Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
501Publicado 2022Tabla de Contenidos: “…4.4.1.1 DWT Analysis and Synthesis Filter Bank -- 4.4.2 Compression and Encryption Module -- 4.4.2.1 SPIHT -- 4.4.2.2 Chaos-Based Encryption -- 4.5 Results and Discussion -- 4.5.1 Experimental Setup and Evaluation Metrics -- 4.5.2 Simulation Results -- 4.5.2.1 Performance Analysis of the Novel Filter KARELET -- 4.5.3 Result Analysis Proposed System -- 4.6 Conclusion -- References -- 5 A Swarm Robot for Harvesting a Paddy Field -- 5.1 Introduction -- 5.1.1 Working Principle of Particle Swarm Optimization -- 5.1.2 First Case Study on Birds Fly -- 5.1.3 Operational Moves on Birds Dataset -- 5.1.4 Working Process of the Proposed Model -- 5.2 Second Case Study on Recommendation Systems -- 5.3 Third Case Study on Weight Lifting Robot -- 5.4 Background Knowledge of Harvesting Process -- 5.4.1 Data Flow of PSO Process -- 5.4.2 Working Flow of Harvesting Process -- 5.4.3 The First Phase of Harvesting Process -- 5.4.4 Separation Process in Harvesting -- 5.4.5 Cleaning Process in the Field -- 5.5 Future Trend and Conclusion -- References -- 6 Firefly Algorithm -- 6.1 Introduction -- 6.2 Firefly Algorithm -- 6.2.1 Firefly Behavior -- 6.2.2 Standard Firefly Algorithm -- 6.2.3 Variations in Light Intensity and Attractiveness -- 6.2.4 Distance and Movement -- 6.2.5 Implementation of FA -- 6.2.6 Special Cases of Firefly Algorithm -- 6.2.7 Variants of FA -- 6.3 Applications of Firefly Algorithm -- 6.3.1 Job Shop Scheduling -- 6.3.2 Image Segmentation -- 6.3.3 Stroke Patient Rehabilitation -- 6.3.4 Economic Emission Load Dispatch -- 6.3.5 Structural Design -- 6.4 Why Firefly Algorithm is Efficient -- 6.4.1 FA is Not PSO -- 6.5 Discussion and Conclusion -- References -- 7 The Comprehensive Review for Biobased FPA Algorithm -- 7.1 Introduction -- 7.1.1 Stochastic Optimization -- 7.1.2 Robust Optimization -- 7.1.3 Dynamic Optimization -- 7.1.4 Alogrithm…”
Libro electrónico -
502por Boyraz, GuvenTabla de Contenidos: “…Chapter 5: Navigating the Digital Shadows - EDR Hacking Techniques -- The foundation of the evasion life cycle -- Function hooking DLLs and how to evade them with In/DirectSyscalls -- Event Tracing for Windows (ETW) and how to evade it -- Patching -- Configuration modification -- Living off the Land (LOTL) techniques -- Microsoft's unwitting role -- Use of kernel-land software (aka the driver method) -- Summary -- Chapter 6: Best Practices and Recommendations for Endpoint Protection -- Endpoint hardening -- Network segmentation -- Inventory and asset discovery -- Using a VPN -- Using MFA -- Closing the USB ports -- Automated updates -- Implementing endpoint encryption -- Regularly assessing and auditing endpoints -- Imposing least privileges and access controls -- Automatic screen lock -- Managing your passwords -- Roaming clients -- Summary -- Part 3: Future Trends and Strategies in Endpoint Security -- Chapter 7: How DNS Logs Can Help You to Defend Your Endpoints -- DNS protocol and enrichment -- Example use cases -- DNS firewall -- How does it work? -- Key advantages of DNS firewalls -- Domain categorization -- Domains without an IP address -- DNS tunneling -- Important elements of detection techniques -- Summary -- Chapter 8: The Road Ahead of Endpoint Security -- Summary of this book -- The future of endpoint security -- Index -- Other Books You May Enjoy…”
Publicado 2024
Libro electrónico -
503Publicado 2023Tabla de Contenidos: “…. -- See also -- Implementing Azure Firewall -- Getting ready -- How to do it... -- How it works... -- See also -- Implementing Azure Web Application Firewall -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Implementing Azure DDoS -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 3: Securing Remote Access -- Technical requirements…”
Libro electrónico -
504Publicado 2023Tabla de Contenidos: “…-- Chapter 2 The Firefly Refuge -- Do Some Research -- Sketch It Out -- Your Challenge -- Project Recipe -- Think Like a Computer Scientist: Tailor Your System to Your Users -- Extend Your Knowledge -- Vocabulary Review -- Quiz -- Assignment: Feed Me! …”
Libro electrónico -
505Publicado 2011Tabla de Contenidos: “…Prevention Controls -- Honeypots and Honeynets -- Firewalls -- Web Application Firewalls vs. Network Firewalls -- Proxy Servers -- Internet Content Filters -- Web Security Gateway -- Protocol Analyzers -- Network Mappers -- Anti-spam -- All-in-one Security Appliances -- Chapter Review -- Questions -- Answers -- Chapter 12 Security Baselines -- Overview Baselines -- Password Selection -- Password Policy Guidelines…”
Libro electrónico -
506Publicado 2013Libro electrónico
-
507Publicado 2008“…It also includes updated discussion of the architecture of the Linux kernel, USB, KDE, GNOME, broadband access issues, routing, gateways, firewalls, disk tuning, GCC, Perl, Python, printing services (CUPS), wireless support, international support, Java programs support (Eclipse), and security. …”
Libro electrónico -
508Publicado 2023Tabla de Contenidos: “…A few words about Upstart, an alternative -- Summary -- Chapter 6: Networking in Linux -- Networking in Linux -- ISO/OSI as a networking standard -- Physical layer -- Data link layer - MAC, VLAN -- Network layer - IPv4 and IPv6 -- Transport layer - TCP and UDP -- Session layer -- Presentation layer - SSL and TLS -- Application layer - HTTP and FTP -- Firewalls -- iptables -- nftables -- ufw -- firewalld -- Advanced topics -- NAT -- Port forwarding -- Interface bonding -- TCP multipath -- BGP -- Summary -- Chapter 7: Git, Your Doorway to DevOps -- Technical requirements -- Basic Git commands -- Configuring the local Git environment -- Setting up a local Git repository -- Local versus remote Git repositories -- Interacting with remote repositories -- What's the git diff command? …”
Libro electrónico -
509Publicado 2024Tabla de Contenidos: “…Basics of shell scripting -- Creating a shell script file -- Variables in shell scripts -- Using mathematical expressions in shell scripts -- Using programming structures -- Using arrays in Bash -- Reading input data -- Formatting output data -- Understanding exit statuses and testing structures -- Using conditional if statements -- Using looping statements -- Working with functions -- Using sed and (g)awk commands -- Using scripts to showcase interprocess communication -- Shared storage -- Unnamed pipes -- Named pipes -- Sockets -- Scripting for administrative tasks -- Creating scripts for system administrative tasks -- Packaging scripts -- Summary -- Questions -- Further reading -- Chapter 9: Securing Linux -- Technical requirements -- Understanding Linux security -- Introducing SELinux -- Working with SELinux -- Introducing AppArmor -- Working with AppArmor -- Final considerations -- Working with firewalls -- Understanding the firewall chain -- Introducing Netfilter -- Working with iptables -- Introducing nftables -- Using firewall managers -- Summary -- Exercises -- Further reading -- Chapter 10: Disaster Recovery, Diagnostics, and Troubleshooting -- Technical requirements -- Planning for disaster recovery -- A brief introduction to risk management -- Risk calculation -- Designing a DRP -- Backing up and restoring the system -- Disk cloning solutions -- Introducing common Linux diagnostic tools for troubleshooting -- Tools for troubleshooting boot issues -- Tools for troubleshooting general system issues -- Tools for troubleshooting network issues -- Tools for troubleshooting hardware issues -- Summary -- Questions -- Further reading -- Part 3: Server Administration -- Chapter 11: Working with Virtual Machines -- Technical requirements -- Introduction to virtualization on Linux -- Efficiency in resource usage -- Introduction to hypervisors…”
Libro electrónico -
510Publicado 2017Tabla de Contenidos: “…Protecting yourself with Windows firewall ; Automatic updates as security ; Personalizing the Windows 10 interface ; Personalizing the desktop ; Customizing startup options -- Windows 10 for the enterprise. …”
Libro electrónico -
511Publicado 2018Tabla de Contenidos: “…Shinder, MD -- ACKNOWLEDGMENTS -- INTRODUCTION -- About Penetration Testing -- What This Book Is About -- How This Book Is Organized -- What You'll Need to Run the Tools -- 1 PREPARATION -- A Hybrid Approach -- Getting Permission -- Summary -- 2 ACCESS METHODS -- Azure Deployment Models -- Obtaining Credentials -- Mimikatz -- Best Practices: Usernames and Passwords -- Usernames and Passwords -- Best Practices: Management Certificates -- Finding Management Certificates -- Best Practices: Protecting Privileged Accounts -- Encountering Two-Factor Authentication -- Summary -- 3 RECONNAISSANCE -- Installing PowerShell and the Azure PowerShell Module -- Service Models -- Best Practices: PowerShell Security -- Authenticating with the PowerShell Module and CLI -- Authenticating with Management Certificates -- Best Practices: Service Principals -- Authenticating with Service Principals -- Best Practices: Subscription Security -- Gathering Subscription Information -- Gathering Information on Networking -- Consolidated PowerShell Scripts -- Summary -- 4 EXAMINING STORAGE -- Best Practices: Storage Security -- Accessing Storage Accounts -- Where to Find Storage Credentials -- Accessing Storage Types -- Summary -- 5 TARGETING VIRTUAL MACHINES -- Best Practices: VM Security -- Virtual Hard Disk Theft and Analysis -- Exploring the VHD with Autopsy -- Cracking Password Hashes -- Password Hash Attack Tools -- Using a VHD's Secrets Against a VM -- Resetting a Virtual Machine's Credentials -- Summary -- 6 INVESTIGATING NETWORKS -- Best Practices: Network Security -- Avoiding Firewalls -- Cloud-to-Corporate Network Bridging -- Summary -- 7 OTHER AZURE SERVICES -- Best Practices: Key Vault…”
Libro electrónico -
512Publicado 2014Tabla de Contenidos: “…Chapter 10 - Security Implications of Bring Your Own Device, IT Consumerization, and Managing User ChoicesChapter 11 - Information Assurance: Open Research Questions and Future Directions; Chapter 12 - Protecting Us from Us: Human Firewall Vulnerability Assessments; Chapter 13 - Service-Oriented Architecture; Chapter 14 - Managing the Security Testing Process; Chapter 15 - Security and Resilience in the Software Development Life Cycle; Chapter 16 - Cloud Cryptography; Chapter 17 - Identity and Access Management Architecture; Chapter 18 - FedRAMP: Entry or Exit Ramp for Cloud Security?…”
Libro electrónico -
513por Toporek, Chuck, 1965-Tabla de Contenidos: “…Mac OS X Survival Guide; Logging In and Fast User Switching; Sleep Mode, Logging Out, and Shutting Down; Startup and Shutdown Keys; Quick Tips for Users; Parental Controls; Using Software Update; Security; Keychains; Firewall Settings; Sharing Services; Other Security Features; Password Security…”
Publicado 2008
Libro electrónico -
514Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: The Background -- Chapter 1: Introduction to Intrusion Detection and Prevention -- The need for information security -- Defense-in-depth strategy -- Firewalls (network and host layers) -- Intrusion detection and prevention systems (network and host layers) -- Endpoint detection and response (host layer) -- Web application firewalls (network and host layers) -- Mail security gateway (network) -- Log management and monitoring (network and host) -- The role of network IDS and IPS -- Types of intrusion detection -- Signature-based intrusion detection -- Anomaly-based intrusion detection -- Hybrid intrusion detection -- The state of the art in IDS/IPS -- Stateful analysis -- Fast packet acquisition -- Parallel processing -- Pattern matching -- Extending rule language -- App and protocol identification -- File analysis -- IDS/IPS metrics -- Detection accuracy -- Performance-related IDS/IPS metrics -- IDS/IPS evaluation and comparison -- Evasions and attacks -- IDS/IPS evasions -- Attacks against the IDS/IPS -- Summary -- Chapter 2: The History and Evolution of Snort -- The beginning of Snort -- Snort 1 - key features and limitations -- Snort 2 - key features, improvements, and limitations -- Snort 2.9 -- The need for Snort 3 -- Summary -- Part 2: Snort 3 - The New Horizon -- Chapter 3: Snort 3 - System Architecture and Functionality -- Design goals -- High performance -- Pluggable modular architecture -- Configurability and customizability -- Efficiency -- Key components -- DAQ module -- Codecs -- Inspectors -- Detection or rule engine -- Configuration module -- Alerting and logging module -- Snort 3 system architecture -- Multithreading -- Packet analysis flow within each Snort thread -- Summary -- Chapter 4: Installing Snort 3.…”
Libro electrónico -
515Publicado 2010Tabla de Contenidos: “…In-Path Deployment -- Nonredundant Branch Office -- Redundant Branch Office -- Serial Inline Clustering -- Off-Path Deployment -- Small to Medium-Sized Nonredundant Branch Office -- Enhanced Network Module (NME-WAE) -- Two-Arm Deployment -- Large Nonredundant Branch Office -- Off-Path Redundant Topology -- Small to Medium-Sized Redundant Branch Office -- Large Redundant Branch Office -- Policy-Based Routing Interception -- Cisco IOS Firewall Integration -- Summary -- Chapter 6 Data Center Network Integration -- Data Center Placement -- Deployment Solutions -- WCCP -- Server Load Balancing -- Scaling Transparent Interception -- WCCP Scalability -- ACE Scalability -- Firewall Integration -- Summary -- Chapter 7 System and Device Management -- System and Device Management Overview -- Initial Setup Wizard -- CLI -- CM Overview -- Centralized Management System Service -- Device Registration and Groups -- Device Activation -- Device Groups -- Provisioned Management -- Role-Based Access Control -- Integration with Centralized Authentication -- Windows Authentication -- TACACS+ Authentication -- RADIUS Authentication -- Device Configuration, Monitoring, and Management -- Alarms, Monitoring, and Reporting -- Managing Alarms -- Monitoring Charts -- Managing Reports -- SNMP, Syslog, and System Logs -- Upgrading and Downgrading Software -- Backup and Restore of CM Database -- Programmatic Interfaces and the XML-API -- Vendors Supporting the XML-API -- Data Accessible via the XML-API -- Simple Method of Accessing XML-API Data -- Summary -- Chapter 8 Configuring WAN Optimization -- Cisco WAAS WAN Optimization Capabilities -- Transport Flow Optimization -- Data Redundancy Elimination -- Persistent LZ Compression -- Automatic Discovery -- Directed Mode -- Configuring WAN Optimization -- Configuring Licenses -- Enabling and Disabling Features…”
Libro electrónico -
516Publicado 2023Tabla de Contenidos: “…Microsoft Cybersecurity Reference Architecture -- Microsoft Purview -- Azure infrastructure security -- Network security groups -- Azure Firewall -- Azure Monitor -- Azure Web Application Firewall (WAF) -- Azure landing zones -- Summary -- Chapter 11: Cost Governance on Azure -- Understanding Azure subscription plans and offers -- Cost optimization features -- Understanding Cost Management + Billing on Azure -- Azure cost calculators -- Best practices for cost optimization and governance -- Optimizing Platform as a Service (PaaS) costs -- General best practices -- Summary -- Chapter 12: Conclusion -- Chapter 1, Unlock New Opportunities with Azure -- Chapter 2, Achieve Availability, Scalability, and Monitoring with Azure -- Chapter 3, Cloud Architecture Design Patterns -- Chapter 4, Azure Network Infrastructure and Design -- Chapter 5, Automating Architecture on Azure -- Chapter 6, Optimize Performance with Azure OLTP Solutions -- Chapter 7, Designing Serverless Architecture Solutions in Azure -- Chapter 8, Deploying, Managing, and Scaling Containers with Azure Kubernetes Service -- Chapter 9, Designing Big Data Solutions with Azure -- Chapter 10, Architecting Secure Applications on a Trusted Platform -- Chapter 11, Cost Governance on Azure -- Summary -- Index -- Other Books You May Enjoy…”
Libro electrónico -
517Publicado 2023Tabla de Contenidos: “…Risk Enabling the Human Firewall.</P></B><P>9.1 Learning how to drive analogy. 9.2 An Introduction to Risk Enabling the Human Firewall. 9.3 Service Provider versus Service Enablement. 9.4 Achieving Risk-Based Service Enablement. 9.5 When a Lack of Risk Enabling the Human Firewall Bites Back. 9.6 Decoding Risk Enabling the Human Firewall </P><B><P>10. …”
Libro electrónico -
518Publicado 2013Tabla de Contenidos: “…Chapter 9 - Wireless and Mobile NetworksChapter 10 - The Network Layer; Chapter 11 - IPv6; Chapter 12 - Routing and Interior Gateways; Chapter 13 - Border Gateway Routing; Chapter 14 - The Transport Layer; Chapter 15 - Packet Loss Recovery; Chapter 16 - TCP Congestion Control; Chapter 17 - Cybersecurity Overview; Chapter 18 - Firewalls; Chapter 19 - Intrusion Detection/Prevention System; Chapter 20 - Hash and Authentication; Chapter 21 - Symmetric Key Ciphers and Wireless LAN Security; Chapter 22 - Public Key Cryptography, Infrastructure and Certificates…”
Libro electrónico -
519Publicado 2015Tabla de Contenidos: “…SummaryChapter 4: Overcoming VDA Registration Problems; Getting familiar with the VDA registration process; Starting with the basics - the event viewer; Firewall configuration; Troubleshooting DNS resolution issues; Scenario - VDA is not able to reach the Delivery Controller; Overcoming time synchronization issues; Conquering domain membership problems; Multiple network adapters; Service principal name; Surpassing DDC FQDN issues; Local group policies and VDA communication; Solving .NET framework exceptions; A basic troubleshooting flowchart…”
Libro electrónico -
520Publicado 2015Tabla de Contenidos: “…; Skills and Activities in Networking Jobs; Managing network devices; Setting up remote access; Maintaining user accounts; Helping end users; Configuring firewalls; Monitoring antimalware consoles; Issuing authentication tokens; Setting up wireless networks; Configuring communications with business partners…”
Libro electrónico