Mostrando 721 - 740 Resultados de 1,060 Para Buscar 'Firefall~', tiempo de consulta: 1.60s Limitar resultados
  1. 721
    Publicado 2017
    “…Administer, configure, and monitor Junos in your organization About This Book Get well acquainted with security and routing policies to identify the use of firewall filters. Learn to provide end-user authentication and protect each layer in an enterprise network. …”
    Libro electrónico
  2. 722
    por Chambers, Mark L.
    Publicado 2024
    Tabla de Contenidos: “…-- Wireless connections -- Connecting a MacBook to an existing wireless network -- Using a base station to go wireless -- Joining a wireless network -- Wired connections -- Making a connection to a wired network -- Wired network hardware -- Joining a wired Ethernet network -- Connecting to the Network -- Sharing stuff nicely with others -- Network internet connections -- Network file sharing -- Sharing a network printer -- Use Your Firewall! -- Chapter 12 Hooking Up with Your World -- Using Photo Booth -- Conversing with FaceTime -- Sending and Receiving Instant Messages -- Sharing Your Screen -- Using Continuity Camera -- Part 4 Living the iLife -- Chapter 13 The Multimedia Joys of Music and TV -- What Can I Play in Music? …”
    Libro electrónico
  3. 723
    Publicado 2001
    Tabla de Contenidos: “…Security against Statistical Attacks -- Conclusion -- 15 Client-side Security -- Copy Protection Schemes -- License Files -- Thwarting the Casual Pirate -- Other License Features -- Other Copy Protection Schemes -- Authenticating Untrusted Clients -- Tamperproofing -- Antidebugger Measures -- Checksums -- Responding to Misuse -- Decoys -- Code Obfuscation -- Basic Obfuscation Techniques -- Encrypting Program Parts -- Conclusion -- 16 Through the Firewall -- Basic Strategies -- Client Proxies -- Server Proxies -- SOCKS -- Peer to Peer -- Conclusions -- Appendix A: Cryptography Basics -- The Ultimate Goals of Cryptography -- Attacks on Cryptography -- Types of Cryptography -- Symmetric Cryptography -- Types of Symmetric Algorithms -- Security of Symmetric Algorithms -- Public Key Cryptography -- Cryptographic Hashing Algorithms -- Other Attacks on Cryptographic Hashes -- What's a Good Hash Algorithm to Use? …”
    Libro electrónico
  4. 724
    por Gödl, Robert
    Publicado 2022
    Tabla de Contenidos: “…6.2.5 FreeCAD - Alternative zu AutoCAD -- 6.2.6 GIMP - Alternative zu Photoshop -- 6.2.7 GNU Paint - Alternative zu Microsoft Paint -- 6.2.8 Darktable - Alternative zu Adobe Lightroom -- 6.2.9 Evolution - Verbindung zu Microsoft Exchange (Office 365) -- 6.2.10 Digikam - Alternative zu ACDSee Photo Studio und ähnlichen Fotosammlungen -- 6.2.11 Kdenlive - Alternative zu Adobe Premiere -- 6.3 Weitere Software -- Kapitel 7: Sicherheit unter Ubuntu -- 7.1 Ist Ubuntu sicherer als Windows? -- 7.2 GUFW - die Firewall -- 7.3 ClamTK - Virenscanner -- 7.4 Deja Dup - Backups -- 7.5 Timeshift - Systemwiederherstellung -- 7.5.1 Timeshift am Terminal nutzen -- 7.6 Spamassassin als Spamfilter in Thunderbird und Evolution -- 7.6.1 Spamassassin in Thunderbird integrieren -- 7.6.2 Spamassassin in Evolution integrieren -- Kapitel 8: Noch mehr über Ubuntu -- 8.1 Tipps, um mehr aus Ihrem Ubuntu herauszuholen…”
    Libro electrónico
  5. 725
    Publicado 2024
    Tabla de Contenidos: “…Microsoft Defender for Endpoint Co-management Authority -- Configuring a compliance policy for Windows devices -- Configuring a configuration profile for Windows devices -- Windows 365 -- Enrollment device platform restrictions -- Enrollment device limit restrictions -- Configuring quality updates for Windows 10 and later in Intune -- How to create a profile for update policies for iOS/iPadOS in Intune -- How to create a profile for update policies for macOS in the Intune portal -- How to create app protection policies in the Microsoft Intune admin portal -- How to create app configuration policies -- How to create policies for Office apps in the Intune admin portal -- Endpoint Security -- Creating a profile for a security baseline for Windows 10 and later -- Creating a Microsoft Defender for Endpoint baseline -- Creating a Microsoft Edge baseline -- Creating a Windows 365 security baseline -- Managing and creating different policies under Endpoint Security -- Configuring an antivirus policy in the Intune portal -- Configuring disk encryption -- Configuring a firewall policy -- Setting up endpoint detection and response -- Configuring attack surface reduction -- Configuring account protection -- Configuring device compliance -- Configuring Conditional Access policies -- Summary -- Chapter 5: Getting Started with Microsoft Purview -- About Microsoft Purview -- How it works... -- Benefits -- Technical and license requirements -- Configuring Microsoft Purview -- Compliance Score -- Classifiers in Microsoft 365 Purview -- Configuring sensitive info types -- Configuring content explorer -- Content search -- Streamlining data discovery -- Enhancing data governance and compliance -- Independence and objectivity -- Regulatory oversight and accountability -- Risk mitigation and control -- A comprehensive compliance oversight…”
    Libro electrónico
  6. 726
    Publicado 2016
    “…Identify and safeguard your network against both internal and external threats, hackers, and malware attacks About This Book Lay your hands on physical and virtual evidence to understand the sort of crime committed by capturing and analyzing network traffic Connect the dots by understanding web proxies, firewalls, and routers to close in on your suspect A hands-on guide to help you solve your case with malware forensic methods and network behaviors Who This Book Is For If you are a network administrator, system administrator, information security, or forensics professional and wish to learn network forensic to track the intrusions through network-based evidence, then this book is for you. …”
    Libro electrónico
  7. 727
    por Harold, Elliotte Rusty
    Publicado 2004
    Tabla de Contenidos: “…The Layers of a NetworkThe Host-to-Network Layer; The Internet Layer; The Transport Layer; The Application Layer; IP, TCP, and UDP; IP Addresses and Domain Names; Ports; The Internet; Internet Address Classes; Network Address Translation; Firewalls; Proxy Servers; The Client/Server Model; Internet Standards; IETF RFCs; W3C Recommendations; Chapter 3. …”
    Libro electrónico
  8. 728
    por Hagen, Silvia
    Publicado 2009
    Tabla de Contenidos: “…ReferencesRFCs; Drafts; Security with IPv6; General Security Concepts; General Security Practices; IPsec Basics; Security Associations; Key Management; IKEv1; IKEv2; IPsec Databases; IPsec Performance; IPv6 Security Elements; Authentication Header; Encapsulating Security Payload Header; Combination of AH and ESP; Overview of New IPsec RFCs; Interaction of IPsec with IPv6 Elements; IPv6 Security "Gotchas"; Native IPv6; Public Key Infrastructure (PKI); Firewalls and intrusion detection/prevention systems; Implementation issues; Neighbor Discovery issues; Port scanning; Multicast issues…”
    Libro electrónico
  9. 729
    por Sheth, Jagdish N.
    Publicado 2007
    Libro electrónico
  10. 730
    por Sheppard, Andrew, 1961-
    Publicado 2005
    Tabla de Contenidos: “…Copy Your Skype DataEcho and Sound Quality; Internet Connection; Avoid Being a Super Node; Configure Skype on a Pocket PC; WiFi Versus Bluetooth; Using Your Pocket PC as a Mobile Phone; Hacking the Hack; Test Your Internet Connection Bandwidth; Skype's Bandwidth Needs; Measure Your Connection Bandwidth; Test Your Internet Connection Latency; Skype's Latency Needs; Measure Your Connection Latency; Build a Skype Server; Hacking the Hack; Make Skype Work with Personal Firewalls; See Also; Set Up Multiple Phone Lines; Multiple Machines; Multiple Instances of Skype on the Same Machine…”
    Libro electrónico
  11. 731
    Publicado 2013
    Tabla de Contenidos: “…Dahl; A Remotely Extinguished Cremora®-Fueled Chris Peterson Flame Effect: Chris Peterson; A Mechanism for a Battery-Operated Torch: Katherine Gloria Tharp; A Safe Glass Mirror Breaking Effect: John McCullough; 1970s' Period Pull-Tab Beverage Cans: Jeff Smejdir; An Affordable Chair for Sweeney Todd: Colin Buckhurst; Using a Trolling Reel to Move Small Furniture and Props: Steve Schmidt; Hand-Held Dancing Fireflies: Andrew V. Wallace; Rigging Hardware…”
    Libro electrónico
  12. 732
    Publicado 2022
    Tabla de Contenidos: “…Private Addressing -- Firewall Rules -- Cloud Router -- Cloud Armor -- Virtual Private Clouds -- VPC Subnets -- Shared VPC -- VPC Network Peering -- Hybrid-Cloud Networking -- Hybrid-Cloud Design Considerations -- Hybrid-Cloud Implementation Options -- Service-Centric Networking -- Private Service Connect for Google APIs…”
    Libro electrónico
  13. 733
    Publicado 2015
    Tabla de Contenidos: “…-- Network programming with Python -- Breaking a few eggs -- Taking it from the top -- Downloading an RFC -- Looking deeper -- Programming for TCP/IP networks -- Firewalls -- Network Address Translation -- IPv6 -- Summary -- Chapter 2 : HTTP and Working with the Web -- Request and response -- Requests with urllib -- Response objects -- Status codes -- Handling problems -- HTTP headers -- Customizing requests -- Content compression -- Multiple values -- Content negotiation -- Content types -- User agents -- Cookies -- Cookie handling -- Know your cookies -- Redirects -- URLs -- Paths and relative URLs -- Query strings -- URL encoding -- URLs in summary -- HTTP methods -- The HEAD method -- The POST method -- Formal inspection -- HTTPS -- The Requests library -- Handling errors with Requests -- Summary -- Chapter 3 : APIs in Action -- Getting started with XML -- The XML APIs -- The basics of ElementTree -- Pretty printing -- Element attributes -- Converting to text -- The Amazon S3 API -- Registering with AWS -- Authentication -- Setting up an AWS user -- Regions -- S3 buckets and objects -- An S3 command-line client -- Creating a bucket with the API -- Uploading a file -- Retrieving an uploaded file through a web browser -- Displaying an uploaded file in a web browser -- Downloading a file with the API…”
    Libro electrónico
  14. 734
    Publicado 2008
    Tabla de Contenidos: “…Front Cover; Network Security: Know It All; Copyright Page; Contents; About the Authors; CHAPTER 1 Network Security Overview; 1.1 Cryptographic Tools; 1.2 Key Predistribution; 1.3 Authentication Protocols; 1.4 Secure Systems; 1.5 Firewalls; 1.6 Conclusion; Further Reading; CHAPTER 2 Network Attacks; 2.1 Introduction; 2.2 Network Attacks and Security Issues; 2.3 Protection and Prevention; 2.4 Detection; 2.5 Assessment and Response; 2.6 Conclusion; References; CHAPTER 3 Security and Privacy Architecture; 3.1 Objectives; 3.2 Background; 3.3 Developing a Security and Privacy Plan…”
    Libro electrónico
  15. 735
    Publicado 2014
    “…Engaging, full-color tutorials cover: - Creating foliage, fire, and smoke with Paint Effects - Growing Maya Fur and nHair on clothing, characters, and sets - Replicating water, smoke, sparks, swarms, bubbles, and debris with nParticles and nCloth - Controlling scenes and simulations with expressions and MEL, Python, and PyMEL scripting - Adding dust, fog, smoke, rippling water, and fireballs with Fluid Effects containers - Creating damage with Effects presets, deformers, and animated textures - Matchmoving and motion tracking with Maya and MatchMover - Creating complex destruction by combining rigid bodies, nParticles, nCloth, and Fluid Effects - Setting up, rendering, and compositing mental ray render passes with Autodesk Composite, Adobe After Effects, and The Foundry Nuke"--…”
    Libro electrónico
  16. 736
    por Chandra, Praphul
    Publicado 2005
    Tabla de Contenidos: “…1.7 Beyond Cryptography1.7.1 Firewalls; 1.7.2 Denial of Service Attacks; 1.7.3 Code Security; 1.7.4 Steganography; 1.8 Conclusion; Chapter 2: Network Security Protocols; 2.1 Introduction; 2.2 Key Establishment Protocols; 2.2.1 Key Generation in SKC; 2.2.2 Key Distribution in SKC; 2.2.3 Key Establishment in PKC; 2.2.4 Diffie-Hellman Key Exchange; 2.2.5 Enhanced Diffie-Hellman Key Exchange; 2.2.6 RSA; 2.3 Authentication Protocols; 2.3.1 Address-Based Authentication; 2.3.2 Passwords for Local Authentication (Login); 2.3.3 Passwords for Network Authentication; 2.3.4 Authentication Using SKC…”
    Libro electrónico
  17. 737
    por Northrup, Tony, 1974-
    Publicado 2005
    Tabla de Contenidos: “…Configure Apache; 2. Open the firewalls; 3. Determine your IP address; 4. Get a domain name; 5. …”
    Libro electrónico
  18. 738
    por Chapple, Mike
    Publicado 2024
    Tabla de Contenidos: “…Chapter 15 Threat Identification and Prevention: Objective 4.2 Understand Network Threats and Attacks -- Antivirus Software -- Intrusion Detection and Prevention -- Intrusion Detection -- Intrusion Prevention -- Environments Monitored -- Classification Errors -- Detection Techniques -- Firewalls -- Vulnerability Scanning -- Network Vulnerability Scanning -- Application Scanning -- Web Application Scanning -- Chapter 16 Network Security Infrastructure: Objective 4.3 Understand Network Security Infrastructure -- Data Center Protection -- Air Temperature -- Humidity -- Fire -- Network Security Zones -- Switches, WAPs, and Routers -- Switches -- WAPs -- Routers -- Network Segmentation -- Virtual Private Networks -- Network Access Control -- Role-Based Access Control -- Posture Checking -- Internet of Things -- IoT Security -- Chapter 17 Cloud Computing: Objective 4.3 Understand Network Security Infrastructure -- Cloud Computing -- Drivers for Cloud Computing -- Cloud Deployment Models -- Private Cloud -- Public Cloud -- Hybrid Cloud -- Community Cloud -- Cloud Service Categories -- Software as a Service (SaaS) -- Infrastructure as a Service (IaaS) -- Platform as a Service (PaaS) -- Desktop as a Service (DaaS) -- Security and the Shared Responsibility Model -- Automation and Orchestration -- Vendor Relationships -- Managed Service Providers -- Vendor Agreements -- Part V Domain 5: Security Operations -- Chapter 18 Encryption: Objective 5.1 Understand Data Security -- Cryptography -- Encrypting Data -- Decrypting Data -- Encryption Algorithms -- Symmetric Encryption -- Asymmetric Encryption -- Uses of Encryption -- Data at Rest -- Data in Transit -- Hash Functions -- MD5 -- SHA -- Chapter 19 Data Handling: Objective 5.1 Understand Data Security -- Data Life Cycle -- Create -- Store -- Use -- Share -- Archive -- Destroy -- Data Classification…”
    Libro electrónico
  19. 739
    Publicado 2021
    Tabla de Contenidos: “…Identifying potential microservices -- Code complexity and maintenance -- Metrics and Monitoring -- Logging -- Splitting a Monolith -- Feature Flags -- Refactoring Jeeves -- Workflow -- Summary -- Chapter 6: Interacting with Other Services -- Calling other web resources -- Finding out where to go -- Environment variables -- Service discovery -- Transferring data -- HTTP cache headers -- GZIP compression -- Protocol Buffers -- MessagePack -- Putting it together -- Asynchronous messages -- Message queue reliability -- Basic queues -- Topic exchanges and queues -- Publish/subscribe -- Putting it together -- Testing -- Using OpenAPI -- Summary -- Chapter 7: Securing Your Services -- The OAuth2 protocol -- X.509 certificate-based authentication -- Token-based authentication -- The JWT standard -- PyJWT -- Using a certificate with JWT -- The TokenDealer microservice -- The OAuth implementation -- Using TokenDealer -- Securing your code -- Limiting your application scope -- Untrusted incoming data -- Redirecting and trusting queries -- Sanitizing input data -- Using Bandit linter -- Dependencies -- Web application firewall -- OpenResty: Lua and nginx -- Rate and concurrency limiting -- Other OpenResty features -- Summary -- Chapter 8: Making a Dashboard -- Building a ReactJS dashboard -- The JSX syntax -- React components -- Pre-processing JSX -- ReactJS and Quart -- Cross-origin resource sharing -- Authentication and authorization -- A note about Micro Frontends -- Getting the Slack token -- JavaScript authentication -- Summary -- Chapter 9: Packaging and Running Python -- The packaging toolchain -- A few definitions -- Packaging -- The setup.py file -- The requirements.txt file -- The MANIFEST.in file -- Versioning -- Releasing -- Distributing -- Running all microservices -- Process management -- Summary -- Chapter 10: Deploying on AWS -- What is Docker?…”
    Libro electrónico
  20. 740
    Publicado 2019
    Tabla de Contenidos: “…-- Cloud Computing -- Data Transfer Rates -- Internet Security -- Malware -- Virus -- Worm -- Trojan -- Rootkit -- Ransomware -- Social Engineering -- Phishing -- Pharming -- Pretexting -- Shouldering -- Threat Prevention -- Biometric Measures -- Strong Passwords -- 2-Factor Authentication -- Public Key Cryptography -- Firewalls -- Index -- Blank Page…”
    Libro electrónico