Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
741por Colobran Huguet, MiquelTabla de Contenidos: “…Seguretat de la xarxa; 5.1. Tallafoc (firewall); 5.2 Sistemes de Detecció d'Intrusos (IDS); 5.3 Honeypots i honeynets; 5.4 Virtual Private Network (VPN); 6. …”
Publicado 2008
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
742por Gómez López, JulioTabla de Contenidos: “…ADMINISTRACIÓN DE LA RED; 6.1 ESQUEMA BÁSICO DE RED; 6.1.1 CONFIGURACIÓN DE LA RED; 6.1.2 ENRUTAMIENTO; 6.1.3 FIREWALL DE WINDOWS; 6.1.4 DHCP; 6.2 TERMINAL SERVER; 6.2.1 ESCRITORIO REMOTO; 6.2.2 SERVIDOR DE APLICACIONES; 6.2.3 CLIENTE DE TERMINAL SERVER; 6.3 WINDOWS SERVER UPDATE SERVICES; 6.3.1 INSTALACIÓN; 6.3.2 CLIENTE; 6.3.3 ADMINISTRACIÓN; RESUMEN DEL CAPÍTULO; EJERCICIOS PROPUESTOS; TEST DE CONOCIMIENTOS; CAPÍTULO 7. …”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
743Publicado 2021Tabla de Contenidos: “…Connecting to the Network -- Sharing stuff nicely with others -- USE YOUR FIREWALL! -- Playing Buck Rogers with FaceTime -- Sending Instant Messages Across the Network -- Part 4 Living the iLife -- Chapter 12 The Multimedia Joys of Music and TV -- What Can I Play in Music? …”
Libro electrónico -
744por Ceyland, SanverTabla de Contenidos: “…Solution development -- 4.1 What to know about the second section -- 4.2 Tivoli Storage Manager architecture considerations -- 4.2.1 Platform and server considerations -- 4.2.2 Server recommendations -- 4.2.3 Connecting with Tivoli Storage Manager across a firewall -- 4.2.4 Client architecture -- 4.3 Storage hierarchy -- 4.3.1 Policy components -- 4.3.2 Copy groups -- 4.3.3 Backup copy group -- 4.3.4 Archive copy group -- 4.3.5 Management class -- 4.3.6 Policy set -- 4.4 Planning disaster recovery management -- 4.4.1 Server recovery steps -- 4.4.2 Creation of up-to-date disaster recovery plan -- Chapter 5. …”
Publicado 2005
Libro electrónico -
745Publicado 2017Tabla de Contenidos: “…. -- See also -- Bypassing IDS/IPS/firewall -- Getting ready -- How to do it... -- How it works... -- There's more... -- Discovering ports over the network -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Using unicornscan for faster port scanning -- Getting ready -- How to do it... -- How it works... -- There's more... -- Service fingerprinting -- Getting ready…”
Libro electrónico -
746por Pogue, David, 1963-Tabla de Contenidos: “…Windows Live Writer -- Windows Media Player -- Windows PowerShell -- Windows Speech Recognition -- WordPad -- XPS Viewer -- The Control Panel -- Many Roads to Control Panel -- The Control Panel, Applet by Applet -- Part Three: Windows Online -- Hooking Up to the Internet -- Connecting to a WiFi Network -- Wired Connections -- Tethering and Cellular Modems -- Dial-Up Connections -- Connection Management -- Security & -- Privacy -- Windows Defender -- Action Center -- Windows Firewall -- Windows SmartScreen -- Privacy and Cookies -- History: Erasing Your Tracks -- The Pop-Up Blocker -- InPrivate Browsing -- Internet Security Zones -- Do Not Track -- Hotspot Security -- Protect Your Home Wireless Network -- Family Safety (Parental Controls) -- Internet Explorer 11 -- IE11 Desktop: The Grand Tour -- The Address/Search Bar -- Tabbed Browsing -- Favorites (Bookmarks) -- History List -- RSS: The Missing Manual -- Tips for Better Surfing -- The Keyboard Shortcut Master List -- Windows Live Mail -- Setting Up Windows Live Mail -- Checking Email -- Composing and Sending Messages -- Reading Email -- Quick Views, Custom Views (Filters) -- How to Process a Message -- Junk Email -- The World of Mail Settings -- The Contacts List -- Mail's Calendar -- RSS Feeds -- Newsgroups -- Part Four: Pictures & -- Music -- Windows Photo Gallery -- Photo Gallery: The Application -- Getting Pictures into Photo Gallery -- The Post-Dump Slideshow -- The Digital Shoebox -- People, Tags, Geotags, Captions, Ratings, and Flags -- Searching for Photos -- Editing Your Shots -- Finding Your Audience -- Windows Media Player -- The Lay of the Land -- Importing Music Files -- Music Playback -- Playlists -- Burning Your Own CDs -- Sharing Music on the Network -- Pictures and Videos -- Part Five: Hardware & -- Peripherals -- Printing, Fonts & -- Faxing -- Installing a Printer…”
Publicado 2013
Libro electrónico -
747Publicado 2023Tabla de Contenidos: “…6.3 Audacity - Alternative zu Adobe Audition (Audiobearbeitung) -- 6.4 Weitere Software -- Kapitel 7: Sicherheit unter Linux Mint und Probleme beseitigen -- 7.1 Ist Linux Mint sicherer als Windows? -- 7.2 GUFW - die Firewall -- 7.3 ClamTK - Virenscanner -- 7.4 Datensicherungen - Backups -- 7.5 Timeshift - Systemwiederherstellung -- 7.5.1 Timeshift am Terminal nutzen -- 7.6 Bekannte Probleme unter Linux Mint lösen -- 7.6.1 Aktuelle Hardware wird nicht erkannt - aktuelleren Kernel installieren -- 7.6.2 Linux Mint ist nicht vollständig in Deutsch -- 7.6.3 Linux Mint startet nicht aus dem Bootmenü heraus -- 7.6.4 Linux Mint startet nicht in die grafische Oberfläche -- 7.6.5 Die grafische Oberfläche startet nach der Installation eines Grafikkartentreibers nicht -- 7.6.6 Keine Rechte im eigenen Home-Verzeichnis -- 7.6.7 Woran liegt es, dass Linux Mint so langsam startet? …”
Libro electrónico -
748por Kunz, ChristopherTabla de Contenidos: “…4.12.3 Whitelist-Filtern mit »HTML Purifier«4.13 Die Zwischenablage per XSS auslesen; 4.14 XSS-Angriffe über DOM; 4.15 XSS in HTTP-Headern; 4.15.1 Angriffe der ersten Ordnung mit Headern; 4.15.2 Second Order XSS per Header; 4.16 Attack API; 4.17 Second Order XSS per RSS; 4.18 Cross-Site Request Forgery (CSRF); 4.18.1 CSRF als Firewall-Brecher; 4.18.2 CSRF in BBCode; 4.18.3 Ein erster Schutz gegen CSRF; 4.18.4 CSRF-Schutzmechanismen; 4.18.5 Formular-Token gegen CSRF; 4.18.6 Unheilige Allianz: CSRF und XSS; 5 SQL-Injection; 5.1 Grundlagen; 5.2 Auffinden von SQL-Injection-Möglichkeiten…”
Publicado 2008
Libro electrónico -
749Publicado 2021Tabla de Contenidos: “…Inverse kinematics analysis of 7-degree of freedom welding and drilling robot using artificial intelligence techniques -- 2.1 Introduction -- 2.2 Literature review -- 2.3 Modeling and design -- 2.3.1 Fitness function -- 2.3.2 Particle swarm optimization -- 2.3.3 Firefly algorithm -- 2.3.4 Proposed algorithm -- 2.4 Results and discussions -- 2.5 Conclusions and future work -- References -- 3. …”
Libro electrónico -
750Publicado 2017Tabla de Contenidos: “…Extending community cookbooks by using application wrapper cookbooks -- Creating custom Ohai plugins -- Creating custom knife plugins -- Chapter 4: Writing Better Cookbooks -- Introduction -- Setting environment variables -- Passing arguments to shell commands -- Overriding attributes -- Using search to find nodes -- Using data bags -- Using search to find data bag items -- Using encrypted data bag items -- Accessing data bag values from external scripts -- Getting information about the environment -- Writing cross-platform cookbooks -- Making recipes idempotent by using conditional execution -- Chapter 5: Working with Files and Packages -- Introduction -- Creating configuration files using templates -- Using pure Ruby in templates for conditionals and iterations -- Installing packages from a third-party repository -- Installing software from source -- Running a command when a file is updated -- Distributing directory trees -- Cleaning up old files -- Distributing different files based on the target platform -- Chapter 6: Users and Applications -- Introduction -- Creating users from data bags -- Securing the Secure Shell daemon -- Enabling passwordless sudo -- Managing NTP -- Installing nginx from source -- Creating nginx virtual hosts -- Creating MySQL databases and users -- Managing Ruby on Rails applications -- Managing Varnish -- Managing your local workstation with Chef Pantry -- Chapter 7: Servers and Cloud Infrastructure -- Introduction -- Creating cookbooks from a running system with Blueprint -- Running the same command on many machines at once -- Setting up SNMP for external monitoring services -- Deploying a Nagios monitoring server -- Using HAProxy to load-balance multiple web servers -- Using custom bootstrap scripts -- Managing firewalls with iptables -- Managing fail2ban to ban malicious IP addresses -- Managing Amazon EC2 instances…”
Libro electrónico -
751Publicado 2021Tabla de Contenidos: “…ARM Template, PowerShell, and Azure CLI -- Chapter Recap -- Chapter 6: Azure Storage -- Storage Accounts -- Account Types and Performance Tiers -- Storage Account Replication -- Creating a Storage Account -- Azure Portal -- ARM Template, PowerShell, and Azure CLI -- Blob Containers -- Blob Access Tier -- Creating a Blob Container -- Azure Portal -- ARM Template, PowerShell, and Azure CLI -- Azure Files -- Azure Files Tiers -- Creating Azure Files -- Azure Portal -- ARM Template, PowerShell, and Azure CLI -- Storage Account Security -- Storage Access Keys and Shared Access Signature -- Storage Networking -- Blob Container Access -- Encryption -- Data Transfer -- Storage Explorer -- AzCopy -- Data Box Gateway and Azure Stack Edge -- Import/Export Service -- Data Box -- Storage Account Management -- Changing Security Parameters -- Access Keys and Shared Access Keys -- Storage Networking and Encryption -- Storage Replication -- Lifecycle Management -- Managed Disks -- Types of Managed Disks -- Standard HDD Disk -- Standard SSD Disk -- Premium SSD Disk -- Ultra Disk -- Performance Tiers -- Managed Disk Security -- Creating a Managed Disk -- Azure Portal -- ARM Template, PowerShell, and Azure CLI -- Chapter Recap -- Chapter 7: Advanced Azure Networking -- Azure DNS -- Public DNS -- Creating a Public DNS Zone -- Azure Portal -- ARM Template, PowerShell, and Azure CLI -- Private DNS -- Creating a Private DNS Zone -- Azure Portal -- ARM Template, PowerShell, and Azure CLI -- Virtual Network Peering -- Creating Virtual Network Peering -- Azure Portal -- ARM Template, PowerShell, and Azure CLI -- Intersite Connectivity -- VNet-to-VNet Connection -- Creating a Virtual Network Gateway -- Azure Portal -- ARM Template, PowerShell, and Azure CLI -- Point-to-Site VPN -- Site-to-Site VPN -- ExpressRoute -- Azure Firewall -- Creating Azure Firewall -- Azure Portal…”
Libro electrónico -
752Publicado 2013Tabla de Contenidos: “…Networks -- Types of Networks -- Network Topology -- Star Topology -- Bus Topology -- Ring Topology -- Ethernet -- Ethernet Connections -- Fiber-Optic Connections -- Wireless Connections -- The OSI Reference Model -- Network Interface Cards and MAC Addresses -- Internet Protocol Addressing -- IPv4 -- IPv6 -- Subnet Masks -- Static IP Addressing -- Dynamic IP Addressing -- The Domain Name System -- Network Switches and Routers -- Network Switches -- Routers -- Gateways -- Bridges -- Network Security -- Network Access Control -- Firewalls -- Navigating Firewalls -- Chapter Review -- Review Questions -- Answers -- Chapter 7. …”
Libro electrónico -
753Publicado 2022Tabla de Contenidos: “…IPv6: Key Differences and Options -- Network Topographies -- Network Relationships -- Transmission Media Types -- Commonly Used Ports and Protocols -- Understand Network Attacks and Countermeasures -- CIANA+PS Layer by Layer -- Common Network Attack Types -- SCADA, IoT, and the Implications of Multilayer Protocols -- Manage Network Access Controls -- Network Access Control and Monitoring -- Network Access Control Standards and Protocols -- Remote Access Operation and Configuration -- Manage Network Security -- Logical and Physical Placement of Network Devices -- Segmentation -- Secure Device Management -- Operate and Configure Network-Based Security Devices -- Network Address Translation -- Additional Security Device Considerations -- Firewalls and Proxies -- Network Intrusion Detection/Prevention Systems -- Security Information and Event Management Systems -- Routers and Switches -- Network Security from Other Hardware Devices -- Traffic-Shaping Devices -- Operate and Configure Wireless Technologies -- Wireless: Common Characteristics -- Wi-Fi -- Bluetooth…”
Libro electrónico -
754Publicado 2024Tabla de Contenidos: “…Chapter 4: Design Principles for Secure Cloud Computing -- Security for IaaS, SaaS, and PaaS -- Security Considerations for Infrastructure as a Service (IaaS) -- Core Elements of Security for IaaS -- Security Considerations for Platform as a Service (PaaS) -- Core Elements of Security for PaaS -- Security Considerations for Software as a Service (SaaS) -- Core Elements of Security for SaaS -- Shared Responsibility Model for Cloud Service Models -- Review of Your Responsibilities -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 5: How to Evaluate Your Cloud Service Provider -- Key Cloud Service Contractual Documents -- CSA -- The Customer Agreement -- The CSA from a CSP Perspective -- AUP -- The Purpose of an AUP -- The Importance of an AUP -- SLA -- The Purpose of an SLA -- The Key Characteristics of an SLA -- The Importance of an SLA -- Evaluation of the CSP Services -- Know Your Business Needs -- Assessing Security and Compliance -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 6: Cloud Data Security Concepts and Architectures -- Structured and Unstructured Data -- Key Differences -- The Cloud Data Lifecycle -- Data Creation or Procurement -- Data Storage -- Data Usage -- Data Sharing -- Data Archiving -- Data Destruction -- Various Storage Types and Common Threats -- Object Storage -- File Storage -- Block Storage -- Prevalent Threats to Cloud Data -- Security Measures for Cloud Object Storage, File Storage, and Block Storage -- Data Classification and Discovery -- Recommended Data Classification Process -- Cloud Data Security Technologies and Common Strategies -- Encryption in Cloud Data Security -- IAM -- SIEM -- Firewall and Intrusion Detection Systems -- Data Loss Prevention Tools -- Critical Cloud Data Security Strategies -- Importance of a Cloud Security Policy…”
Libro electrónico -
755Publicado 2018Tabla de Contenidos: “…Boundary defense with firewalls and filtering -- Comprehensive access control -- Core and edge gateways -- Unidirectional gateway protection -- Asset discovery, visibility, and monitoring -- Physical security - the first line of defense -- Security assessment of IIoT connectivity standards and protocols -- Fieldbus protocols -- Connectivity framework standards -- Data Distribution Service -- DDS security -- oneM2M -- oneM2M security -- Open Platform Communications Unified Architecture (OPC UA) -- OPC UA security -- Web services and HTTP -- Web services and HTTP security -- Connectivity transport standards -- Transmission Control Protocol (TCP) -- TCP security -- User Datagram Protocol (UDP) -- UDP security -- MQTT and MQTT-SN -- MQTT security -- Constrained Application Protocol (CoAP) -- CoAP security -- Advanced Message Queuing Protocol (AMQP) -- Connectivity network standards -- Data link and physical access standards -- IEEE 802.15.4 WPAN -- IEEE 802.11 wireless LAN -- Cellular communications -- Wireless wide area network standards -- IEEE 802.16 (WiMAX) -- LoRaWAN -- Summary -- Chapter 6: Securing IIoT Edge, Cloud, and Apps -- Defining edge, fog, and cloud computing -- IIoT cloud security architecture -- Secured industrial site -- Secured edge intelligence -- Secure edge cloud transport -- Secure cloud services -- Cloud security - shared responsibility model -- Defense-in-depth cloud security strategy -- Infrastructure security -- Identity and access management -- Application security -- Microservice architecture -- Container security -- Credential store and vault -- Data protection -- Data governance -- Data encryption -- Key and digital certificate management -- Securing the data life cycle -- Cloud security operations life cycle -- Business continuity plan and disaster recovery -- Secure patch management -- Security monitoring…”
Libro electrónico -
756por McNab, Chris 1980-Tabla de Contenidos: “…Low-Level IP Assessment; 4.5.1.2. firewalk; 4.5.2. Passively Monitoring ICMP Responses; 4.5.3. …”
Publicado 2004
Libro electrónico -
757Publicado 2023Tabla de Contenidos: “…Chapter 11 Storage: Objective 2.5: Compare and contrast storage types -- Volatile Storage -- Nonvolatile Storage -- Chapter 12 Computing Devices: Objective 2.6: Compare and contrast common computing devices and their purposes -- Computing Device Types -- Internet of Things -- Chapter 13 TCP/IP Networking: Objective 2.7: Explain basic networking concepts -- Network Types -- TCP/IP Networking -- Network Addressing -- Chapter 14 Application Protocols: Objective 2.7: Explain basic networking concepts -- Application Protocols -- Chapter 15 Network Devices: Objective 2.7: Explain basic networking concepts -- Modems -- Switches -- Routers -- Firewalls -- Access Points -- Chapter 16 Wireless Networks: Objective 2.8: Given a scenario, install, configure, and secure a basic wireless network -- Wireless Networking -- Wireless Signal Propagation -- Wireless Security -- Wireless Encryption -- Part III Domain 3.0: Applications and Software -- Chapter 17 Operating Systems: Objective 3.1: Explain the purpose of operating systems -- Operating System Roles -- Operating System Types -- Chapter 18 Virtualization: Objective 3.1: Explain the purpose of operating systems -- Virtualization -- Chapter 19 Filesystems: Objective 3.2: Compare and contrast components of an operating system -- Files and Filesystems -- Filesystem Features -- Filesystem Types -- Chapter 20 Services and Processes: Objective 3.2: Compare and contrast components of an operating system -- Applications -- Processes -- Services -- Chapter 21 Drivers, Utilities, and Interfaces: Objective 3.2: Compare and contrast components of an operating system -- Drivers -- Interfaces -- Utilities -- Chapter 22 Software Types: Objective 3.3: Explain the purpose and proper use of software -- Software…”
Libro electrónico -
758por Ferreira, LuisTabla de Contenidos: “…Other disciplines -- 5.1 Introduction -- 5.2 Provisioning and orchestration -- 5.2.1 Provisioning and orchestration products -- 5.2.2 Provisioning and orchestration case study -- 5.2.3 Correlated products -- 5.3 Security -- 5.3.1 Firewalls, VPNs, and virtual organizations -- 5.3.2 Security products -- 5.3.3 Conclusions -- 5.4 Directory Services -- 5.4.1 Directory Services products -- 5.4.2 Conclusions -- 5.5 Licensing -- 5.5.1 Licensing products -- 5.5.2 Conclusion -- 5.6 Billing and metering -- 5.6.1 Conclusion -- Part 3 Bundles -- Chapter 6. …”
Publicado 2005
Libro electrónico -
759Publicado 2012Tabla de Contenidos: “…Postmortem -- Tall Tale 3 -- Postmortem -- Tall Tale 4 -- Honeypot 1 -- Postmortem -- Conclusion -- Chapter 8: Tools and Tactics -- Detection Technologies -- Host-Based Tools -- Antivirus Tools -- Digital Forensics -- Security Management Tools -- Network-Based Tools -- Firewalls -- Intrusion Detection/Prevention Systems -- Deception Technologies -- Honeywalls -- Honeynets as Part of Defense-in-Depth -- Research vs. …”
Libro electrónico -
760por Parasram, Shiva V. N.Tabla de Contenidos: “…Creating new cases and getting acquainted with the Autopsy 4 interface -- Analyzing directories and recovering deleted files and artifacts with Autopsy 4 -- Summary -- Part 5: Network Forensic Analysis Tools -- Chapter 14: Network Discovery Tools -- Using netdiscover in Kali Linux to identify devices on a network -- Using Nmap to find additional hosts and devices on a network -- Using Nmap to fingerprint host details -- Using Shodan.io to find IoT devices including firewalls, CCTV, and servers -- Using Shodan filters for IoT searches -- Summary -- Chapter 15: Packet Capture Analysis with Xplico -- Installing Xplico in Kali Linux -- Installing DEFT Linux 8.1 in VirtualBox -- Downloading sample analysis files -- Starting Xplico in DEFT Linux -- Using Xplico to automatically analyze web, email, and voice traffic -- Automated web traffic analysis -- Automated SMTP traffic analysis -- Automated VoIP traffic analysis -- Summary -- Chapter 16: Network Forensic Analysis Tools -- Capturing packets using Wireshark -- Packet analysis using NetworkMiner -- Packet capture analysis with PcapXray -- Online PCAP analysis using packettotal.com -- Online PCAP analysis using apackets.com -- Reporting and presentation -- Summary -- Index -- Other Books You May Enjoy…”
Publicado 2023
Libro electrónico