Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
621Microsoft Windows 7 administrator's reference upgrading, deploying, managing, and securing Windows 7Publicado 2010Tabla de Contenidos: “…Windows DefenderWindows Firewall; Summary; Chapter 2. Installing and Upgrading to Windows 7; Planning and Preparation; Select the Windows 7 Edition; System Compatibility; Windows 7 Upgrade Advisor; Back Up Current System; Windows Easy Transfer; Windows Vista File Backup; Windows Vista Complete Backup; Manual Backup of User Data; Other Tools; Determine Deployment Scenario; New System Scenario; Upgrade System Scenario; System Refresh Scenario; System Replace Scenario; Select Install Type; Preinstalled; Clean Install; In-place Upgrade; Migration; Virtualization and Dual Booting; Obtain Windows 7…”
Libro electrónico -
622por Bathurst, RobTabla de Contenidos: “…A Recent Example-FlashbackHow it Works; Understanding Apple's Security Response; Apple iOS Specific; Keeping it Under Control; Advanced Persistent Threats; Apple Script; Conclusion; 6 Defensive Applications; Introduction; Secure Configurations; Passwords, Passphrases, and Multi-Factor Authentication; Account Access Restriction; FileVault; Firewall Configuration; Network Services; Kernel Extension Removal; Examining Commercial Tools; PrivacyScan by SecureMac; MacScan by SecureMac; Conclusion; 7 Offensive Tactics; Introduction; The Exploits; mDNSResponder UPnP Location Exploit…”
Publicado 2013
Libro electrónico -
623por Bartz, Robert J., 1959-Tabla de Contenidos: “…Built-in RADIUS ServicesSite Survey Tools; Radio Frequency Spectrum Management; Firewall; Quality of Service; Redundancy; Wireless Intrusion Prevention System; Direct and Distributed AP Connectivity; Layer 2 and Layer 3 AP Connectivity; Distributed and Centralized Data Forwarding; Power over Ethernet; Summary; Exam Essentials; Review Questions; Chapter 4 Wireless LAN Client Devices; Radio Hardware Used with Wireless LAN Technology; PCMCIA; Features of PCMCIA Cards; Installation and Configuration of PCMCIA Cards; ExpressCard; Features of the ExpressCard…”
Publicado 2012
Libro electrónico -
624por Moskowitz, JeremyTabla de Contenidos: “…The Two Default Group Policy ObjectsThe Strange Life of Password Policy; Inside Auditing With and Without Group Policy; Restricted Groups; Restrict Software: Software Restriction Policy and AppLocker; Controlling User Account Control (UAC) with Group Policy; Wireless (802.3) and Wired Network (802.11) Policies; Configuring Windows Firewall with Group Policy; Final Thoughts; Chapter 9: Profiles: Local, Roaming, and Mandatory; What Is a User Profile?…”
Publicado 2010
Libro electrónico -
625Publicado 2014Tabla de Contenidos: “…Preparation for a Team Foundation Server EnvironmentUnderstanding the Architecture and Scale-Out Options; Hardware Requirements; Virtualization; Planning for Software Prerequisites; Service Accounts; File Share Folders; SMTP Server; Firewall Concerns and Ports Used; Friendly DNS Names; Legacy Visual Studio Versions; Summary; Chapter 3 Installation and Configuration; What You'll Need; Team Foundation Server 2013; Team Foundation Server 2013 Installation Guide; SQL Server 2012; Operating System; SharePoint; Client Software; Service Packs and Other Updates; Installing Team Foundation Server…”
Libro electrónico -
626Publicado 2023Tabla de Contenidos: “…. -- Automating it -- Configuring Windows Firewall -- How to do it... -- Automating it…”
Libro electrónico -
627Publicado 2014Tabla de Contenidos: “…Trojanisches Pferd, Trojaner Rootkits; Drive-By-Infection; Schutz gegen Infektionen des Rechners; Antiviren-Programm; Firewall; Missbrauch durch Erstellen eines Accounts unter falschem Namen; Missbrauch ohne Erlangen der Zugangsdaten vom Account-Inhaber; Mail-Spoofing; Schwachstellen beim Authentisierungsnehmer; SQL-Injection; Cross-Site-Scripting (XSS); Schwachstellen in der IT-Infrastruktur; Unbefugte Weitergabe der Zugangsdaten; Rechtsscheinhaftung; Voraussetzungen einer Rechtsscheinhaftung; Rechtsscheintatbestand; Zurechenbarkeit; Veranlassungsprinzip…”
Tesis -
628por Ali, Syed. authorTabla de Contenidos: “…""Hybrid Cloud""""Components of a Cloud""; ""Migrating to the Cloud""; ""DevOps""; ""Security in the Cloud""; ""Google Cloud Platform""; ""Projects""; ""Permissions""; ""Google Compute Engine""; ""Virtual Machines""; ""Networks""; ""Regions and Zones""; ""Quotas""; ""Firewalls""; ""Images""; ""Network Load Balancing""; ""Maintenance""; ""Google Cloud Storage""; ""Google App Engine""; ""Deployment Tools""; ""Google Cloud SDK""; ""GCP Support""; ""Change Management""; ""Conclusion""; ""Chapter 3: Virtualization with KVM""; ""What Is Virtualization?""…”
Publicado 2015
Libro electrónico -
629por Akhgar, BabakTabla de Contenidos: “…Intrusion Detection Systems, Network Traffic and Firewall LogsInterviews with Suspects; Analysis of Suspects Media; Doxing; Collecting Evidence; Seizing Equipment; Search for Written Passwords; Forensic Acquisition; Ram; Image; Forensic Analysis; Anti-forensics; RAM Analysis; Data Carving and Magic Values; Media Storage Forensics; The Structure and Format of a Hard Drive; Partitions; Master Boot Record; The VBR and BIOS parameter block; File System; File Table; Searching for Evidence; Keyword and Phrases Search; Recovering Deleted Information; Recovering Deleted Files and Folders…”
Publicado 2014
Libro electrónico -
630
-
631Publicado 2023Tabla de Contenidos: “…Lines of Code (Size) -- Number of Functions (Scope) -- Nature of the Service -- Development -- Deployment -- Deployment Automation -- Container-Based Deployments -- Governance -- A Reference Architecture for Enterprise Software System with MSA -- Components of Enterprise Software Systems -- Databases -- Core Business Applications -- Integration Software -- API Software -- Accessibility Software -- Proxy Servers -- Load Balancers -- Ingress Controllers -- Content Delivery Network (CDN) -- Firewalls -- Security Software -- User Management -- Access Management -- Authentication -- Authorization…”
Libro electrónico -
632Publicado 2021Tabla de Contenidos: “…-- Physical security -- Antivirus solutions -- Windows Defender Firewall -- Application control -- URL filtering -- Spam filtering -- Client-facing systems -- Backups -- Users -- Securing the data -- Leveraging encryption -- Configuring BitLocker -- Summary -- Chapter 7: Hardening a Unix Server -- Technical requirements -- Securing Unix services -- Defining the purpose of the server -- Secure startup configuration -- Managing services -- Applying secure file permissions -- Understanding ownership and permissions -- Default permissions -- Permissions in directories (folders) -- Changing default permissions with umask -- Permissions hierarchy -- Comparing directory permissions -- Changing permissions and ownership of a single file -- Useful commands to search for unwanted permissions -- Enhancing the protection of the server by improving your access controls -- Viewing ACLs -- Managing ACLs -- Default ACL on directories -- Removing ACLs -- Enhanced access controls -- Configuring host-based firewalls -- Understanding iptables -- Configuring iptables -- SSH brute-force protection with iptables -- Protecting from port scanning with iptables -- Advanced management of logs -- Leveraging the logs -- Summary -- Further reading -- Chapter 8: Enhancing Your Network Defensive Skills -- Technical requirements -- Using the master tool of network mapping - Nmap -- Phases of a cyber attack -- Nmap -- Nmap scripts…”
Libro electrónico -
633Publicado 2017Tabla de Contenidos: “…Share Permissions -- Configuring OneDrive -- Summary -- Video Resources -- Exam Essentials -- Review Questions -- Chapter 7 Windows 10 Networking -- Understanding the Basics -- Peer-to-Peer Networks -- Onsite Active Directory Networks -- Cloud-Based Azure Active Directory -- Other Microsoft Networking Terms and Roles -- Configuring NIC Devices -- Configuring a Network Adapter -- Troubleshooting a Network Adapter -- Configuring Wireless NIC Devices -- Configuring Wi-Fi Direct -- Understanding TCP/IP -- Benefits and Features of TCP/IP -- Basics of IP Addressing and Configuration -- Using IPv6 Addresses -- Configuring TCP/IP on Windows 10 -- Testing Your IP Configuration -- Configuring Windows 10 on a Network -- Configuring Windows Firewall -- Understanding the Windows Firewall Basics -- Windows Firewall with Advanced Security -- Summary -- Video Resources -- Exam Essentials -- Review Questions -- Chapter 8 Installing Applications -- Understanding Deployment Options -- Understanding System Center -- Using the Windows 10 Application Deployment Tool -- Deploying Software with the Windows Assessment and Deployment Kit (ADK) -- Understanding GPO Deployments -- Installing Applications -- Using the Upgrade Analytics Tool -- Windows Features -- Configuring Startup Options -- Using Hyper-V for Desktop Applications -- Configuring User Experience Virtualization (UE-V) -- Understanding AppLocker -- Understanding Azure -- Using Azure RemoteApp -- Understanding App-V -- Supporting the Windows Store…”
Libro electrónico -
634Publicado 2019Tabla de Contenidos: “…The First Salesperson to Send 10,000 Videos -- A Sales Team That's Sent 10,000 Videos -- Personal Touch, Faster Conversion, and More Referrals -- It's Not About the Video -- Chapter 6 Ten Times to Use Video Instead of Plain, Typed-Out Text -- Top 10 Times Video Says It Better -- When Not to Send Video -- Part 3 How to Record and Send Videos -- Chapter 7 Sending Video in Emails, Text Messages, and Social Messages -- Three Ways to Send Video in Email -- Screen Recording -- Sending Videos by Text Messages -- Sending Videos in Social Messages -- Delivery, Filters, and Firewalls -- The Video Viewing Experience -- Face to Face in Any Channel -- Chapter 8 Why You're Not Sending Video and How to Get Comfortable on Camera -- Why We Stop "Doing Video" Before We Even Start -- You Look (and Sound) Great -- You Know What to Say -- Your Process Results From Execution -- Seven Tips for Better Videos -- You're Not Alone -- Chapter 9 The Salesperson's Guide to Video Cameras -- Video Camera Tips -- Video Setup Tips -- The Right Tool for the Right Job -- Part 4 Improving Video Results -- Chapter 10 How to Get More Opens, Plays, and Replies -- Top Reasons for Video Email Underperformance -- How to Get More Email Opens -- How to Get More Video Plays -- How to Keep People Engaged in Your Videos -- How to Increase Your Reply Rate -- Tips for Prospecting with Video -- Chapter 11 So, You Sent a Video . . . …”
Libro electrónico -
635Publicado 2007Tabla de Contenidos: “…8 Next Generation Network ManagementIntroduction; NGN Features; NGN Architecture; Requirements for Management of NGN; NGN Management Architecture; IP Multimedia Subsystem; Service Oriented Architecture; NGN Management and TMN; Additional Remarks; 9 Customer Premises Networks; Introduction to Local Area Networks; Transporting IP; Network Address Translation and Firewalls; Modems; Conclusions; Part Four Cellular Telephone Networks; 10 Evolution of Cellular Systems; Introduction; Generations of Cellular Systems; Evolution of Cellular Markets; Cellular Systems Multiple Access Techniques…”
Libro electrónico -
636por Photopoulos, ConstantineTabla de Contenidos: “…Baseline ApproachConstraints; Laptops; Portable Storage Devices; Transportable Media; E-mail; Internal Controls; External Controls; Technical Safeguards; Firewalls; Intrusion Detection and Prevention Systems; Penetration Testing and Vulnerability Scanning; Data Transmission; Remote Access; External System Connections; Antivirus and Patches; Isolation and Minimization; Access Control; Access Provisioning; Authentication; Entitlement Reviews; Privileged Accounts; Account Ownership; Account Assignment and Usage; Managing Account Passwords; Activity Logging and Monitoring; Policies and Procedures…”
Publicado 2008
Libro electrónico -
637Publicado 2014“…Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. …”
Libro electrónico -
638por Canavan, TomTabla de Contenidos: “…Dumpster Diving and Social EngineeringBreach Response; Terrorists; Access to Equipment; Water Detection; Fire Suppression; Emergency Procedures; Disaster Recovery and Business Continuity; Cyber Security; Firewalls and Intrusion Detection; Log File Auditing; Spam, Virus Scanning, and Prevention; Patching for Weaknesses; VoIP; Web Servers; Environmental Support; Network Redundancy; Electrical Service; Technical Support; Emergency Planning for the Host; Location of the Host's Data Center; Processes; Backups; Offsite Procedures; Accepting Credit Cards on Your Website; Understanding PCI…”
Publicado 2011
Libro electrónico -
639Publicado 2015Tabla de Contenidos: “…Defining a simple module to configure timeDefining nodes and node grouping; Deploying modules to single nodes and node groups; Chapter 8: Yum and Repositories; Introduction; Managing yum history; Creating a copy of an RHN repository; Configuring additional repositories; Setting up yum to automatically update; Configuring logrotate for yum; Recovering from a corrupted RPM database; Chapter 9: Securing RHEL 7; Introduction; Installing and configuring IPA; Securing the system login; Configuring privilege escalation with sudo; Secure the network with firewalld; Using kdump and SysRq; Using ABRT…”
Libro electrónico -
640Publicado 2017Tabla de Contenidos: “…. -- Using scripts -- See also -- Bypassing firewalls with Nmap -- TCP ACK scan -- How to do it... -- How it works... -- TCP Window scan -- How to do it... -- Idle scan -- How to do it... -- How it works... -- Searching for open directories -- The dirb tool -- How to do it... -- There's more... -- See also -- Performing deep magic with DMitry -- How to do it... -- Hunting for SSL flaws -- How to do it... -- See also -- Exploring connections with intrace -- How to do it... -- Digging deep with theharvester -- How to do it... -- How it works…”
Libro electrónico