Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
601Publicado 2010Tabla de Contenidos: “…Quiz -- Security Fundamentals -- Secure and Insecure File Systems -- Authentication Technologies -- Protection Against Viruses and Malware -- Software Firewalls -- Hardware Recycling and Deconstruction -- Securing Wireless Networks -- WEP and WPA Encryption -- Access Point Configuration for Maximum Security -- Data and Physical Security -- Data Access Local Security Policy -- Encryption Technologies -- Backups -- Data Migration -- Data and Data Remnant Removal -- Password Management -- Locking a Workstation -- Incident Reporting -- Social Engineering -- Access Control Purposes and Principles -- Operating System Access Control -- Components -- Restricted Spaces -- Auditing and Event Logging -- Installing, Configuring, and Troubleshooting Security Features -- BIOS Security Features -- Software Firewalls -- Wireless Client Configuration -- Unused Wireless Connections -- File Systems (Converting From FAT32 To NTFS) -- Malicious Software Protection -- Chapter 11 Printers -- Do I Know This Already?" …”
Libro electrónico -
602Publicado 2011“…Written by three of Cisco's most experienced CiscoSecure product support experts, it covers all AAA solutions (except NAC) on Cisco routers, switches, access points, firewalls, and concentrators. It also thoroughly addresses both ACS configuration and troubleshooting, including the use of external databases supported by ACS. …”
Libro electrónico -
603
-
604por Jacobs, Jay (Data analyst)Tabla de Contenidos: “…Exploring Data Homing In on a Question; Summary; Recommended Reading; Chapter 4 Performing Exploratory Security Data Analysis; Dissecting the IP Address; Representing IP Addresses; Segmenting and Grouping IP Addresses; Locating IP Addresses; Augmenting IP Address Data; Association/Correlation, Causation, and Security Operations Center Analysts Gone Rogue; Mapping Outside the Continents; Visualizing the ZeuS Botnet; Visualizing Your Firewall Data; Summary; Recommended Reading; Chapter 5 From Maps to Regression; Simplifying Maps; How Many Zero Access Infections per Country?…”
Publicado 2014
Libro electrónico -
605Publicado 2017Tabla de Contenidos: “…Using Session in a Flask app -- Connection pooling -- HTTP cache headers -- Improving data transfer -- GZIP compression -- Binary payloads -- Putting it together -- Asynchronous calls -- Task queues -- Topic queues -- Publish/subscribe -- RPC over AMQP -- Putting it together -- Testing -- Mocking synchronous calls -- Mocking asynchronous calls -- Mocking Celery -- Mocking other asynchronous calls -- Summary -- Chapter 6: Monitoring Your Services -- Centralizing logs -- Setting up Graylog -- Sending logs to Graylog -- Adding extra fields -- Performance metrics -- System metrics -- Code metrics -- Web server metrics -- Summary -- Chapter 7: Securing Your Services -- The OAuth2 protocol -- Token-based authentication -- The JWT standard -- PyJWT -- X.509 certificate-based authentication -- The TokenDealer microservice -- The POST/oauth/token implementation -- Using TokenDealer -- Web application firewall -- OpenResty - Lua and nginx -- Rate and concurrency limiting -- Other OpenResty features -- Securing your code -- Asserting incoming data -- Limiting your application scope -- Using Bandit linter -- Summary -- Chapter 8: Bringing It All Together -- Building a ReactJS dashboard -- The JSX syntax -- React components -- ReactJS and Flask -- Using Bower, npm, and Babel -- Cross-origin resource sharing -- Authentication and authorization -- Interacting with Data Service -- Getting the Strava token -- JavaScript authentication -- Summary -- Chapter 9: Packaging and Running Runnerly -- The packaging toolchain -- A few definitions -- Packaging -- The setup.py file -- The requirements.txt file -- The MANIFEST.in file -- Versioning -- Releasing -- Distributing -- Running all microservices -- Process management -- Summary -- Chapter 10: Containerized Services -- What is Docker? …”
Libro electrónico -
606Publicado 2015Tabla de Contenidos: “…Get Smart ; Take the Online Privacy Test; Eight Privacy Tips to Use Right Now; Targets and Nontargets; Losing Your Privacy; Ways You Can Lose Your Privacy; Protect Yourself Right Now ; Tape Over Your Webcam; Lock Your Phone, Computer, and Tablet; Do a Privacy Check-Up; Don't Email Your ID; Use a Password Manager and Install an Antitheft App; Be the Firewall; 2. But It's Just My Phone Number ; You Control What You Share ; Private Spaces and Activities; Lock Down Your Personally Identifying Information; Red Alert List; Yellow Alert List; Green List…”
Libro electrónico -
607por Krum, Spencer. author, Van Hevelingen, William. author, Kero, Ben. author, Turnbull, James. author, McCune, Jeffrey. authorTabla de Contenidos: “…""The site.pp File""""Firewall Configuration""; ""Starting the Puppet Master""; ""Connecting Our First Agent""; ""Completing the Connection""; ""Creating Our First Configuration Item""; ""Adding a Node Definition""; ""Creating Our First Module""; ""Module Structure""; ""The init.pp file""; ""Applying Our First Configuration""; ""Summary""; ""Resources""; ""Chapter 2: Building Hosts with Puppet""; ""Getting Started""; ""Installing Puppet""; ""Integrating and Bootstrapping Puppet with Kickstart""; ""Configuring Nodes""; ""Working with Similar Hosts""; ""Using External Sources""…”
Publicado 2013
Libro electrónico -
608por Thakker, Tushar. authorTabla de Contenidos: “…Planning an Installation TopologyDeciding the Product Offerings To Be Provisioned; Deciding the Installation Topology; Memory Sizing for the Servers; Recommended Memory Requirement for DB Instances; Recommended Memory for Identity Management Nodes; Recommended Memory for Fusion Applications Nodes; Calculating Memory Requirements for an Installation; Planning Network and Storage; Planning Internal and External Firewall; Planning Load-Balancer or Reverse Proxy; Understanding SSL Certificates Requirements; DMZ Tier Requirements; Web Proxy Requirements; Recommended Storage Space; Summary…”
Publicado 2015
Libro electrónico -
609Publicado 2017Tabla de Contenidos: “…-- Pivoting -- The Attack -- The Hard Disk Firewall Fail -- Metasploit Demonstration -- Under the Hood -- The Benefits of Admin -- Typical Subnet Cloning -- Recovering Passwords -- Making a Shopping List -- Summary -- Exercises -- Chapter 5: Guns and Ammo -- Background and Mission Briefing -- Payload Delivery Part V: Simulating a Ransomware Attack -- What Is Ransomware? …”
Libro electrónico -
610por Solutions, Online TrainingTabla de Contenidos: “…Shutting Down a Windows XP Domain-Connected ComputerShutting Down a Windows XP Workgroup-Connected Computer; Chapter 2 Working Efficiently in Windows XP; Getting to Know the Windows Desktop; Working with the Start Menu; Using the Taskbar; Creating Shortcuts; Rearranging Your Desktop; Cleaning Up Your Desktop; Chapter 3 Managing Computer Security; Changing Your Computer's Name; Working with User Accounts in a Domain; Working with User Accounts in a Workgroup; Switching Quickly Among Users; Analyzing Your Computer's Security; Configuring Internet Security Zones; Configuring Windows Firewall…”
Publicado 2004
Libro electrónico -
611por Ballew, JoliTabla de Contenidos: “…; Configure Your Windows Vista-Based PC; Configure Windows Firewall; Configure Windows Defender; Chapter Summary; Part II: Setting Up a Network…”
Publicado 2010
Libro electrónico -
612por Pyles, James“…Microsoft Windows SharePoint Services technology in Office 2007 is an integrated set of services designed to connect people, information, processes, and systems both within and beyond the organizational firewall. SharePoint 2007: The Definitive Guide provides a detailed discussion of all Sharepoint features, application…”
Publicado 2007
Libro electrónico -
613por Gough, MichaelTabla de Contenidos: “…Video-Call-Capable Cell PhonesProviders of Gateways for Cell-Phone-to-PC Video Calls; Summary; Appendix A: Firewall Port Information; Appendix B: Video Call Software Solutions; Appendix C: Software Add-ons for Skype; Expanding Skype's Capabilities; Voice Mail; Recording Skype Calls; Integrating with Outlook; SMS Text Messaging; Forwarding Your Skype Calls; SkypeCasting; Skype Web Toolbars; Other Plug-ins; Index…”
Publicado 2006
Libro electrónico -
614por Chak, DanTabla de Contenidos: “…The Big Picture; Growing Slowly; Understanding All the Pieces; Application Layer; Web-services layer; Caching Layer; Messaging System; Web Server; Firewall; 2. Organizing with Plugins; Writing Your Own Plugins; Core plugin template; Testing; Using a core plugin; Custom Extensions; Extension plugin template; Using a custom extension; Testing; Deployment…”
Publicado 2009
Libro electrónico -
615por Carter, GeraldTabla de Contenidos: “…Downloading the Source DistributionRead the Documentation; Configuring Samba; Kerberos and LDAP; Unicode and the iconv Library; Compiling and Installing Samba; Upgrading Your Installation; Reconfiguring Samba; Setting Search Paths; Enabling the Samba Web Administration Tool (SWAT); A Basic Samba Configuration File; Encrypted Passwords; Using SWAT to Create an smb.conf File; Testing the Configuration File; Firewall Configuration; Starting the Samba Daemons; Starting the Daemons Manually; Automatic Startup; BSD Unix; System V Unix and most Linux distributions; Mac OS X…”
Publicado 2007
Libro electrónico -
616por Learning, Solid QualityTabla de Contenidos: “…Reviewing Microsoft SQL Server 2005 Management Tools; Using SQL Server Books Online; Using SQL Server Configuration Manager; Using the SQL Server 2005 Network Configuration Node; Dynamic ports; Windows Firewall; What is the best configuration?; Using the SQL Native Client Configuration Node; Aliases; Using SQL Server Surface Area Configuration; Using Surface Area Configuration For Features; Sac Utility…”
Publicado 2009
Libro electrónico -
617por Negus, Chris, 1957-Tabla de Contenidos: “…Chapter 13: Doing Remote System Administration Doing Remote Login and Tunneling with SSH; Using screen: A Rich Remote Shell; Using a Remote Windows Desktop; Using Remote BSD Desktop and Applications; Sharing Desktops Using VNC; Summary; Chapter 14: Locking Down Security; Working with Users and Groups; Checking on Users; Securing Network Services; Configuring the Built-In Firewall; Working with System Logs; Using Advanced Security Features; Summary; Appendix A: Using vi or Vim Editors; Starting and Quitting the vi Editor; Moving Around in vi; Changing and Deleting Text in vi…”
Publicado 2008
Libro electrónico -
618por Stewart, James Michael“…Fast Pass coverage includes: General security concepts.Assessing risk.Securing communications.Implementing wireless security features.Configuring a firewall.Detecting intrusions.Securing your organization's infrastructure.Understanding the basics of cryptography.Managing security keys and certificates.Ensuring operational and organizational security.Recovering from disasters.A CD-ROM so you can practice, practice, practice.Concise, objective-focused cove…”
Publicado 2004
Libro electrónico -
619por Pogue, ChrisTabla de Contenidos: “…Install ClamAVUpdating Virus Database with Freshclam; Scanning the Target Directory; Download Panda Antivirus; Install Panda Antivirus; Scanning the Target Directory; Web References; Appendix A: Implementing Cybercrime Detection Techniques on Windows and *nix by Michael Cross; Introduction; Security Auditing and Log Files; Auditing for Windows Platforms; Auditing for UNIX and Linux Platforms; Firewall Logs, Reports, Alarms, and Alerts; Commercial Intrusion Detection Systems; Characterizing Intrusion Detection Systems; Commercial IDS Players; IP Spoofing and Other Antidetection Tactics…”
Publicado 2008
Libro electrónico -
620por Prowell, Stacy J.Tabla de Contenidos: “…Protocol Tunneling; How Protocol Tunneling Works; The Great Firewall; Setting Up a Channel with SSH; Corkscrew and SSH over HTTPS; SSH over HTTP; Automation; Dangers of Protocol Tunneling; Defending against Protocol Tunneling; Preventing Protocol Tunneling; Detecting Protocol Tunneling; The Future of Protocol Tunneling; Summary…”
Publicado 2010
Libro electrónico