Mostrando 621 - 640 Resultados de 1,060 Para Buscar 'Firefall~', tiempo de consulta: 1.52s Limitar resultados
  1. 621
    Publicado 2010
    Tabla de Contenidos: “…Windows DefenderWindows Firewall; Summary; Chapter 2. Installing and Upgrading to Windows 7; Planning and Preparation; Select the Windows 7 Edition; System Compatibility; Windows 7 Upgrade Advisor; Back Up Current System; Windows Easy Transfer; Windows Vista File Backup; Windows Vista Complete Backup; Manual Backup of User Data; Other Tools; Determine Deployment Scenario; New System Scenario; Upgrade System Scenario; System Refresh Scenario; System Replace Scenario; Select Install Type; Preinstalled; Clean Install; In-place Upgrade; Migration; Virtualization and Dual Booting; Obtain Windows 7…”
    Libro electrónico
  2. 622
    por Bathurst, Rob
    Publicado 2013
    Tabla de Contenidos: “…A Recent Example-FlashbackHow it Works; Understanding Apple's Security Response; Apple iOS Specific; Keeping it Under Control; Advanced Persistent Threats; Apple Script; Conclusion; 6 Defensive Applications; Introduction; Secure Configurations; Passwords, Passphrases, and Multi-Factor Authentication; Account Access Restriction; FileVault; Firewall Configuration; Network Services; Kernel Extension Removal; Examining Commercial Tools; PrivacyScan by SecureMac; MacScan by SecureMac; Conclusion; 7 Offensive Tactics; Introduction; The Exploits; mDNSResponder UPnP Location Exploit…”
    Libro electrónico
  3. 623
    por Bartz, Robert J., 1959-
    Publicado 2012
    Tabla de Contenidos: “…Built-in RADIUS ServicesSite Survey Tools; Radio Frequency Spectrum Management; Firewall; Quality of Service; Redundancy; Wireless Intrusion Prevention System; Direct and Distributed AP Connectivity; Layer 2 and Layer 3 AP Connectivity; Distributed and Centralized Data Forwarding; Power over Ethernet; Summary; Exam Essentials; Review Questions; Chapter 4 Wireless LAN Client Devices; Radio Hardware Used with Wireless LAN Technology; PCMCIA; Features of PCMCIA Cards; Installation and Configuration of PCMCIA Cards; ExpressCard; Features of the ExpressCard…”
    Libro electrónico
  4. 624
    por Moskowitz, Jeremy
    Publicado 2010
    Tabla de Contenidos: “…The Two Default Group Policy ObjectsThe Strange Life of Password Policy; Inside Auditing With and Without Group Policy; Restricted Groups; Restrict Software: Software Restriction Policy and AppLocker; Controlling User Account Control (UAC) with Group Policy; Wireless (802.3) and Wired Network (802.11) Policies; Configuring Windows Firewall with Group Policy; Final Thoughts; Chapter 9: Profiles: Local, Roaming, and Mandatory; What Is a User Profile?…”
    Libro electrónico
  5. 625
    Publicado 2014
    Tabla de Contenidos: “…Preparation for a Team Foundation Server EnvironmentUnderstanding the Architecture and Scale-Out Options; Hardware Requirements; Virtualization; Planning for Software Prerequisites; Service Accounts; File Share Folders; SMTP Server; Firewall Concerns and Ports Used; Friendly DNS Names; Legacy Visual Studio Versions; Summary; Chapter 3 Installation and Configuration; What You'll Need; Team Foundation Server 2013; Team Foundation Server 2013 Installation Guide; SQL Server 2012; Operating System; SharePoint; Client Software; Service Packs and Other Updates; Installing Team Foundation Server…”
    Libro electrónico
  6. 626
    Publicado 2023
    Tabla de Contenidos: “…. -- Automating it -- Configuring Windows Firewall -- How to do it... -- Automating it…”
    Libro electrónico
  7. 627
    Publicado 2014
    Tabla de Contenidos: “…Trojanisches Pferd, Trojaner Rootkits; Drive-By-Infection; Schutz gegen Infektionen des Rechners; Antiviren-Programm; Firewall; Missbrauch durch Erstellen eines Accounts unter falschem Namen; Missbrauch ohne Erlangen der Zugangsdaten vom Account-Inhaber; Mail-Spoofing; Schwachstellen beim Authentisierungsnehmer; SQL-Injection; Cross-Site-Scripting (XSS); Schwachstellen in der IT-Infrastruktur; Unbefugte Weitergabe der Zugangsdaten; Rechtsscheinhaftung; Voraussetzungen einer Rechtsscheinhaftung; Rechtsscheintatbestand; Zurechenbarkeit; Veranlassungsprinzip…”
    Tesis
  8. 628
    por Ali, Syed. author
    Publicado 2015
    Tabla de Contenidos: “…""Hybrid Cloud""""Components of a Cloud""; ""Migrating to the Cloud""; ""DevOps""; ""Security in the Cloud""; ""Google Cloud Platform""; ""Projects""; ""Permissions""; ""Google Compute Engine""; ""Virtual Machines""; ""Networks""; ""Regions and Zones""; ""Quotas""; ""Firewalls""; ""Images""; ""Network Load Balancing""; ""Maintenance""; ""Google Cloud Storage""; ""Google App Engine""; ""Deployment Tools""; ""Google Cloud SDK""; ""GCP Support""; ""Change Management""; ""Conclusion""; ""Chapter 3: Virtualization with KVM""; ""What Is Virtualization?""…”
    Libro electrónico
  9. 629
    por Akhgar, Babak
    Publicado 2014
    Tabla de Contenidos: “…Intrusion Detection Systems, Network Traffic and Firewall LogsInterviews with Suspects; Analysis of Suspects Media; Doxing; Collecting Evidence; Seizing Equipment; Search for Written Passwords; Forensic Acquisition; Ram; Image; Forensic Analysis; Anti-forensics; RAM Analysis; Data Carving and Magic Values; Media Storage Forensics; The Structure and Format of a Hard Drive; Partitions; Master Boot Record; The VBR and BIOS parameter block; File System; File Table; Searching for Evidence; Keyword and Phrases Search; Recovering Deleted Information; Recovering Deleted Files and Folders…”
    Libro electrónico
  10. 630
    Publicado 2013
    Tabla de Contenidos:
    Libro electrónico
  11. 631
    Publicado 2023
    Tabla de Contenidos: “…Lines of Code (Size) -- Number of Functions (Scope) -- Nature of the Service -- Development -- Deployment -- Deployment Automation -- Container-Based Deployments -- Governance -- A Reference Architecture for Enterprise Software System with MSA -- Components of Enterprise Software Systems -- Databases -- Core Business Applications -- Integration Software -- API Software -- Accessibility Software -- Proxy Servers -- Load Balancers -- Ingress Controllers -- Content Delivery Network (CDN) -- Firewalls -- Security Software -- User Management -- Access Management -- Authentication -- Authorization…”
    Libro electrónico
  12. 632
    Publicado 2021
    Tabla de Contenidos: “…-- Physical security -- Antivirus solutions -- Windows Defender Firewall -- Application control -- URL filtering -- Spam filtering -- Client-facing systems -- Backups -- Users -- Securing the data -- Leveraging encryption -- Configuring BitLocker -- Summary -- Chapter 7: Hardening a Unix Server -- Technical requirements -- Securing Unix services -- Defining the purpose of the server -- Secure startup configuration -- Managing services -- Applying secure file permissions -- Understanding ownership and permissions -- Default permissions -- Permissions in directories (folders) -- Changing default permissions with umask -- Permissions hierarchy -- Comparing directory permissions -- Changing permissions and ownership of a single file -- Useful commands to search for unwanted permissions -- Enhancing the protection of the server by improving your access controls -- Viewing ACLs -- Managing ACLs -- Default ACL on directories -- Removing ACLs -- Enhanced access controls -- Configuring host-based firewalls -- Understanding iptables -- Configuring iptables -- SSH brute-force protection with iptables -- Protecting from port scanning with iptables -- Advanced management of logs -- Leveraging the logs -- Summary -- Further reading -- Chapter 8: Enhancing Your Network Defensive Skills -- Technical requirements -- Using the master tool of network mapping - Nmap -- Phases of a cyber attack -- Nmap -- Nmap scripts…”
    Libro electrónico
  13. 633
    Publicado 2017
    Tabla de Contenidos: “…Share Permissions -- Configuring OneDrive -- Summary -- Video Resources -- Exam Essentials -- Review Questions -- Chapter 7 Windows 10 Networking -- Understanding the Basics -- Peer-to-Peer Networks -- Onsite Active Directory Networks -- Cloud-Based Azure Active Directory -- Other Microsoft Networking Terms and Roles -- Configuring NIC Devices -- Configuring a Network Adapter -- Troubleshooting a Network Adapter -- Configuring Wireless NIC Devices -- Configuring Wi-Fi Direct -- Understanding TCP/IP -- Benefits and Features of TCP/IP -- Basics of IP Addressing and Configuration -- Using IPv6 Addresses -- Configuring TCP/IP on Windows 10 -- Testing Your IP Configuration -- Configuring Windows 10 on a Network -- Configuring Windows Firewall -- Understanding the Windows Firewall Basics -- Windows Firewall with Advanced Security -- Summary -- Video Resources -- Exam Essentials -- Review Questions -- Chapter 8 Installing Applications -- Understanding Deployment Options -- Understanding System Center -- Using the Windows 10 Application Deployment Tool -- Deploying Software with the Windows Assessment and Deployment Kit (ADK) -- Understanding GPO Deployments -- Installing Applications -- Using the Upgrade Analytics Tool -- Windows Features -- Configuring Startup Options -- Using Hyper-V for Desktop Applications -- Configuring User Experience Virtualization (UE-V) -- Understanding AppLocker -- Understanding Azure -- Using Azure RemoteApp -- Understanding App-V -- Supporting the Windows Store…”
    Libro electrónico
  14. 634
    Publicado 2019
    Tabla de Contenidos: “…The First Salesperson to Send 10,000 Videos -- A Sales Team That's Sent 10,000 Videos -- Personal Touch, Faster Conversion, and More Referrals -- It's Not About the Video -- Chapter 6 Ten Times to Use Video Instead of Plain, Typed-Out Text -- Top 10 Times Video Says It Better -- When Not to Send Video -- Part 3 How to Record and Send Videos -- Chapter 7 Sending Video in Emails, Text Messages, and Social Messages -- Three Ways to Send Video in Email -- Screen Recording -- Sending Videos by Text Messages -- Sending Videos in Social Messages -- Delivery, Filters, and Firewalls -- The Video Viewing Experience -- Face to Face in Any Channel -- Chapter 8 Why You're Not Sending Video and How to Get Comfortable on Camera -- Why We Stop "Doing Video" Before We Even Start -- You Look (and Sound) Great -- You Know What to Say -- Your Process Results From Execution -- Seven Tips for Better Videos -- You're Not Alone -- Chapter 9 The Salesperson's Guide to Video Cameras -- Video Camera Tips -- Video Setup Tips -- The Right Tool for the Right Job -- Part 4 Improving Video Results -- Chapter 10 How to Get More Opens, Plays, and Replies -- Top Reasons for Video Email Underperformance -- How to Get More Email Opens -- How to Get More Video Plays -- How to Keep People Engaged in Your Videos -- How to Increase Your Reply Rate -- Tips for Prospecting with Video -- Chapter 11 So, You Sent a Video . . . …”
    Libro electrónico
  15. 635
    Publicado 2007
    Tabla de Contenidos: “…8 Next Generation Network ManagementIntroduction; NGN Features; NGN Architecture; Requirements for Management of NGN; NGN Management Architecture; IP Multimedia Subsystem; Service Oriented Architecture; NGN Management and TMN; Additional Remarks; 9 Customer Premises Networks; Introduction to Local Area Networks; Transporting IP; Network Address Translation and Firewalls; Modems; Conclusions; Part Four Cellular Telephone Networks; 10 Evolution of Cellular Systems; Introduction; Generations of Cellular Systems; Evolution of Cellular Markets; Cellular Systems Multiple Access Techniques…”
    Libro electrónico
  16. 636
    por Photopoulos, Constantine
    Publicado 2008
    Tabla de Contenidos: “…Baseline ApproachConstraints; Laptops; Portable Storage Devices; Transportable Media; E-mail; Internal Controls; External Controls; Technical Safeguards; Firewalls; Intrusion Detection and Prevention Systems; Penetration Testing and Vulnerability Scanning; Data Transmission; Remote Access; External System Connections; Antivirus and Patches; Isolation and Minimization; Access Control; Access Provisioning; Authentication; Entitlement Reviews; Privileged Accounts; Account Ownership; Account Assignment and Usage; Managing Account Passwords; Activity Logging and Monitoring; Policies and Procedures…”
    Libro electrónico
  17. 637
    Publicado 2014
    “…Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. …”
    Libro electrónico
  18. 638
    por Canavan, Tom
    Publicado 2011
    Tabla de Contenidos: “…Dumpster Diving and Social EngineeringBreach Response; Terrorists; Access to Equipment; Water Detection; Fire Suppression; Emergency Procedures; Disaster Recovery and Business Continuity; Cyber Security; Firewalls and Intrusion Detection; Log File Auditing; Spam, Virus Scanning, and Prevention; Patching for Weaknesses; VoIP; Web Servers; Environmental Support; Network Redundancy; Electrical Service; Technical Support; Emergency Planning for the Host; Location of the Host's Data Center; Processes; Backups; Offsite Procedures; Accepting Credit Cards on Your Website; Understanding PCI…”
    Libro electrónico
  19. 639
    Publicado 2015
    Tabla de Contenidos: “…Defining a simple module to configure timeDefining nodes and node grouping; Deploying modules to single nodes and node groups; Chapter 8: Yum and Repositories; Introduction; Managing yum history; Creating a copy of an RHN repository; Configuring additional repositories; Setting up yum to automatically update; Configuring logrotate for yum; Recovering from a corrupted RPM database; Chapter 9: Securing RHEL 7; Introduction; Installing and configuring IPA; Securing the system login; Configuring privilege escalation with sudo; Secure the network with firewalld; Using kdump and SysRq; Using ABRT…”
    Libro electrónico
  20. 640
    Publicado 2017
    Tabla de Contenidos: “…. -- Using scripts -- See also -- Bypassing firewalls with Nmap -- TCP ACK scan -- How to do it... -- How it works... -- TCP Window scan -- How to do it... -- Idle scan -- How to do it... -- How it works... -- Searching for open directories -- The dirb tool -- How to do it... -- There's more... -- See also -- Performing deep magic with DMitry -- How to do it... -- Hunting for SSL flaws -- How to do it... -- See also -- Exploring connections with intrace -- How to do it... -- Digging deep with theharvester -- How to do it... -- How it works…”
    Libro electrónico