Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
641por Meyers, Michael, 1961-Tabla de Contenidos: “…Administrative Access Control -- Malware -- Social Engineering -- Man in the Middle -- Denial of Service -- Physical Intrusion -- Attacks on Wireless Connections -- Securing User Accounts -- Authentication -- Passwords -- Controlling User Accounts -- Firewalls -- Hiding the IPs -- Port Filtering -- Packet Filtering -- MAC Filtering -- Personal Firewalls -- Network Zones -- Vulnerability Scanners -- Chapter Review -- Questions -- Answers -- Chapter 17 Virtualization -- Historical/Conceptual -- What is Virtualization? …”
Publicado 2012
Libro electrónico -
642Publicado 2009Tabla de Contenidos: “….; 5.2 Explain the purpose of network scanners; 5.3 Given a scenario, utilize the appropriate hardware tools; Review Questions; Answers to Review Questions; Chapter 6 - Network Security; 6.1 Explain the function of hardware and software security devices; 6.2 Explain common features of a firewall; 6.3 Explain the methods of network access security…”
Libro electrónico -
643Publicado 2016Tabla de Contenidos: “…Bridge configurationUsing NAT configuration; Summary; Chapter 7: Securing Proxmox VE; Security benefits of virtualization; Attack surface reduction; Isolation; Availability of prior states; Hardware abstraction; Segmentation; Encapsulation and portability; Physical security; Fine privilege control; PVE firewall features; Aggravated vulnerabilities; Denial of service attacks; VM escape and hyper jumping; Virtualization sprawl; At war with complexity; ; Taking action; Protecting the boot process; pagebreak //pagebreakLocking down the bootloader; Locking down BIOS/UEFI…”
Libro electrónico -
644Publicado 2016Tabla de Contenidos: “…Stateless Filters, Hierarchical Policing, and Tri-Color Marking; Firewall Filter and Policer Overview; Stateless Versus Stateful; Stateless Filter Components; Filters Versus Routing Policy; Filter Scaling; Filtering Differences for MPC Versus DPC; Filter Operation; Stateless Filter Processing; Policing; Rate Limiting: Shaping or Policing?…”
Libro electrónico -
645
-
646por Allen, RobbieTabla de Contenidos: “…Using the RegistryDiscussion; See Also; 2.17 Disabling the Windows Firewall AfterInstallation; Problem; Solution; Using a graphical user interface; Using Group Policy; Using a command-line interface; Discussion; 2.18 Keeping an Installation Process WormandVirus-Free; Problem; Solution; Discussion; See Also; Managing Hardware and Devices; 3.0 Introduction; 3.1 Adding Hardware; Problem; Solution; Using the BIOS; Using a graphical user interface; Using a command-line interface; Discussion; See Also; 3.2 Resolving Unknown Devices; Problem; Solution; Using a graphical user interface; Discussion…”
Publicado 2005
Libro electrónico -
647por Flickenger, RobTabla de Contenidos: “…Backing Up Your Boot SectorSee also:; Keeping Parts of Filesystems in sync with rsync; Listing: Balance-push.sh; Automated Snapshot-Style Incremental Backups with rsync; Extensions: Hourly, Daily, and Weekly Snapshots; Listing: make_snapshot.sh; Listing: Daily_snapshot_rotate.sh; Sample Output of ls -l /snapshot/home; See also:; Working with ISOs and CDR/CDRWs; See also:; Burning a CD Without Creating an ISO File; Networking; Creating a Firewall from the Command Line of any Server; See also:; Simple IP Masquerading; See also:; iptables Tips & Tricks; Advanced iptables Features; See also…”
Publicado 2003
Libro electrónico -
648por Davies, JosephTabla de Contenidos: “…IPv6 Has More Efficient ForwardingIPv6 Has Support for Security and Mobility; Testing for Understanding; Chapter 2: IPv6 Protocol for Windows Server 2008 and Windows Vista; Architecture of the IPv6 Protocol for Windows Server 2008 and Windows Vista; Features of the IPv6 Protocol for Windows Server 2008 and Windows Vista; Installed, Enabled, and Preferred by Default; Basic IPv6 Stack Support; IPv6 Stack Enhancements; GUI and Command-Line Configuration; Integrated IPsec Support; Windows Firewall Support; Temporary Addresses; Random Interface IDs; DNS Support…”
Publicado 2008
Libro electrónico -
649por Myer, TomTabla de Contenidos: “…Using Remote Desktop and Applications Sharing Your Desktop Using VNC; Summary; Chapter 14: Locking Down Security; Working with Users and Groups; Managing Users the GUI Way; Checking on Users; Configuring the Built-in Firewall; Working with System Logs; Summary; Appendix A: Using vi or Vim Editors; Starting and Quitting the vi Editor; Moving Around in vi; Changing and Deleting Text in vi; Using Miscellaneous Commands; Modifying Commands with Numbers; Using Ex Commands; Working in Visual Mode; Summary; Appendix B: Special Shell Characters and Variables; Using Special Shell Characters…”
Publicado 2009
Libro electrónico -
650por Handa, ArunTabla de Contenidos: “…2.9 Network Management2.10 Chapter Summary; Chapter 3: Basics of IP Networks; 3.1 IP from an IMS perspective; 3.2 Addressing; 3.3 IPv4/IPv6; 3.4 Routing; 3.5 Trusted Networks; 3.6 NAT/Firewall Traversal - Session Border Control; 3.7 Chapter Summary; Chapter 4: The IMS-related Protocols; 4.1 Transport Protocols; 4.2 Session Protocols; 4.3 AAA Protocol - Diameter; 4.4 Media Protocols; 4.5 IP Access and Addressing; 4.6 Security; 4.7 QoS; 4.8 Application; 4.9 Chapter Summary; Chapter 5: Principles of Operation; 5.1 Subscriber Identities and Addressing; 5.2 Subscription in IMS…”
Publicado 2009
Libro electrónico -
651por Ray, Thomas R. 1960-Tabla de Contenidos: “…6.9 Measuring and adjusting the FM HD Radio hybrid signal for compliance6.10 Radio Data Systems; 6.11 Multicast channels: enter the importer; 6.12 Firewall configuration; 6.13 PAD; 6.14 System maintenance; 6.15 Moseley Starlink Note; 6.16 FM Conclusion; Appendix: Real-life Experiences with HD Radio; A.1 The beginning; A.2 Signal coverage; A.3 Nighttime AM HD Radio testing; A.4 Nighttime hybrid AM HD Radio operation; A.5 Practical considerations for the implementation of AM IBOC; A.6 Real-world AM IBOC converage using a consumer IBOC radio; A.7 Installation of IBOC on AM…”
Publicado 2008
Libro electrónico -
652por Thurrott, PaulTabla de Contenidos: “…Part III: Security and NetworkingChapter 7: Windows 7 Security Features; Security and Windows 7; Securing Windows 7 in Just Two Steps; Action Center; Windows Defender; Windows Firewall; Windows Update; Internet Explorer 8 Security Features; Summary; Chapter 8: Users, Accounts, and UAC; Understanding User Accounts; User Account Control; Parental Controls; Summary; Chapter 9: Networking and HomeGroup Sharing; Windows XP with SP2: A First Look at Today's Networking Infrastructure; What's New in Windows 7 Networking; Network Locations; Network and Sharing Center; Using Network Explorer…”
Publicado 2009
Libro electrónico -
653Publicado 2015Tabla de Contenidos: “…; Early ciphers used; Digital signatures; Leads to a public key infrastructure; X.509 certificates; Digital certificate servers; Installing certificates on the devices; Summary; Chapter 5 - Authentication; Authentication defined; Details of 802.1x authentication; Use a VoIP-enabled firewall; Use 802.1X authentication for IP phones; Attacking VoIP Authentication; Encrypt the traffic; Authentication on wireless networks; Summary…”
Libro electrónico -
654Publicado 2012Tabla de Contenidos: “…VCP5 VMware® Certified Professional on vSphereTM 5 Study Guide; Contents; Chapter 1 What's New in vSphere 5; ESX Retirement; VCB Retirement; VMI Paravirtualization Retirement; VMware GUI Toolbox Retirement; Windows 2000 Guest OS Customization Support; Newly Created VMCI Sockets Unsupported; Requirement of LAHF and SAHF CPU Instruction Sets; Intel SMT-Related CPU Scheduler Enhancements; Notable Configuration Maximums Changes; ESXi Firewall and Management Networks; Swap to SSD; Support for Hardware and Software FCoE Adapters; Host UEFI Boot Support; Improved SNMP Support…”
Libro electrónico -
655por Minelli, Michael, 1974-Tabla de Contenidos: “…New Approaches; Data Discovery: Work the Way People's Minds Work; Open-Source Technology for Big Data Analytics; The Cloud and Big Data; Predictive Analytics Moves into the Limelight; Software as a Service BI; Mobile Business Intelligence is Going Mainstream; Ease of Mobile Application Deployment; Crowdsourcing Analytics; Inter- and Trans-Firewall Analytics; R&D Approach Helps Adopt New Technology; Adding Big Data Technology into the Mix; Big Data Technology Terms; Data Size 101; Notes; Chapter 4: Information Management…”
Publicado 2013
Libro electrónico -
656por Miser, BradTabla de Contenidos: “…Connect to the Internet with a Broadband Wireless ModemManage MacBook's Power; Protect MacBook's Data with FileVault; Protect MacBook with System Security; Protect MacBook with Its Firewall; Synchronize Files with Other Computers; Chapter 9: Connecting MacBook to Other Devices; Expand Storage Space with an External Hard Drive; Connect and Use an External Display; Connect and Use a Bluetooth Mouse; Connect and Use External Speakers; Connect To and Use a USB Hub; Connect To and Use Ethernet Devices; Synchronize MacBook with an iPhone; Part III: Enjoying the Internet…”
Publicado 2010
Libro electrónico -
657por Muniz, Joseph“…Even though web applications are developed in a very secure environment and have an intrusion detection system and firewall in place to detect and prevent any malicious activity, open ports are a pre-requisite for conducting online business. …”
Publicado 2013
Libro electrónico -
658por Seibold, ChrisTabla de Contenidos: “…Security & PrivacyGeneral tab; FileVault tab; Firewall tab; Privacy; Spotlight; Universal Access; Seeing tab; Hearing tab; Keyboard tab; Mouse tab (Mouse & Trackpad tab on MacBooks); CDs and DVDs; Displays; Energy Saver; Keyboard; Keyboard tab; Keyboard Shortcuts tab; Mouse; Magic Mouse options; Mighty Mouse options; If you're using a non-Apple mouse; Trackpad; Multitouch trackpads; Print & Scan; Sound; Sound Effects tab; Output tab; Input tab; Mail, Contacts & Calendars; MobileMe; Network; Bluetooth; Sharing; Users & Groups; Parental Controls; Apps tab; Web tab; People tab; Time Limits tab…”
Publicado 2011
Libro electrónico -
659por Wiles, JackTabla de Contenidos: “…Paul Henry; Traditional AV, IDS, and IPS considerations; Traditional firewall consideration; Flaw remediation; Do you have a guest user of your credit card?…”
Publicado 2012
Libro electrónico -
660Publicado 2002Tabla de Contenidos: “…A Phase-Changing Moon BoxThe World's Brightest Glowing Thing; Disappearing Footlights; Modifying Kodak's Fun-Flash® for Theatrical Effects; Simultaneous Realtime Control of Sound and Light with MIDI; A Sure-Shot Fireball Effect; A Motorized, Mirrored Rain Effect; Theatrically Safe Outdoor Bonfires; A Free-Falling Ball of Light; Painting; Using Embossed Wallpaper for Low Relief; Dyeing Marble Patterns into Fabric; A Durable, Rough Texture Coating for Scenery and Props; Shop-Made Naugahyde; Simple and Inexpensive Stained Glass; Creating an Antique Mirror Effect; Props; More Stage Blood…”
Libro electrónico