Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
561por Pamungkas, Bayu CahyaTabla de Contenidos: “…Verifying the additional PostgreSQL pathConfiguring PostgreSQL; Modifying the client authentication configuration file; Verifying the PostgreSQL configuration file; Configuring the firewall to allow database connections; Installing ADempiere on the server side; Downloading the ADempiere core installation files; Downloading the latest ADempiere patch files; Obtaining the ADempiere application patch files; Obtaining the ADempiere database migration script; Verifying the ADempiere binary files; Extracting the ADempiere core installation files; Applying the ADempiere application patch files…”
Publicado 2009
Libro electrónico -
562Publicado 2014Tabla de Contenidos: “…The complements of SplunkODBC; Splunk - outside the box; Customer Relationship Management; Emerging technologies; Knowledge discovery and data mining; Disaster recovery; Virus protection; The enhancement of structured data; Project management; Firewall applications; Enterprise wireless solutions; Hadoop technologies; Media measurement; Social media; Geographical Information Systems; Mobile Device Management; Splunk in action; Summary; Chapter 2: Advanced Searching; Searching in Splunk; The search dashboard; The new search dashboard; The Splunk search mechanism…”
Libro electrónico -
563por Sabharwal, NavinTabla de Contenidos: “…""Chapter 2: Cloud Stakeholders and Value Chain""""Cloud Views""; ""Service Delivery Chain in the Cloud""; ""Service-Based View""; ""Cloud Service Creator""; ""Cloud Service Aggregator""; ""Service Consumer""; ""Layer-Based View""; ""Chapter 3: Technology that Drives the Cloud""; ""Virtualization: The Engine of Cloud Computing""; ""Virtual Machine""; ""Virtual Servers""; ""Virtual Network""; ""Virtual Storage""; ""Virtual Firewall""; ""Load Balancer""; ""Virtual Applications and Middleware""; ""Cloud Architecture Layers""; ""Chapter 4: Introduction to Capacity Management""; ""ITIL Overview""…”
Publicado 2013
Libro electrónico -
564por Koepsell, David R.Tabla de Contenidos: “…Creation and Dissemination of Types versus Goods Ethical Problems with Traditional IP; Conclusion; 7 Economics, Surplus, and Justice; Justice and Monopoly; Ideas as Commons and Truly Free Markets; The Scientific Commons and the Marketplace; Justice and Law: Rejecting Positivism; A Vacuum of Justice; Progress and Justice: Embracing a Natural Basis for the Good; Rights to Tokens and Exchanges of Types: Pragmatic and Theoretical Approaches to Markets without Scarcity; Tiered pricing models; 8 Nanotech Nightmares; Scientific Duties and Dangerous Technologies; The Scientific Firewall…”
Publicado 2011
Libro electrónico -
565por Lammle, ToddTabla de Contenidos: “…-- Chapter 1: Basic IOS Commands -- Booting the Router -- Configuring a Router -- Using the show Command -- Chapter 2: Managing a Cisco Internetwork -- Understanding the Internal Components of a Cisco Router -- Managing the Configuration Register -- Backing Up and Restoring the Cisco IOS -- Backing Up and Restoring the Cisco Configuration -- Using Cisco Discovery Protocol (CDP) -- Using Telnet -- Resolving Hostnames -- Checking Network Connectivity and Troubleshooting -- Using the sh processes Command -- Chapter 3: IP Routing -- Routing Basics -- Routing Protocol Basics -- Routing Information Protocol (RIP) -- Chapter 4: Enhanced IGRP (EIGRP) and Open Shortest Path First (OSPF) -- Understanding EIGRP Basics -- Understanding Open Shortest Path First (OSPF) Basics -- Configuring OSPF -- Verifying OSPF Configuration -- Chapter 5: Layer-2 Switching and Spanning-Tree Protocol (STP) -- Switching Services -- Chapter 6: Virtual LANs (VLANs) -- Understanding VLAN Basics -- Configuring VLANs -- Configuring VTP -- Telephony: Configuring Voice VLANs -- Chapter 7: Security -- Perimeter Routers, Firewalls, and Internal Routers -- Introduction to Access Lists -- Standard Access Lists -- Extended Access Lists -- Monitoring Access Lists -- Chapter 8: Network Address Translation (NAT) -- When Do We Use NAT? …”
Publicado 2014
Libro electrónico -
566Publicado 2022Tabla de Contenidos: “…Periods of Japanese history -- Theorizing war-related contents tourism / Philip Seaton and Takayoshi Yamamura -- The narrative worlds of ancient wars : travelling heroes in Kojiki / Takayoshi Yamamura -- The Mongol invasions of Japan and Tsushima tourism / Kyungjae Jang -- Sekiro : shadows die twice and contents tourism in Aizu-Wakamatsu / Aleksandra Jaworowicz-Zimny -- History girls and women's war-related contents tourism / Akiko Sugawa-Shimada -- Satsuma's invasion of the Ryukyu Kingdom in 1609 and Okinawa tourism / Kyungjae Jang -- War-related narratives and contents tourism during the 'Tokugawa peace' / Takayoshi Yamamura -- Tōken Ranbu and samurai swords as tourist attractions / Akiko Sugawa-Shimada -- Castles and castle towns in Japanese tourism / Yosuke Fujiki and Hitoshi Nakai -- Festivals of war : travelling the Shinsengumi in 2019 -- Hokkaido as imperial acquisition and the Ainu in popular culture and tourism / Ryo Koarai -- The Russo-Japanese War and (contents) tourism / Philip Seaton -- Tourism relating to the new culture introduced by First World War German POWs / Kyungjae Jang -- Theatre (contents) tourism and war as a backdrop to romance / Akiko Sugawa-Shimada -- Yasukuni Shrine's Yūshūkan museum as a site of contents tourism / Philip Seaton and Takayoshi Yamamura -- The sense of belonging created by In this Corner of the World / Luli van der Does -- Travelling Grave of the Fireflies : the gap between creators' intentions and audiences'/tourists' interpretations / Takayoshi Yamamura -- Tours of Tokkōtai (kamikaze) training bases / Luli van der Does -- Repatriation and the enka ballad Ganpeki no haha / Akiko Sugawa-Shimada -- Kantai Collection and entertainmentization of the Second World War / Kyungjae Jang -- The war metaphors underpinning Mizuki Shigeru yōkai tourism / Qiaodan Wang and Philip Seaton -- Shin Godzilla : tourism consuming images of JSDF, kaiju characters, and destroyed sites / Aleksandra Jaworowicz-Zimny and Takayoshi Yamamura -- Fantasy wars and their real-life inspirations : tourism and international conflicts caused by Attack on Titan / Ryo Koarai and Takayoshi Yamamura -- Conclusions : patterns of war-related (contents) tourism / Takayoshi Yamamura and Philip Seaton…”
Libro electrónico -
567Publicado 2022Tabla de Contenidos: “…Other Container-Oriented Services -- AWS CLI Example -- Summary -- Exam Essentials -- Review Questions -- Chapter 3 AWS Storage -- Introduction -- S3 Service Architecture -- Prefixes and Delimiters -- Working with Large Objects -- Encryption -- Logging -- S3 Durability and Availability -- Durability -- Availability -- Eventually Consistent Data -- S3 Object Life Cycle -- Versioning -- Life Cycle Management -- Accessing S3 Objects -- Access Control -- Presigned URLs -- Static Website Hosting -- Amazon S3 Glacier -- Storage Pricing -- Other Storage-Related Services -- Amazon Elastic File System -- Amazon FSx -- AWS Storage Gateway -- AWS Snow Family -- AWS DataSync -- AWS CLI Example -- Summary -- Exam Essentials -- Review Questions -- Chapter 4 Amazon Virtual Private Cloud (VPC) -- Introduction -- VPC CIDR Blocks -- Secondary CIDR Blocks -- IPv6 CIDR Blocks -- Subnets -- Subnet CIDR Blocks -- Availability Zones -- IPv6 CIDR Blocks -- Elastic Network Interfaces -- Primary and Secondary Private IP Addresses -- Attaching Elastic Network Interfaces -- Enhanced Networking -- Internet Gateways -- Route Tables -- Routes -- The Default Route -- Security Groups -- Inbound Rules -- Outbound Rules -- Sources and Destinations -- Stateful Firewall -- Default Security Group -- Network Access Control Lists -- Inbound Rules -- Outbound Rules -- Using Network Access Control Lists and Security Groups Together -- AWS Network Firewall -- Public IP Addresses -- Elastic IP Addresses -- AWS Global Accelerator -- Network Address Translation -- Network Address Translation Devices -- Configuring Route Tables to Use NAT Devices -- NAT Gateway -- NAT Instance -- AWS PrivateLink -- VPC Peering -- Hybrid Cloud Networking -- AWS Site-to-Site VPN -- AWS Transit Gateway -- AWS Direct Connect -- High-Performance Computing -- Elastic Fabric Adapter -- AWS ParallelCluster -- Summary…”
Libro electrónico -
568Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Google Cloud Platform -- Introduction to cloud computing -- Introducing GCP -- GCP services -- Compute services -- Storage services -- Networking services -- Big data -- Data centers and regions -- Relating AWS and Azure to GCP -- Exploring GCP -- Creating your first project -- Using the command line -- Summary -- Chapter 2: Google Cloud Platform Compute -- Google Compute Engine -- f1-micro bursting machine types -- Mega-memory machine types -- Images -- Creating a VM instance -- Preemptible VM instances -- Live migration -- Instance templates -- Google App Engine -- Kubernetes engine -- Node pools -- Google Cloud Functions -- Summary -- Chapter 3: Google Cloud Platform Storage -- Persistent storage -- Google Cloud Storage buckets -- Google Cloud Spanner -- Google Cloud SQL -- Google Cloud Bigtable -- Summary -- Chapter 4: Google Cloud Platform Networking -- VPC networks -- Routes -- Firewall -- VPC network peering -- Private Google access -- Other networking concepts -- Load balancing -- Google Cloud CDN -- Cloud VPN -- Cloud interconnect -- Summary -- Chapter 5: Google Cloud Platform Containers -- Kubernetes concepts -- Administering a cluster -- Configuring cluster networking -- Multi-zone clusters -- Preemptible instances -- Summary -- Chapter 6: Google Cloud Platform Operations -- Stackdriver monitoring and logging -- Logging -- Stackdriver error reporting -- Stackdriver debugger -- Stackdriver profiler -- Stackdriver Trace -- Summary -- Chapter 7: Google Cloud Platform Identity and Security -- Infrastructure and cloud platform security -- Identity and access management -- Key management service -- Cloud security scanner -- Data loss prevention -- Security keys -- Summary…”
Libro electrónico -
569Publicado 2015Tabla de Contenidos: “…SSL EncryptionAdvanced Persistent Threat (APT); Cyber Espionage; Malware and Trojans; Malware Communications; Adware, Crimeware, and Ransomware; Reverse Engineering; Malware Analysis; Memory Attacks and Analysis; Digital Forensics and Incident Response; Penetration Testing Tools; SCADA; Mobile Phone Attacks; Government Surveillance; 3D Printers; Maltego; ROT13; Wickr; Pastebin; Women in Technology; Pirate Party; magicJack; Firewalls; Avatar; Chaos Communication Congress/Chaos Computer Camp; Hacker Spaces; Hacker Hostel; German International ID; Snopes; Wikileaks; DEFCON; BruCON; 44Con; OPSEC…”
Libro electrónico -
570Publicado 2020Tabla de Contenidos: “…., Srivastava, Shivam, Gupta, Anish, Sinha, Rishu, Biswas, S.S. and Vanishree, J. -- Modified firefly-based maximum power point tracking algorithm for PV systems under partial shading conditions / Chitra, A., Yogitha, G., Karthik Sivaramakrishnan, Razia Sultana, W. and Sanjeevikumar, P. -- Induction motor control schemes for hybrid electric vehicles/electric vehicles / Sarin, M.V., Chitra, A., Sanjeevikumar, P. and Venkadesan, A. -- Intelligent hybrid battery management system for electric vehicle / Rajalakshmi, M. and Razia Sultana, W. -- A comprehensive study on various topologies of permanent magnet motor drives for electric vehicles application / Chiranjit Sain, Atanu Banerjee and Pabitra Kumar Biswas -- A new approach for flux computation using intelligent technique for direct flux oriented control of asynchronous motor / A. …”
Libro electrónico -
571por Solé Almagro, DavidTabla de Contenidos: “…Protección de servicios: firewall. Herramientas de seguridad (...); 8. Resumen; Ejercicios de repaso y autoevaluación; 5. …”
Publicado 2015
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
572por Van der Walt, DirkTabla de Contenidos: “…; Advantages; Extra packages; Available packages; CentOS; SUSE; Ubuntu; Special considerations; Remember the firewall; CentOS; SUSE; Have a go hero - installing from source; Building from source; Advantages of building packages; CentOS; Time for action - building CentOS RPMs; What just happened?…”
Publicado 2011
Libro electrónico -
573Publicado 2016Tabla de Contenidos: “…X509 AuthenticationChapter 13 - BYOD Designs; User PEAP; BYOD EAP-TLS; Web authentication for BYOD access; Chapter 14 - ISE Posture Assessment; Introduction; Posture basics; Required AuthZ components; Client provisioning; Posture rules; Conditions; Remediation; Requirements; Posture policy; Examples; Basic Company Posture; Patch Checking; Chapter 15 - VPN Integrations; Posture; Chapter 16 - ISE Reporting and Logging; Introduction; Reporting; Logging; Monitoring; Examples; Send Events to Remote Servers; Identity Firewall with Context Directory Agent; Set Up a Remote Syslog Server…”
Libro electrónico -
574Publicado 2023Tabla de Contenidos: “…-- Summary -- Chapter 10: Best Practices for Protecting Windows from Ransomware Attacks -- Best practices and security settings in Windows -- Remote desktop management -- Administrative shares -- LAPS and restrict usage of local accounts -- Windows Firewall best practices -- Tamper Protection -- Automatic patching of infrastructure -- File Server Resource Manager and file groups -- Other top tips to protect against ransomware -- Summary -- Index…”
Libro electrónico -
575por Hassell, JonathanTabla de Contenidos: “…Table of Contents; Preface; Audience; Organization and Structure; Conventions Used in This Book; Using Code Examples; We'd Like to Hear from You; Safari® Books Online; Acknowledgments; Introducing Windows Server 2008; The Biggest Changes; Server Core; IIS Improvements; Networking Improvements; TCP/IP Stack Enhancements; Changes to Terminal Services; Active Directory: Read-Only Domain Controllers; Security Improvements; Operating System File Protection; BitLocker; Device Installation Control; Windows Firewall with Advanced Security; Network Access Protection; Manageability Improvements…”
Publicado 2007
Libro electrónico -
576por Gibson, DarrilTabla de Contenidos: “…Chapter 11: Managing Security in Windows 7User Account Control; Security Policies; Designing BitLocker Support; Windows Firewall; Summary; Chapter Essentials; Chapter 12: Supporting Mobile Windows 7 Users; Configuring and Troubleshooting Wireless Connectivity; Troubleshooting Remote Access Issues; Understanding DirectAccess; Using BranchCache; Summary; Chapter Essentials; Chapter 13: Administering Internet Explorer; Managing Windows Internet Explorer Settings; Understanding Advanced Settings; Troubleshooting Internet Explorer Issues; Summary; Chapter Essentials…”
Publicado 2010
Libro electrónico -
577Publicado 2007Tabla de Contenidos: “…Managing Security Essentials; Introduction; Managing the Windows Firewall and IPSec; Managing Patching; Managing Malware Protection; Managing Internet Browser Security; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. …”
Libro electrónico -
578Publicado 2007Tabla de Contenidos: “…Microsoft Vista: Networking Essentials; Introduction; Not Your Father's TCP/IP Stack; Using the Network and Sharing Center; Using the Network Map; Working with the Windows Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. …”
Libro electrónico -
579Publicado 2007Tabla de Contenidos: “…Building & Maintaining a Secure Network; Introduction; Installing and Maintaining a Firewall Configuration…”
Libro electrónico -
580por Bhardwaj, Pawan K.Tabla de Contenidos: “…Configuring, Managing, and Troubleshooting SecurityExam 70-270 Study Guide; Windows XP Basics; Windows XP Editions; Windows XP Professional edition; Windows XP Home edition; Windows XP Media Center edition; Windows XP Tablet PC edition; Windows XP Professional 64-Bit edition; Major Enhancements in Service Pack 2; Security Center; Windows Firewall; Automatic Updates; Internet Explorer; Workgroups and Domains; Workgroups; Domains; Types of computers in a Windows Server 2003 network; Installing Microsoft Windows XP Professional; Planning Before Installation; Hardware requirements…”
Publicado 2007
Libro electrónico