Mostrando 781 - 800 Resultados de 1,060 Para Buscar 'Firefall~', tiempo de consulta: 1.65s Limitar resultados
  1. 781
    por Blyth, Andrew
    Publicado 2024
    Tabla de Contenidos: “…Chapter 9: PowerShell and FTP, SFTP, SSH, and TFTP -- PowerShell and FTP -- Banner grabbing for FTP -- Connecting to an FTP server -- Brute-forcing authentication of an FTP connection -- Anonymous access check -- SSL/TLS support for an FTP server -- Listing files on the FTP server -- Uploading a file to an FTP server -- Downloading a file from an FTP server -- Strong password policies for FTP -- Firewall and access control lists for FTP -- PowerShell and TFTP -- Identifying the TFTP server -- Enumerating a TFTP server configuration -- Verifying access controls for TFTP -- PowerShell and SSH, SCP, and SFTP -- SSH server configuration assessment -- Brute-forcing authentication for SSH -- SSH server access control -- Reviewing user access -- SCP server configuration assessment -- SFTP server configuration assessment -- Reviewing SFTP configuration -- Security auditing tools for SSH -- User authentication and authorization -- Monitoring and logging -- Modules -- Summary -- Chapter 10: Brute Forcing in PowerShell -- Brute forcing, in general, using PowerShell -- Automated scripting -- Password list attacks -- Dictionary attacks -- Credential stuffing -- Rate limiting and stealth -- Brute forcing FTP using PowerShell -- Setting up the environment -- Creating credential lists -- FTP login attempt script -- Handling FTP server responses -- Rate limiting and stealth -- Logging and reporting -- Brute forcing SSH using PowerShell -- Setting up the environment -- Creating credential lists -- SSH login attempt script -- Handling SSH server responses -- Rate limiting and stealth -- Logging and reporting -- Brute forcing web services using PowerShell -- Understanding the web service -- Setting up the environment -- Installing required modules -- Creating credential lists -- Web service authentication -- Handling web service responses -- Rate limiting and stealth…”
    Libro electrónico
  2. 782
    por Edelman, Jason
    Publicado 2024
    Tabla de Contenidos: “…Navigation menu -- Nautobot home page and panels -- Footer navigation -- Table views -- Detailed views -- Managing inventory and bootstrapping your first installation -- Identifying your data -- Organizational data -- Device data -- Summary -- Chapter 5: Configuring Nautobot Core Data Models -- IP address management in Nautobot -- IP addresses -- Prefixes -- Namespaces -- VRFs -- VLANs -- RIRs -- Configuring IP address management in Nautobot -- IPAM configuration for Wayne Enterprises -- Modeling HA and virtual devices -- Device Redundancy Groups -- Virtual chassis -- Key differences between device redundancy and virtual chassis -- Setting up a firewall redundancy group for Wayne Enterprises in Nautobot -- Interface Redundancy Groups -- Cabling and power management -- Cables -- Incorporating power management with cabling -- Power panels -- Power feeds -- Understanding the blast radius through comprehensive data -- Secrets management -- Why use secrets? …”
    Libro electrónico
  3. 783
    Publicado 2022
    Tabla de Contenidos: “…13.6 Data and Result Analysis -- 13.7 Conclusion and Future Scope -- References -- 14 Skin Cancer Classification: Analysis of Different CNN Models via Classification Accuracy -- 14.1 Introduction -- 14.2 Literature Survey -- 14.3 Methodology -- 14.3.1 Dataset Preparation -- 14.3.2 Dataset Loading and Data Pre-Processing -- 14.3.3 Creating Models -- 14.4 Models Used -- 14.5 Simulation Results -- 14.5.1 Changing Size of MaxPool2D(n,n) -- 14.5.2 Changing Size of AveragePool2D(n,n) -- 14.5.3 Changing Number of con2d(32n-64n) Layers -- 14.5.4 Changing Number of con2d-32*n Layers -- 14.5.5 ROC Curves and MSE Curves -- 14.6 Conclusion -- References -- 15 Route Mapping of Multiple Humanoid Robots Using Firefly-Based Artificial Potential Field Algorithm in a Cluttered Terrain -- 15.1 Introduction -- 15.2 Design of Proposed Algorithm -- 15.2.1 Mechanism of Artificial Potential Field -- 15.2.1.1 Potential Field Generated by Attractive Force of Goal -- 15.2.1.2 Potential Field Generated by Repulsive Force of Obstacle -- 15.2.2 Mechanism of Firefly Algorithm -- 15.2.2.1 Architecture of Optimization Problem Based on Firefly Algorithm -- 15.2.3 Dining Philosopher Controller -- 15.3 Hybridization Process of Proposed Algorithm -- 15.4 Execution of Proposed Algorithm in Multiple Humanoid Robots -- 15.5 Comparison -- 15.6 Conclusion -- References -- 16 Innovative Practices in Education Systems Using Artificial Intelligence for Advanced Society -- 16.1 Introduction -- 16.2 Literature Survey -- 16.2.1 AI in Auto-Grading -- 16.2.2 AI in Smart Content -- 16.2.3 AI in Auto Analysis on Student's Grade -- 16.2.4 AI Extends Free Intelligent Tutoring -- 16.2.5 AI in Predicting Student Admission and Drop-Out Rate -- 16.3 Proposed System -- 16.3.1 Data Collection Module -- 16.3.2 Data Pre-Processing Module -- 16.3.3 Clustering Module -- 16.3.4 Partner Selection Module…”
    Libro electrónico
  4. 784
    Publicado 2016
    Tabla de Contenidos: “…Backing up and restoring packages -- Making use of aptitude -- Installing Snap packages -- Summary -- Chapter 6: Controlling and Monitoring Processes -- Showing running processes with the ps command -- Managing jobs -- Killing misbehaving processes -- Utilizing htop -- Managing system processes -- Monitoring memory usage -- Scheduling tasks with Cron -- Understanding load average -- Summary -- Chapter 7: Managing Your Ubuntu Server Network -- Planning your IP address scheme -- Serving IP addresses with isc-dhcp-server -- Setting up name resolution (DNS) with bind -- Creating a secondary DNS server -- Setting up an Internet gateway -- Keeping your system clock in sync with NTP -- Summary -- Chapter 8: Accessing and Sharing Files -- File server considerations -- Sharing files with Windows users using Samba -- Setting up NFS shares -- Transferring files with rsync -- Transferring files with SCP -- Mounting remote filesystems with SSHFS -- Summary -- Chapter 9: Managing Databases -- Preparations for setting up a database server -- Installing MariaDB -- Taking a look at MariaDB configuration -- Understanding how MariaDB differs in Ubuntu 16.04 -- Managing databases -- Setting up a slave DB server -- Summary -- Chapter 10: Serving Web Content -- Installing and configuring Apache -- Installing additional Apache modules -- Securing Apache with SSL -- Setting up high availability with keepalived -- Installing and configuring ownCloud -- Summary -- Chapter 11 : Virtualizing Hosts and Applications -- Setting up a virtual machine server -- Creating virtual machines -- Bridging the virtual machine network -- Creating, running, and managing Docker containers -- Summary -- Chapter 12 : Securing Your Server -- Lowering your attack surface -- Securing OpenSSH -- Installing and configuring Fail2ban -- MariaDB best practices -- Setting up a firewall…”
    Libro electrónico
  5. 785
    por Vyncke, Eric, Paggen, Christopher
    Publicado 2008
    Tabla de Contenidos: “…-- Securing the Control Plane on a Switch -- Implementing Hardware-Based CoPP -- Implementing Software-Based CoPP -- Mitigating Attacks Using CoPP -- Summary -- References -- Chapter 14 Disabling Control Plane Protocols -- Configuring Switches Without Control Plane Protocols -- Summary -- Chapter 15 Using Switches to Detect a Data Plane DoS -- Detecting DoS with NetFlow -- Securing Networks with RMON -- Other Techniques That Detect Active Worms -- Summary -- References -- Part III: Using Switches to Augment the Network Security -- Chapter 16 Wire Speed Access Control Lists -- ACLs or Firewalls? -- State or No State? -- Protecting the Infrastructure Using ACLs -- RACL, VACL, and PACL: Many Types of ACLs -- Technology Behind Fast ACL Lookups -- Summary -- Chapter 17 Identity-Based Networking Services with 802.1X -- Foundation -- Basic Identity Concepts -- Discovering Extensible Authentication Protocol -- Exploring IEEE 802.1X -- 802.1X Security -- Working with Multiple Devices -- Working with Devices Incapable of 802.1X -- Policy Enforcement -- Summary -- References -- Part IV: What Is Next in LAN Security? …”
    Libro electrónico
  6. 786
    Publicado 2011
    Tabla de Contenidos: “…A Multi-Get Interface -- The Vote Interface -- API Design Guidelines -- Models -- Rails -- Rails 2.3 Routes -- Rails 3 Routes -- The Rails Controller -- Sinatra -- Rack -- Conclusion -- 6 Connecting to Services -- Blocking I/O, Threading, and Parallelism -- Asynchronous I/O -- Multi-threading -- Typhoeus -- Making Single Requests -- Making Simultaneous Requests -- Multi-threaded Requests -- JRuby -- Logging for Performance -- Handling Error Conditions -- Testing and Mocking Service Calls -- Requests in Development Environments -- Conclusion -- 7 Developing Service Client Libraries -- Packaging -- Jeweler -- Building and Deploying a Library -- Parsing Logic -- The JSON Gem -- YAJL Ruby -- Wrapping Parsed Results -- ActiveModel -- Validations -- Serialization -- Connection and Request Logic -- Data Reads -- Data Writes -- Mocks, Stubs, and Tests -- Conclusion -- 8 Load Balancing and Caching -- Latency and Throughput -- Load Balancing -- Load Balancing Algorithms -- Implementing Load Balancing -- Caching with Memcached -- The Memcached Client and ActiveRecord -- Time-Based Expiration -- Manual Expiration -- Generational Cache Keys -- HTTP Caching -- Expiration-Based Caching -- Validation-Based Caching -- Implementing HTTP Caching -- Conclusion -- 9 Parsing XML for Legacy Services -- XML -- REXML -- Nokogiri -- SOAP -- Exploring Web Services with a WSDL File -- Making Requests -- Conclusion -- 10 Security -- Authentication -- HTTP Authentication -- Signing Requests -- SSL for Authentication -- Authentication for Rails Applications -- Authorization -- Firewalls -- An RBAC Authorization Service -- Encryption -- SSL for Encryption -- Public/Private Key Pairs for Encryption -- Conclusion -- 11 Messaging -- What Is Messaging? …”
    Libro electrónico
  7. 787
    Publicado 2017
    Tabla de Contenidos: “…. -- Brute forcing WordPress installations -- Brute forcing WordPress installations -- Detecting web application firewalls -- How to do it... -- How it works... -- There's more... -- Detecting possible XST vulnerabilities -- How to do it... -- How it works…”
    Libro electrónico
  8. 788
    Publicado 2019
    Tabla de Contenidos: “…-- Equipment failure -- Platform instability -- Database design flaws -- Data-entry errors -- Operator error -- Taking Advantage of RAID -- Striping -- RAID levels -- Backing Up Your System -- Preparation for the worst -- Full or incremental backup -- Frequency -- Backup maintenance -- Coping with Internet Threats -- Viruses -- Trojan horses -- Worms -- Denial-of-service attacks -- SQL injection attacks -- Phishing scams -- Zombie spambots -- Installing Layers of Protection -- Network-layer firewalls -- Application-layer firewalls -- Antivirus software -- Vulnerabilities, exploits, and patches -- Education -- Alertness -- Chapter 2 Protecting Against User Errors and Conflicts -- Reducing Data-Entry Errors -- Data types: The first line of defense -- Constraints: The second line of defense -- Sharp-eyed humans: The third line of defense -- Coping with Errors in Database Design -- Handling Programming Errors -- Solving Concurrent-Operation Conflicts -- Passing the ACID Test: Atomicity, Consistency, Isolation, and Durability -- Operating with Transactions -- Using the SET TRANSACTION statement -- Starting a transaction -- Committing a transaction…”
    Libro electrónico
  9. 789
    Publicado 2011
    Tabla de Contenidos: “…Special Situations -- Using Cd/Rw and Dvd/Rw/R+/R- Devices -- Virtual Guest Tagging Driver -- Virtual Hardware for Non-Disk Scsi Devices -- Virtual Hardware for Raw Disk Map Access to Remote Scsi -- Virtual Hardware for Rdm-Like Access to Local Scsi -- Vm Disk Modes and Snapshots -- Os Installation Peculiarities -- Cloning, Templates, and Deploying Vms -- Vm Solutions -- Private Lab -- Firewalled Private Lab -- Firewalled Lab Bench -- Cluster in a Box -- Cluster Between Esx Hosts -- Cluster Between Virtual and Physical Servers -- Vcenter As a Vm -- Virtual Appliances -- Vmware Tools -- Vmx Changes -- Conclusion -- Chapter 11 Dynamic Resource Load Balancing -- Defining Drlb -- The Basics -- The Advanced Features -- Shares -- Resource Pool Addendum -- Network Resources -- Disk Resources -- Cpu Resources -- Memory Resources -- Vapps -- Monitoring -- Alarms -- Performance Analysis -- Putting It All Together -- Conclusion -- Chapter 12 Disaster Recovery, Business Continuity, And Backup -- Disaster Types -- Recovery Methods -- Best Practices -- Backup and Business Continuity -- Backup -- Business Continuity -- The Tools -- Local Tape Devices -- Vmware Data Recovery -- Third-Party Tools -- Conclusion -- Epilogue: The Future Of The Virtual Environment -- References -- Index…”
    Libro electrónico
  10. 790
    Publicado 2018
    Tabla de Contenidos: “…. -- Creating a simple NAT and DMZ firewall -- Getting ready -- How to do it... -- How it works... -- Parsing a GitHub project and generate a report -- Getting ready -- How to do it... -- How it works... -- Creating a poor man's incremental remote backup -- Getting ready -- How to do it... -- How it works...…”
    Libro electrónico
  11. 791
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Foundations of AWS Security -- Chapter 1: Introduction to AWS Security Concepts and Shared Responsibility Model -- Cloud security overview - its importance and challenges -- The significance of cloud security -- Cloud security challenges -- AWS shared responsibility model -- Security "of" the cloud -- Security "in" the cloud -- IaaS, PaaS, SaaS - different levels of responsibility -- Shared responsibility in practice - a closer look at AWS compute -- The importance of understanding the shared responsibility model -- AWS global infrastructure and security -- Regions -- AZs -- Edge locations -- AWS security best practices - general guidelines -- Understand the shared responsibility model -- Use AWS security services and features -- Implement a strong identity and access management strategy -- Protect your data -- Ensure network security -- Integrate security into your development life cycle -- Monitor and audit your environment -- Continuously improve your security posture -- Summary -- Questions -- Answers -- Further reading -- Chapter 2: Infrastructure Security - Keeping Your VPC secure -- Designing secure VPCs -- Understanding VPCs and their importance -- Key components of a VPC -- Best practices for designing secure VPCs -- Implementing security groups, NACLs, and AWS Network Firewall -- Overview -- Using security groups -- Using NACLs -- Using AWS Network Firewall -- Configuring AWS Shield and AWS WAF for advanced protection -- Enabling AWS Shield for DDoS protection -- Configuring AWS WAF for web application protection -- Summary -- Questions -- Answers -- Further reading -- Chapter 3: Identity and Access Management - Securing Users, Roles, and Policies -- Access control models -- Access control models overview -- Understanding RBAC…”
    Libro electrónico
  12. 792
    por Kammermann, Markus
    Publicado 2022
    Tabla de Contenidos: “…-- 14.2.1 »Sie machen es dem Angreifer ja auch einfach« -- 14.2.2 Denial-of-Service-Attacken -- 14.2.3 Pufferüberlauf -- 14.2.4 Man-in-the-Middle-Attacken -- 14.2.5 Spoofing -- 14.3 Angriffe gegen IT-Systeme -- 14.3.1 Exploits und Exploit-Kits -- 14.4 Social Engineering -- 14.4.1 Die Ziele des Social Engineers -- 14.4.2 Beliebter Ansatz: Phishing-Mails -- 14.4.3 Tailgating und andere Methoden -- 14.5 Angriffspunkt drahtloses Netzwerk -- 14.6 Der freundliche Mitarbeiter -- 14.7 Fragen zum Kapitel -- Kapitel 15: Die Verteidigung des Netzwerks -- 15.1 Physikalische Sicherheit -- 15.1.1 Zutrittsregelungen‌ -- 15.1.2 Vom Badge bis zur Biometrie -- 15.1.3 Zutrittsschleusen und Videoüberwachung -- 15.1.4 Schutz gegen Einbruch, Feuer und Wasser -- 15.1.5 Klimatisierung und Kühlung -- 15.1.6 Fachgerechte Inventarisierung und Entfernung -- 15.2 Fehlertoleranter Aufbau -- 15.3 Datensicherung -- 15.4 Virenschutz mit Konzept -- 15.5 Netzwerkhärtung -- 15.6 Firewalls -- 15.6.1 Verschiedene Firewall-Typen -- 15.6.2 Das Konzept der DMZ‌ -- 15.6.3 Erweiterte Funktionen einer Firewall -- 15.6.4 Der Proxyserver -- 15.6.5 IDS und IPS -- 15.7 Aktive Suche nach Schwachstellen‌ -- 15.8 Die Rolle des Risiko-Managements -- 15.9 Verteidigungskonzepte -- 15.9.1 Die Auswertung von Überwachungen -- 15.9.2 Notfallvorsorge -- 15.9.3 Die First Responders -- 15.9.4 Und das alles zusammen? …”
    Libro electrónico
  13. 793
    Publicado 2018
    Tabla de Contenidos: “…. -- Chapter 8: Servers and Cloud Infrastructure -- Introduction -- Managing firewalls with iptables -- Getting ready -- How to do it... -- How it works... -- There's more... -- Building high-availability services using Keepalived -- Getting ready -- How to do it... -- How it works... -- There's more... -- Managing NFS servers and file shares -- How to do it... -- How it works... -- Using HAProxy to load balance multiple web servers -- How to do it... -- How it works... -- There's more... -- Managing EC2 instances -- Getting ready -- How to do it... -- How it works... -- There's more... -- Managing virtual machines with Vagrant -- Getting ready -- How to do it... -- How it works... -- There's more... -- Managing Docker with Puppet -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 9: External Tools and the Puppet Ecosystem -- Introduction -- Creating custom facts -- How to do it... -- How it works... -- There's more…”
    Libro electrónico
  14. 794
    Publicado 2017
    Tabla de Contenidos: “…. -- Differences from traditional firewalls -- Creating a load balancer -- How to do it... -- How it works... -- There's more... -- HTTPS/SSL -- Path-based routing -- Chapter 5: Management Tools -- Introduction -- Auditing your AWS account -- How to do it... -- How it works... -- There's more... -- Recommendations with Trusted Advisor -- How to do it... -- How it works... -- There's more... -- Creating e-mail alarms -- How to do it... -- How it works... -- There's more... -- Existing topics -- Other subscriptions -- See also -- Publishing custom metrics in CloudWatch -- Getting ready -- How to do it... -- How it works... -- There's more... -- Cron -- Auto scaling -- Backfilling -- See also -- Creating monitoring dashboards -- Getting ready -- How to do it... -- There's more... -- Widget types -- See also -- Creating a budget -- Getting ready -- How to do it... -- How it works... -- Feeding log files into CloudWatch logs -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 6: Database Services -- Introduction -- Creating a database with automatic failover -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating a NAT gateway -- Getting ready -- How to do it... -- How it works... -- See also -- Creating a database read-replica -- Getting ready -- How to do it... -- How it works... -- There's more... -- Promoting a read-replica to master -- Getting ready -- How to do it... -- Creating a one-time database backup -- Getting ready -- How to do it... -- Restoring a database from a snapshot -- Getting ready -- How to do it... -- There's more…”
    Libro electrónico
  15. 795
    por Barrett, Daniel J.
    Publicado 2005
    Tabla de Contenidos: “…1.4.4 Keys and Agents1.4.5 Access Control; 1.4.6 Port Forwarding; 1.5 History of SSH; 1.6 Related Technologies; 1.6.1 rsh Suite (r-Commands); 1.6.2 Pretty Good Privacy (PGP) and GNU Privacy Guard (GnuPG); 1.6.3 Kerberos; 1.6.4 IPSEC and Virtual Private Networks; 1.6.5 Secure Remote Password (SRP); 1.6.6 Secure Socket Layer (SSL) Protocol; 1.6.7 SSL-Enhanced Telnet and FTP; 1.6.8 stunnel; 1.6.9 Firewalls; 1.7 Summary; Basic Client Use; 2.1 A Running Example; 2.2 Remote Terminal Sessions with ssh; 2.2.1 File Transfer with scp; 2.3 Adding Complexity to the Example; 2.3.1 Known Hosts…”
    Libro electrónico
  16. 796
    por Bucker, Axel
    Publicado 2003
    Tabla de Contenidos: “…6.4 Design approach -- 6.5 Implementation architecture -- 6.6 Technical implementation -- 6.6.1 Precondition -- 6.6.2 Sample Custom SOAP rpc Servlet -- 6.7 Conclusion -- Part 4 Appendixes -- Appendix A. mySAP Workplace integration guide -- Overview -- Version information -- Configuration -- WebSEAL configuration -- mySAP Workplace configuration -- Management issues -- User administration -- Appendix B. mySAP Enterprise Portal integration guide -- Overview -- Integration product version information -- Scenario 1 -- Configure WebSEAL -- Configure SAP Enterprise Portal -- Scenario 2 -- Configure WebSEAL -- Configure mySAP Enterprise Portal -- Other integration considerations -- Configuring network firewalls -- Known problems -- Tivoli Access Manager global sign-On (GSO) -- Creating a Tivoli Access Manager GSO resource -- Creating the WebSEAL GSO junction -- Creating and modifying WebSEAL users -- Creating a resource credential -- Configure back-end Web server for BA authentication -- GSO administration and management considerations -- Initial GSO credential population -- Multiple point of access -- GSO password management and synchronization -- Password synchronization between the same registry -- Password synchronization between Access Manager and NT domains -- Appendix C. …”
    Libro electrónico
  17. 797
    por Dooley, Kevin
    Publicado 2002
    Tabla de Contenidos: “…FDDI; 4.7. Wireless; 4.8. Firewalls and Gateways; 4.9. Structured Cabling; 4.9.2. …”
    Libro electrónico
  18. 798
    por Lucas, Michael, 1967-
    Publicado 2013
    “…OpenBSD, the elegant, highly secure Unix-like operating system, is widely used as the basis for critical DNS servers, routers, firewalls, and more. This long-awaited second edition of Absolute OpenBSD maintains author Michael Lucas's trademark straightforward and practical approach that readers have enjoyed for years. …”
    Libro electrónico
  19. 799
    Publicado 2013
    Tabla de Contenidos: “…Control Surfaces -- Landing Gear -- Types of Landing Gear -- Powerplant Structures -- Nacelles -- Firewalls -- Engine Mounts -- Cowling and Fairings -- Rotorcraft Structures -- Fuselage -- Landing Gear -- Review Questions -- 3. …”
    Libro electrónico
  20. 800
    Publicado 2016
    Tabla de Contenidos: “…Front Cover; Multiscale Modeling for Process Safety Applications; Copyright; Contents; Preface; Acknowledgments; 1 - INTRODUCTION; REFERENCES; 2 - PROCESS SAFETY; 2.1 FIRE; 2.1.1 THE FIRE TRIANGLE; 2.1.2 IGNITION PHENOMENA; 2.1.3 FLAMMABILITY LIMITS OF GASES AND VAPORS; 2.1.4 TYPES OF FIRES; 2.1.4.1 Diffusion fires; Jet fires; Natural fires; Pool fires; Fireballs; 2.1.4.2 Premixed fires; Flash fires; 2.1.5 FIRE RISK ANALYSIS; 2.2 EXPLOSION; 2.2.1 DEFLAGRATION AND DETONATION; 2.2.2 EXPLOSION ENERGY; 2.2.2.1 Energy of chemical explosions; 2.2.2.2 Energy of mechanical explosions…”
    Libro electrónico