Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
541A CISO Guide to Cyber Resilience A How-To Guide for Every CISO to Build a Resilient Security ProgramPublicado 2024Tabla de Contenidos: “…-- Moving to remote work -- LastPass hack -- Testing your home firewall -- Network access control (NAC) and Zero Trust -- Application firewall -- Mirai botnet -- Securing your browser -- Turning on your application firewall -- Okta hack -- Quick reference for endpoint security -- Summary -- Chapter 6: Data Safeguarding -- Offline backups -- Testing your backups -- Cryptographic hashing -- Availability in the cloud -- Business continuity -- Recovery time objective (RTO) -- Recovery point objective (RPO) -- Maximum tolerable downtime (MTD) -- Succession planning -- AWS DDOS attack -- Disaster recovery -- Redundancy in architecture -- Disaster recovery roles and responsibilities -- Testing disaster recovery -- Summary…”
Libro electrónico -
542Publicado 2018Tabla de Contenidos: “…. -- How it works... -- Using Windows Firewall with Advanced Security to block unnecessary traffic -- Getting ready -- How to do it... -- How it works... -- Changing the RDP port on your server to hide access -- Getting ready -- How to do it... -- How it works... -- Multi-homing your Windows Server 2016 -- Getting ready -- How to do it... -- How it works... -- See also -- Adding a static route into the Windows routing table -- Getting ready -- How to do it... -- How it works... -- Using Telnet to test a connection and network flow -- Getting ready -- How to do it... -- How it works... -- Using the Pathping command to trace network traffic -- Getting ready -- How to do it... -- How it works... -- Setting up NIC Teaming -- Getting ready -- How to do it... -- How it works... -- Renaming and domain joining via PowerShell -- Getting ready -- How to do it... -- How it works... -- See also -- Building your first Server Core -- Getting ready -- How to do it... -- How it works... -- Chapter 2: Working with Certificates -- Introduction -- Setting up the first certification authority server in a network -- Getting ready -- How to do it... -- How it works... -- See also -- Building a Subordinate certification authority server -- Getting ready -- How to do it... -- How it works... -- See also -- Creating a certificate template to prepare for issuing machine certificates to your clients -- Getting ready -- How to do it... -- How it works... -- Publishing a certificate template to allow enrollment -- Getting ready -- How to do it... -- How it works... -- Using MMC to request a new certificate -- Getting ready -- How to do it…”
Libro electrónico -
543por Hyman, JackTabla de Contenidos: “…Network Security Groups (NSG) -- Azure Firewall -- Azure DDoS Protection -- Chapter Review -- Questions -- Answers -- Chapter 6 Identity, Governance, Privacy, and Compliance -- Authentication and Authorization -- Azure Active Directory -- Conditional Access, Multi-Factor Authentication (MFA), and Single Sign-On (SSO) -- Conditional Access -- Multi-Factor Authentication -- Single Sign-On -- Azure Governance Features -- Role-Based Access Control (RBAC) -- Resource Locks -- Resource Tags -- Azure Policy -- Azure Blueprints -- Cloud Adoption Framework for Azure -- An Overview of Security, Privacy, and Trust -- Microsoft Privacy Statement -- Online Services Terms (OST) and Data Protection Addendum (DPA) -- Trust Center -- Azure Compliance Documentation -- Azure Sovereign Regions -- Azure Public Cloud -- Azure U.S. …”
Publicado 2021
Libro electrónico -
544Publicado 2015Tabla de Contenidos: “…Summary; Chapter 7: Tuning the Operating System; Linux distributions and Zabbix; The necessary adjustments in the Kernel; User-level FD limits; Kernel-level FD limits; Changing swap behavior; Changing IO schedulers; The network parameters; Summary; Chapter 8: Doing the Extra Work; Dividing the components; Specifying the hardware for each component; Partitioning tables; Summary; Chapter 9: Using the Zabbix Proxy; Zabbix proxy and Zabbix performance; The first steps with Zabbix proxy; The firewall settings; Hardware for the Zabbix proxy; Summary…”
Libro electrónico -
545por Toporek, Chuck, 1965-Tabla de Contenidos: “…; Logging In and Fast User Switching; Sleep Mode, Logging Out, and Shutting Down; Startup and Shutdown Keys; Quick Tips for Users; Parental Controls; Using Software Update; Security; FileVault; Keychains; Firewall Settings; Sharing Services; Other Security Features; Password Security; Force Quitting Applications; Relaunching the Finder; Keyboard Shortcuts; Basic Keyboard Shortcuts; Mac OS X Basics…”
Publicado 2005
Libro electrónico -
546Publicado 2015Tabla de Contenidos: “…Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Diving In - Our First Salt Commands; Introducing Salt; Installing Salt; Installation with system packages (Ubuntu); Installing with Salt-Bootstrap; Configuring Salt; Firewall configuration; Salt minion configuration; Starting the Salt master and Salt minion; Accepting the minion key on the master; A game of ping pong; Masterless Salt; Summary; Chapter 2: Controlling Your Minions with Remote Execution; The structure of a remote execution command; Command-line options…”
Libro electrónico -
547Publicado 2024Tabla de Contenidos: “…-- Building security policies in Strata Cloud Manager -- Security rules -- Custom security profiles -- Decryption -- Objects -- Building security policies in Panorama -- Clientless VPN -- Summary -- Part 3: Advanced Configuration and Best Practices -- Chapter 9: User Identification and Cloud Identity Engine -- Technical requirements -- User identification and group mapping -- Cloud Identity Engine -- Setting up a directory sync in Azure -- Setting up a SCIM connector -- Adding CIE to Prisma Access -- User ID redistribution -- User ID collector in Strata Cloud Manager -- User ID collector in Panorama -- User ID agents on firewalls -- Summary -- Chapter 10: Advanced Configurations and Insights -- Licensing -- Cortex Data Lake -- Insights and ADEM -- Summary -- Chapter 11: ZTNA Connector -- Differences between the ZTNA connector and SC-CAN -- Preparing to deploy the ZTNA connector -- Setting up the ZTNA connector -- Setting up the connector VM -- Basic troubleshooting -- Summary -- Index -- Other Books You May Enjoy…”
Libro electrónico -
548Tabla de Contenidos: “…-- Firewall -- Basic Functions of Firewall -- Packet Filtering -- How a packet filtering firewall works -- TCP Layer -- An Example of Packet Filtering Rules…”
Libro electrónico -
549
-
550por Pompon, Raymond. author“…Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. …”
Publicado 2016
Libro electrónico -
551por Henry, Kevin M.Tabla de Contenidos: “…Case study: Attack on a Chinese bankKey learning points; Questions; Chapter 7: Launching the Attack; Steps to an exploit; Attacking wireless networks; Pen testing wireless; Network sniffing; Firewalls; Intrusion detection and prevention systems (IDS/IPS); Key learning points; Questions; Chapter 8: Attacking Web Applications; The steps in attacking a web application; Questions; Chapter 9: Preparing the Report; Determining risk levels; Risk response; Report confidentiality; Delivering the report; Key learning points; Questions; Appendix 1: Linux; Appendix 2: Encryption; Concepts of cryptography…”
Publicado 2012
Libro electrónico -
552Publicado 2019“…You’ll also learn the basics of topics like: •Multifactor authentication and how biometrics and hardware tokens can be used to harden the authentication process •The principles behind modern cryptography, including symmetric and asymmetric algorithms, hashes, and certificates •The laws and regulations that protect systems and data •Anti-malware tools, firewalls, and intrusion detection systems •Vulnerabilities such as buffer overflows and race conditions A valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, Foundations of Information Security is a great place to start your journey into the dynamic and rewarding field of information security…”
Libro electrónico -
553Publicado 2010Tabla de Contenidos: “…Dominating Sets Partition as Backbones in Wireless Sensor Networks Using Distributed Graph Coloring -- On Multihop Broadcast over Adaptively Duty-Cycled Wireless Sensor Networks -- A Novel Mobility Management Scheme for Target Tracking in Cluster-Based Sensor Networks -- Suppressing Redundancy in Wireless Sensor Network Traffic -- Ensuring Data Storage Security against Frequency-Based Attacks in Wireless Networks -- Time-Critical Data Delivery in Wireless Sensor Networks -- MetroTrack: Predictive Tracking of Mobile Events Using Mobile Phones -- Mobile Sensor Network Localization in Harsh Environments -- AEGIS: A Lightweight Firewall for Wireless Sensor Networks -- Halo: Managing Node Rendezvous in Opportunistic Sensor Networks -- Optimal Data Gathering Paths and Energy Balance Mechanisms in Wireless Networks -- Programming Sensor Networks with State-Centric Services -- Fast Decentralized Averaging via Multi-scale Gossip -- Wormholes No More? …”
Libro electrónico -
554Publicado 2018Tabla de Contenidos: “…-- Features of Neo4j -- Clustering -- Neo4j Browser -- Cache sharding -- Help for beginners -- Evaluating your use case -- Social networks -- Matchmaking -- Network management -- Analytics -- Recommendation engines -- Neo4j anti-patterns -- Applying relational modeling techniques in Neo4j -- Using Neo4j for the first time on something mission-critical -- Storing entities and relationships within entities -- Improper use of relationship types -- Storing binary large object data -- Indexing everything -- Neo4j hardware selection, installation, and configuration -- Random access memory -- CPU -- Disk -- Operating system -- Network/firewall -- Installation -- Installing JVM -- Configuration -- High-availability clustering…”
Libro electrónico -
555Publicado 2015Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Table of Contents -- Preface -- Chapter 1: Packet Analyzers -- Uses for packet analyzers -- Introducing Wireshark -- Wireshark features -- Wireshark's dumpcap and tshark -- The Wireshark packet capture process -- Other packet analyzer tools -- Mobile packet capture -- Summary -- Chapter 2: Capturing Packets -- Guide to capturing packets -- Capturing packets with Interface Lists -- Common interface names -- Capturing packets with Start options -- Capturing packets with Capture Options -- The capture filter options -- Auto-capturing a file periodically -- Troubleshooting -- Wireshark user interface -- The Filter toolbar -- Filtering techniques -- Filter examples -- The Packet List pane -- The Packet Details pane -- The Packet Bytes pane -- Wireshark features -- Decode-As -- Protocol preferences -- The IO graph -- Following the TCP stream -- Exporting the displayed packet -- Generating the firewall ACL rules -- Tcpdump and snoop -- References -- Summary -- Chapter 3: Analyzing the TCP Network -- Recapping TCP -- TCP header fields -- TCP states -- TCP connection establishment and clearing -- TCP three-way handshake -- Handshake message - first step [SYN] -- Handshake message - second step [SYN, ACK] -- Handshake message - third step [ACK] -- TCP data communication -- TCP close sequence -- Lab exercise -- TCP troubleshooting -- TCP reset sequence -- RST after SYN-ACK -- RST after SYN -- Lab exercise -- TCP CLOSE_WAIT -- Lab exercise -- TCP TIME_WAIT -- TCP latency issues -- Cause of latency -- Identifying latency -- Server latency example -- Wire latency -- Wireshark TCP sequence analysis -- TCP retransmission -- Lab exercise -- TCP ZeroWindow -- TCP Window Update -- TCP Dup-ACK -- References -- Summary -- Chapter 4: Analyzing SSL/TLS -- Introducing SSL/TLS…”
Libro electrónico -
556Publicado 2016Tabla de Contenidos: “…Configuring Network ConnectionsJoining a Domain; Chapter 8: Connecting Your Network to the Internet; Connecting to the Internet; Securing Your Connection with a Firewall; Chapter 9: Setting Up a Wireless Network; Diving into Wireless Networking; A Little High School Electronics; Eight-Oh-Two-Dot-Eleventy Something?…”
Libro electrónico -
557por Knight, Brian, 1976-Tabla de Contenidos: “…SSAS ETL Processing and Management OverviewSSAS Integration Basics Within SSIS; Advanced Processing and Par tition Management Examples; Summary; Chapter 7: Package Reliability; Error and Event Handling; Logging; Checkpoint Files; Transactions; Raw Files; Proactive WMI Integration; Building a File Watcher Task; Summary; Chapter 8: Deployment; Working with a Team in SSIS; Reusable Packages; Creating a Package Template; Package Configuration; Deployment Utility; Summary; Chapter 9: Managing SSIS; The Package Store; Management Studio; Running Packages with DTExecUI; Security; Firewall Issues…”
Publicado 2007
Libro electrónico -
558Publicado 2010Tabla de Contenidos: “…""Network Infrastructure Vulnerabilities""""Choosing Tools""; ""Scanning, Poking, and Prodding""; ""Common Router, Switch, and Firewall Weaknesses""; ""General Network Defenses""; ""Chapter 9: Wireless LANs""; ""Understanding the Implications of Wireless Network Vulnerabilities""; ""Choosing Your Tools""; ""Wireless LAN Discovery""; ""Wireless Network Attacks and Countermeasures""; ""Part IV: Hacking Operating Systems""; ""Chapter 10: Windows""; ""Windows Vulnerabilities""; ""Choosing Tools""; ""Information Gathering""; ""Null Sessions""; ""Share Permissions""; ""Missing Patch Exploitation""…”
Libro electrónico -
559por Singh, AbhinavTabla de Contenidos: “…The getdesktop and keystroke sniffingUsing a scraper meterpreter script; Chapter 6: Advanced Meterpreter Scripting; Introduction; Passing the hash; Setting up a persistent connection with backdoors; Pivoting with meterpreter; Port forwarding with meterpreter; Meterpreter API and mixins; Railgun -- converting Ruby into a weapon; Adding a DLL and function definition to Railgun; Building a ""Windows Firewall De-activator"" meterpreter script; Analyzing an existing meterpreter script; Chapter 7: Working with Modules for Penetration Testing; Introduction; Working with scanner auxiliary modules…”
Publicado 2012
Libro electrónico -
560por Carstensen, JaredTabla de Contenidos: “…Dealing with multiple compliance standardsCloud Security Alliance; Leveraging the CSA; Overview of the CAI and CCM; Mapping the CAI and CCM to the security stack; Conclusion; Chapter 6: Cloud Computing Application Security; Identity management and role-based access controls; User identity management; Administrator identity management; Identity management conclusion; Network security; Network security conclusion; Data security; Data security conclusion; Instance security; Firewall; System services; Vulnerability assessment/penetration testing…”
Publicado 2012
Libro electrónico