Mostrando 801 - 820 Resultados de 1,060 Para Buscar 'Firefall~', tiempo de consulta: 1.64s Limitar resultados
  1. 801
    Tabla de Contenidos: “…Completing the SIP Publish Trunk Configuration -- Other Important Settings for Presence Server Configuration -- Proxy Domain -- IP Phone Messenger -- CTI Gateway -- Adding Additional Nodes to the CUPS Cluster -- CUPS Redundancy Configuration -- Unattended Installation -- Troubleshooting the Installation -- Recap of Dependencies -- Tools -- Summary -- Chapter 4 Cisco Unified Presence Integration with Cisco Unified Communications Manager -- LDAP Integration -- Provisioning -- Authentication -- Directory Access -- Configuring LDAP -- Configuring LDAP Synchronization -- Configuring LDAP Authentication -- Configuring a Secure Connection Between Cisco Unified Presence and the LDAP Directory -- Cisco Unified Communications Manager Configuration with Cisco Unified Presence Server -- Preconfiguration Checks -- Configuring CTI Gateway Settings -- Configuring CTI Gateway Server Names and Addresses -- Creating CTI Gateway Profiles -- Configuring Firewalls to Pass CUPC Traffic -- Configuring Presence Service Parameter -- Configure the SIP Trunk on CUCM -- LDAP Profile Creation -- Creating LDAP Profiles and Adding Users to the Profile -- Adding Users and Making Device Associations -- Adding a Softphone Device for Each User -- Configure CUPC on CUP -- TFTP Server Connection -- Configuring the Proxy Listener and TFTP Addresses -- Configuring the Service Parameter for CUPC -- Summary -- Chapter 5 Cisco Unified Personal Communicator -- CUPC Configuration -- Configuring CUPC User in CUCM -- Configuring IP Phone in CUCM -- Configuring a CUPC Device in CUCM -- Configuring Advanced Features for CUPC -- Voicemail Configuration for CUPC -- Cisco Unity Connection -- Cisco Unity -- Configuring Voicemail Servers in CUPS -- Configuring Mailstore Server in CUPS -- Configuring Voicemail Profiles in CUPS -- Conferencing Configuration for CUPC…”
    Libro electrónico
  2. 802
    Publicado 2024
    Tabla de Contenidos: “…Network segmentation -- Access control -- Intrusion detection and prevention systems -- Virtual private networks (VPNs) -- Security audits and penetration testing -- Honeypots and deception technologies -- Zero trust architecture -- Security monitoring -- Security policy and frameworks -- NIST cybersecurity framework -- ISO/IEC 27001 and ISO/IEC 27002 -- NERC CIP -- The Department of Homeland Security (DHS) critical infrastructure security framework -- HITRUST CSF -- CIS Controls -- Summary -- References -- Chapter 7: Protecting Critical Infrastructure - Part 2 -- Systems security and endpoint protection -- Antivirus/antimalware protection -- Firewalls -- Host IDS/IPS -- EDR -- Application security -- Secure software development life cycle -- Code reviews and static analysis -- Authentication and authorization hardening -- Data encryption -- Session management -- Security patching and updates -- Penetration testing -- Logging and monitoring -- IR and data recovery -- Summary -- References -- Chapter 8: Protecting Critical Infrastructure - Part 3 -- IR -- IR history -- IR planning -- Security culture and awareness -- Interconnectivity of critical infrastructure -- Cascading effects of a cyberattack -- Responsibility to safeguard critical assets -- Insider threats -- Teamwork and information sharing -- Executive orders -- Executive Order 13010 - Critical Infrastructure Protection (1996) -- Executive Order 13231 - Critical Infrastructure Protection in the Information Age (2001) -- Homeland Security Presidential Directive 7 (HSPD-7) - Critical Infrastructure Identification, Prioritization, and Protection (2003) -- Executive Order 13636 - Improving Critical Infrastructure Cybersecurity (2013) -- Presidential Policy Directive 21 (PPD-21) - Critical Infrastructure Security and Resilience (2013)…”
    Libro electrónico
  3. 803
    Tabla de Contenidos: “…Workstation: Desktop Setup Configuration -- SkyDrive Pro: Configuration -- SkyDrive Pro: Planning for Personal and Team Site Document Storage -- Step 1: Add SkyDrive Pro to Your Desktop -- Step 2: Office 365 SkyDrive Pro Configuration -- Step 3: Launch SkyDrive Pro on Your Local System -- Step 4: Office 365 SkyDrive Pro Configuration -- SkyDrive Pro: Team Site Caution -- SkyDrive: Configuration Changes -- SkyDrive Pro: Support for Office 2010 Users -- SkyDrive: Checking Storage Allocation -- Smartphone: Configuration -- iPhone -- Android Devices: Motorola Droid v2.2 (and Above) -- Windows Phone: Office 365 -- Windows Phone: Adding Another Exchange Account -- Lync: Skype Configuration -- Step 1: Enable Lync Client to Accept Skype User Calls -- Step 2: Verify Configuration of Office 365 with External Users -- Lync: Linking Microsoft Account to Skype -- Lync: Using Skype to Call Lync -- Lync: Troubleshooting -- Lync: Firewall Port Configuration -- Reference Links -- Next Steps -- Contents at a Glance -- Chapter 3: Office 365 Planning and Purchase -- Office 365 Subscription Plans -- Planning and Purchase Chapter Structure -- Pre-deployment -- Step 1: Purchase Your Subscription(s) -- Step 2: Choose Your Sign-On Method -- Office 365 Sign-On -- DirSync with Password Sync -- Active Directory Federation Services (AD FS)/Single Sign-On -- AD FS/Single Sign-On with Exchange Federation -- DirSync and SSO/AD FS Caution -- Step 3: Collect Your Information -- Domains and Domain Information -- Users and Resources -- Security Groups -- Special E-mail Addresses: Distribution Groups and Aliases -- Exchange Public Folders -- Internet, Hardware, and Software -- Perform Any Required Updates and Software or Hardware Upgrades -- Compliance Archive Requirements -- Step 4: Define Your Migration Plan and Schedule -- E-mail Flow…”
    Libro electrónico
  4. 804
    Publicado 2013
    Tabla de Contenidos:
    Libro electrónico
  5. 805
    Publicado 2013
    Tabla de Contenidos: “…-- Privileged Execution with sudo -- System Auditing -- The auditd Daemon -- The IP Filter Firewall -- Configuring IP Filter -- Remote Access -- The ssh Server -- The ssh Client -- Another Security Feature -- Summary -- References -- Chapter 13: System Performance -- First, Know Your System! …”
    Libro electrónico
  6. 806
    Publicado 2017
    Tabla de Contenidos: “…128 Trend Following Dogma 130 The Crisis Alpha Debate 131 An Aside: Diversifying Across Time 134 Taking Advantage of a Correction 135 The Niederhoffer Argument 135 Chasing 1-Day Moves 138 Pushing the Analogy Too Far 139 Analysing the Data Directly 141 LEGO Trend Following 142 Summary 143 CHAPTER 7 Strategies for Taking Advantage of a Market Drop 144 The Elastic Band 144 Trading Reversals 147 More Texas-Style Hedging 149 Selling Index Put Spreads 151 Breathing Some Life into the Equity Risk Premium 152 Buying VIX Puts 153 Selling VIX Upside 154 The Remarkable Second Moment 155 Summary 158 CHAPTER 8 "Flash Crashes", Crises and the Limits of Prediction 159 Lord of the Fireflies 159 Cascading Sales 160 A Concrete Example 162 An Aside 162 Paths, Prints 163 The Role of the Central Bank 164 Credit Cycles at the Zero Bound 164 The Monetary Policy Palette 165 Reading the Tea Leaves 168 Summary and Conclusion 169 GLOSSARY 171 REFERENCES 173 INDEX 177.…”
    Libro electrónico
  7. 807
    por Vugt, Sander van
    Publicado 2013
    Tabla de Contenidos: “…Accessing Virtual Machines Remotely -- Setting up shared machines with the VMware Web Service -- Shared virtual machines and user accounts -- Creating a Windows user account -- Creating a Linux user account -- Sharing a virtual machine -- Accessing a shared virtual machine -- Using VNC for remote virtual machine access -- Enabling VNC access on a virtual machine -- Connecting remotely to virtual machines using VNC -- Using TeamViewer for remote access through a firewall -- Installing the TeamViewer agent -- Using the TeamViewer client -- Accessing VMware Workstation from tablets and mobile devices -- Summary -- 7. …”
    Libro electrónico
  8. 808
    Tabla de Contenidos: “…Runtime patterns and product mappings -- 3.1 An introduction to the node types -- 3.1.1 Web application server node -- 3.1.2 User node -- 3.1.3 Public Key Infrastructure (PKI) front-end -- 3.1.4 Domain Name System (DNS) node -- 3.1.5 Protocol firewall node -- 3.1.6 Domain firewall node -- 3.1.7 Directory and security services node -- 3.1.8 Existing applications and data node -- 3.1.9 Web server redirector node -- 3.1.10 Application server node -- 3.1.11 Integration server node -- 3.1.12 Process manager node -- 3.1.13 Data Server / Services node -- 3.2 Runtime patterns -- 3.2.1 Decomposition runtime patterns -- 3.2.2 Agent runtime pattern -- 3.3 Product mappings…”
    Libro electrónico
  9. 809
    Publicado 2022
    Tabla de Contenidos: “…Baud Rate -- Wavelength -- Half- and Full-Duplex Ethernet -- Ethernet at the Data Link Layer -- Binary to Decimal and Hexadecimal Conversion -- Ethernet Addressing -- Ethernet Frames -- Ethernet at the Physical Layer -- Ethernet over Other Standards (IEEE 1905.1-2013) -- Ethernet over Power Line -- Ethernet over HDMI -- Bidirectional Wavelength-Division Multiplexing (WDM) -- Course Wavelength-Division Multiplexing (CWDM) -- Dense Wavelength-Division Multiplexing (DWDM) -- Summary -- Exam Essentials -- Written Lab -- Review Questions -- Chapter 5 Networking Devices -- Common Network Connectivity Devices -- Network Interface Card -- Hub -- Bridge -- Switch -- Router -- Firewall -- IDS/IPS -- HIDS -- Access Point -- Wireless Range Extender -- Wireless LAN Controller -- Load Balancer -- Contention Methods -- Dynamic Host Configuration Protocol Server -- IPAM -- Other Specialized Devices -- Multilayer Switch -- Domain Name Service Server -- Network Time Protocol -- Proxy Server -- Encryption and Content Filtering -- Analog Modem -- Packet Shaper -- VPN Concentrator/Headend -- Media Converter -- VoIP PBX -- VoIP Endpoint -- NGFW/Layer 7 Firewall -- VoIP Gateway -- Cable Modem -- DSL Modem -- Networked Devices -- VoIP Phones -- Printers -- Physical Access Control Devices -- Cameras -- Heating, Ventilation, and Air Conditioning (HVAC) Sensors -- Internet of Things (IoT) -- Industrial Control Systems…”
    Libro electrónico
  10. 810
    por Empson, Scott, Roth, Hans, 1953-
    Publicado 2010
    Tabla de Contenidos: “…Step 2: Configure Policies for the Client Group(s) -- Step 3: Configure the IPsec Transform Sets (IKE Phase 2, Tunnel Termination) -- Step 4: Configure Router AAA and Add VPN Client Users -- Step 5: Create VPN Client Policy for Security Association Negotiation -- Step 6: Configure the Crypto Map (IKE Phase 2) -- Step 7: Apply the Crypto Map to the Interface -- Step 8: Verify the VPN Service -- Configuring IPsec Site-to-Site VPNs Using CLI -- Step 1: Configure the ISAKMP Policy (IKE Phase 1) -- Step 2: Configure the IPsec Transform Sets (IKE Phase 2, Tunnel Termination) -- Step 3: Configure the Crypto ACL (Interesting Traffic, Secure Data Transfer) -- Step 4: Configure the Crypto Map (IKE Phase 2) -- Step 5: Apply the Crypto Map to the Interface (IKE Phase 2) -- Step 6: Configure the Firewall Interface ACL -- Step 7: Verify the VPN Service -- Configuring GRE Tunnels over IPsec -- Step 1: Create the GRE Tunnel -- Step 2: Specify the IPsec VPN Authentication Method -- Step 3: Specify the IPsec VPN IKE Proposals -- Step 4: Specify the IPsec VPN Transform Sets -- Step 5a: Specify Static Routing for the GRE over IPsec Tunnel -- Step 5b: Specify Routing with OSPF for the GRE over IPsec Tunnel -- Step 6: Enable the Crypto Programming at the Interfaces -- Appendix: Create Your Own Journal Here…”
    Libro electrónico
  11. 811
    Publicado 2012
    Tabla de Contenidos: “…-- Going Connection Shopping -- Objective 8.03 Using Remote Access -- Dial-up to the Internet -- Private Dial-Up -- Dedicated Connection -- DSL and Cable -- Cable Issues -- Remote Terminal -- VoIP -- RTP -- SIP and H.323 -- Skype -- Streaming Media with RSTP -- Checkpoint -- Review Questions -- Review Answers -- Chapter 9: Network Security -- Objective 9.01 Common Threats -- System Crash/Hardware Failure -- Administrative Access Control -- Malware -- Virus -- Worm -- Macro Virus -- Trojan -- Rootkit -- Adware/Spyware -- Dealing with Malware -- Antimalware Programs -- Social Engineering -- Phishing -- Man in the Middle -- Denial of Service -- Physical Intrusion -- Attacks on Wireless Connections -- Leeching -- Cracking Wireless Encryption -- Rogue Access Points -- Evil Twin -- Objective 9.02 Securing User Accounts -- Authentication -- Authentication Principles -- Authentication Protocols -- Authorization -- Logon and Access Security -- Implementing Share-Level Security -- Implementing User-Level Security -- Using Passwords -- Objective 9.03 Firewalls -- Hiding the IPs -- Port Filtering -- Packet Filtering -- MAC Filtering -- Personal Firewalls -- Network Zones -- Vulnerability Scanners -- Objective 9.04 Securing Remote Connections -- IPsec -- Virtual Private Networks -- PPTP VPNs -- L2TP VPNs -- SSL VPNs -- Checkpoint -- Review Questions -- Review Answers -- Chapter 10: The Complete Network -- Objective 10.01 Designing and Implementing a SOHO Network -- Define the Network Needs -- Network Design -- Compatibility Issues…”
    Libro electrónico
  12. 812
    Publicado 2024
    Tabla de Contenidos: “…Preface -- Part 1: Raising Your Photoshop Game -- 1 -- Making Photoshop Work Harder and Smarter -- Technical requirements -- Updates and new features -- Contextual Task Bar -- Adobe Firefly -- The Remove tool -- Adjustment presets -- Creating a bespoke workspace -- Modifying panels -- Customizing the Tools panel -- Saving a custom workspace -- Modifying keyboard shortcuts and menus -- Modifying preferences -- Defining color settings -- Quality-first approach -- Image quality -- Calculating PPI in Photoshop -- Summary -- 2 -- Non-Destructive Healing and Retouching -- Technical requirements -- Cropping and straightening images and extending the canvas -- Straightening a crooked image -- Cropping images -- Extending the canvas with content-aware cropping -- Quickly cropping tips -- Content-aware scale -- Healing and retouching -- Nondestructive workflows -- Remove cables from a photo -- Removing large blemishes with Content-Aware Fill -- Bending subjects with Puppet Warp -- Removing unwanted content with the Clone Stamp tool -- Adding smiles to portraits with Face-Aware Liquify -- Portrait retouching -- Color and tonal editing with adjustment layers -- How adjustment layers work -- Quick tonal editing with adjustment layers and blend modes -- Removing color casts -- Altering the hue of multiple subjects -- The simplest method for color matching -- Summary -- 3 -- Masking and Cutouts -- Technical requirements -- Applying and editing a basic layer mask -- Using masks to cut out image backgrounds -- Applying masks to adjustment layers -- Blending multiple images with a layer mask -- Masking with Blend If -- Creating distressed photo edges -- Masking hair -- Unlinking images and masks -- Masking layer groups -- Working with vector masks -- Creating an editable vignette with a vector mask -- Creating a typographic mask effect -- Summary…”
    Libro electrónico
  13. 813
    por Loshin, Peter
    Publicado 2013
    Tabla de Contenidos: “…; 2.5.3 Checking the Tor Log; 2.5.4 Reconfiguring Tor for Firewalls; 2.5.5 If Tor Still Won't Connect; 3 Using Tails; 3.1 What Is in Tails; 3.2 Setting Up for Tails; 3.2.1 Getting Tails; 3.2.2 Configuring the System to Boot Tails; 3.3 Using Tails; 3.3.1 Booting Tails; 3.3.2 Shutting Tails Down; 3.3.3 Installing Tails on a USB Drive; 3.3.4 Installing Tails to a USB Device, Manually; 3.3.5 Upgrading Tails ("Clone & Upgrade"); 3.3.6 Persistent Storage on Tails; 3.3.7 Configuring Persistence; 3.3.8 Whisperback…”
    Libro electrónico
  14. 814
    Publicado 2017
    Tabla de Contenidos: “…Introduction to Renewable Energy Systems / An Overview of Renewable Energy Systems -- Climate Change -- Renewable Energy Trend -- Types of Renewable Energy Systems -- Introduction -- Wind Power -- Solar Energy -- Geothermal Power -- Hydro Power -- Bioenergy -- Ocean Power -- Economic Aspects of Renewable Energy Systems -- Introduction -- Affecting Factors -- Life-Cycle Costs -- Economic Trend of Renewable Energy Systems -- Opportunities and Challenges of Renewable Energy Systems Integration -- Renewable Energy Systems Integration Opportunities -- Renewable Energy Systems Integration Challenges and Barriers -- Alleviating the Challenges and Barriers -- Current Trends and Future Prospects -- The Need for Optimization Tools to Solve Problems Related to Renewable Energy Systems -- Conclusions -- Acknowledgments -- References -- Introduction to Optimization / Introduction -- Formulation of Optimization Problem -- General Models of Optimization Problems -- Convex Optimization -- Basic Concepts and Models of Linear Optimization -- Solution Techniques for Unconstrained Optimization -- Nelder -- Mead Method -- Golden Section Search -- Fibonacci Search -- Hooke and Jeeves' Method -- Gradient Descent Method -- Coordinate Descent Method -- Solution Techniques for Constrained Optimization and Relevant Applications to Renewable Energy Systems -- Genetic Algorithm -- Particle Swarm Optimization -- Simulating Annealing -- Ant Colony Optimization -- Tabu Search -- Firefly Algorithm -- Artificial Bee Colony Algorithm -- Artificial Immune System -- Game Theory -- Simplex Technique Specifically for Mixed Integer Linear Programming Concept -- Optimal Control Technique -- Conclusion and Discussion -- References -- Optimal Procurement of Contingency and Load Following Reserves by Demand Side Resources Under Wind-Power Generation Uncertainty / Introduction -- Mathematical Model -- Overview and Modeling Assumptions -- Objective Function -- Constraints -- Case Studies -- Wind-Power Production Scenario Generation -- Illustrative Example -- Application on a 24-Bus System -- Computational Statistics -- Conclusions -- Appendix A: 24-Bus System Test System Data -- Nomenclature -- Sets and Indices -- Parameters -- Variables -- References -- Optimum Bidding of Renewable Energy System Owners in Electricity Markets / Renewable Energy System Owners in Electricity Markets -- Electricity Market Overview -- Importance of Integrating Renewables into the Electricity Market -- Current Market Rules for Renewable Energy System Owners in North America -- Price-Taker Models -- Multistage Stochastic Programming Approach -- Multistage Stochastic Programming Approach -- Scenario Generation and Reduction Method -- Risk Management -- Bidding Strategy Models for Price-Taker Renewable Energy Owner -- Mitigating the Trading Risk by Purchasing Additional Power from Conventional Energy Owner -- Price-Maker Models -- MPEC Approach -- Why Consider Wind Power Energy Owners as Price-Makers? …”
    Libro electrónico
  15. 815
    por Church, Steve
    Publicado 2009
    Tabla de Contenidos: “…2.4.3 VPNs2.4.4 DNS; 2.4.5 DHCP; 2.4.6 IP Broadcast; 2.4.7 IP Multicast; 2.4.8 Firewalls; 2.4.9 NATs; 2.5 Quality of Service; 2.5.1 Bandwidth; 2.5.2 Dropped Packets; 2.5.3 Delay and Jitter; 2.5.4 Service Level Agreements; 2.5.5 MPLS; 2.6 IP and Ethernet Addresses; 2.6.1 IP Addresses; 2.6.2 Subnets and the Subnet Mask; 2.6.3 Ethernet Addresses; 2.7 Network Diagrams; 2.8 Pro Audio, Meet IP; Chapter 3 Switching and Routing; 3.1 Layers and Terms; 3.2 Ethernet Switch; 3.2.1 Managed Switches; 3.2.2 Scalability; 3.3 IP Router; 3.3.1 Roots of the Internet; 3.3.2 TCP/IP Suite; 3.4 Straddling Layers…”
    Libro electrónico
  16. 816
    Publicado 2014
    Tabla de Contenidos: “…Puppet - Now You Are the Puppet Master -- Installing the Puppet master -- Configuring the firewall -- DNS -- Network Time Protocol -- The Puppet lab repository -- Puppet resource -- Managing packages, services, and files -- Classes -- Resource definition -- Puppet facts -- Using include -- Creating and testing manifests -- Enrolling remote puppet agents -- Summary -- 10. …”
    Libro electrónico
  17. 817
    por Flanagan, William A.
    Publicado 2012
    Tabla de Contenidos: “…7.1 Space, Power, and Cooling 171 -- 7.2 Priority for Voice, Video, Fax Packets 172 -- 7.3 Packets per Second 174 -- 7.4 Bandwidth 174 -- 7.5 Security Issues 175 -- 7.5.1 Eavesdropping and vLAN Hopping 176 -- 7.5.2 Access Controls for Users and Connections 176 -- 7.5.3 Modems 177 -- 7.5.4 DNS Cache Poisoning 177 -- IN SHORT: Earliest Instance of DNS Cache Poisoning 179 -- 7.5.5 Toll Fraud 179 -- 7.5.6 Pay-per-Call Scams 179 -- 7.5.7 Vishing 180 -- 7.5.8 SIP ScanningSPIT 180 -- 7.5.9 Opening the Firewall to Incoming Voice 181 -- 7.6 First Migration Steps While Keeping Legacy Equipment 181 -- 7.6.1 Circuit-Switched PBX 182 -- 7.6.2 Digital Phones 182 -- 7.6.3 Analog Phones and FX Service 183 -- 7.6.4 Facsimile Machines 184 -- 7.6.5 Modems 185 -- 8 Interconnections to Global Services 187 -- 8.1 Media Gateways 188 -- 8.2 SIP Trunking 192 -- 8.3 Operating VoIP Across Network Address Translation 196 -- 8.3.1 Failures of SIP, SDP (Signaling) 199 -- 8.3.2 Failures of RTP (Media) 199 -- 8.3.3 Solutions 200 -- 8.3.4 STUN: Session Traversal Utilities for NAT 201 -- 8.3.5 TURN: Traversal Using Relays around NAT 204 -- 8.3.6 ICE: Interactive Connectivity Establishment 206 -- 8.4 Session Border Controller 207 -- 8.4.1 Enterprise SBC 209 -- 8.4.2 Carrier SBC 210 -- 8.5 Supporting Multiple-Carrier Connections 212 -- 8.6 Mobility and Wireless Access 213 -- 8.6.1 VoIP on Wireless LANsWi-Fi 213 -- 8.6.2 Integration of Wi-Fi and Cellular Services 214 -- 8.6.3 Packet Voice on Mobile Broadband: WiMAX, LTE 214 -- 8.6.4 Radio over VoIP 215 -- IN SHORT: E&M Voice Signaling 216 -- 9 Network Management for VoIP and UC 217 -- 9.1 Starting Right 218 -- 9.1.1 Acceptance Testing 219 -- 9.1.2 Configuration Management and Governance 220 -- 9.1.3 Privilege Setting 220 -- 9.2 Continuous Monitoring and Management 221 -- 9.2.1 NMS Software 222 -- 9.2.2 Simple Network Management Protocol 223 -- 9.2.3 Web Interface 224 -- 9.2.4 Server Logging 224 -- 9.2.5 Software Maintenance 225 -- 9.2.6 Quality of ServiceExperience Monitoring 225.…”
    Libro electrónico
  18. 818
    Publicado 2022
    Tabla de Contenidos: “…Implement Network Security Controls on All Internal Communications, Denying Communications among Various Segments Where Necessary -- A Word about Firewalls -- 6. Associate Activities with a Real Person or a Single Specific Entity -- 7. …”
    Libro electrónico
  19. 819
    Publicado 2025
    Tabla de Contenidos: “…Internet Control Message Protocol -- Network Addressing -- IP Addresses -- MAC Addresses -- Address Lookup -- Network Ports and Applications -- Chapter 13 Application Protocols: Objective 2.8: Identify basic networking concepts -- Application Protocols -- Websites -- Email -- File Transfer and Administrative Connections -- Chapter 14 Network Devices: Objective 2.8: Identify basic networking concepts -- Modems -- Switches -- Routers -- Firewalls -- Access Points -- Chapter 15 Wireless Networks: Objective 2.9: Explain the basic capabilities of a small wireless network -- Wireless Networking -- Wireless Networking Standards -- Wireless Signal Propagation -- Wireless Antennas -- Wireless Device Placement -- Interference -- Part III Domain 3.0: Applications and Software -- Chapter 16 Filesystems: Objective 3.1: Identify components of an OS -- Files and Filesystems -- Files and Folders -- Filenames and Extensions -- Filesystem Features -- Compression -- Encryption -- Chapter 17 Services and Processes: Objective 3.1: Identify components of an OS -- Applications -- Processes -- Services -- Chapter 18 Drivers, Utilities, and Interfaces: Objective 3.1: Identify components of an OS -- Drivers -- Interfaces -- System Applications and Utilities -- Chapter 19 Operating Systems: Objective 3.2: Explain the purpose of operating systems -- Operating System Roles -- Disk Management -- Memory Management -- Task and Process Management -- Application Management -- Device Management -- Access Control -- Operating System Types -- Desktop/Workstation Operating Systems -- Mobile Operating Systems -- Server Operating Systems -- Embedded Operating Systems -- Chapter 20 Software Types: Objective 3.3: Explain the purpose and proper use of software -- Software -- Productivity Software -- Collaboration Software -- Instant Messaging Software -- Web Browsing Software…”
    Libro electrónico
  20. 820
    Publicado 2024
    Tabla de Contenidos: “…. -- See also -- Chapter 6: Web Security Using Certificates, CDNs, and Firewalls -- Technical requirements -- Enabling HTTPS for a web server on an EC2 instance -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Creating an SSL/TLS certificate with ACM -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Creating ELB target groups -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Using an application load balancer with TLS termination at the ELB -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Using a network load balancer with TLS termination at EC2 -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Securing S3 using CloudFront and TLS -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Using a WAF -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Chapter 7: Monitoring with CloudWatch, CloudTrail, and Config -- Technical requirements…”
    Libro electrónico