Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
521Publicado 2015Tabla de Contenidos: “…; Skills and Activities in Networking Jobs; Managing network devices; Setting up remote access; Maintaining user accounts; Helping end users; Configuring firewalls; Monitoring antimalware consoles; Issuing authentication tokens; Setting up wireless networks; Configuring communications with business partners…”
Libro electrónico -
522Publicado 2016“…Esentially a complete security culture toolkit, this comprehensive resource provides you with a blueprint for assessing, designing, building, and maintaining human firewalls. Globally recognized information security expert Lance Hayden lays out a course of action for drastically improving organizations’ security cultures through the precise use of mapping, survey, and analysis. …”
Libro electrónico -
523por Pogue, David, 1963-“…You won't find questionable firewalls or inefficient permissions. Just a beautiful machine with a thoroughly reliable system. …”
Publicado 2012
Libro electrónico -
524por Gutiérrez Salazar, PabloTabla de Contenidos: “…FUNDAMENTOS -- LINUX -- TERMINAL DE LINUX -- INSTALANDO HERRAMIENTAS -- INTERFAZ DE RED -- REDES, PROTOCOLOS Y PUERTOS -- MODELO OSI -- TCP / IP -- PUERTOS -- FIREWALL -- COOKIES -- SEGURIDAD INFORMÁTICA -- FILOSOFÍAS DE HACKING -- SEGURIDAD DE LA INFORMACIÓN Y SEGURIDAD INFORMÁTICA -- CUALIDADES DE LA SEGURIDAD DE LA INFORMACIÓN -- METODOLOGÍA PARA MEJORAR LA SEGURIDAD DE LA INFORMACIÓN -- RETOS EN LA SEGURIDAD DE LA INFORMACIÓN -- INGENIERÍA SOCIAL -- PRUEBA DE PENETRACIÓN -- FORMAS DE OCULTAR INFORMACIÓN -- CRIPTOGRAFÍA -- CIFRADO EN ARCHIVOS -- ESTEGANOGRAFÍA -- PRACTICA -- PREPARACIÓN DEL LABORATORIO -- VIRTUALIZACIÓN -- WINDOWS & -- MACINTOSH -- SISTEMAS OPERATIVOS -- INSTALANDO LINUX VULNERABLE DE PRUEBAS -- INSTALANDO EMULADOR ANDROID -- INSTALANDO SERVIDOR WEB VULNERABLE -- 2. …”
Publicado 2019
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
525Publicado 2015Tabla de Contenidos: “…Inside Basic and Advanced Auditing Restricted Groups; Restrict Software Using AppLocker; Controlling User Account Control with Group Policy ; Wireless (802.3) and Wired Network (802.11) Policies; Configuring Windows Firewall with Group Policy; Final Thoughts; Chapter 9: Profiles: Local, Roaming, and Mandatory; Setting the Stage for Multiple Clients; What Is a User Profile?…”
Libro electrónico -
526por Viega, JohnTabla de Contenidos: “…; Why Microsoft's Free AV Won't Matter; Google Is Evil; Why Most AV Doesn't Work (Well); Why AV Is Often Slow; Four Minutes to Infection?; Personal Firewall Problems; Call It "Antivirus"; Why Most People Shouldn't Run Intrusion Prevention Systems; Problems with Host Intrusion Prevention; Plenty of Phish in the Sea…”
Publicado 2009
Libro electrónico -
527por Brown, EileenTabla de Contenidos: “…MANAGING REBRANDS AND BRAND MIGRATION8 CONNECTIONS AND REPUTATION; MAKING SENSE OF SOCIAL NETWORKING; COMMUNITY CONNECTIONS AND RECOMMENDATIONS; CONSOLIDATING YOUR APPROACH; YOUR EXISTING BRAND; 9 DISCOVERY; CREATING AND PUBLICISING YOUR BRAND; USING SOCIAL MEDIA FOR RECRUITMENT; DISCOVERING THE INFLUENCERS IN YOUR AUDIENCE; STARTING YOUR SOCIAL MEDIA PLAN; 10 SCALING NETWORKS; SCALING NETWORKS; OUR BEHAVIOUR IS INFLUENCED BY OUR AGE; OTHER WAYS OF BROADCASTING YOUR MESSAGE; INSIDE THE FIREWALL; CUSTOMER SERVICE; 11 RELATIONSHIPS AND ENGAGEMENT; TWITTER FOR YOUR BUSINESS…”
Publicado 2012
Libro electrónico -
528Publicado 2024Tabla de Contenidos: “…Manipulation with Blobs and Containers -- Leveraging AzCopy for Data Transfer between Storage Accounts -- Implementing Basic Operations from C# Code -- Managing Metadata and Security Settings for Storage Accounts -- Encryption -- Firewalls -- Metadata and Tags -- Retrieving Metadata Using C# Code -- Lifecycle Management -- Cost Savings -- Summary -- Further Reading -- Exam Readiness Drill - Chapter Review Questions -- Chapter 7: Implementing User Authentication and Authorization -- Technical Requirements -- Understanding the Microsoft Identity Platform -- Service Principals -- Permissions and Consent Types -- Permission Types -- Consent Types -- Exercise 1: Experiencing Permissions and Consent -- Task 1: Implementing Authentication with the Default Permissions -- Task 2: Testing the Dynamic Consent Experience -- Task 3: Defining Static Permissions for Admin Consent -- Exercise 2: Implementing Conditional Access -- Task 1: Creating a Conditional Access Policy -- Implementing Authentication with the MSAL -- Authentication Flows -- Client Applications -- Exercise 3: Implementing Authentication with the MSAL -- Task 1: Creating a New Console App and Adding the MSAL.NET Package -- Task 2: Implementing Authentication in a Console App Using the MSAL -- Discovering Microsoft Graph -- Exercise 4: Microsoft Graph -- Task 1: Using Graph Explorer -- Task 2: Querying the Microsoft Graph API Using the SDK -- Using SASs -- The SAS Token Structure -- SAS Types -- Exercise 5: Using Shared Access Signatures -- Task 1: Creating a Storage Account Using the Azure CLI -- Task 2: Generating a SAS -- Stored Access Policies -- Exercise 6: Implementing Stored Access Policies -- Task 1: Creating and Using a Stored Access Policy -- Summary -- Further Reading -- Exam Readiness Drill - Chapter Review Questions -- Chapter 8: Implementing Secure Azure Solutions…”
Libro electrónico -
529Publicado 2018Tabla de Contenidos: “…-- Single management instance -- Multiple management instances -- MRA's approach number of cloud management instances -- Firewall or no firewall -- Load balancing -- Web proxies -- Content Delivery Networks (CDNs) -- Prerequisites to allow the API platform to be built -- Background to the account types -- Building the cloud -- Default roles and users -- Creating users inside API platform -- Configuring Oracle traffic director -- Network-based access controls -- Setting up Apiary -- Configure developer portal look and feel -- Gateway life cycle and deployment -- Gateway configuration -- Where to get the logical gateway ID -- Configuration JSON properties -- Gateway prerequisites -- Retrieving the gateway deployment package -- Actioning the gateway deployment -- Unpacking -- Install -- Configure -- Start -- Create -- Join -- Making the gateway production ready -- Linux security -- Log analytics -- Dealing with certificates -- Gateway lockdown -- Summary -- Chapter 6: Defining Policies for APIs -- Background -- Common security threats -- Denial-of-service attacks (DoS) -- Payload attacks -- Role of the gateway -- HTTP and HTTPS -- Throttling -- Implementing APIs for MRA -- Understanding policies -- General guidelines for designing policies -- Request and response pipeline policies -- Defining polices -- Inbound policies -- Outbound policies -- Defining rate limiting policies -- API rate limiting policies -- Steps to create a rate limiting policy -- Application rate limiting policies -- Creating an application rate policy -- Testing the policy -- Lightweight authorization checks -- Creating an API key policy -- Testing the API key -- Logging -- Enabling logging -- Interface filtering -- Creating an interface filter -- Testing the policy -- Cross origin resource sharing (CORS) -- Creating a CORS policy…”
Libro electrónico -
530Publicado 2018Tabla de Contenidos: “…The vcenter_folder module -- The vcenter_license module -- The vmware_guest module -- The vmware_guest_facts module -- The vmware_guest_file_operation module -- The vmware_guest_find module -- The vmware_guest_powerstate module -- The vmware_guest_snapshot module -- The vmware_guest_tools_wait module -- VMware ESXi -- The vmware_dns_config module -- The vmware_host_dns_facts module -- The vmware_host module -- The vmware_host_facts module -- The vmware_host_acceptance module -- The vmware_host_config_manager module -- The vmware_host_datastore module -- The vmware_host_firewall_manager module -- The vmware_host_firewall_facts module -- The vmware_host_lockdown module -- The vmware_host_ntp module -- The vmware_host_package_facts module -- The vmware_host_service_manager module -- The vmware_host_service_facts module -- The vmware_datastore_facts module -- The vmware_host_vmnic_facts module -- The vmware_local_role_manager module -- The vmware_local_user_manager module -- The vmware_cfg_backup module -- The vmware_vmkernel module -- The vmware_vmkernel_facts module -- The vmware_target_canonical_facts module -- The vmware_vmotion module -- The vmware_vsan_cluster module -- The vmware_vswitch module -- The vmware_drs_rule_facts module -- The vmware_dvswitch module -- The vmware_dvs_host module -- The vmware_dvs_portgroup module -- The vmware_maintenancemode module -- The vmware_portgroup module -- The vmware_resource_pool module -- An example playbook -- Summary -- Questions -- Further reading -- Chapter 12: Ansible Windows Modules -- Technical requirements -- Up-and-running -- Vagrantfile -- Ansible preparation -- The ping module -- The setup module -- Installing a web server -- IIS role -- ASP.NET role -- Interacting with AWS Windows instances -- AWS role -- User role -- Chocolatey role -- Information role -- Running the playbook -- Summary…”
Libro electrónico -
531por Barrett, JoanTabla de Contenidos: “…Scenario 1: Configuration for a small company -- 4.1 Small company scenario -- 4.2 Installed software -- 4.3 Topology setup -- 4.3.1 Network configuration -- 4.3.2 Firewall configuration -- 4.3.3 HTTP Server (powered by Apache) installation -- 4.3.4 HTTP Server configuration -- 4.3.5 WebSphere Application Server profile -- 4.3.6 Associating the HTTP server with the WebSphere profile -- 4.3.7 Functional verification testing -- Chapter 5. …”
Publicado 2005
Libro electrónico -
532Troubleshooting and supporting Windows 11 creating robust, reliable, sustainable, and secure systemsPublicado 2023Tabla de Contenidos: “…The Windows Security Center -- Virus and Threat Protection -- Excluded Items -- Controlled Folder Access -- Reputation-Based Protection -- Exploit Protection -- Device Security -- Protection History -- The Windows Advanced Firewall -- Troubleshooting and Repairing the Windows Firewall -- Summary -- Chapter 4: Configuring Windows 11 -- Using Group Policy to Manage Configuration and Settings -- Hiding Settings -- Hiding Control Panel Items and Windows Tools -- Using the Registry to Restrict Windows Tools Access -- Managing Programs and Apps -- Managing User Accounts -- Local vs. …”
Libro electrónico -
533Publicado 2024Tabla de Contenidos: “…Artificial Intelligence and Machine Learning -- Redshift -- Route 53 Advanced Features and Policies -- Alias Records -- Resolvers -- Route 53 Resolver DNS Firewall -- Health Checks -- Traffic Routing Policies -- Simple Routing -- Multivalue Responses -- Latency-Based Routing -- Failover Routing -- Round-Robin Routing -- Weighted Routing -- Geolocation -- Geo-proximity -- Route 53 Service Integrations -- VPC -- CloudFront -- Load Balancers -- Route 53 Application Recovery Controller -- Hybrid Route 53 -- Multi-account Route 53 -- Multi-Region Route 53 -- Using Route 53 Public Hosted Zones -- Using Route 53 Private Hosted Zones -- Using Route 53 Resolver Endpoints in Hybrid and AWS Architectures -- Using Route 53 for Global Traffic Management -- Route 53 Failover -- Domain Registration -- Required Information to Register a Domain -- Privacy Protection -- Route 53 Registration Information -- Renewing Your Domain -- Summary -- Exam Essentials -- Exercises -- Review Questions -- Chapter 3 Hybrid and Multi-account DNS -- Implementing Hybrid and Multi-account DNS Architectures -- Route 53 Hosted Zones -- Private Hosted Zones -- Public Hosted Zones -- Traffic Management -- Latency -- Geolocation -- Weighted -- Failover -- Multivalue -- Health Checking -- Domain Delegation and Forwarding -- Delegating Domains -- Forwarding Rules -- Configuring Records in Route 53 -- A Record -- AAAA Record -- CNAME -- MX Record -- SOA Record -- TXT Record -- PTR Record -- Alias Record -- SRV Record -- SPF Record -- NAPTR Record -- CAA Record -- Configuring DNSSEC -- Multi-account Route 53 -- DNS Endpoints -- Outbound Endpoints -- Inbound Endpoints -- Configuring Route 53 Monitoring and Logging -- CloudTrail API Logging -- CloudWatch Logging -- DNS Query Logging -- Resolver Query Logging -- Hosted Zone Monitoring -- Resolver Endpoints Monitoring…”
Libro electrónico -
534Tabla de Contenidos: “…5.3.2 CSAM logs -- 5.3.3 ISAM logs -- 5.3.4 Debug mode -- 5.4 Gathering up WSAM logs and other data -- 5.5 Tools and utilities -- 5.6 Assorted tips and techniques -- Chapter 6. Firewalls and ports -- 6.1 Firewalls and Native Address Translation -- 6.2 Changes on the Data Collector machine -- Part 1 Appendixes -- Appendix A. …”
Libro electrónico -
535Publicado 2023Tabla de Contenidos: “…Connecting peripherals -- Modbus messaging -- Reading data from a peripheral -- Summary -- Further reading -- Part 3: Miscellaneous Topics -- Chapter 12: Enhancing Security for Reducing Risk -- Learning about the threat landscape -- Encryption algorithms -- Data backup -- Multi-factor authentication -- Password managers -- Embracing cloud security -- Multi-factor authentication -- Identity and access management -- Key Management Service -- Secrets Manager -- Storage buckets -- Managed databases -- Virtual machines -- Shielded VMs -- DoS protection -- Virtual private networks -- Bastion hosts -- Firewalls -- Enforcing edge security -- Operating system -- Login and access control -- Over-the-air updates -- Backups -- Physical ports -- Firewalls -- Learning about certificate authorities -- Let's Encrypt -- Certificate Authority Service -- Summary -- Chapter 13: Scaling for High Availability -- Understanding high availability -- Power outage -- Network outages -- Hardware failure -- Hardware upgrades -- Increased demand -- Understanding load balancing -- Implementing HA for databases -- Implementing HA for RESTful servers -- Summary -- Further reading -- Chapter 14: Building and Manufacturing Hardware -- Designing more compact hardware -- Proof-of-concept (PoC) prototypes -- Microcontrollers -- Preliminary production design -- PCB prototyping -- Schematic design -- PCB design -- Bill of Materials -- Designing printed circuit boards -- Manufacturing hardware -- PCB fabrication -- Enclosures -- Understanding the need for certification -- Summary -- Further reading -- Index -- About Packt -- Other Books You May Enjoy…”
Libro electrónico -
536Publicado 2015Tabla de Contenidos: “…""Chapter 5: Programming with Logic""""Introduction""; ""Querying a social website's data""; ""Designing a type inferencer""; ""Playing a round of checkers""; ""Chapter 6: Sharing by Communicating""; ""Introduction""; ""Building a tiny web crawler""; ""Designing an HTML5 game""; ""Designing an online taxi-booking engine""; ""Chapter 7: Transformations as First-class Citizens""; ""Introduction""; ""Building a recursive descent parser using trampoline""; ""Implementing a reusable mini-firewall using transducers""; ""Building a little unification engine with continuation passing style""…”
Libro electrónico -
537por Rathbone, AndyTabla de Contenidos: “…Chapter 6: Adding or Replacing a Hard DriveChapter 7: Adding a DVD Drive; Chapter 8: Fine-Tuning Your Computer's Sound; Chapter 9: Beefing Up Your Computer's Video Card; Chapter 10: Replacing the Power Supply or Laptop Battery; Part III: Teaching an Old Computer New Tricks; Chapter 11: Creating a Home Theater with Windows 7' s Media Center; Chapter 12: Upgrading a Computer for Editing Movies; Chapter 13: Repurposing an Old Computer; Part IV: Communications; Chapter 14: Adding or Replacing a Modem; Chapter 15: Linking Computers with a Network; Chapter 16: Filtering Out Evil with Firewalls…”
Publicado 2010
Libro electrónico -
538Publicado 2018Tabla de Contenidos: “…Welcome to cybersecurity ; Managing firewalls and virus protection ; Managing spam ; Managing backups ; Managing disaster recovery and business continuity planning -- Appendix A: Directory of useful websites -- Appendix B: Glossary…”
Libro electrónico -
539Publicado 2020Tabla de Contenidos: “…-- II NÉ CALCOLATORI NÉ FARFALLE: CORPI CIBERNETICI NE LA MACCHINA MONDIALE E PRISCILLA -- 1. …”
Libro electrónico -
540por Jang, MichaelTabla de Contenidos: “…Login, Logout, and User Switching -- Special Groups -- Standard and Red Hat Groups -- Shared Directories -- Exercise 6-4: Control Group Ownership with the SGID Bit -- Certification Summary -- Two-Minute Drill -- Q& -- A Self Test -- Lab Questions -- Self Test Answers -- Lab Answers -- 7 Storage and Filesystem Administration -- Storage Management and Partitions -- Current System State -- The fdisk Utility -- The gdisk Utility -- The parted Utility -- Using parted: Starting, Getting Help, and Quitting -- Graphical Options -- Exercise 7-1: Work with fdisk and parted -- Filesystem Formats -- Standard Filesystems -- Journaling Filesystems -- Filesystem Format Commands -- Swap Volumes -- Filesystem Check Commands -- Exercise 7-2: Format, Check, and Mount Different Filesystems -- Basic Linux Filesystems and Directories -- Separate Linux Filesystems -- Directories That Can Be Mounted Separately -- Logical Volume Manager (LVM) -- Definitions in LVM -- Create a Physical Volume -- Create a Volume Group -- Create a Logical Volume -- Make Use of a Logical Volume -- More LVM Commands -- Remove a Logical Volume -- Resize Logical Volumes -- Filesystem Management -- The /etc/fstab File -- Universally Unique Identifiers in /etc/fstab -- The mount Command -- More Filesystem Mount Options -- Virtual Filesystems -- Add Your Own Filesystems to /etc/fstab -- Removable Media and /etc/fstab -- Network Filesystems -- The Automounter -- Mounting via the Automounter -- Exercise 7-3: Configure the Automounter -- Certification Summary -- Two-Minute Drill -- Q& -- A Self Test -- Lab Questions -- Self Test Answers -- Lab Answers -- 8 Linux Security -- Basic Firewall Control -- Standard Ports -- The firewalld Service -- Exercise 8-1: Adjust Firewall Settings -- Exercise 8-2: Firewall Configuration with the Cockpit Web Console -- Securing SSH with Key-Based Authentication…”
Publicado 2024
Libro electrónico