Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
701Publicado 2017Tabla de Contenidos: “…. -- How it works... -- Firewall identification with Scapy -- Getting ready -- How to do it... -- How it works... -- Firewall identification with Nmap -- Getting ready -- How to do it... -- How it works... -- Firewall identification with Metasploit -- Getting ready -- How to do it... -- How it works... -- Chapter 6: Vulnerability Scanning -- Introduction…”
Libro electrónico -
702
-
703Publicado 2022Tabla de Contenidos: “…UDP -- Exam essentials -- 2.2 Compare and contrast common networking hardware -- Routers -- Switches -- Access points -- Patch panel -- Firewall -- Power over Ethernet (PoE) -- Hub -- Cable modem -- Digital subscriber line (DSL) -- Optical network terminal (ONT) -- Network interface card (NIC) -- Software-defined networking (SDN) -- Exam essentials -- 2.3 Compare and contrast protocols for wireless networking -- Frequencies -- Channels -- Bluetooth -- 802.11 -- Long-range fixed wireless -- NFC -- Radio-frequency identification (RFID)…”
Libro electrónico -
704por Takemura, Chris, 1981-Tabla de Contenidos: “…Specifying a MAC AddressManipulating vifs with xm; Securing Xen's Virtual Network; Specifying an IP Address; Firewalling the Dom0; Networking with network-route; Networking with network-bridge; Networking with network-nat; Configuration Variables; Custom Network Scripts; Multiple-Bridge Setups; Bridged and Routing; Further Thoughts; 6: DomU Management: Tools and Frontends; Tools for the VM Provider; Xen-tools; libvirt, virsh, and virt-manager; Administering the Virtualized Data Center; Administration for the VM Customer; Xen-shell…”
Publicado 2009
Libro electrónico -
705Publicado 2016Tabla de Contenidos: “…Cover ; Copyright; Credits; About the Author; www.PacktPub.com; Table of Contents; Preface; Chapter 1: OpenStack Networking Components - an Overview ; Features of OpenStack Networking; Switching; Routing; Advanced networking features; Load balancing; Firewalling; Virtual private networks; The OpenStack architecture; A reference architecture; Implementing the network; Plugins and drivers; Neutron agents; The DHCP agent; The metadata agent; The network plugin agent; Summary; Chapter 2: Installing OpenStack Using RDO ; System requirements; The initial network configuration; Example networks…”
Libro electrónico -
706Publicado 2017Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- About the Guest-Editor -- Introduction: From Automated to Autonomous Assembly -- ROBOTICS AND CONSTRUCTION -- SELF-ASSEMBLY -- AUTOMATION IN CONSTRUCTION -- AUTONOMOUS VERSUS AUTOMATED -- THE NEXT PHASE -- Notes -- Combinatorial Commons: Social Remixing in a Sharing Economy -- Notes -- How Specific Interactions Drive the Complex Organisation of Building Blocks -- Building Blocks with Specific Interactions -- Self-Assembly of Desired Structures -- Self-Sustained Self-Replication Reactions -- Notes -- From Self-Assembly to Evolutionary Structures -- INGREDIENTS FOR SELF-ASSEMBLY -- EXPLORATIONS IN SELF-ASSEMBLY -- A FUTURE OF EVOLUTIONARY STRUCTURES -- Notes -- The Vanishing Actor: How to Let Things Happen: The Art of Order Without Orders -- Removing the 'Self' from Organisation -- The Order of the Fireflies -- Synchronicity -- Notes -- Complex Design by Simple Robots: A Collective Embodied Intelligence Approach to Construction -- COLLECTIVE EMBODIED INTELLIGENCE AND DISTRIBUTED CONTROL STRATEGIES -- CHALLENGES IN REAL-WORLD CONSTRUCTION -- Notes -- Crowd-Driven Pattern Formation: Computational Strategies for Large-Scale Design and Assembly -- An Assembly Problem -- This is Not a Ball -- Beyond Vision -- Hive -- What is Next? …”
Libro electrónico -
707Tabla de Contenidos: “…Discovering Languages Supported by Translate API Accessing Translate API using Client Programs ; Summary; Part II: Google Cloud Platform - Compute Products ; Chapter 4: Google Compute Engine; Virtual Machines ; Persistent Disks ; Networks and Firewalls ; Deploying High-Performance Virtual Machines Using Compute Engine; Associating the gcloud Command-Line Tool with a Google Account; Selecting a Google Cloud Platform Project ; Creating and Starting an Instance ; Allowing Ingress Network Access ; Creating a Web Presence with Compute Engine in 8 Minutes Flat…”
Libro electrónico -
708por Lesser, BrianTabla de Contenidos: “…Getting the Code Examples WorkingSafari Enabled; Comments and Questions; Acknowledgments; Part I; Introducing the Flash Communication Server; Clients and Servers; Creating an Application; Real-Time Messaging Protocol; FlashCom Versus Traditional Media Servers; The Communication Classes; Connecting to the Server; Streaming Audio, Video, and ActionScript Data; Camera, Microphone, and Video; Sharing Data in Real Time; Client and Application Objects; Remote Methods; Communicating with Application Servers, Databases, and Directory Servers; Firewalls and Security; Getting Started…”
Publicado 2005
Libro electrónico -
709por Garfinkel, SimsonTabla de Contenidos: “…Securing the Host ComputerMinimizing Risk by Minimizing Services; Operating Securely; Secure Remote Access and ContentUpdating; Firewalls and the Web; Conclusion; Chapter 16. Securing Web Applications; A Legacy of Extensibility and Risk; Rules to Code By; Securely Using Fields, Hidden Fields, and Cookies; Rules for Programming Languages; Using PHP Securely; Writing Scripts That Run with Additional Privileges; Connecting to Databases; Conclusion; Chapter 17. …”
Publicado 2002
Libro electrónico -
710por Siever, EllenTabla de Contenidos: “…Serial-line communicationTroubleshooting TCP/IP; Overview of Firewalls and Masquerading; Overview of NFS; Administering NFS; Daemons; Exporting Filesystems; Mounting Filesystems; Overview of NIS; Servers; Domains; NIS Maps; Map Manipulation Utilities; Administering NIS; Setting Up an NIS Server; Setting Up an NIS Client; NIS User Accounts; RPC and XDR; Linux Commands; Alphabetical Summary of Commands; accept; access; aclocal; aconnect; acpi; acpi_available; acpid; addr2line; addresses; agetty; alsactl; amidi; amixer; anacron; aplay; aplaymidi; apm; apmd; apropos; apt; ar; arch; arecord…”
Publicado 2005
Libro electrónico -
711por Russell, Ryan, 1969-Tabla de Contenidos: “…YOU CANNOT SECURELY EXCHANGE ENCRYPTION KEYS WITHOUT A SHARED PIECE OF INFORMATIONMALICIOUS CODE CANNOT BE 100 PERCENT PROTECTED AGAINST; ANY MALICIOUS CODE CAN BE COMPLETELY MORPHED TO BYPASS SIGNATURE DETECTION; FIREWALLS CANNOT PROTECT YOU 100 PERCENT FROM ATTACK; ANY IDS CAN BE EVADED; SECRET CRYPTOGRAPHIC ALGORITHMS ARE NOT SECURE; IF A KEY IS NOT REQUIRED, YOU DO NOT HAVE ENCRYPTION-YOU HAVE ENCODING; PASSWORDS CANNOT BE SECURELY STORED ON THE CLIENT UNLESS THERE IS ANOTHER PASSWORD TO PROTECT THEM…”
Publicado 2009
Libro electrónico -
712por Blum, Richard, 1962-Tabla de Contenidos: “…RhythmboxBrasero; Sound Recorder; Playing Audio Files from Nautilus; Summary; Chapter 12: Using Video; Video Formats; The Totem Movie Player; Watching Web Clips; Editing Videos; Summary; Part III: Managing Your Workstation; Chapter 13: Software Installs and Updates; Software Management in Ubuntu; Installing Updates; Installing New Applications; Installing New Packages; Command-Line Package Management; Summary; Chapter 14: Networking; Networking Basics; Connecting to the Network; Network Tools; Firewalls; Summary; Chapter 15: External Devices; Printers; Scanners; Digital Cameras…”
Publicado 2009
Libro electrónico -
713por Cherry, DennyTabla de Contenidos: “…Network address translationNetwork firewalls; Securing your Wi-Fi network; AT&T U-Verse router; D-Link router; NetGear routers; Hiding your wireless network; MAC address filtering; Changing the MAC address in Windows; Changing the MAC address in Apple OS X; Letting others onto your Wi-Fi network; Other devices on the network; Summary; Chapter 4: Securing Your Home Computer; Data encryption for the home user; Native Windows data encryption; Encrypting a disk in Windows; Encrypting a disk in Mac OSX; What do those website security logos mean?…”
Publicado 2014
Libro electrónico -
714Publicado 2003Tabla de Contenidos: “…Security; Security Considerations for Web Services; Web Services Security Initiatives; Canonical XML; XML Digital Signatures; Apache XML Security; XML Encryption; Security Assertions Markup Language; Web Services Security Assertions; XML Access Control Markup Language; XML Key Management Specification; WS-I Specifications; SOAP and Firewalls; Security and J2EE; Java Cryptography Extensions…”
Libro electrónico -
715Publicado 2010Tabla de Contenidos: “…Limitations of Using Libpcap and DerivativesWireshark Utilities; TShark; Rawshark; Dumpcap; Mergecap; Editcap; Text2pcap; Using SPAN Ports or TAPS; SPAN Port Issues; Network Tap; Using Fiddler; Firewalls; Placement of Sensors; Summary; CHAPTER 3. …”
Libro electrónico -
716por Gallagher, SimonTabla de Contenidos: “…; Active Directory; Backup/Restore; IP Addressing; Management Agents and Firewalling; Legacy System Dependencies…”
Publicado 2013
Libro electrónico -
717Publicado 2014Tabla de Contenidos: “…Making Yourself Available (Or Not) for ChattingMaking Calls with FaceTime; Chapter 4: Moving Around with Maps; Wherever You Go, There You Are; Asking For Directions; Book III: Beyond the Basics; Chapter 1: Backing Up and Restoring Your Data; Understanding Different Backup Options; Blasting into the Past with Time Machine; Moving Your Backup from an Old Mac to a New Mac; Working with Data-Recovery Programs; Chapter 2: Protecting Your Mac against Local and Remote Threats; Locking Down Your Mac; Using Passwords; Encrypting Data with FileVault; Using Firewalls; Selecting Privacy Settings…”
Libro electrónico -
718por Long, Johnny“…Whether breaking into buildings or slipping past industrial-grade firewalls, their goal has always been the s…”
Publicado 2008
Libro electrónico -
719por Hofmann, AndreasTabla de Contenidos: “…7.4 Versionierung -- 7.5 Qsync oder Netzlaufwerk -- 7.6 Die Alternative zu Qsync -- Kapitel 8: Backups - Daten sichern für den Ernstfall -- 8.1 Backup-Strategien -- 8.2 Daten auf dem NAS sichern -- 8.2.1 Datensicherung mit dem NetBak Replicator -- 8.2.2 Datensicherung auf das NAS mithilfe der Betriebssystemfunktionen -- 8.3 Das NAS selbst sichern -- 8.3.1 Konfiguration manuell sichern -- 8.3.2 HBS3 Hybrid Backup Sync - die ultimative Backup-Lösung -- 8.4 Weitere Funktionen von Hybrid Backup Sync -- 8.4.1 Synchronisierung mit HBS 3 -- 8.4.2 Dienste -- Teil III: Weiterführende Konfiguration -- Kapitel 9: Das NAS über das Internet erreichen -- 9.1 Zugriff über myQNAPcloud -- 9.1.1 myQNAPcloud-Konto erstellen -- 9.1.2 myQNAPcloud Link aktivieren -- 9.1.3 Zugriff über myqnapcloud.com -- 9.1.4 Zugriff auf das NAS mit den QNAP-Apps und myQNAPcloud -- 9.1.5 My DDNS -- 9.2 Externen Zugriff einrichten -- 9.2.1 Den Router aus dem Internet erreichen - DDNS einrichten -- 9.2.2 Portfreigabe einrichten -- 9.2.3 Die eigene Domain verwenden -- 9.2.4 Namensauflösung im LAN -- 9.2.5 Sicherheit durch SSL-Verschlüsselung -- 9.3 VPN - sicherer Zugriff auf das NAS über das Internet -- 9.3.1 QBelt-Server konfigurieren -- 9.3.2 QVPN Client einrichten -- 9.3.3 OpenVPN-Server konfigurieren -- 9.3.4 OpenVPN-Client unter Windows einrichten -- Kapitel 10: Sicherheit -- 10.1 Bedrohungen -- 10.2 Physische Sicherheit -- 10.3 Freigabeordner -- 10.4 Benutzerverwaltung -- 10.5 Passwörter -- 10.6 Verschlüsselung -- 10.6.1 Freigabeordner nachträglich verschlüsseln -- 10.6.2 Umgang mit verschlüsselten Ordnern -- 10.6.3 Die Verschlüsselung von Freigabeordnern aufheben -- 10.7 Firewall -- 10.7.1 Erlauben/Verweigern-Liste - Firewall Light -- 10.7.2 Firewall-Regeln -- 10.7.3 Die Firewall aktivieren -- 10.7.4 Eine Regel anlegen -- 10.7.5 Regel-Prioritäten…”
Publicado 2021
Libro electrónico -
720Publicado 2018Tabla de Contenidos: “…Operating system logs -- Windows logs -- Linux logs -- Firewall logs -- Web server logs -- References -- Summary -- Other Books You May Enjoy -- Index…”
Libro electrónico