Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
781por Blyth, AndrewTabla de Contenidos: “…Chapter 9: PowerShell and FTP, SFTP, SSH, and TFTP -- PowerShell and FTP -- Banner grabbing for FTP -- Connecting to an FTP server -- Brute-forcing authentication of an FTP connection -- Anonymous access check -- SSL/TLS support for an FTP server -- Listing files on the FTP server -- Uploading a file to an FTP server -- Downloading a file from an FTP server -- Strong password policies for FTP -- Firewall and access control lists for FTP -- PowerShell and TFTP -- Identifying the TFTP server -- Enumerating a TFTP server configuration -- Verifying access controls for TFTP -- PowerShell and SSH, SCP, and SFTP -- SSH server configuration assessment -- Brute-forcing authentication for SSH -- SSH server access control -- Reviewing user access -- SCP server configuration assessment -- SFTP server configuration assessment -- Reviewing SFTP configuration -- Security auditing tools for SSH -- User authentication and authorization -- Monitoring and logging -- Modules -- Summary -- Chapter 10: Brute Forcing in PowerShell -- Brute forcing, in general, using PowerShell -- Automated scripting -- Password list attacks -- Dictionary attacks -- Credential stuffing -- Rate limiting and stealth -- Brute forcing FTP using PowerShell -- Setting up the environment -- Creating credential lists -- FTP login attempt script -- Handling FTP server responses -- Rate limiting and stealth -- Logging and reporting -- Brute forcing SSH using PowerShell -- Setting up the environment -- Creating credential lists -- SSH login attempt script -- Handling SSH server responses -- Rate limiting and stealth -- Logging and reporting -- Brute forcing web services using PowerShell -- Understanding the web service -- Setting up the environment -- Installing required modules -- Creating credential lists -- Web service authentication -- Handling web service responses -- Rate limiting and stealth…”
Publicado 2024
Libro electrónico -
782por Edelman, JasonTabla de Contenidos: “…Navigation menu -- Nautobot home page and panels -- Footer navigation -- Table views -- Detailed views -- Managing inventory and bootstrapping your first installation -- Identifying your data -- Organizational data -- Device data -- Summary -- Chapter 5: Configuring Nautobot Core Data Models -- IP address management in Nautobot -- IP addresses -- Prefixes -- Namespaces -- VRFs -- VLANs -- RIRs -- Configuring IP address management in Nautobot -- IPAM configuration for Wayne Enterprises -- Modeling HA and virtual devices -- Device Redundancy Groups -- Virtual chassis -- Key differences between device redundancy and virtual chassis -- Setting up a firewall redundancy group for Wayne Enterprises in Nautobot -- Interface Redundancy Groups -- Cabling and power management -- Cables -- Incorporating power management with cabling -- Power panels -- Power feeds -- Understanding the blast radius through comprehensive data -- Secrets management -- Why use secrets? …”
Publicado 2024
Libro electrónico -
783Publicado 2022Tabla de Contenidos: “…13.6 Data and Result Analysis -- 13.7 Conclusion and Future Scope -- References -- 14 Skin Cancer Classification: Analysis of Different CNN Models via Classification Accuracy -- 14.1 Introduction -- 14.2 Literature Survey -- 14.3 Methodology -- 14.3.1 Dataset Preparation -- 14.3.2 Dataset Loading and Data Pre-Processing -- 14.3.3 Creating Models -- 14.4 Models Used -- 14.5 Simulation Results -- 14.5.1 Changing Size of MaxPool2D(n,n) -- 14.5.2 Changing Size of AveragePool2D(n,n) -- 14.5.3 Changing Number of con2d(32n-64n) Layers -- 14.5.4 Changing Number of con2d-32*n Layers -- 14.5.5 ROC Curves and MSE Curves -- 14.6 Conclusion -- References -- 15 Route Mapping of Multiple Humanoid Robots Using Firefly-Based Artificial Potential Field Algorithm in a Cluttered Terrain -- 15.1 Introduction -- 15.2 Design of Proposed Algorithm -- 15.2.1 Mechanism of Artificial Potential Field -- 15.2.1.1 Potential Field Generated by Attractive Force of Goal -- 15.2.1.2 Potential Field Generated by Repulsive Force of Obstacle -- 15.2.2 Mechanism of Firefly Algorithm -- 15.2.2.1 Architecture of Optimization Problem Based on Firefly Algorithm -- 15.2.3 Dining Philosopher Controller -- 15.3 Hybridization Process of Proposed Algorithm -- 15.4 Execution of Proposed Algorithm in Multiple Humanoid Robots -- 15.5 Comparison -- 15.6 Conclusion -- References -- 16 Innovative Practices in Education Systems Using Artificial Intelligence for Advanced Society -- 16.1 Introduction -- 16.2 Literature Survey -- 16.2.1 AI in Auto-Grading -- 16.2.2 AI in Smart Content -- 16.2.3 AI in Auto Analysis on Student's Grade -- 16.2.4 AI Extends Free Intelligent Tutoring -- 16.2.5 AI in Predicting Student Admission and Drop-Out Rate -- 16.3 Proposed System -- 16.3.1 Data Collection Module -- 16.3.2 Data Pre-Processing Module -- 16.3.3 Clustering Module -- 16.3.4 Partner Selection Module…”
Libro electrónico -
784Publicado 2016Tabla de Contenidos: “…Backing up and restoring packages -- Making use of aptitude -- Installing Snap packages -- Summary -- Chapter 6: Controlling and Monitoring Processes -- Showing running processes with the ps command -- Managing jobs -- Killing misbehaving processes -- Utilizing htop -- Managing system processes -- Monitoring memory usage -- Scheduling tasks with Cron -- Understanding load average -- Summary -- Chapter 7: Managing Your Ubuntu Server Network -- Planning your IP address scheme -- Serving IP addresses with isc-dhcp-server -- Setting up name resolution (DNS) with bind -- Creating a secondary DNS server -- Setting up an Internet gateway -- Keeping your system clock in sync with NTP -- Summary -- Chapter 8: Accessing and Sharing Files -- File server considerations -- Sharing files with Windows users using Samba -- Setting up NFS shares -- Transferring files with rsync -- Transferring files with SCP -- Mounting remote filesystems with SSHFS -- Summary -- Chapter 9: Managing Databases -- Preparations for setting up a database server -- Installing MariaDB -- Taking a look at MariaDB configuration -- Understanding how MariaDB differs in Ubuntu 16.04 -- Managing databases -- Setting up a slave DB server -- Summary -- Chapter 10: Serving Web Content -- Installing and configuring Apache -- Installing additional Apache modules -- Securing Apache with SSL -- Setting up high availability with keepalived -- Installing and configuring ownCloud -- Summary -- Chapter 11 : Virtualizing Hosts and Applications -- Setting up a virtual machine server -- Creating virtual machines -- Bridging the virtual machine network -- Creating, running, and managing Docker containers -- Summary -- Chapter 12 : Securing Your Server -- Lowering your attack surface -- Securing OpenSSH -- Installing and configuring Fail2ban -- MariaDB best practices -- Setting up a firewall…”
Libro electrónico -
785Tabla de Contenidos: “…-- Securing the Control Plane on a Switch -- Implementing Hardware-Based CoPP -- Implementing Software-Based CoPP -- Mitigating Attacks Using CoPP -- Summary -- References -- Chapter 14 Disabling Control Plane Protocols -- Configuring Switches Without Control Plane Protocols -- Summary -- Chapter 15 Using Switches to Detect a Data Plane DoS -- Detecting DoS with NetFlow -- Securing Networks with RMON -- Other Techniques That Detect Active Worms -- Summary -- References -- Part III: Using Switches to Augment the Network Security -- Chapter 16 Wire Speed Access Control Lists -- ACLs or Firewalls? -- State or No State? -- Protecting the Infrastructure Using ACLs -- RACL, VACL, and PACL: Many Types of ACLs -- Technology Behind Fast ACL Lookups -- Summary -- Chapter 17 Identity-Based Networking Services with 802.1X -- Foundation -- Basic Identity Concepts -- Discovering Extensible Authentication Protocol -- Exploring IEEE 802.1X -- 802.1X Security -- Working with Multiple Devices -- Working with Devices Incapable of 802.1X -- Policy Enforcement -- Summary -- References -- Part IV: What Is Next in LAN Security? …”
Libro electrónico -
786Publicado 2011Tabla de Contenidos: “…A Multi-Get Interface -- The Vote Interface -- API Design Guidelines -- Models -- Rails -- Rails 2.3 Routes -- Rails 3 Routes -- The Rails Controller -- Sinatra -- Rack -- Conclusion -- 6 Connecting to Services -- Blocking I/O, Threading, and Parallelism -- Asynchronous I/O -- Multi-threading -- Typhoeus -- Making Single Requests -- Making Simultaneous Requests -- Multi-threaded Requests -- JRuby -- Logging for Performance -- Handling Error Conditions -- Testing and Mocking Service Calls -- Requests in Development Environments -- Conclusion -- 7 Developing Service Client Libraries -- Packaging -- Jeweler -- Building and Deploying a Library -- Parsing Logic -- The JSON Gem -- YAJL Ruby -- Wrapping Parsed Results -- ActiveModel -- Validations -- Serialization -- Connection and Request Logic -- Data Reads -- Data Writes -- Mocks, Stubs, and Tests -- Conclusion -- 8 Load Balancing and Caching -- Latency and Throughput -- Load Balancing -- Load Balancing Algorithms -- Implementing Load Balancing -- Caching with Memcached -- The Memcached Client and ActiveRecord -- Time-Based Expiration -- Manual Expiration -- Generational Cache Keys -- HTTP Caching -- Expiration-Based Caching -- Validation-Based Caching -- Implementing HTTP Caching -- Conclusion -- 9 Parsing XML for Legacy Services -- XML -- REXML -- Nokogiri -- SOAP -- Exploring Web Services with a WSDL File -- Making Requests -- Conclusion -- 10 Security -- Authentication -- HTTP Authentication -- Signing Requests -- SSL for Authentication -- Authentication for Rails Applications -- Authorization -- Firewalls -- An RBAC Authorization Service -- Encryption -- SSL for Encryption -- Public/Private Key Pairs for Encryption -- Conclusion -- 11 Messaging -- What Is Messaging? …”
Libro electrónico -
787Publicado 2017Tabla de Contenidos: “…. -- Brute forcing WordPress installations -- Brute forcing WordPress installations -- Detecting web application firewalls -- How to do it... -- How it works... -- There's more... -- Detecting possible XST vulnerabilities -- How to do it... -- How it works…”
Libro electrónico -
788Publicado 2019Tabla de Contenidos: “…-- Equipment failure -- Platform instability -- Database design flaws -- Data-entry errors -- Operator error -- Taking Advantage of RAID -- Striping -- RAID levels -- Backing Up Your System -- Preparation for the worst -- Full or incremental backup -- Frequency -- Backup maintenance -- Coping with Internet Threats -- Viruses -- Trojan horses -- Worms -- Denial-of-service attacks -- SQL injection attacks -- Phishing scams -- Zombie spambots -- Installing Layers of Protection -- Network-layer firewalls -- Application-layer firewalls -- Antivirus software -- Vulnerabilities, exploits, and patches -- Education -- Alertness -- Chapter 2 Protecting Against User Errors and Conflicts -- Reducing Data-Entry Errors -- Data types: The first line of defense -- Constraints: The second line of defense -- Sharp-eyed humans: The third line of defense -- Coping with Errors in Database Design -- Handling Programming Errors -- Solving Concurrent-Operation Conflicts -- Passing the ACID Test: Atomicity, Consistency, Isolation, and Durability -- Operating with Transactions -- Using the SET TRANSACTION statement -- Starting a transaction -- Committing a transaction…”
Libro electrónico -
789Publicado 2011Tabla de Contenidos: “…Special Situations -- Using Cd/Rw and Dvd/Rw/R+/R- Devices -- Virtual Guest Tagging Driver -- Virtual Hardware for Non-Disk Scsi Devices -- Virtual Hardware for Raw Disk Map Access to Remote Scsi -- Virtual Hardware for Rdm-Like Access to Local Scsi -- Vm Disk Modes and Snapshots -- Os Installation Peculiarities -- Cloning, Templates, and Deploying Vms -- Vm Solutions -- Private Lab -- Firewalled Private Lab -- Firewalled Lab Bench -- Cluster in a Box -- Cluster Between Esx Hosts -- Cluster Between Virtual and Physical Servers -- Vcenter As a Vm -- Virtual Appliances -- Vmware Tools -- Vmx Changes -- Conclusion -- Chapter 11 Dynamic Resource Load Balancing -- Defining Drlb -- The Basics -- The Advanced Features -- Shares -- Resource Pool Addendum -- Network Resources -- Disk Resources -- Cpu Resources -- Memory Resources -- Vapps -- Monitoring -- Alarms -- Performance Analysis -- Putting It All Together -- Conclusion -- Chapter 12 Disaster Recovery, Business Continuity, And Backup -- Disaster Types -- Recovery Methods -- Best Practices -- Backup and Business Continuity -- Backup -- Business Continuity -- The Tools -- Local Tape Devices -- Vmware Data Recovery -- Third-Party Tools -- Conclusion -- Epilogue: The Future Of The Virtual Environment -- References -- Index…”
Libro electrónico -
790Publicado 2018Tabla de Contenidos: “…. -- Creating a simple NAT and DMZ firewall -- Getting ready -- How to do it... -- How it works... -- Parsing a GitHub project and generate a report -- Getting ready -- How to do it... -- How it works... -- Creating a poor man's incremental remote backup -- Getting ready -- How to do it... -- How it works...…”
Libro electrónico -
791Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Part 1: Foundations of AWS Security -- Chapter 1: Introduction to AWS Security Concepts and Shared Responsibility Model -- Cloud security overview - its importance and challenges -- The significance of cloud security -- Cloud security challenges -- AWS shared responsibility model -- Security "of" the cloud -- Security "in" the cloud -- IaaS, PaaS, SaaS - different levels of responsibility -- Shared responsibility in practice - a closer look at AWS compute -- The importance of understanding the shared responsibility model -- AWS global infrastructure and security -- Regions -- AZs -- Edge locations -- AWS security best practices - general guidelines -- Understand the shared responsibility model -- Use AWS security services and features -- Implement a strong identity and access management strategy -- Protect your data -- Ensure network security -- Integrate security into your development life cycle -- Monitor and audit your environment -- Continuously improve your security posture -- Summary -- Questions -- Answers -- Further reading -- Chapter 2: Infrastructure Security - Keeping Your VPC secure -- Designing secure VPCs -- Understanding VPCs and their importance -- Key components of a VPC -- Best practices for designing secure VPCs -- Implementing security groups, NACLs, and AWS Network Firewall -- Overview -- Using security groups -- Using NACLs -- Using AWS Network Firewall -- Configuring AWS Shield and AWS WAF for advanced protection -- Enabling AWS Shield for DDoS protection -- Configuring AWS WAF for web application protection -- Summary -- Questions -- Answers -- Further reading -- Chapter 3: Identity and Access Management - Securing Users, Roles, and Policies -- Access control models -- Access control models overview -- Understanding RBAC…”
Libro electrónico -
792por Kammermann, MarkusTabla de Contenidos: “…-- 14.2.1 »Sie machen es dem Angreifer ja auch einfach« -- 14.2.2 Denial-of-Service-Attacken -- 14.2.3 Pufferüberlauf -- 14.2.4 Man-in-the-Middle-Attacken -- 14.2.5 Spoofing -- 14.3 Angriffe gegen IT-Systeme -- 14.3.1 Exploits und Exploit-Kits -- 14.4 Social Engineering -- 14.4.1 Die Ziele des Social Engineers -- 14.4.2 Beliebter Ansatz: Phishing-Mails -- 14.4.3 Tailgating und andere Methoden -- 14.5 Angriffspunkt drahtloses Netzwerk -- 14.6 Der freundliche Mitarbeiter -- 14.7 Fragen zum Kapitel -- Kapitel 15: Die Verteidigung des Netzwerks -- 15.1 Physikalische Sicherheit -- 15.1.1 Zutrittsregelungen -- 15.1.2 Vom Badge bis zur Biometrie -- 15.1.3 Zutrittsschleusen und Videoüberwachung -- 15.1.4 Schutz gegen Einbruch, Feuer und Wasser -- 15.1.5 Klimatisierung und Kühlung -- 15.1.6 Fachgerechte Inventarisierung und Entfernung -- 15.2 Fehlertoleranter Aufbau -- 15.3 Datensicherung -- 15.4 Virenschutz mit Konzept -- 15.5 Netzwerkhärtung -- 15.6 Firewalls -- 15.6.1 Verschiedene Firewall-Typen -- 15.6.2 Das Konzept der DMZ -- 15.6.3 Erweiterte Funktionen einer Firewall -- 15.6.4 Der Proxyserver -- 15.6.5 IDS und IPS -- 15.7 Aktive Suche nach Schwachstellen -- 15.8 Die Rolle des Risiko-Managements -- 15.9 Verteidigungskonzepte -- 15.9.1 Die Auswertung von Überwachungen -- 15.9.2 Notfallvorsorge -- 15.9.3 Die First Responders -- 15.9.4 Und das alles zusammen? …”
Publicado 2022
Libro electrónico -
793Publicado 2018Tabla de Contenidos: “…. -- Chapter 8: Servers and Cloud Infrastructure -- Introduction -- Managing firewalls with iptables -- Getting ready -- How to do it... -- How it works... -- There's more... -- Building high-availability services using Keepalived -- Getting ready -- How to do it... -- How it works... -- There's more... -- Managing NFS servers and file shares -- How to do it... -- How it works... -- Using HAProxy to load balance multiple web servers -- How to do it... -- How it works... -- There's more... -- Managing EC2 instances -- Getting ready -- How to do it... -- How it works... -- There's more... -- Managing virtual machines with Vagrant -- Getting ready -- How to do it... -- How it works... -- There's more... -- Managing Docker with Puppet -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 9: External Tools and the Puppet Ecosystem -- Introduction -- Creating custom facts -- How to do it... -- How it works... -- There's more…”
Libro electrónico -
794Publicado 2017Tabla de Contenidos: “…. -- Differences from traditional firewalls -- Creating a load balancer -- How to do it... -- How it works... -- There's more... -- HTTPS/SSL -- Path-based routing -- Chapter 5: Management Tools -- Introduction -- Auditing your AWS account -- How to do it... -- How it works... -- There's more... -- Recommendations with Trusted Advisor -- How to do it... -- How it works... -- There's more... -- Creating e-mail alarms -- How to do it... -- How it works... -- There's more... -- Existing topics -- Other subscriptions -- See also -- Publishing custom metrics in CloudWatch -- Getting ready -- How to do it... -- How it works... -- There's more... -- Cron -- Auto scaling -- Backfilling -- See also -- Creating monitoring dashboards -- Getting ready -- How to do it... -- There's more... -- Widget types -- See also -- Creating a budget -- Getting ready -- How to do it... -- How it works... -- Feeding log files into CloudWatch logs -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 6: Database Services -- Introduction -- Creating a database with automatic failover -- Getting ready -- How to do it... -- How it works... -- There's more... -- Creating a NAT gateway -- Getting ready -- How to do it... -- How it works... -- See also -- Creating a database read-replica -- Getting ready -- How to do it... -- How it works... -- There's more... -- Promoting a read-replica to master -- Getting ready -- How to do it... -- Creating a one-time database backup -- Getting ready -- How to do it... -- Restoring a database from a snapshot -- Getting ready -- How to do it... -- There's more…”
Libro electrónico -
795por Barrett, Daniel J.Tabla de Contenidos: “…1.4.4 Keys and Agents1.4.5 Access Control; 1.4.6 Port Forwarding; 1.5 History of SSH; 1.6 Related Technologies; 1.6.1 rsh Suite (r-Commands); 1.6.2 Pretty Good Privacy (PGP) and GNU Privacy Guard (GnuPG); 1.6.3 Kerberos; 1.6.4 IPSEC and Virtual Private Networks; 1.6.5 Secure Remote Password (SRP); 1.6.6 Secure Socket Layer (SSL) Protocol; 1.6.7 SSL-Enhanced Telnet and FTP; 1.6.8 stunnel; 1.6.9 Firewalls; 1.7 Summary; Basic Client Use; 2.1 A Running Example; 2.2 Remote Terminal Sessions with ssh; 2.2.1 File Transfer with scp; 2.3 Adding Complexity to the Example; 2.3.1 Known Hosts…”
Publicado 2005
Libro electrónico -
796por Bucker, AxelTabla de Contenidos: “…6.4 Design approach -- 6.5 Implementation architecture -- 6.6 Technical implementation -- 6.6.1 Precondition -- 6.6.2 Sample Custom SOAP rpc Servlet -- 6.7 Conclusion -- Part 4 Appendixes -- Appendix A. mySAP Workplace integration guide -- Overview -- Version information -- Configuration -- WebSEAL configuration -- mySAP Workplace configuration -- Management issues -- User administration -- Appendix B. mySAP Enterprise Portal integration guide -- Overview -- Integration product version information -- Scenario 1 -- Configure WebSEAL -- Configure SAP Enterprise Portal -- Scenario 2 -- Configure WebSEAL -- Configure mySAP Enterprise Portal -- Other integration considerations -- Configuring network firewalls -- Known problems -- Tivoli Access Manager global sign-On (GSO) -- Creating a Tivoli Access Manager GSO resource -- Creating the WebSEAL GSO junction -- Creating and modifying WebSEAL users -- Creating a resource credential -- Configure back-end Web server for BA authentication -- GSO administration and management considerations -- Initial GSO credential population -- Multiple point of access -- GSO password management and synchronization -- Password synchronization between the same registry -- Password synchronization between Access Manager and NT domains -- Appendix C. …”
Publicado 2003
Libro electrónico -
797por Dooley, KevinTabla de Contenidos: “…FDDI; 4.7. Wireless; 4.8. Firewalls and Gateways; 4.9. Structured Cabling; 4.9.2. …”
Publicado 2002
Libro electrónico -
798por Lucas, Michael, 1967-“…OpenBSD, the elegant, highly secure Unix-like operating system, is widely used as the basis for critical DNS servers, routers, firewalls, and more. This long-awaited second edition of Absolute OpenBSD maintains author Michael Lucas's trademark straightforward and practical approach that readers have enjoyed for years. …”
Publicado 2013
Libro electrónico -
799Publicado 2013Tabla de Contenidos: “…Control Surfaces -- Landing Gear -- Types of Landing Gear -- Powerplant Structures -- Nacelles -- Firewalls -- Engine Mounts -- Cowling and Fairings -- Rotorcraft Structures -- Fuselage -- Landing Gear -- Review Questions -- 3. …”
Libro electrónico -
800Publicado 2016Tabla de Contenidos: “…Front Cover; Multiscale Modeling for Process Safety Applications; Copyright; Contents; Preface; Acknowledgments; 1 - INTRODUCTION; REFERENCES; 2 - PROCESS SAFETY; 2.1 FIRE; 2.1.1 THE FIRE TRIANGLE; 2.1.2 IGNITION PHENOMENA; 2.1.3 FLAMMABILITY LIMITS OF GASES AND VAPORS; 2.1.4 TYPES OF FIRES; 2.1.4.1 Diffusion fires; Jet fires; Natural fires; Pool fires; Fireballs; 2.1.4.2 Premixed fires; Flash fires; 2.1.5 FIRE RISK ANALYSIS; 2.2 EXPLOSION; 2.2.1 DEFLAGRATION AND DETONATION; 2.2.2 EXPLOSION ENERGY; 2.2.2.1 Energy of chemical explosions; 2.2.2.2 Energy of mechanical explosions…”
Libro electrónico