libro electrónico
  15. 495
    por Pogue, David, 1963-
    Publicado 2012
    “…No viruses, worms, or spyware. No questionable firewalls or inefficient permissions. Just a beautiful machine with a thoroughly reliable system. …”
    Libro electrónico
  16. 496
    Publicado 2016
    “…This title explores how to accomplish advanced system administration tasks, such as writing shell scripts, troubleshooting a server boot procedure, working with SELinux and firewalls and configuring different network services. …”
    Video
  17. 497
    Publicado 2017
    Tabla de Contenidos: “…The Ryu controller with Python -- Open vSwitch commands -- The Ryu firewall application -- Layer 2 OpenFlow switch -- Planning your application -- Application components -- The POX controller -- Summary -- Chapter 11: Advanced OpenFlow Topics -- Setup -- OpenFlow operations with Ryu -- Packet inspection -- Static router -- Mininet topology -- Ryu controller code -- Ryu flow installation -- Ryu packet generation -- Final result -- Router with API -- Ryu controller with API -- API usage examples -- BGP router with OpenFlow -- Lab router setup -- Python with the BGP speaker library -- Ryu BGP application -- Firewall with OpenFlow -- Summary -- Chapter 12: OpenStack, OpenDaylight, and NFV -- OpenStack -- OpenStack overview -- Networking in OpenStack -- Trying out OpenStack -- OpenDaylight -- OpenDaylight programming overview -- OpenDaylight example -- Summary -- Chapter 13: Hybrid SDN -- Preparing the network -- Familiarize yourself with the existing framework and tools -- Network standardization -- Create minimum viable products -- Relentlessly experiment -- Greenfield deployment -- Controller redundancy -- Multiple controller example -- BGP migration example -- Migration segmentation -- VIRL and Mininet setup -- Cisco device configuration -- Ryu BGP speaker -- Mininet and REST Router -- Result and verification -- More BGP example -- Examine the JSONRPC over WebSocket -- Monitoring integration -- Secure TLS connection -- Physical switch selection -- Lab OpenFlow switches -- Incumbent vendor switches -- Whitebox Switches -- Summary -- Index…”
    Libro electrónico
  18. 498
    Publicado 2023
    Tabla de Contenidos: “…Working with Azure Container Instances -- Creating the Azure Container Registry instance -- Pushing a container image to ACR -- Creating an Azure Container Instance -- Deploying Azure Container Instance for web app -- Creating Azure Container Apps -- Summary -- Further reading -- Chapter 8: Understanding Networking in Azure -- Connectivity in Azure -- Design considerations for VNets -- Exercise 1 - design and implement a virtual network in Azure -- Enabling cross-virtual-network connectivity -- Using service chaining to direct traffic to a gateway -- The hub-spoke network topology in Azure -- Azure virtual NAT -- Hybrid networking -- Azure VPN Gateway -- Site-to-site VPN connections -- Point-to-site VPN connections -- Azure Virtual WAN -- ExpressRoute -- Decision tree on network topology -- Load balancing -- Load balancing non-HTTP(S) traffic -- Load balancing HTTP(S) traffic -- Network security -- Azure DDoS protection -- Azure Firewall -- Exercise 2 - Azure Firewall - implement secure network access using the Bicep language -- Azure WAF -- Summary -- Chapter 9: Securing Access to Your Applications -- Technical requirements -- Designing for security -- Securing traffic -- SQL database firewalls -- Web application VNet integration -- Azure Firewall -- Application Gateway -- Azure Front Door -- What to use and when? …”
    Libro electrónico
  19. 499
    por Verham, Dominiek
    Publicado 2024
    Tabla de Contenidos: “…Configure storage security -- RBAC roles on the storage account -- Applying the correct NTFS permissions -- Configuring private access using a private endpoint -- Configuring NSGs -- Configure network security with Azure Firewall -- Using IP groups in firewall policies -- Configure network security with NSGs -- Deploying AVD on dedicated hosts -- Configuring Defender for Cloud -- Deploying an Azure VPN gateway -- Summary -- Part 5: Use Cases -- Chapter 12: Windows 365 Use Cases -- When to use Windows 365 as your personal desktop -- Windows 365 as a replacement for on-premise VDI -- Why is Windows 365 a good alternative to an on-premise VDI? …”
    Libro electrónico
  20. 500
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributor -- Table of Contents -- Preface -- Chapter 1: Introduction to Linux -- An overview of the Linux system -- Virtualization -- Installing VirtualBox and CentOS -- Working with VirtualBox -- Connecting VMs through SSH -- Summary -- Chapter 2: The Linux Command Line -- Introducing the command line -- File globbing -- Quoting commands -- Getting help -- Working with the Linux shell -- Understanding standard streams -- Understanding regular expressions -- Working with sed -- Working with awk -- Navigating the Linux filesystem -- Summary -- Chapter 3: The Linux Filesystem -- Understanding the filesystem -- Working with file links -- Searching for files -- Working with users and groups -- Working with file permissions -- Working with text files -- Working with VIM text editor -- Summary -- Chapter 4: Working with the Command Line -- Essential Linux commands -- Additional programs -- net-tools -- Nmap -- links -- iotop -- iftop -- htop -- lsof -- Understanding processes -- Cloning -- Signals -- kill -- hang-up -- Working with Bash shell variables -- Introduction to Bash shell scripting -- Implementing Bash shell scripting -- Automating script execution -- Summary -- Chapter 5: More Advanced Command Lines and Concepts -- Basic networking concepts -- Installing new software and updating the system -- Introduction to services -- Basic system troubleshooting and firewalling -- Introducing ACLs -- setuid, setgid and sticky bit -- setuid -- setgid -- sticky bit -- Summary -- Other Books You May Enjoy -- Index…”
    Libro electrónico