Mostrando 581 - 600 Resultados de 1,060 Para Buscar 'Firefall~', tiempo de consulta: 1.72s Limitar resultados
  1. 581
    por Honeycutt, Jerry
    Publicado 2009
    Tabla de Contenidos: “…Enabling Non-Administrators to Make Configuration ChangesWindows Defender; Windows Firewall; Internet Explorer Security Features; BitLocker; Encrypting File System (EFS); Auditing Enhancements; Smart Card Improvements; Credential Manager Enhancements; Architectural and Internal Windows Vista Security Improvements; Windows Resource Protection (WRP); Kernel Patch Protection; Required Driver Signing; Windows Service Hardening; Authorization Manager; Network Access Protection Client; Web Services for Management; Crypto Next Generation (CNG) Services; Data Execution Prevention (DEP)…”
    Libro electrónico
  2. 582
    por Negus, Chris, 1957-
    Publicado 2008
    Tabla de Contenidos: “…Using screen: A Rich Remote ShellUsing a Remote Windows Desktop; Using Remote Linux Desktop and Applications; Sharing Desktops Using VNC; Summary; Chapter 14: Locking Down Security; Working with Users and Groups; Checking on Users; Configuring the Built-In Firewall; Working with System Logs; Using Advanced Security Features; Summary; Appendix A: Using vi or Vim Editors; Starting and Quitting the vi Editor; Moving Around in vi; Changing and Deleting Text in vi; Using Miscellaneous Commands; Modifying Commands with Numbers; Using Ex Commands; Working in Visual Mode…”
    Libro electrónico
  3. 583
    por Hobson, Jonathan
    Publicado 2013
    Tabla de Contenidos: “…Updating the system with YUMCleaning the YUM cache; Automating Yum updates with Yum-cron; Installing packages with YUM; Removing packages with YUM; Finding packages with YUM; Installing Yum Priorities to support additional repositories; Enhancing CentOS with the EPEL and Remi repositories; Chapter 5: Securing CentOS; Introduction; Escalating user privilege with sudo; Hardening the secure shell environment; Configuring a firewall and working with IPTables; Protecting SSH with fail2ban; Preventing dictionary-based attacks with DenyHosts; Running antivirus scans with ClamAV…”
    Libro electrónico
  4. 584
    Publicado 2014
    Tabla de Contenidos: “…Leasing a blob and implementing distributed locksUsing the Azure Content Delivery Network (CDN); Chapter 4: Going Relational with the Azure SQL Database; Introduction; Creating a SQL Database server and database; Managing SQL Database logins and firewall rules; Developing a SQL Database with Visual Studio; Connecting to a SQL Database with ADO.NET; Connecting to a SQL Database with Entity Framework; Connecting to a SQL Database from PHP and Java; Migrating a database to a SQL Database; Leveraging backup solutions with SQL Database; Monitoring SQL Database with the dynamic management views…”
    Libro electrónico
  5. 585
    Publicado 2014
    Tabla de Contenidos: “…Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: An Overview of Red Hat Enterprise Virtualization; The virtualization overview; Kernel-based Virtual Machine (KVM); Features of RHEV; Supported virtual machine operating systems; RHEV architecture; Components of RHEV; The hardware and software requirement of RHEV; Red Hat Enterprise Virtualization Manager; The Red Hat Enterprise Virtualization Hypervisor host; The Red Hat Enterprise Virtualization Manager client; Firewall Requirements; Summary…”
    Libro electrónico
  6. 586
    por Musumeci, Guillermo
    Publicado 2012
    Tabla de Contenidos: “…Designing Active Directory integrationBuilding a small test farm; Creating a list of applications to publish in our XenApp farm; Testing the list of applications; Microsoft Office applications; Java; Summary; Chapter 3: Installing XenApp 6.5; Installing and configuring XenApp 6.5; Configuring Windows components; Configuring Windows Firewall; Configure IE ESC (Enhanced Security Configuration); Installing XenApp using the Wizard-Based Server Role Manager; Installing License Server and Web Interface roles in server BRICKXA65-01; Configuring Citrix License Server; Installing Citrix Licenses…”
    Libro electrónico
  7. 587
    por Brant, Justin M.
    Publicado 2013
    Tabla de Contenidos: “…Reviewing and modifying alertsForwarding alerts to e-mail; Summary; Chapter 5: Syslog, Reporting, and Network Atlas; Utilizing Syslog; Understanding Syslog; Forwarding Syslog on common Cisco devices; Enabling and configuring Syslog forwarding on Cisco firewall; Enabling and configuring Syslog forwarding on a Cisco switch; Testing and reviewing Syslog data in SolarWinds SAM; Utilizing reporting; Running reports; Creating reports; Scheduling reports; Orion Network Atlas overview; Creating a network map; Adding network maps to the Orion web console; Summary; Appendix: Troubleshooting…”
    Libro electrónico
  8. 588
    por Cheng, Steven
    Publicado 2010
    Tabla de Contenidos: “…Using transport and message security at the same timeAuthorizing through declarative role-based access control; Impersonating with a client caller identity; Adding multiple tokens in a service request (supportingToken); Supplying dedicated credentials for firewall or proxy authentication; Securing a dynamic SoapHeader; Chapter 8: Concurrency; Introduction; Hosting a singleton instance service; Invoking a WCF service without blocking the front UI; Using throttling to control service concurrency; Ensuring termination of a client session…”
    Libro electrónico
  9. 589
    Publicado 2014
    Tabla de Contenidos: “…Using r10kUsing modules; concat; inifile; firewall; lvm; stdlib; Summary; Chapter 5: Custom Facts and Modules; Module manifest files; Module files and templates; Naming a module; Creating modules with a Puppet module; Comments in modules; Multiple definitions; Custom facts; Creating custom facts; Creating a custom fact for use in hiera; Summary; Chapter 6: Custom Types; Parameterized classes; Defined types; Types and providers; Creating a new type; Summary; Chapter 7: Reporting and Orchestration; Turning on reporting; Syslog; Store; IRC; Foreman; Installing Foreman…”
    Libro electrónico
  10. 590
    por Chambers, James
    Publicado 2013
    Tabla de Contenidos: “…Moving beyond the Basic Set UpSummary; Chapter 6: Using Peripheral Features with Windows Azure Web Sites; Sharing Administrative Responsibilities; Understanding the Scope of Trust in Co-Administration; Avoiding Shared Administration; Managing Your Linked Resources; Working with Windows Azure SQL Databases Remotely; Opening the Firewall; Establishing Remote Connections; Summary; Chapter 7: Scaling, Configuring, and Monitoring Your Site; Using the Power of the Cloud: Scale; Understanding Levels of Scale; Improving Capacity; Scaling Linked Resources; Configuring and Downloading Diagnostic Logs…”
    Libro electrónico
  11. 591
    Publicado 2015
    Tabla de Contenidos: “…Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods…”
    Libro electrónico
  12. 592
    por Krause, Jordan
    Publicado 2015
    Tabla de Contenidos: “…Creating a DHCP reservation for a specific server or resourcePre-staging a computer account in Active Directory; Using PowerShell to create a new Active Directory user; Using PowerShell to view system uptime; Chapter 3: Security and Networking; Introduction; Requiring complex passwords in your network; Using Windows Firewall with Advanced Security to block unnecessary traffic; Changing the RDP port on your server to hide access; Multi-homing your Windows Server 2012 R2; Adding a static route into the Windows routing table; Using Telnet to test a connection and network flow…”
    Libro electrónico
  13. 593
    por Turnbull, James
    Publicado 2011
    Tabla de Contenidos: “…Installing on Microsoft WindowsInstalling on other Platforms; Configuring Puppet; The site.pp file; Firewall Configuration; Starting the Puppet Master; Connecting Our First Agent; Completing the Connection; Creating Our First Configuration; Extending the site.pp file; Agent Configuration; Creating our first module; Module Structure; The init.pp file; Applying Our First Configuration; Summary; Resources; CHAPTER 2 Building Hosts with Puppet; Getting Started; Installing Puppet; Configuring Nodes; Working With Similar Hosts; Using External Sources; Specifying a Default Node…”
    Libro electrónico
  14. 594
    Tabla de Contenidos: “…Research in congestion-resistant frequency allocation scheme for HF IP networkUncertainty research of remote sensing image classification using the Modified Rough Entropy Model; Formal modeling and verification for SDN firewall application using pACSR; Fast recovery of TCP congestion window on a backup 3G path for MPTCP via occasional probing; Design of a compact frequency-reconfigurable notched UWB antenna based on meander lines; Joint antennas selection and power optimization for energy efficient MIMO systems…”
    Libro electrónico
  15. 595
    Publicado 2021
    Tabla de Contenidos: “…Installing a Trusted SSL Certificate on Debian -- CentOS -- Installing a Trusted SSL Certificate on CentOS -- Installing Two-Factor Authentication (2FA) for Webmin -- Enabling Two-Factor Authentication -- Starting and Stopping Webmin -- Basic Modules -- Webmin Group -- System Group -- Servers Group -- Others Group -- Networking Group -- Hardware Group -- Cluster Group -- Advanced Topics -- Creating Other Webmin Users -- Usermin -- Chapter 5: Basics of Linux Security -- Physical Security, Console Access, and File Permissions -- Console Access -- File Permissions -- SetUID, SetGID, and SELinux -- Securing Administrative Access Using sudo -- Network Security -- Open Ports and Firewalls -- Securing SSH by Using Keyfiles -- PuTTY -- Locking It All Down -- Log File Management -- Viewing and Rotating Logs -- Final Thoughts on Security -- Chapter 6: Basics of Backups and Version Control -- Backup Basics: What to Back Up, Where to Back It Up, and How Often to Back Up -- Scheduled vs. …”
    Libro electrónico
  16. 596
    por Woody, Aaron
    Publicado 2013
    Tabla de Contenidos: “…Common IT security standardsSecurity exceptions; Security review of changes; Perimeter security changes; Data access changes; Network architectural changes; Summary; Chapter 4: Securing the Network; Overview; Next generation firewalls; Benefits of NGFW technology; Application awareness; Intrusion prevention; Advanced malware mitigation; Intrusion detection and prevention; Intrusion detection; Intrusion prevention; Detection methods; Behavioral analysis; Anomaly detection; Signature-based detection; Advanced persistent threat detection and mitigation; Securing network services; DNS…”
    Libro electrónico
  17. 597
    Publicado 2008
    Tabla de Contenidos: “…Cover -- Contents -- Foreword -- Introduction -- Part I: Introduction to Network Security Solutions -- Chapter 1 Overview of Network Security Technologies -- Firewalls -- Virtual Private Networks (VPN) -- Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) -- Anomaly Detection Systems -- Authentication, Authorization, and Accounting (AAA) and Identity Management -- Network Admission Control -- Routing Mechanisms as Security Tools -- Summary -- Part II: Security Lifestyle: Frameworks and Methodologies -- Chapter 2 Preparation Phase -- Risk Analysis -- Social Engineering -- Security Intelligence -- Creating a Computer Security Incident Response Team (CSIRT) -- Building Strong Security Policies -- Infrastructure Protection -- Endpoint Security -- Network Admission Control -- Summary -- Chapter 3 Identifying and Classifying Security Threats -- Network Visibility -- Telemetry and Anomaly Detection -- Intrusion Detection and Intrusion Prevention Systems (IDS/IPS) -- Summary -- Chapter 4 Traceback -- Traceback in the Service Provider Environment -- Traceback in the Enterprise -- Summary -- Chapter 5 Reacting to Security Incidents -- Adequate Incident-Handling Policies and Procedures -- Laws and Computer Crimes -- Security Incident Mitigation Tools -- Forensics -- Summary -- Chapter 6 Postmortem and Improvement -- Collected Incident Data -- Root-Cause Analysis and Lessons Learned -- Building an Action Plan -- Summary -- Chapter 7 Proactive Security Framework -- SAVE Versus ITU-T X.805 -- Identity and Trust -- Visibility -- Correlation -- Instrumentation and Management -- Isolation and Virtualization -- Policy Enforcement -- Visualization Techniques -- Summary -- Part III: Defense-In-Depth Applied -- Chapter 8 Wireless Security -- Overview of Cisco Unified Wireless Network Architecture…”
    Libro electrónico
  18. 598
    Publicado 2006
    Tabla de Contenidos: “…Networking -- The Internet protocol -- Configuring IP addresses -- Naming and DNS -- Private networks and NAT -- Routing -- Active network connections -- Appletalk -- Locations -- Using a dial-up connection -- Virtual private networks -- Firewalls -- Internet connection sharing -- 14. Network services -- File sharing -- Web sharing -- Remote login -- FTP access -- sharing printers -- Mail…”
    Libro electrónico
  19. 599
    Publicado 2023
    Tabla de Contenidos: “…Configuring Monitoring and Alerts -- Summary -- Exam Essentials -- Review Questions -- Chapter 9: Resource Isolation Design Patterns -- Configuring Network Firewalling -- Working with Sandbox Environments -- Controlling Local System Access -- Summary -- Exam Essentials -- Review Questions -- Appendix: Answers to Review Questions -- Chapter 1: Using Digital Resources Responsibly -- Chapter 2: What Are Vulnerabilities and Threats? …”
    Libro electrónico
  20. 600
    Publicado 2015
    Tabla de Contenidos: “…How to Estimate Consequences and Likelihood -- Risk Ranking -- Risk Reduction and Mitigation -- Summary -- Chapter 9 - Establishing Zones and Conduits -- Information in this Chapter -- Security Zones and Conduits Explained -- Identifying and Classifying Security Zones and Conduits -- Recommended Security Zone Separation -- Network Connectivity -- Caution -- Control Loops -- Supervisory Controls -- Note -- Plant Level Control Processes -- Control Data Storage -- Trading Communications -- Remote Access -- Users and Roles -- Protocols -- Criticality -- Tip -- Tip -- Establishing Security Zones and Conduits -- Summary -- Chapter 10 - Implementing Security and Access Controls -- Information in this Chapter -- Network Segmentation -- Zones and Security Policy Development -- Using Zones within Security Device Configurations -- Implementing Network Security Controls -- Selecting Network Security Devices -- Implementing Network Security Devices -- Firewall Configuration Guidelines -- Intrusion Detection and Prevention (IDS/IPS) Configuration Guidelines -- Recommended IDS/IPS Rules -- Anomaly-Based Intrusion Detection -- Protocol Anomaly Detection -- Application and Protocol Monitoring in Industrial Networks -- Data Diodes and Unidirectional Gateways -- Implementing Host Security and Access Controls -- Selecting Host Cyber Security Systems -- Host Firewalls -- Host IDS -- Anti-virus -- Application Whitelisting -- External Controls -- Patch Management -- Patching as a form of Vulnerability Management -- Leave no Vulnerability Unturned -- Maintaining System Availability -- Comprehensive Predeployment Testing -- Automating the Process -- How Much Security is Enough? …”
    Libro electrónico