Mostrando 661 - 680 Resultados de 1,060 Para Buscar 'Firefall~', tiempo de consulta: 1.64s Limitar resultados
  1. 661
    por Ferguson, Bill H.
    Publicado 2012
    Tabla de Contenidos: “…Review QuestionsChapter 5: Domain 5 Network Security; 5.1 Given a scenario, implement appropriate wireless security measures; 5.2 Explain the methods of network access security; 5.3 Explain the methods of user authentication; 5.4 Explain common threats, vulnerabilities, and mitigation techniques; 5.5 Given a scenario, install and configure a basic firewall; 5.6 Categorize different types of network security appliances and methods; Review Questions; Appendix A: Answers to Review Questions; Chapter 1: Domain 1 Network Technologies; Chapter 2: Domain 2 Network Installation and Configuration…”
    Libro electrónico
  2. 662
    Publicado 2014
    Tabla de Contenidos: “…Setting Up Android Emulators Smartphone Pentest Framework; Target Virtual Machines; Creating the Windows XP Target; VMware Player on Microsoft Windows; VMware Fusion on Mac OS; Installing and Activating Windows; Installing VMware Tools; Turning Off Windows Firewall; Setting User Passwords ; Setting a Static IP Address; Making XP Act Like It's a Member of a Windows Domain; Installing Vulnerable Software; Installing Immunity Debugger and Mona ; Setting Up the Ubuntu 8.10 Target; Creating the Windows 7 Target ; Creating a User Account; Opting Out of Automatic Updates; Setting a Static IP Address…”
    Libro electrónico
  3. 663
    Publicado 2014
    Tabla de Contenidos: “…Configuring ports and protocols on the host firewall for each VMM componentChapter 4: Installing a High Available VMM Server; Introduction; Installing a highly available VMM management server; Installing a VMM management server on the additional node of a cluster; Connecting to a highly available VMM management server using the VMM console; Deploying a highly available library server on a file server cluster; Uninstalling a highly available VMM management server; Chapter 5: Configuring Fabric Resources in VMM; Introduction; Creating host groups; Setting up a VMM library…”
    Libro electrónico
  4. 664
    por Gucer, Vasfi, Ceylan, Sanver
    Publicado 2005
    Tabla de Contenidos: “…Tivoli Management Framework basics -- 2.1 Components of the basic Tivoli architecture -- 2.2 Tivoli user interfaces -- 2.2.1 Tivoli Desktop -- 2.2.2 Command line interface -- 2.2.3 Navigating the Tivoli Desktop -- 2.3 Tivoli resources -- 2.4 Authorization roles -- 2.4.1 Scope of authorization roles -- 2.5 Tivoli profiles -- 2.5.1 Profile managers and profile distribution -- 2.6 Multiplexed distribution services -- 2.6.1 MDist and MDist 2 -- 2.6.2 MDist 2 functions -- 2.6.3 MDist2 components -- 2.6.4 wmdist command -- 2.6.5 Using the Distribution Status console -- 2.7 Connecting multiple TMR regions -- 2.7.1 Benefits of connecting TMRs -- 2.7.2 Connection types -- 2.7.3 Name registry -- 2.7.4 Case study: Hub-spoke architecture -- 2.8 Endpoint login sequence -- 2.8.1 Initial login without a select_gateway_policy script -- 2.8.2 Initial login with a select_gateway_policy script -- 2.8.3 Normal login -- 2.8.4 Isolated login -- 2.8.5 Orphan login -- 2.8.6 Implementing policy scripts -- 2.9 Firewall Security Toolbox -- 2.9.1 Tivoli environment with a firewall -- 2.9.2 Tivoli environment with demilitarized zones -- 2.9.3 Sending events across firewalls -- 2.10 Installing Firewall Security Toolbox -- 2.10.1 Installing on UNIX operating systems…”
    Libro electrónico
  5. 665
    Publicado 2021
    Tabla de Contenidos: “…Step 1: Generate Your API Token in Cloud App Security -- Step 2: Create Your Trigger in Microsoft Flow -- Step 3: Create the Teams Message Action in Microsoft Flow -- Step 4: Generate an Email in Microsoft Flow -- Connecting the Flow in Cloud App Security -- Performing an Automated Response Using Azure Security Center -- Using Machine Learning and Artificial Intelligence in Threat Response -- Overview of Fusion Detections -- Overview of Azure Machine Learning -- Summary -- Chapter 5 Microsoft Cybersecurity Reference Architecture and Capability Map -- Introduction -- Microsoft Security Architecture versus the NIST Cybersecurity Framework (CSF) -- Microsoft Security Architecture -- The Identify Function -- The Protect Function -- The Detect Function -- The Respond Function -- The Recover Function -- Using the Microsoft Reference Architecture -- Microsoft Threat Intelligence -- Service Trust Portal -- Security Development Lifecycle (SDL) -- Protecting the Hybrid Cloud Infrastructure -- Azure Marketplace -- Private Link -- Azure Arc -- Azure Lighthouse -- Azure Firewall -- Azure Web Application Firewall (WAF) -- Azure DDOS Protection -- Azure Key Vault -- Azure Bastion -- Azure Site Recovery -- Azure Security Center (ASC) -- Microsoft Azure Secure Score -- Protecting Endpoints and Clients -- Microsoft Endpoint Manager (MEM) Configuration Manager -- Microsoft Intune -- Protecting Identities and Access -- Azure AD Conditional Access -- Passwordless for End-to-EndSecure Identity -- Azure Active Directory (aka Azure AD) -- Azure MFA -- Azure Active Directory Identity Protection -- Azure Active Directory Privilege Identity Management (PIM) -- Microsoft Defender for Identity -- Azure AD B2B and B2C -- Azure AD Identity Governance -- Protecting SaaS Apps -- Protecting Data and Information -- Azure Purview -- Microsoft Information Protection (MIP)…”
    Libro electrónico
  6. 666
    por Vílchez Beltrán, Julio
    Publicado 2023
    Tabla de Contenidos: “…Aplicación de medidas de seguridad y confidencialidad del sistema operativo: programas de protección (antivirus, firewall, antispam, otros) -- 7. Técnicas de protección de accesos públicos y privados en archivos informáticos -- 8. …”
    Libro electrónico
  7. 667
    por Vílchez Beltrán, Julio
    Publicado 2023
    Tabla de Contenidos: “…Aplicación de medidas de seguridad y confidencialidad del sistema operativo: programas de protección (antivirus, firewall, antispam, otros) -- 7. Técnicas de protección de accesos públicos y privados en archivos informáticos -- 8. …”
    Libro electrónico
  8. 668
    Publicado 2016
    Tabla de Contenidos: “…Management point common issuesInstallation; Prerequisites; Ports and firewalls; Certificates; How a distribution point works; Pull distribution points; Cloud distribution points; Preboot Execution Environment; Troubleshooting our distribution point; Console; Content Status; Distribution Point Group Status; Distribution Point Configuration Status; Logs; WMI; PXE; Distribution point common issues; Distribution; Boundary assignment; Content mismatch; BranchCache; Prestaged content; PXE boot failure; Summary; Chapter 6 : Troubleshooting Other Roles; Application Catalog roles…”
    Libro electrónico
  9. 669
    Publicado 2015
    Tabla de Contenidos: “…; Antivirus Software: Past and Present; Antivirus Scanners, Kernels, and Products; Typical Misconceptions about Antivirus Software; Antivirus Features; Basic Features; Making Use of Native Languages; Scanners; Signatures; Compressors and Archives; Unpackers; Emulators; Miscellaneous File Formats; Advanced Features; Packet Filters and Firewalls; Self-Protection; Anti-Exploiting; Summary; Chapter 2 Reverse-Engineering the Core…”
    Libro electrónico
  10. 670
    Publicado 2015
    Tabla de Contenidos: “…Configuring the DHCP service agentConfiguring LoadBalancer as a service; Configuring Firewall as a Service; Chapter 8: Nova-Compute Service; Introduction; Configuring Nova Hypervisors; Configuring Nova-compute with KVM Hypervisor; Configuring Nova-compute with a QEMU Hypervisor emulation; Configuring Nova scheduler filters; Configuring Nova host aggregates; Configuring Nova host aggregates filters; Configuring Nova scheduler weights; Chapter 9: Horizon Dashboard Service; Introduction; Securing Horizon with Secure Socket Layer; Configuring Horizon caching with memcached…”
    Libro electrónico
  11. 671
    por Gralla, Preston
    Publicado 2007
    Tabla de Contenidos: “…Protecting yourself on the Internet -- 44. How firewalls work --…”
    Libro electrónico
  12. 672
    por Ferguson, Bill
    Publicado 2005
    Tabla de Contenidos: “…1.6 Identifying Network ComponentsCritical Information; Hubs; Switches; Bridges; Routers; Gateways; CSU/DSU; NICs; ISDN Adapters; Wireless Access Point; Modems; Transceivers; Firewalls; Exam Essentials; 1.7 Specifying the Characteristics of Wireless Technologies; Critical Information; Infrared; Bluetooth; Exam Essentials; 1.8 Identifying Wireless Service Performance Factors; Critical Information; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 2: Domain 2 Protocols and Standards; 2.1 Identifying a MAC Address and Its Parts; Critical Information; Exam Essentials…”
    Libro electrónico
  13. 673
    por Liu, Dale
    Publicado 2009
    Tabla de Contenidos: “…Front Cover; Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity; Copyright Page; Lead Author and Technical Editor; Contributing Authors; Contents; Introduction; About This Book; Defining a Secure Network; Network Architectures; Equipment Used forthe Examples in This Book; Routers; Switches; Firewalls; Syslog Server; Setting Up a Secure Network; Routers; Switches; Syslog; Wireless Access Points; The Incident; What Happened; Who Spotted It; First Responders; How to Respond; Preserving the Evidence; Relevant Laws; Whom to Call; Law Enforcement Issues…”
    Libro electrónico
  14. 674
    por Mowbray, Thomas J.
    Publicado 2014
    Tabla de Contenidos: “…Converting Text Files Between OSesMaking Backup Disks; Formatting Disks; Configuring Firewalls; Converting and Migrating VMs; Additional Network Administration Knowledge; Summary; Assignments; Chapter 5: Customizing BackTrack; Creating and Running BackTrack Images; Customizing BackTrack with VM; Updating and Upgrading BackTrack and Pen Test Tools; Adding Windows to BackTrack with VMware; Licensing Challenges for Network Administrators; Summary; Assignments; Chapter 6: Protocol Analysis and; Networking Theory and Practice; Frequently Encountered Network Protocols; Network Programming: Bash…”
    Libro electrónico
  15. 675
    por Groth, David
    Publicado 2006
    Tabla de Contenidos: “…Chapter 6: Wired and Wireless NetworksBefore Installing New Hardware or Software; Wireless Networking; Workstation Configuration; Network Installation Tools; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 7: WAN and Remote Access Technologies; Remote Access Connection Configuration Requirements; Remote Access Connection Methods; Remote Access Protocols; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 8: Network Access and Security; Accessing Network Resources; Managing User Account and Password Security; Using Firewalls…”
    Libro electrónico
  16. 676
    Publicado 2014
    Tabla de Contenidos: “…; Features of OpenStack Networking; Switching; Routing; Load balancing; Firewalling; Virtual private networks; Preparing the physical infrastructure; Types of network traffic; Management network; API network; External network; Guest network; Physical server connections; Single interface; Multiple interfaces; Bonding; Separating services across nodes; A single controller with one or more compute nodes…”
    Libro electrónico
  17. 677
    Publicado 2014
    Tabla de Contenidos: “…Virtual Local Area NetworksRemote Access; Network Address Translation; Telephony; Network Access Control; Understanding the Various Network Infrastructure Devices; Firewalls; Routers; Switches; Load Balancers; Proxies; Web Security Gateway; VPNs and VPN Concentrators; Intrusion Detection Systems; Understanding Intrusion Detection Systems; IDS vs. …”
    Libro electrónico
  18. 678
    Publicado 2001
    Tabla de Contenidos: “…Contents; Preface; Some context and a definition; How this book came into being; Contents of this book; Peer-to-peer web site; We'd like to hear from you; PART ONE; A Network of Peers; A revisionist history of peer-to-peer (1969-1995); Usenet; DNS; The network model of the Internet explosion (1995-1999); The switch to client/server; The breakdown of cooperation; Spam: Uncooperative people; The TCP rate equation: Cooperative protocols; Firewalls, dynamic IP, NAT: The end of the open network; Asymmetric bandwidth; Observations on the current crop of peer-to-peer applications (2000)…”
    Libro electrónico
  19. 679
    Publicado 2023
    Tabla de Contenidos: “…Do Bad Things -- Elements of a Typical Security Program -- Risk Management -- Security Governance and Management -- Security Controls -- Professional Ethics -- Chapter Review -- Quick Review -- Questions -- Questions and Answers -- Chapter 2 Access Controls Concepts -- Access Control Fundamentals -- Access Control Concepts -- Access Control Practices -- Identification, Authentication, Authorization, and Accountability -- Identity and Access Management -- Identity and Access Management Lifecycle -- Privileged Accounts -- Logical Access Controls -- Access Control Models -- Identity Management Technologies -- Monitoring Logical Access -- Physical Access Control -- Preventing and Controlling Physical Access -- Monitoring Physical Access -- Chapter Review -- Quick Review -- Questions -- Questions and Answers -- Chapter 3 Network Security -- Network Fundamentals -- Network Types -- Wired and Wireless Networks -- System Addresses -- Network Devices and Terminology -- Networking in Action -- Protocols -- Ports -- OSI Model -- TCP/IP -- IP Addressing -- Network Threats and Attacks -- Conducting Research -- Identifying Targets -- Exploiting Targets -- Doing Bad Things -- Network Defenses -- Firewalls -- Network Security Architecture Elements -- Network Access Control -- E-mail and Web Application Filtering -- Network Operations Elements -- Wireless Security -- Internet of Things Security -- Security Assessments and Testing…”
    Libro electrónico
  20. 680
    Publicado 2023
    Tabla de Contenidos: “…Subnetting and IP addressing -- Load balancing -- CDNs -- Considerations and cost optimization strategies for networks -- Network security -- Performance optimization -- Cost optimization -- Summary -- Part 3: Security, Compliance, and Databases -- Chapter 6: Security and Compliance 1 - Cloud Perspective -- Technical requirements -- Introduction to security in cloud computing -- Understanding cloud security risks -- Data breaches -- Insider threats -- Data loss and recovery -- Insecure APIs -- DoS attacks -- Shared technology vulnerabilities -- Cloud security tools and technologies -- IAM -- Encryption and data protection -- Firewalls and network security -- IDS/IPS -- Summary -- Chapter 7: Security and Compliance 2 - Cloud Perspective -- Technical requirements -- Compliance and legal considerations -- AWS Artifact -- Azure Compliance Manager -- IR and cloud forensics -- Tools and services for IR and cloud forensics -- Managing cloud security at scale -- Evolving threat landscape -- Cloud security best practices -- Summary -- Chapter 8: Database Services 1 - Cloud Perspective -- Technical requirements -- Overview of database services in the cloud -- Types of databases - relational and NoSQL -- Setting up OCI -- Data warehousing services in the cloud -- Setting up Amazon Redshift -- Setting up Google BigQuery -- Databases beyond the traditional realm -- Document database -- In-memory database -- Graph database -- Columnar database -- Key-value store -- Time-series database -- Converged database -- Wide-column store -- Summary -- Chapter 9: Database Services 2 - Cloud Perspective -- Data modeling and schema design -- Conceptual data model -- Physical data model -- Normalization -- Denormalization -- Benefits of data modeling and schema design -- Database provisioning and configuration -- Database provisioning -- Database configuration…”
    Libro electrónico