Mostrando 701 - 720 Resultados de 1,060 Para Buscar 'Firefall~', tiempo de consulta: 1.66s Limitar resultados
  1. 701
    Publicado 2017
    Tabla de Contenidos: “…. -- How it works... -- Firewall identification with Scapy -- Getting ready -- How to do it... -- How it works... -- Firewall identification with Nmap -- Getting ready -- How to do it... -- How it works... -- Firewall identification with Metasploit -- Getting ready -- How to do it... -- How it works... -- Chapter 6: Vulnerability Scanning -- Introduction…”
    Libro electrónico
  2. 702
    Publicado 2025
    Tabla de Contenidos:
    Libro electrónico
  3. 703
    Publicado 2022
    Tabla de Contenidos: “…UDP -- Exam essentials -- 2.2 Compare and contrast common networking hardware -- Routers -- Switches -- Access points -- Patch panel -- Firewall -- Power over Ethernet (PoE) -- Hub -- Cable modem -- Digital subscriber line (DSL) -- Optical network terminal (ONT) -- Network interface card (NIC) -- Software-defined networking (SDN) -- Exam essentials -- 2.3 Compare and contrast protocols for wireless networking -- Frequencies -- Channels -- Bluetooth -- 802.11 -- Long-range fixed wireless -- NFC -- Radio-frequency identification (RFID)…”
    Libro electrónico
  4. 704
    por Takemura, Chris, 1981-
    Publicado 2009
    Tabla de Contenidos: “…Specifying a MAC AddressManipulating vifs with xm; Securing Xen's Virtual Network; Specifying an IP Address; Firewalling the Dom0; Networking with network-route; Networking with network-bridge; Networking with network-nat; Configuration Variables; Custom Network Scripts; Multiple-Bridge Setups; Bridged and Routing; Further Thoughts; 6: DomU Management: Tools and Frontends; Tools for the VM Provider; Xen-tools; libvirt, virsh, and virt-manager; Administering the Virtualized Data Center; Administration for the VM Customer; Xen-shell…”
    Libro electrónico
  5. 705
    Publicado 2016
    Tabla de Contenidos: “…Cover ; Copyright; Credits; About the Author; www.PacktPub.com; Table of Contents; Preface; Chapter 1: OpenStack Networking Components - an Overview ; Features of OpenStack Networking; Switching; Routing; Advanced networking features; Load balancing; Firewalling; Virtual private networks; The OpenStack architecture; A reference architecture; Implementing the network; Plugins and drivers; Neutron agents; The DHCP agent; The metadata agent; The network plugin agent; Summary; Chapter 2: Installing OpenStack Using RDO ; System requirements; The initial network configuration; Example networks…”
    Libro electrónico
  6. 706
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- About the Guest-Editor -- Introduction: From Automated to Autonomous Assembly -- ROBOTICS AND CONSTRUCTION -- SELF-ASSEMBLY -- AUTOMATION IN CONSTRUCTION -- AUTONOMOUS VERSUS AUTOMATED -- THE NEXT PHASE -- Notes -- Combinatorial Commons: Social Remixing in a Sharing Economy -- Notes -- How Specific Interactions Drive the Complex Organisation of Building Blocks -- Building Blocks with Specific Interactions -- Self-Assembly of Desired Structures -- Self-Sustained Self-Replication Reactions -- Notes -- From Self-Assembly to Evolutionary Structures -- INGREDIENTS FOR SELF-ASSEMBLY -- EXPLORATIONS IN SELF-ASSEMBLY -- A FUTURE OF EVOLUTIONARY STRUCTURES -- Notes -- The Vanishing Actor: How to Let Things Happen: The Art of Order Without Orders -- Removing the 'Self' from Organisation -- The Order of the Fireflies -- Synchronicity -- Notes -- Complex Design by Simple Robots: A Collective Embodied Intelligence Approach to Construction -- COLLECTIVE EMBODIED INTELLIGENCE AND DISTRIBUTED CONTROL STRATEGIES -- CHALLENGES IN REAL-WORLD CONSTRUCTION -- Notes -- Crowd-Driven Pattern Formation: Computational Strategies for Large-Scale Design and Assembly -- An Assembly Problem -- This is Not a Ball -- Beyond Vision -- Hive -- What is Next? …”
    Libro electrónico
  7. 707
    Tabla de Contenidos: “…Discovering Languages Supported by Translate API Accessing Translate API using Client Programs ; Summary; Part II: Google Cloud Platform - Compute Products ; Chapter 4: Google Compute Engine; Virtual Machines ; Persistent Disks ; Networks and Firewalls ; Deploying High-Performance Virtual Machines Using Compute Engine; Associating the gcloud Command-Line Tool with a Google Account; Selecting a Google Cloud Platform Project ; Creating and Starting an Instance ; Allowing Ingress Network Access ; Creating a Web Presence with Compute Engine in 8 Minutes Flat…”
    Libro electrónico
  8. 708
    por Lesser, Brian
    Publicado 2005
    Tabla de Contenidos: “…Getting the Code Examples WorkingSafari Enabled; Comments and Questions; Acknowledgments; Part I; Introducing the Flash Communication Server; Clients and Servers; Creating an Application; Real-Time Messaging Protocol; FlashCom Versus Traditional Media Servers; The Communication Classes; Connecting to the Server; Streaming Audio, Video, and ActionScript Data; Camera, Microphone, and Video; Sharing Data in Real Time; Client and Application Objects; Remote Methods; Communicating with Application Servers, Databases, and Directory Servers; Firewalls and Security; Getting Started…”
    Libro electrónico
  9. 709
    por Garfinkel, Simson
    Publicado 2002
    Tabla de Contenidos: “…Securing the Host ComputerMinimizing Risk by Minimizing Services; Operating Securely; Secure Remote Access and ContentUpdating; Firewalls and the Web; Conclusion; Chapter 16. Securing Web Applications; A Legacy of Extensibility and Risk; Rules to Code By; Securely Using Fields, Hidden Fields, and Cookies; Rules for Programming Languages; Using PHP Securely; Writing Scripts That Run with Additional Privileges; Connecting to Databases; Conclusion; Chapter 17. …”
    Libro electrónico
  10. 710
    por Siever, Ellen
    Publicado 2005
    Tabla de Contenidos: “…Serial-line communicationTroubleshooting TCP/IP; Overview of Firewalls and Masquerading; Overview of NFS; Administering NFS; Daemons; Exporting Filesystems; Mounting Filesystems; Overview of NIS; Servers; Domains; NIS Maps; Map Manipulation Utilities; Administering NIS; Setting Up an NIS Server; Setting Up an NIS Client; NIS User Accounts; RPC and XDR; Linux Commands; Alphabetical Summary of Commands; accept; access; aclocal; aconnect; acpi; acpi_available; acpid; addr2line; addresses; agetty; alsactl; amidi; amixer; anacron; aplay; aplaymidi; apm; apmd; apropos; apt; ar; arch; arecord…”
    Libro electrónico
  11. 711
    por Russell, Ryan, 1969-
    Publicado 2009
    Tabla de Contenidos: “…YOU CANNOT SECURELY EXCHANGE ENCRYPTION KEYS WITHOUT A SHARED PIECE OF INFORMATIONMALICIOUS CODE CANNOT BE 100 PERCENT PROTECTED AGAINST; ANY MALICIOUS CODE CAN BE COMPLETELY MORPHED TO BYPASS SIGNATURE DETECTION; FIREWALLS CANNOT PROTECT YOU 100 PERCENT FROM ATTACK; ANY IDS CAN BE EVADED; SECRET CRYPTOGRAPHIC ALGORITHMS ARE NOT SECURE; IF A KEY IS NOT REQUIRED, YOU DO NOT HAVE ENCRYPTION-YOU HAVE ENCODING; PASSWORDS CANNOT BE SECURELY STORED ON THE CLIENT UNLESS THERE IS ANOTHER PASSWORD TO PROTECT THEM…”
    Libro electrónico
  12. 712
    por Blum, Richard, 1962-
    Publicado 2009
    Tabla de Contenidos: “…RhythmboxBrasero; Sound Recorder; Playing Audio Files from Nautilus; Summary; Chapter 12: Using Video; Video Formats; The Totem Movie Player; Watching Web Clips; Editing Videos; Summary; Part III: Managing Your Workstation; Chapter 13: Software Installs and Updates; Software Management in Ubuntu; Installing Updates; Installing New Applications; Installing New Packages; Command-Line Package Management; Summary; Chapter 14: Networking; Networking Basics; Connecting to the Network; Network Tools; Firewalls; Summary; Chapter 15: External Devices; Printers; Scanners; Digital Cameras…”
    Libro electrónico
  13. 713
    por Cherry, Denny
    Publicado 2014
    Tabla de Contenidos: “…Network address translationNetwork firewalls; Securing your Wi-Fi network; AT&T U-Verse router; D-Link router; NetGear routers; Hiding your wireless network; MAC address filtering; Changing the MAC address in Windows; Changing the MAC address in Apple OS X; Letting others onto your Wi-Fi network; Other devices on the network; Summary; Chapter 4: Securing Your Home Computer; Data encryption for the home user; Native Windows data encryption; Encrypting a disk in Windows; Encrypting a disk in Mac OSX; What do those website security logos mean?…”
    Libro electrónico
  14. 714
    Publicado 2003
    Tabla de Contenidos: “…Security; Security Considerations for Web Services; Web Services Security Initiatives; Canonical XML; XML Digital Signatures; Apache XML Security; XML Encryption; Security Assertions Markup Language; Web Services Security Assertions; XML Access Control Markup Language; XML Key Management Specification; WS-I Specifications; SOAP and Firewalls; Security and J2EE; Java Cryptography Extensions…”
    Libro electrónico
  15. 715
    Publicado 2010
    Tabla de Contenidos: “…Limitations of Using Libpcap and DerivativesWireshark Utilities; TShark; Rawshark; Dumpcap; Mergecap; Editcap; Text2pcap; Using SPAN Ports or TAPS; SPAN Port Issues; Network Tap; Using Fiddler; Firewalls; Placement of Sensors; Summary; CHAPTER 3. …”
    Libro electrónico
  16. 716
    por Gallagher, Simon
    Publicado 2013
    Tabla de Contenidos: “…; Active Directory; Backup/Restore; IP Addressing; Management Agents and Firewalling; Legacy System Dependencies…”
    Libro electrónico
  17. 717
    Publicado 2014
    Tabla de Contenidos: “…Making Yourself Available (Or Not) for ChattingMaking Calls with FaceTime; Chapter 4: Moving Around with Maps; Wherever You Go, There You Are; Asking For Directions; Book III: Beyond the Basics; Chapter 1: Backing Up and Restoring Your Data; Understanding Different Backup Options; Blasting into the Past with Time Machine; Moving Your Backup from an Old Mac to a New Mac; Working with Data-Recovery Programs; Chapter 2: Protecting Your Mac against Local and Remote Threats; Locking Down Your Mac; Using Passwords; Encrypting Data with FileVault; Using Firewalls; Selecting Privacy Settings…”
    Libro electrónico
  18. 718
    por Long, Johnny
    Publicado 2008
    “…Whether breaking into buildings or slipping past industrial-grade firewalls, their goal has always been the s…”
    Libro electrónico
  19. 719
    por Hofmann, Andreas
    Publicado 2021
    Tabla de Contenidos: “…7.4 Versionierun‌‌g -- 7.5 Qsync oder Netzlaufwerk‌ -- 7.6 Die Alternative zu Qsync -- Kapitel 8: Backups - Daten sichern für den Ernstfall -- 8.1 Backup-Strategien -- 8.2 Daten auf dem NAS sichern -- 8.2.1 Datensicherung mit dem NetBak Replicator -- 8.2.2 Datensicherung auf das NAS mithilfe der Betriebssystemfunktionen -- 8.3 Das NAS selbst sichern -- 8.3.1 Konfiguration manuell sichern -- 8.3.2 HBS3‌ Hybrid Backup Sync - die ultimative Backup-Lösung -- 8.4 Weitere Funktionen von Hybrid Backup Sync -- 8.4.1 Synchronisierung mit HBS 3 -- 8.4.2 Dienste -- Teil III: Weiterführende Konfiguration -- Kapitel 9: Das NAS über das Internet erreichen -- 9.1 Zugriff über myQNAPcloud -- 9.1.1 myQNAPcloud-Konto erstellen -- 9.1.2 myQNAPcloud Link aktivieren -- 9.1.3 Zugriff über myqnapcloud.com -- 9.1.4 Zugriff auf das NAS mit den QNAP-Apps und myQNAPcloud -- 9.1.5 My DDN‌S -- 9.2 Externen Zugriff einrichten -- 9.2.1 Den Router aus dem Internet erreichen - DDNS einrichten -- 9.2.2 Portfreigab‌e einrichten -- 9.2.3 Die eigene Domain verwenden -- 9.2.4 Namensauflösung im LA‌N -- 9.2.5 Sicherheit durch SSL-Verschlüsselung -- 9.3 VPN - sicherer Zugriff auf das NAS über das Internet -- 9.3.1 QBelt-Server konfigurieren -- 9.3.2 QVPN Client einrichten -- 9.3.3 OpenVPN-Server konfigurieren -- 9.3.4 OpenVPN-Client unter Windows einrichten -- Kapitel 10: Sicherheit -- 10.1 Bedrohungen -- 10.2 Physische Sicherheit -- 10.3 Freigabeordner -- 10.4 Benutzerverwaltung -- 10.5 Passwörter -- 10.6 Verschlüsselung -- 10.6.1 Freigabeordner nachträglich verschlüsseln -- 10.6.2 Umgang mit verschlüsselten Ordnern -- 10.6.3 Die Verschlüsselung von Freigabeordnern aufheben -- 10.7 Firewall -- 10.7.1 Erlauben/Verweigern-Liste - Firewall Light -- 10.7.2 Firewall-Regeln -- 10.7.3 Die Firewall aktivieren -- 10.7.4 Eine Regel anlegen -- 10.7.5 Regel-Prioritäten…”
    Libro electrónico
  20. 720
    Publicado 2018
    Tabla de Contenidos: “…Operating system logs -- Windows logs -- Linux logs -- Firewall logs -- Web server logs -- References -- Summary -- Other Books You May Enjoy -- Index…”
    Libro electrónico