Mostrando 601 - 620 Resultados de 1,060 Para Buscar 'Firefall~', tiempo de consulta: 1.73s Limitar resultados
  1. 601
    Publicado 2010
    Tabla de Contenidos: “…Quiz -- Security Fundamentals -- Secure and Insecure File Systems -- Authentication Technologies -- Protection Against Viruses and Malware -- Software Firewalls -- Hardware Recycling and Deconstruction -- Securing Wireless Networks -- WEP and WPA Encryption -- Access Point Configuration for Maximum Security -- Data and Physical Security -- Data Access Local Security Policy -- Encryption Technologies -- Backups -- Data Migration -- Data and Data Remnant Removal -- Password Management -- Locking a Workstation -- Incident Reporting -- Social Engineering -- Access Control Purposes and Principles -- Operating System Access Control -- Components -- Restricted Spaces -- Auditing and Event Logging -- Installing, Configuring, and Troubleshooting Security Features -- BIOS Security Features -- Software Firewalls -- Wireless Client Configuration -- Unused Wireless Connections -- File Systems (Converting From FAT32 To NTFS) -- Malicious Software Protection -- Chapter 11 Printers -- Do I Know This Already?" …”
    Libro electrónico
  2. 602
    Publicado 2011
    “…Written by three of Cisco's most experienced CiscoSecure product support experts, it covers all AAA solutions (except NAC) on Cisco routers, switches, access points, firewalls, and concentrators. It also thoroughly addresses both ACS configuration and troubleshooting, including the use of external databases supported by ACS. …”
    Libro electrónico
  3. 603
    Publicado 2021
    Libro electrónico
  4. 604
    por Jacobs, Jay (Data analyst)
    Publicado 2014
    Tabla de Contenidos: “…Exploring Data Homing In on a Question; Summary; Recommended Reading; Chapter 4 Performing Exploratory Security Data Analysis; Dissecting the IP Address; Representing IP Addresses; Segmenting and Grouping IP Addresses; Locating IP Addresses; Augmenting IP Address Data; Association/Correlation, Causation, and Security Operations Center Analysts Gone Rogue; Mapping Outside the Continents; Visualizing the ZeuS Botnet; Visualizing Your Firewall Data; Summary; Recommended Reading; Chapter 5 From Maps to Regression; Simplifying Maps; How Many Zero Access Infections per Country?…”
    Libro electrónico
  5. 605
    Publicado 2017
    Tabla de Contenidos: “…Using Session in a Flask app -- Connection pooling -- HTTP cache headers -- Improving data transfer -- GZIP compression -- Binary payloads -- Putting it together -- Asynchronous calls -- Task queues -- Topic queues -- Publish/subscribe -- RPC over AMQP -- Putting it together -- Testing -- Mocking synchronous calls -- Mocking asynchronous calls -- Mocking Celery -- Mocking other asynchronous calls -- Summary -- Chapter 6: Monitoring Your Services -- Centralizing logs -- Setting up Graylog -- Sending logs to Graylog -- Adding extra fields -- Performance metrics -- System metrics -- Code metrics -- Web server metrics -- Summary -- Chapter 7: Securing Your Services -- The OAuth2 protocol -- Token-based authentication -- The JWT standard -- PyJWT -- X.509 certificate-based authentication -- The TokenDealer microservice -- The POST/oauth/token implementation -- Using TokenDealer -- Web application firewall -- OpenResty - Lua and nginx -- Rate and concurrency limiting -- Other OpenResty features -- Securing your code -- Asserting incoming data -- Limiting your application scope -- Using Bandit linter -- Summary -- Chapter 8: Bringing It All Together -- Building a ReactJS dashboard -- The JSX syntax -- React components -- ReactJS and Flask -- Using Bower, npm, and Babel -- Cross-origin resource sharing -- Authentication and authorization -- Interacting with Data Service -- Getting the Strava token -- JavaScript authentication -- Summary -- Chapter 9: Packaging and Running Runnerly -- The packaging toolchain -- A few definitions -- Packaging -- The setup.py file -- The requirements.txt file -- The MANIFEST.in file -- Versioning -- Releasing -- Distributing -- Running all microservices -- Process management -- Summary -- Chapter 10: Containerized Services -- What is Docker? …”
    Libro electrónico
  6. 606
    Publicado 2015
    Tabla de Contenidos: “…Get Smart ; Take the Online Privacy Test; Eight Privacy Tips to Use Right Now; Targets and Nontargets; Losing Your Privacy; Ways You Can Lose Your Privacy; Protect Yourself Right Now ; Tape Over Your Webcam; Lock Your Phone, Computer, and Tablet; Do a Privacy Check-Up; Don't Email Your ID; Use a Password Manager and Install an Antitheft App; Be the Firewall; 2. But It's Just My Phone Number ; You Control What You Share ; Private Spaces and Activities; Lock Down Your Personally Identifying Information; Red Alert List; Yellow Alert List; Green List…”
    Libro electrónico
  7. 607
    Tabla de Contenidos: “…""The site.pp File""""Firewall Configuration""; ""Starting the Puppet Master""; ""Connecting Our First Agent""; ""Completing the Connection""; ""Creating Our First Configuration Item""; ""Adding a Node Definition""; ""Creating Our First Module""; ""Module Structure""; ""The init.pp file""; ""Applying Our First Configuration""; ""Summary""; ""Resources""; ""Chapter 2: Building Hosts with Puppet""; ""Getting Started""; ""Installing Puppet""; ""Integrating and Bootstrapping Puppet with Kickstart""; ""Configuring Nodes""; ""Working with Similar Hosts""; ""Using External Sources""…”
    Libro electrónico
  8. 608
    por Thakker, Tushar. author
    Publicado 2015
    Tabla de Contenidos: “…Planning an Installation TopologyDeciding the Product Offerings To Be Provisioned; Deciding the Installation Topology; Memory Sizing for the Servers; Recommended Memory Requirement for DB Instances; Recommended Memory for Identity Management Nodes; Recommended Memory for Fusion Applications Nodes; Calculating Memory Requirements for an Installation; Planning Network and Storage; Planning Internal and External Firewall; Planning Load-Balancer or Reverse Proxy; Understanding SSL Certificates Requirements; DMZ Tier Requirements; Web Proxy Requirements; Recommended Storage Space; Summary…”
    Libro electrónico
  9. 609
    Publicado 2017
    Tabla de Contenidos: “…-- Pivoting -- The Attack -- The Hard Disk Firewall Fail -- Metasploit Demonstration -- Under the Hood -- The Benefits of Admin -- Typical Subnet Cloning -- Recovering Passwords -- Making a Shopping List -- Summary -- Exercises -- Chapter 5: Guns and Ammo -- Background and Mission Briefing -- Payload Delivery Part V: Simulating a Ransomware Attack -- What Is Ransomware? …”
    Libro electrónico
  10. 610
    por Solutions, Online Training
    Publicado 2004
    Tabla de Contenidos: “…Shutting Down a Windows XP Domain-Connected ComputerShutting Down a Windows XP Workgroup-Connected Computer; Chapter 2 Working Efficiently in Windows XP; Getting to Know the Windows Desktop; Working with the Start Menu; Using the Taskbar; Creating Shortcuts; Rearranging Your Desktop; Cleaning Up Your Desktop; Chapter 3 Managing Computer Security; Changing Your Computer's Name; Working with User Accounts in a Domain; Working with User Accounts in a Workgroup; Switching Quickly Among Users; Analyzing Your Computer's Security; Configuring Internet Security Zones; Configuring Windows Firewall…”
    Libro electrónico
  11. 611
    por Ballew, Joli
    Publicado 2010
    Tabla de Contenidos: “…; Configure Your Windows Vista-Based PC; Configure Windows Firewall; Configure Windows Defender; Chapter Summary; Part II: Setting Up a Network…”
    Libro electrónico
  12. 612
    por Pyles, James
    Publicado 2007
    “…Microsoft Windows SharePoint Services technology in Office 2007 is an integrated set of services designed to connect people, information, processes, and systems both within and beyond the organizational firewall. SharePoint 2007: The Definitive Guide provides a detailed discussion of all Sharepoint features, application…”
    Libro electrónico
  13. 613
    por Gough, Michael
    Publicado 2006
    Tabla de Contenidos: “…Video-Call-Capable Cell PhonesProviders of Gateways for Cell-Phone-to-PC Video Calls; Summary; Appendix A: Firewall Port Information; Appendix B: Video Call Software Solutions; Appendix C: Software Add-ons for Skype; Expanding Skype's Capabilities; Voice Mail; Recording Skype Calls; Integrating with Outlook; SMS Text Messaging; Forwarding Your Skype Calls; SkypeCasting; Skype Web Toolbars; Other Plug-ins; Index…”
    Libro electrónico
  14. 614
    por Chak, Dan
    Publicado 2009
    Tabla de Contenidos: “…The Big Picture; Growing Slowly; Understanding All the Pieces; Application Layer; Web-services layer; Caching Layer; Messaging System; Web Server; Firewall; 2. Organizing with Plugins; Writing Your Own Plugins; Core plugin template; Testing; Using a core plugin; Custom Extensions; Extension plugin template; Using a custom extension; Testing; Deployment…”
    Libro electrónico
  15. 615
    por Carter, Gerald
    Publicado 2007
    Tabla de Contenidos: “…Downloading the Source DistributionRead the Documentation; Configuring Samba; Kerberos and LDAP; Unicode and the iconv Library; Compiling and Installing Samba; Upgrading Your Installation; Reconfiguring Samba; Setting Search Paths; Enabling the Samba Web Administration Tool (SWAT); A Basic Samba Configuration File; Encrypted Passwords; Using SWAT to Create an smb.conf File; Testing the Configuration File; Firewall Configuration; Starting the Samba Daemons; Starting the Daemons Manually; Automatic Startup; BSD Unix; System V Unix and most Linux distributions; Mac OS X…”
    Libro electrónico
  16. 616
    por Learning, Solid Quality
    Publicado 2009
    Tabla de Contenidos: “…Reviewing Microsoft SQL Server 2005 Management Tools; Using SQL Server Books Online; Using SQL Server Configuration Manager; Using the SQL Server 2005 Network Configuration Node; Dynamic ports; Windows Firewall; What is the best configuration?; Using the SQL Native Client Configuration Node; Aliases; Using SQL Server Surface Area Configuration; Using Surface Area Configuration For Features; Sac Utility…”
    Libro electrónico
  17. 617
    por Negus, Chris, 1957-
    Publicado 2008
    Tabla de Contenidos: “…Chapter 13: Doing Remote System Administration Doing Remote Login and Tunneling with SSH; Using screen: A Rich Remote Shell; Using a Remote Windows Desktop; Using Remote BSD Desktop and Applications; Sharing Desktops Using VNC; Summary; Chapter 14: Locking Down Security; Working with Users and Groups; Checking on Users; Securing Network Services; Configuring the Built-In Firewall; Working with System Logs; Using Advanced Security Features; Summary; Appendix A: Using vi or Vim Editors; Starting and Quitting the vi Editor; Moving Around in vi; Changing and Deleting Text in vi…”
    Libro electrónico
  18. 618
    por Stewart, James Michael
    Publicado 2004
    “…Fast Pass coverage includes: General security concepts.Assessing risk.Securing communications.Implementing wireless security features.Configuring a firewall.Detecting intrusions.Securing your organization's infrastructure.Understanding the basics of cryptography.Managing security keys and certificates.Ensuring operational and organizational security.Recovering from disasters.A CD-ROM so you can practice, practice, practice.Concise, objective-focused cove…”
    Libro electrónico
  19. 619
    por Pogue, Chris
    Publicado 2008
    Tabla de Contenidos: “…Install ClamAVUpdating Virus Database with Freshclam; Scanning the Target Directory; Download Panda Antivirus; Install Panda Antivirus; Scanning the Target Directory; Web References; Appendix A: Implementing Cybercrime Detection Techniques on Windows and *nix by Michael Cross; Introduction; Security Auditing and Log Files; Auditing for Windows Platforms; Auditing for UNIX and Linux Platforms; Firewall Logs, Reports, Alarms, and Alerts; Commercial Intrusion Detection Systems; Characterizing Intrusion Detection Systems; Commercial IDS Players; IP Spoofing and Other Antidetection Tactics…”
    Libro electrónico
  20. 620
    por Prowell, Stacy J.
    Publicado 2010
    Tabla de Contenidos: “…Protocol Tunneling; How Protocol Tunneling Works; The Great Firewall; Setting Up a Channel with SSH; Corkscrew and SSH over HTTPS; SSH over HTTP; Automation; Dangers of Protocol Tunneling; Defending against Protocol Tunneling; Preventing Protocol Tunneling; Detecting Protocol Tunneling; The Future of Protocol Tunneling; Summary…”
    Libro electrónico