Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
721Publicado 2017“…Administer, configure, and monitor Junos in your organization About This Book Get well acquainted with security and routing policies to identify the use of firewall filters. Learn to provide end-user authentication and protect each layer in an enterprise network. …”
Libro electrónico -
722por Chambers, Mark L.Tabla de Contenidos: “…-- Wireless connections -- Connecting a MacBook to an existing wireless network -- Using a base station to go wireless -- Joining a wireless network -- Wired connections -- Making a connection to a wired network -- Wired network hardware -- Joining a wired Ethernet network -- Connecting to the Network -- Sharing stuff nicely with others -- Network internet connections -- Network file sharing -- Sharing a network printer -- Use Your Firewall! -- Chapter 12 Hooking Up with Your World -- Using Photo Booth -- Conversing with FaceTime -- Sending and Receiving Instant Messages -- Sharing Your Screen -- Using Continuity Camera -- Part 4 Living the iLife -- Chapter 13 The Multimedia Joys of Music and TV -- What Can I Play in Music? …”
Publicado 2024
Libro electrónico -
723Publicado 2001Tabla de Contenidos: “…Security against Statistical Attacks -- Conclusion -- 15 Client-side Security -- Copy Protection Schemes -- License Files -- Thwarting the Casual Pirate -- Other License Features -- Other Copy Protection Schemes -- Authenticating Untrusted Clients -- Tamperproofing -- Antidebugger Measures -- Checksums -- Responding to Misuse -- Decoys -- Code Obfuscation -- Basic Obfuscation Techniques -- Encrypting Program Parts -- Conclusion -- 16 Through the Firewall -- Basic Strategies -- Client Proxies -- Server Proxies -- SOCKS -- Peer to Peer -- Conclusions -- Appendix A: Cryptography Basics -- The Ultimate Goals of Cryptography -- Attacks on Cryptography -- Types of Cryptography -- Symmetric Cryptography -- Types of Symmetric Algorithms -- Security of Symmetric Algorithms -- Public Key Cryptography -- Cryptographic Hashing Algorithms -- Other Attacks on Cryptographic Hashes -- What's a Good Hash Algorithm to Use? …”
Libro electrónico -
724Ubuntu 22.04 Schnelleinstieg Der einfache Einstieg in die Linux-Welt. Inkl. Ubuntu 22.04 LTS auf DVDpor Gödl, RobertTabla de Contenidos: “…6.2.5 FreeCAD - Alternative zu AutoCAD -- 6.2.6 GIMP - Alternative zu Photoshop -- 6.2.7 GNU Paint - Alternative zu Microsoft Paint -- 6.2.8 Darktable - Alternative zu Adobe Lightroom -- 6.2.9 Evolution - Verbindung zu Microsoft Exchange (Office 365) -- 6.2.10 Digikam - Alternative zu ACDSee Photo Studio und ähnlichen Fotosammlungen -- 6.2.11 Kdenlive - Alternative zu Adobe Premiere -- 6.3 Weitere Software -- Kapitel 7: Sicherheit unter Ubuntu -- 7.1 Ist Ubuntu sicherer als Windows? -- 7.2 GUFW - die Firewall -- 7.3 ClamTK - Virenscanner -- 7.4 Deja Dup - Backups -- 7.5 Timeshift - Systemwiederherstellung -- 7.5.1 Timeshift am Terminal nutzen -- 7.6 Spamassassin als Spamfilter in Thunderbird und Evolution -- 7.6.1 Spamassassin in Thunderbird integrieren -- 7.6.2 Spamassassin in Evolution integrieren -- Kapitel 8: Noch mehr über Ubuntu -- 8.1 Tipps, um mehr aus Ihrem Ubuntu herauszuholen…”
Publicado 2022
Libro electrónico -
725Publicado 2024Tabla de Contenidos: “…Microsoft Defender for Endpoint Co-management Authority -- Configuring a compliance policy for Windows devices -- Configuring a configuration profile for Windows devices -- Windows 365 -- Enrollment device platform restrictions -- Enrollment device limit restrictions -- Configuring quality updates for Windows 10 and later in Intune -- How to create a profile for update policies for iOS/iPadOS in Intune -- How to create a profile for update policies for macOS in the Intune portal -- How to create app protection policies in the Microsoft Intune admin portal -- How to create app configuration policies -- How to create policies for Office apps in the Intune admin portal -- Endpoint Security -- Creating a profile for a security baseline for Windows 10 and later -- Creating a Microsoft Defender for Endpoint baseline -- Creating a Microsoft Edge baseline -- Creating a Windows 365 security baseline -- Managing and creating different policies under Endpoint Security -- Configuring an antivirus policy in the Intune portal -- Configuring disk encryption -- Configuring a firewall policy -- Setting up endpoint detection and response -- Configuring attack surface reduction -- Configuring account protection -- Configuring device compliance -- Configuring Conditional Access policies -- Summary -- Chapter 5: Getting Started with Microsoft Purview -- About Microsoft Purview -- How it works... -- Benefits -- Technical and license requirements -- Configuring Microsoft Purview -- Compliance Score -- Classifiers in Microsoft 365 Purview -- Configuring sensitive info types -- Configuring content explorer -- Content search -- Streamlining data discovery -- Enhancing data governance and compliance -- Independence and objectivity -- Regulatory oversight and accountability -- Risk mitigation and control -- A comprehensive compliance oversight…”
Libro electrónico -
726Publicado 2016“…Identify and safeguard your network against both internal and external threats, hackers, and malware attacks About This Book Lay your hands on physical and virtual evidence to understand the sort of crime committed by capturing and analyzing network traffic Connect the dots by understanding web proxies, firewalls, and routers to close in on your suspect A hands-on guide to help you solve your case with malware forensic methods and network behaviors Who This Book Is For If you are a network administrator, system administrator, information security, or forensics professional and wish to learn network forensic to track the intrusions through network-based evidence, then this book is for you. …”
Libro electrónico -
727por Harold, Elliotte RustyTabla de Contenidos: “…The Layers of a NetworkThe Host-to-Network Layer; The Internet Layer; The Transport Layer; The Application Layer; IP, TCP, and UDP; IP Addresses and Domain Names; Ports; The Internet; Internet Address Classes; Network Address Translation; Firewalls; Proxy Servers; The Client/Server Model; Internet Standards; IETF RFCs; W3C Recommendations; Chapter 3. …”
Publicado 2004
Libro electrónico -
728por Hagen, SilviaTabla de Contenidos: “…ReferencesRFCs; Drafts; Security with IPv6; General Security Concepts; General Security Practices; IPsec Basics; Security Associations; Key Management; IKEv1; IKEv2; IPsec Databases; IPsec Performance; IPv6 Security Elements; Authentication Header; Encapsulating Security Payload Header; Combination of AH and ESP; Overview of New IPsec RFCs; Interaction of IPsec with IPv6 Elements; IPv6 Security "Gotchas"; Native IPv6; Public Key Infrastructure (PKI); Firewalls and intrusion detection/prevention systems; Implementation issues; Neighbor Discovery issues; Port scanning; Multicast issues…”
Publicado 2009
Libro electrónico -
729
-
730por Sheppard, Andrew, 1961-Tabla de Contenidos: “…Copy Your Skype DataEcho and Sound Quality; Internet Connection; Avoid Being a Super Node; Configure Skype on a Pocket PC; WiFi Versus Bluetooth; Using Your Pocket PC as a Mobile Phone; Hacking the Hack; Test Your Internet Connection Bandwidth; Skype's Bandwidth Needs; Measure Your Connection Bandwidth; Test Your Internet Connection Latency; Skype's Latency Needs; Measure Your Connection Latency; Build a Skype Server; Hacking the Hack; Make Skype Work with Personal Firewalls; See Also; Set Up Multiple Phone Lines; Multiple Machines; Multiple Instances of Skype on the Same Machine…”
Publicado 2005
Libro electrónico -
731Publicado 2013Tabla de Contenidos: “…Dahl; A Remotely Extinguished Cremora®-Fueled Chris Peterson Flame Effect: Chris Peterson; A Mechanism for a Battery-Operated Torch: Katherine Gloria Tharp; A Safe Glass Mirror Breaking Effect: John McCullough; 1970s' Period Pull-Tab Beverage Cans: Jeff Smejdir; An Affordable Chair for Sweeney Todd: Colin Buckhurst; Using a Trolling Reel to Move Small Furniture and Props: Steve Schmidt; Hand-Held Dancing Fireflies: Andrew V. Wallace; Rigging Hardware…”
Libro electrónico -
732Publicado 2022Tabla de Contenidos: “…Private Addressing -- Firewall Rules -- Cloud Router -- Cloud Armor -- Virtual Private Clouds -- VPC Subnets -- Shared VPC -- VPC Network Peering -- Hybrid-Cloud Networking -- Hybrid-Cloud Design Considerations -- Hybrid-Cloud Implementation Options -- Service-Centric Networking -- Private Service Connect for Google APIs…”
Libro electrónico -
733Publicado 2015Tabla de Contenidos: “…-- Network programming with Python -- Breaking a few eggs -- Taking it from the top -- Downloading an RFC -- Looking deeper -- Programming for TCP/IP networks -- Firewalls -- Network Address Translation -- IPv6 -- Summary -- Chapter 2 : HTTP and Working with the Web -- Request and response -- Requests with urllib -- Response objects -- Status codes -- Handling problems -- HTTP headers -- Customizing requests -- Content compression -- Multiple values -- Content negotiation -- Content types -- User agents -- Cookies -- Cookie handling -- Know your cookies -- Redirects -- URLs -- Paths and relative URLs -- Query strings -- URL encoding -- URLs in summary -- HTTP methods -- The HEAD method -- The POST method -- Formal inspection -- HTTPS -- The Requests library -- Handling errors with Requests -- Summary -- Chapter 3 : APIs in Action -- Getting started with XML -- The XML APIs -- The basics of ElementTree -- Pretty printing -- Element attributes -- Converting to text -- The Amazon S3 API -- Registering with AWS -- Authentication -- Setting up an AWS user -- Regions -- S3 buckets and objects -- An S3 command-line client -- Creating a bucket with the API -- Uploading a file -- Retrieving an uploaded file through a web browser -- Displaying an uploaded file in a web browser -- Downloading a file with the API…”
Libro electrónico -
734Publicado 2008Tabla de Contenidos: “…Front Cover; Network Security: Know It All; Copyright Page; Contents; About the Authors; CHAPTER 1 Network Security Overview; 1.1 Cryptographic Tools; 1.2 Key Predistribution; 1.3 Authentication Protocols; 1.4 Secure Systems; 1.5 Firewalls; 1.6 Conclusion; Further Reading; CHAPTER 2 Network Attacks; 2.1 Introduction; 2.2 Network Attacks and Security Issues; 2.3 Protection and Prevention; 2.4 Detection; 2.5 Assessment and Response; 2.6 Conclusion; References; CHAPTER 3 Security and Privacy Architecture; 3.1 Objectives; 3.2 Background; 3.3 Developing a Security and Privacy Plan…”
Libro electrónico -
735Publicado 2014“…Engaging, full-color tutorials cover: - Creating foliage, fire, and smoke with Paint Effects - Growing Maya Fur and nHair on clothing, characters, and sets - Replicating water, smoke, sparks, swarms, bubbles, and debris with nParticles and nCloth - Controlling scenes and simulations with expressions and MEL, Python, and PyMEL scripting - Adding dust, fog, smoke, rippling water, and fireballs with Fluid Effects containers - Creating damage with Effects presets, deformers, and animated textures - Matchmoving and motion tracking with Maya and MatchMover - Creating complex destruction by combining rigid bodies, nParticles, nCloth, and Fluid Effects - Setting up, rendering, and compositing mental ray render passes with Autodesk Composite, Adobe After Effects, and The Foundry Nuke"--…”
Libro electrónico -
736por Chandra, PraphulTabla de Contenidos: “…1.7 Beyond Cryptography1.7.1 Firewalls; 1.7.2 Denial of Service Attacks; 1.7.3 Code Security; 1.7.4 Steganography; 1.8 Conclusion; Chapter 2: Network Security Protocols; 2.1 Introduction; 2.2 Key Establishment Protocols; 2.2.1 Key Generation in SKC; 2.2.2 Key Distribution in SKC; 2.2.3 Key Establishment in PKC; 2.2.4 Diffie-Hellman Key Exchange; 2.2.5 Enhanced Diffie-Hellman Key Exchange; 2.2.6 RSA; 2.3 Authentication Protocols; 2.3.1 Address-Based Authentication; 2.3.2 Passwords for Local Authentication (Login); 2.3.3 Passwords for Network Authentication; 2.3.4 Authentication Using SKC…”
Publicado 2005
Libro electrónico -
737por Northrup, Tony, 1974-Tabla de Contenidos: “…Configure Apache; 2. Open the firewalls; 3. Determine your IP address; 4. Get a domain name; 5. …”
Publicado 2005
Libro electrónico -
738por Chapple, MikeTabla de Contenidos: “…Chapter 15 Threat Identification and Prevention: Objective 4.2 Understand Network Threats and Attacks -- Antivirus Software -- Intrusion Detection and Prevention -- Intrusion Detection -- Intrusion Prevention -- Environments Monitored -- Classification Errors -- Detection Techniques -- Firewalls -- Vulnerability Scanning -- Network Vulnerability Scanning -- Application Scanning -- Web Application Scanning -- Chapter 16 Network Security Infrastructure: Objective 4.3 Understand Network Security Infrastructure -- Data Center Protection -- Air Temperature -- Humidity -- Fire -- Network Security Zones -- Switches, WAPs, and Routers -- Switches -- WAPs -- Routers -- Network Segmentation -- Virtual Private Networks -- Network Access Control -- Role-Based Access Control -- Posture Checking -- Internet of Things -- IoT Security -- Chapter 17 Cloud Computing: Objective 4.3 Understand Network Security Infrastructure -- Cloud Computing -- Drivers for Cloud Computing -- Cloud Deployment Models -- Private Cloud -- Public Cloud -- Hybrid Cloud -- Community Cloud -- Cloud Service Categories -- Software as a Service (SaaS) -- Infrastructure as a Service (IaaS) -- Platform as a Service (PaaS) -- Desktop as a Service (DaaS) -- Security and the Shared Responsibility Model -- Automation and Orchestration -- Vendor Relationships -- Managed Service Providers -- Vendor Agreements -- Part V Domain 5: Security Operations -- Chapter 18 Encryption: Objective 5.1 Understand Data Security -- Cryptography -- Encrypting Data -- Decrypting Data -- Encryption Algorithms -- Symmetric Encryption -- Asymmetric Encryption -- Uses of Encryption -- Data at Rest -- Data in Transit -- Hash Functions -- MD5 -- SHA -- Chapter 19 Data Handling: Objective 5.1 Understand Data Security -- Data Life Cycle -- Create -- Store -- Use -- Share -- Archive -- Destroy -- Data Classification…”
Publicado 2024
Libro electrónico -
739Publicado 2021Tabla de Contenidos: “…Identifying potential microservices -- Code complexity and maintenance -- Metrics and Monitoring -- Logging -- Splitting a Monolith -- Feature Flags -- Refactoring Jeeves -- Workflow -- Summary -- Chapter 6: Interacting with Other Services -- Calling other web resources -- Finding out where to go -- Environment variables -- Service discovery -- Transferring data -- HTTP cache headers -- GZIP compression -- Protocol Buffers -- MessagePack -- Putting it together -- Asynchronous messages -- Message queue reliability -- Basic queues -- Topic exchanges and queues -- Publish/subscribe -- Putting it together -- Testing -- Using OpenAPI -- Summary -- Chapter 7: Securing Your Services -- The OAuth2 protocol -- X.509 certificate-based authentication -- Token-based authentication -- The JWT standard -- PyJWT -- Using a certificate with JWT -- The TokenDealer microservice -- The OAuth implementation -- Using TokenDealer -- Securing your code -- Limiting your application scope -- Untrusted incoming data -- Redirecting and trusting queries -- Sanitizing input data -- Using Bandit linter -- Dependencies -- Web application firewall -- OpenResty: Lua and nginx -- Rate and concurrency limiting -- Other OpenResty features -- Summary -- Chapter 8: Making a Dashboard -- Building a ReactJS dashboard -- The JSX syntax -- React components -- Pre-processing JSX -- ReactJS and Quart -- Cross-origin resource sharing -- Authentication and authorization -- A note about Micro Frontends -- Getting the Slack token -- JavaScript authentication -- Summary -- Chapter 9: Packaging and Running Python -- The packaging toolchain -- A few definitions -- Packaging -- The setup.py file -- The requirements.txt file -- The MANIFEST.in file -- Versioning -- Releasing -- Distributing -- Running all microservices -- Process management -- Summary -- Chapter 10: Deploying on AWS -- What is Docker?…”
Libro electrónico -
740Publicado 2019Tabla de Contenidos: “…-- Cloud Computing -- Data Transfer Rates -- Internet Security -- Malware -- Virus -- Worm -- Trojan -- Rootkit -- Ransomware -- Social Engineering -- Phishing -- Pharming -- Pretexting -- Shouldering -- Threat Prevention -- Biometric Measures -- Strong Passwords -- 2-Factor Authentication -- Public Key Cryptography -- Firewalls -- Index -- Blank Page…”
Libro electrónico