Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
821por Grant, RickfordTabla de Contenidos: “…-- The First Line of Defense -- Software Firewalls -- ClamAV: Antivirus Software, Linux Style -- Project 19A: Virus Scanning with avast! …”
Publicado 2010
Libro electrónico -
822por Guthrie, ForbesTabla de Contenidos: “…-- Separation of Duties -- Risk Scenario -- Risk Mitigation -- vCenter Server Permissions -- Risk Scenario -- Risk Mitigation -- Security in vCenter Linked Mode -- Risk Scenario -- Risk Mitigation -- Command-Line Access to ESXi Hosts -- Risk Scenario -- Risk Mitigation -- Managing Network Access -- Risk Scenario -- Risk Mitigation -- The DMZ -- Risk Scenario -- Risk Mitigation -- Firewalls in the Virtual Infrastructure -- The Problem -- The Solution -- Change Management -- Risk Scenario -- Risk Mitigation -- Protecting the VMs -- Risk Scenario -- Risk Mitigation -- Protecting the Data -- Risk Scenario -- Risk Mitigation -- Cloud Computing -- Risk Scenario -- Risk Mitigation -- Auditing and Compliance -- The Problem -- The Solution -- Summary -- Chapter 10 Monitoring and Capacity Planning -- Nothing Is Static -- Building Monitoring into the Design -- Determining the Tools to Use -- Selecting the Items to Monitor -- Selecting Thresholds -- Taking Action on Thresholds -- Alerting the Operators -- Incorporating Capacity Planning in the Design -- Planning before Virtualization -- Planning during Virtualization -- Summary -- Chapter 11 Bringing a vSphere Design Together -- Sample Design -- Business Overview for XYZ Widgets -- Hypervisor Design -- vSphere Management Layer -- Server Hardware -- Networking Configuration -- Shared Storage Configuration -- VM Design -- VMware Datacenter Design -- Security Architecture -- Monitoring and Capacity Planning -- Examining the Design -- Hypervisor Design -- vSphere Management Layer -- Server Hardware -- Networking Configuration…”
Publicado 2013
Libro electrónico -
823Publicado 2020“…Indeed, the system is able to create any new network with any kind of virtual resource (e.g. switches, routers, LSRs, optical paths, firewalls, SIP-based servers, devices, servers, access points, etc.). …”
Libro electrónico -
824Publicado 2004Tabla de Contenidos: “…Creating an exposed serial process -- 11.1 Business scenario -- 11.2 Business process model -- 11.3 Design guidelines -- 11.3.1 Design overview -- 11.3.2 Using firewalls -- 11.3.3 Web services security -- 11.3.4 Web services gateway -- Part 5 Appendixes -- Appendix A. …”
Libro electrónico -
825Publicado 2022Tabla de Contenidos: “…Logging Levels/Severity Levels -- 00-FMindd 18 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Interface Statistics/Status -- Link State (Up/Down) -- Speed/Duplex -- Send/Receive Traffic -- Cyclic Redundancy Checks (CRCs) -- Protocol Packet and Byte Counts -- Interface Errors or Alerts -- CRC Errors -- Giants -- Runts -- Encapsulation Errors -- Environmental Factors and Sensors: Temperature, Humidity, Electrical, Flooding -- Baselines -- NetFlow Data -- Uptime/Downtime -- REVIEW -- 31 QUESTIONS -- 31 ANSWERS -- Objective 32 Explain the purpose of organizational documents -- and policies -- Plans and Procedures -- Change Management -- Incident Response Plan -- Disaster Recovery Plan -- Business Continuity Plan -- System Life Cycle -- Standard Operating Procedures -- Hardening and Security Policies -- Password Policy -- Acceptable Use Policy -- Bring Your Own Device (BYOD) Policy -- Remote Access Policy -- Onboarding and Offboarding Policy -- Security Policy -- Data Loss Prevention -- Common Documentation -- Physical Network Diagram -- Logical Network Diagram -- Wiring Diagram -- Site Survey Report -- 00-FMindd 19 22/04/22 11:12 AM -- xx Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Audit and Assessment Report -- Baseline Configurations -- Common Agreements -- Non-Disclosure Agreement (NDA) -- Service-Level Agreement (SLA) -- Memorandum of Understanding (MOU) -- REVIEW -- 32 QUESTIONS -- 32 ANSWERS -- Objective 33 Explain high availability and disaster recovery -- concepts and summarize which is the best solution -- Load Balancing -- Multipathing -- Network Interface Card (NIC) Teaming -- Redundant Hardware/Clusters -- Switches -- Routers -- Firewalls -- Facilities and Infrastructure Support -- Uninterruptible Power Supply (UPS) -- Power Distribution Units (PDUs) -- Generator -- HVAC -- Fire Suppression -- Redundancy and High Availability (HA) Concepts -- Cold Site -- Warm Site -- Hot Site -- Cloud Site -- Active-Active vs Active-Passive -- Mean Time to Repair (MTTR) -- Mean Time Between Failure (MTBF) -- Recovery Time Objective (RTO) -- Recovery Point Objective (RPO) -- Network Device Backup/Restore -- Configuration -- State -- REVIEW -- 33 QUESTIONS -- 33 ANSWERS -- 00-FMindd 20 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- 40 Network Security -- Objective 41 Explain common security concepts -- Confidentiality, Integrity, Availability (CIA) -- Threats -- Internal -- External -- Vulnerabilities -- Common Vulnerabilities and Exposures (CVE) -- Zero-Day -- Exploits -- Least Privilege -- Role-Based Access -- Zero Trust -- Defense in Depth -- Network Segmentation Enforcement -- Screened Subnet [Previously Known as Demilitarized Zone (DMZ)] -- Separation of Duties -- Network Access Control -- Honeypot -- Authentication Methods -- Multifactor -- Terminal Access Controller Access-Control System Plus (TACACS+) -- Remote Authentication Dial-in User Service (RADIUS) -- Single Sign-On (SSO) -- LDAP -- Kerberos -- Local Authentication -- Extensible Authentication Protocol (EAP) -- 8021X -- Risk Management -- Security Risk Assessments -- Business Risk Assessments -- Security Information and Event Management (SIEM) -- REVIEW -- 41 QUESTIONS -- 41 ANSWERS -- Objective 42 Compare and contrast common types of attacks -- Technology-Based -- Denial-of-Service (DoS)/Distributed Denial-of-Service (DDoS) -- On-Path Attack (Previously Known as Man-in-the-Middle Attack) -- 00-FMindd 21 22/04/22 11:12 AM -- xxii Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- ARP Spoofing -- DNS Poisoning -- VLAN Hopping -- Rogue DHCP -- Rogue Access Point (AP) -- Evil Twin -- Ransomware -- Password Attacks -- MAC Spoofing -- IP Spoofing -- Deauthentication -- Malware -- Human and Environmental -- Social Engineering -- REVIEW -- 42 QUESTIONS -- 42 ANSWERS -- Objective 43 Given a scenario, apply network -- hardening techniques -- Best Practices -- Secure SNMP -- Router Advertisement (RA) Guard -- Port Security -- Dynamic ARP Inspection -- Control Plane Policing -- Private VLANs -- Disable Unneeded Switchports -- Disable Unneeded Network Services -- Change Default Passwords -- Password Complexity/Length -- Enable DHCP Snooping -- Change Default VLAN -- Patch and Firmware Management -- Access Control List -- Firewall Rules -- Role-Based Access -- Wireless Security -- MAC Filtering -- Antenna Placement -- Power Levels -- Wireless Client Isolation -- Guest Network Isolation -- 00-FMindd 22 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Preshared Keys (PSKs) -- EAP -- Geofencing -- Captive Portal -- IoT Access Considerations -- REVIEW -- 43 QUESTIONS -- 43 ANSWERS -- Objective 44 Compare and contrast remote access methods -- and security implications -- Site-to-Site VPN -- Client-to-Site VPN -- Clientless VPN -- Split Tunnel vs Full Tunnel -- Remote Desktop Connection -- Remote Desktop Gateway -- SSH -- Virtual Network Computing (VNC)…”
Libro electrónico -
826Publicado 2017Tabla de Contenidos: “…. -- CRUSH tunables -- The evolution of CRUSH tunables -- Argonaut - legacy -- Firefly - CRUSH_TUNABLES3 -- Hammer - CRUSH_V4 -- Jewel - CRUSH_TUNABLES5 -- Ceph and kernel versions that support given tunables -- Warning when tunables are non-optimal -- A few important points -- Ceph cluster map -- High availability monitors -- Ceph authentication and authorization -- Ceph authentication -- Ceph authorization -- How to do it... -- I/O path from a Ceph client to a Ceph cluster -- Ceph Placement Group -- How to do it... -- Placement Group states -- Creating Ceph pools on specific OSDs -- How to do it... -- Chapter 10: Production Planning and Performance Tuning for Ceph -- Introduction -- The dynamics of capacity, performance, and cost -- Choosing hardware and software components for Ceph -- Processor -- Memory -- Network -- Disk -- Partitioning the Ceph OSD journal -- Partitioning Ceph OSD data -- Operating system -- OSD filesystem -- Ceph recommendations and performance tuning -- Tuning global clusters -- Tuning Monitor -- OSD tuning -- OSD general settings -- OSD journal settings -- OSD filestore settings -- OSD recovery settings -- OSD backfilling settings -- OSD scrubbing settings -- Tuning the client -- Tuning the operating system -- Tuning the network -- Sample tuning profile for OSD nodes -- How to do it... -- Ceph erasure-coding -- Erasure code plugin -- Creating an erasure-coded pool -- How to do it... -- Ceph cache tiering -- Writeback mode -- Read-only mode -- Creating a pool for cache tiering -- How to do it... -- See also -- Creating a cache tier -- How to do it... -- Configuring a cache tier -- How to do it... -- Testing a cache tier -- How to do it... -- Cache tiering - possible dangers in production environments -- Known good workloads -- Known bad workloads -- Chapter 11: The Virtual Storage Manager for Ceph -- Introductionc…”
Libro electrónico -
827Publicado 2014Tabla de Contenidos: “…6 PUESTA EN MARCHA DEL SISTEMA -- 6.1 ADMINISTRACIÓN DE USUARIOS -- 6.1.1 Usuarios -- 6.1.2 El administrador de usuarios -- 6.1.3 Directivas de seguridad local -- 6.2 SISTEMA DE FICHEROS -- 6.2.1 Administrador de discos -- 6.2.2 Cuotas de disco -- 6.3 PERMISOS -- 7 ADMINISTRACIÓN BÁSICA DEL SISTEMA -- 7.1 ARRANQUE Y PARADA -- 7.1.1 Configuración del gestor de arranque del SO -- 7.1.2 Servicios del sistema -- 7.1.3 Procesos -- 7.1.4 Programación de tareas -- 7.1.5 Proceso de parada del sistema -- 7.2 MONITORIZACIÓN DEL SISTEMA -- 7.2.1 Monitor de confiabilidad y rendimiento -- 7.2.2 Visor de eventos -- 7.3 COPIAS DE SEGURIDAD -- 7.3.1 Realizar una copia de seguridad -- 7.3.2 Recuperar una copia de seguridad -- 7.3.3 Configurar opciones de rendimiento -- 8 ADMINISTRACIÓN DE LA RED -- 8.1 ESQUEMA BÁSICO DE RED -- 8.1.1 Configuración de la red -- 8.1.2 Enrutamiento -- 8.1.3 Firewall de Windows -- 8.1.4 DHCP -- 8.1.5 DNS -- 8.2 TERMINAL SERVER -- 8.2.1 Escritorio remoto -- 8.2.2 Servidor de aplicaciones -- 8.2.3 Cliente de Terminal Server -- 8.3 WINDOWS SERVER UPDATE SERVICES -- 8.3.1 Instalación -- 8.3.2 Cliente -- 8.3.3 Administración -- 9 SERVIDORES DE IMPRESIÓN Y DE ARCHIVOS -- 9.1 COMPARTIR ARCHIVOS E IMPRESORAS -- 9.1.1 Compartir una carpeta -- 9.1.2 Acceso a un recurso compartido -- 9.1.3 Administrar recursos compartidos -- 9.1.4 Instantáneas -- 9.1.5 Sistemas de archivos distribuidos -- 9.2 SERVIDORES DE IMPRESIÓN -- 9.2.1 Compartir impresora -- 9.2.2 Servidor de impresión y documentos -- 9.2.3 Cliente -- 10 SERVICIOS DE INTERNET -- 10.1 SERVIDOR WEB -- 10.1.1 Instalación -- 10.1.2 Administración -- 10.1.3 Creación de un nuevo sito web -- 10.1.4 Creación de un directorio virtual -- 10.1.5 Extensiones de servicio web -- 10.1.6 Seguridad -- 10.2 SERVIDOR FTP -- 10.2.1 Instalación -- 10.2.2 Creación de un nuevo sitio FTP…”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universitat Ramon Llull)Enlace del recurso
Libro electrónico -
828Publicado 2016Tabla de Contenidos: “…Part 5: Security And Maintenance: -- System Security: -- Tools to fight the bad guys -- Take Action Against The Barbarian Hoard: -- Finding the action center -- Setting up the Windows Firewall -- Protecting the PC with Windows Defender -- Paying attention to the UAC warnings -- System Privacy Settings: -- Setting the screen saver lock -- Reviewing Windows 10 privacy options -- Latest Version: -- Updating and upgrading -- Updating Windows -- That All-Important Safety Copy: -- File You Had Yesterday: -- Obtaining an external backup device -- Configuring Windows 10 file history -- Setting up Windows 7 backup -- Recovering a previous version of a file -- Restoring files from a backup -- Exploring Internet backup utilities -- Compressed Folder Archives: -- Compressing files -- Working with a compressed folder -- Installing software from a compressed folder -- Maintenance Chores: -- Storage Utilities: -- Freeing storage space -- Checking for errors -- Running defrag -- Network troubleshooting -- Manage The PC's Power: -- Setting power options in Windows 10 -- Configuring a power management plan -- Adding the hibernate option -- Windows 10 do-over --…”
Libro electrónico -
829por Lovelace, MaryTabla de Contenidos: “…3.1.1 Configurations -- 3.1.2 Installation prerequisites -- 3.1.3 TCP/IP ports used by TotalStorage Productivity Center -- 3.1.4 Default databases created during install -- 3.2 Pre-installation check list -- 3.2.1 User IDs and security -- 3.2.2 Certificates and key files -- 3.3 Services and service accounts -- 3.3.1 Starting and stopping the managers -- 3.3.2 Uninstall Internet Information Services -- 3.3.3 SNMP install -- 3.4 IBM TotalStorage Productivity Center for Fabric -- 3.4.1 The computer name -- 3.4.2 Database considerations -- 3.4.3 Windows Terminal Services -- 3.4.4 Tivoli NetView -- 3.4.5 Personal firewall -- 3.4.6 Change the HOSTS file -- 3.5 Installation process -- 3.5.1 Prerequisite product install: DB2 and WebSphere -- 3.5.2 Installing IBM Director -- 3.5.3 Tivoli Agent Manager -- 3.5.4 IBM TotalStorage Productivity Center for Disk and Replication Base -- 3.5.5 IBM TotalStorage Productivity Center for Disk -- 3.5.6 IBM TotalStorage Productivity Center for Replication -- 3.5.7 IBM TotalStorage Productivity Center for Fabric -- Chapter 4. …”
Publicado 2005
Libro electrónico -
830por Ballew, JoliTabla de Contenidos: “…Contents note continued: Opening and closing desktop apps -- Using menus -- Using ribbons -- Formatting text -- Using the Clipboard -- Inserting objects -- Printing a document -- Saving a file -- Exploring other desktop apps -- Adding a device -- Troubleshooting device installations -- Connecting to a Bluetooth device -- Connecting to a private network -- Sharing with a homegroup -- Troubleshooting network connectivity -- Connecting to a public network -- Changing network settings -- Using Airplane Mode -- Enabling Windows Firewall -- Allowing apps to access your personal information or location -- Using Windows Defender -- Creating new users -- Creating a picture password -- Creating a PIN -- Switching among user accounts -- Managing User Account Control settings -- Turning on Family Safety -- Working with Family Safety settings -- Choosing settings to sync to SkyDrive -- Choosing files to save to SkyDrive -- Saving files to SkyDrive -- Creating a new folder in SkyDrive --…”
Publicado 2013
Libro electrónico -
831por Chicano Tejada, EsterTabla de Contenidos: “…Gestión de registros de elementos de red y filtrado (router, switch, firewall, IDS/IPS, etc.) -- 10. Resumen -- Ejercicios de repaso y autoevaluación -- Capítulo 6 Selección del sistema de registro en función de los requerimientos de la organización -- 1. …”
Publicado 2023
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
832por Chicano Tejada, EsterTabla de Contenidos: “…Gestión de registros de elementos de red y filtrado (router, switch, firewall, IDS/IPS, etc.) -- 10. Resumen -- Ejercicios de repaso y autoevaluación -- Capítulo 6 Selección del sistema de registro en función de los requerimientos de la organización -- 1. …”
Publicado 2023
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
833por Chicano Tejada, EsterTabla de Contenidos: “…Gestión de registros de elementos de red y filtrado (router, switch, firewall, IDS/IPS, etc.) -- 10. Resumen -- Ejercicios de repaso y autoevaluación -- Capítulo 6 Selección del sistema de registro en función de los requerimientos de la organización -- 1. …”
Publicado 2023
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
834Publicado 2018Tabla de Contenidos: “…-- Creating an Elastic File System -- Extending EFS to Elastic Beanstalk -- Planning your next steps -- Summary -- Chapter 4: Securing Workloads Using AWS WAF -- Introducing AWS Web Application Firewall -- Concepts and terminologies -- Getting started with WAF -- Creating the web ACL -- Creating the conditions -- Creating rules -- Assigning a WAF Web ACL to CloudFront distributions…”
Libro electrónico -
835Publicado 2013Tabla de Contenidos: “…Task 2: RC on Launch to Landing, No Power -- Task 3: RC on Launch and Landing, Low Power, Cut Throttle -- Task 4: RC on Launch and Landing, Increasing Power -- Task 5: Turning -- The Wind -- Overall Good Strategies for Learning to Fly -- Skill Building -- Precision Landing -- Hit the Balloon -- Fly in Stressful Situations -- Aerobatics -- Conclusion -- 6 Keeping You and Your Airplane Alive: Diagnostics and Repair -- Preflight Checklists of Use -- The Brief Preflight in 3 Seconds: Servos, Up, Down, Left, Right, Power, Launch -- More Complete Checklist for Aircraft of Questionable Integrity -- Crash Kit -- Basic Crash Kit -- More Complete Crash Kit -- Kinds of Repairs -- The Big-Crash Postflight Inspection -- More Specific Fixes -- Completely Dead Airplane -- Completely Dead Airplane: Rebind the Receiver -- Completely Dead Airplane: ESC Not Sending Power to the Receiver -- Completely Dead Airplane: Receiver/Servo -- Completely Dead Airplane: Transmitter -- Water Immersion -- Servos Operate But Motor Does Not -- Evaluating Motor Damage -- Symptom: Motor Has Weak Thrust -- Motor Vibrates -- Motor Gets Very Hot -- Motor Doesn't Work at All -- Battery Damage -- Highly Suspect Battery -- Check Battery Pack -- Battery Disposal -- Servo Damage -- Servo Not Moving -- Servo Arms Are No Longer Vertical When Trim Tabs Are Centered -- Busted Servo Arm -- Broken Propeller -- Kinds of Prop Damage -- Flutter -- Poor Radio Connection -- Conclusion -- 7 Make Your Plane Look Good for Day Flying -- General Considerations to Keep in Mind -- Examples -- Mouse: Avery Stick-on Labels and Sharpies -- Purple Monster: Wrapping Paper -- Big Pink Angst: Fresnel-Lens Plastic -- Silver Shark: Plastic Film 2 -- Brooklyn Aerodrome Orange Plane (BAOP) Paint on Foam -- Blue Angel and Others in Printed Tyvek -- Flying Heart: Sign Vinyl -- Firefly: Balloon Film -- Decorating with Tape…”
Libro electrónico -
836Publicado 2024Tabla de Contenidos: “…-- Types of ACLs -- Understanding firewall rules -- What does this mean for a network architect? …”
Libro electrónico -
837Publicado 2023Tabla de Contenidos: “…_OS sicherer als Windows? -- 7.2 GUFW - die Firewall -- 7.3 ClamTK - Virenscanner -- 7.4 Déjà Dup - Backups -- 7.5 Timeshift - Systemwiederherstellung -- 7.5.1 Timeshift am Terminal nutzen…”
Libro electrónico -
838Publicado 2012Tabla de Contenidos: “…Cover -- Brief Contents -- Contents -- Foreword -- Preface -- Chapter 1: Web Foundations -- 1.1 The Evolution of the Web -- 1.2 A Peek into the History of the Web -- 1.3 Internet Applications -- 1.4 Networks -- 1.4.1 From Moore to Metcalf -- 1.5 TCP/IP -- 1.5.1 Internet Address Structure -- 1.5.2 IPv6 -- 1.6 Higher Level Protocols -- 1.6.1 FTP -- 1.6.2 Telnet -- 1.6.3 E-mail Related Protocols -- 1.6.4 HTTP -- 1.7 Important Components of the Web -- 1.7.1 Firewalls -- 1.7.2 Routers -- 1.7.3 Browser -- 1.7.4 Browser Caches -- 1.8 Web Search Engines -- 1.9 Web Servers -- 1.10 Application Server -- 1.11 Internet Organizations' Who's Who -- 1.11.1 ISOC - Internet Society -- 1.11.2 IETF - Internet Engineering Task Force -- 1.11.3 IESG - Internet Engineering Steering Group -- 1.11.4 IANA - Internet Assigned Numbers Authority -- 1.11.5 IAB - Internet Architecture Board -- 1.11.6 IRTF - Internet Research Task Force -- 1.11.7 W3C - World Wide Web Consortium -- 1.12 Summary -- Exercises -- Caselet Activity -- Chapter 2: Client-Side-HTML -- 2.1 SGML Framework -- 2.2 HTML -- 2.3 HTML Tags -- 2.3.1 Attributes -- 2.4 HTML File Structure -- 2.5 Common HTML Tags -- 2.5.1 HTML Tag -- 2.5.2 Meta -- 2.5.3 Title -- 2.5.4 Body -- 2.5.5 Headings -- 2.5.6 Anchor -- 2.5.7 Lists -- 2.5.8 Table -- 2.5.9 Frames -- 2.5.10 HTML Forms -- 2.6 XHTML -- 2.6.1 HTML Validator -- 2.7 Block and Inline Elements -- 2.8 HTML5 -- 2.9 Summary -- Exercises -- Project Activities -- Caselet Activity -- Chapter 3: Client-Side-CSS -- 3.1 CSS Declarations -- 3.2 Using CSS -- 3.3 Sample CSS File -- 3.4 Selectors -- 3.5 Box Model -- 3.5.1 Concept -- 3.5.2 Padding -- 3.6 Float -- 3.6.1 Using Float and Clear -- 3.7 Z-Index -- 3.7.1 Websites -- 3.8 Benefits of CSS -- 3.9 Summary -- Exercises -- Project Activities -- Caselet Activity -- Chapter 4: Client-Side-Behavior -- 4.1 JavaScript…”
Libro electrónico -
839Publicado 2012Tabla de Contenidos: “…Multitier Networking Data Design Considerations -- Logical Deployment Diagram and Corresponding Physical Deployment Diagram of All Relevant Devices -- Secure Infrastructure Design -- Storage Integration -- Advanced Configuration of Routers, Switches, and Other Network Devices -- ESB -- SOA -- SIEM -- Database Access Monitor (DAM) -- Service Enabled -- WS-Security -- Two-Minute Drill -- Q& -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 5 Host Security Controls -- Host-based Firewalls -- Trusted OS -- Endpoint Security Software -- Host Hardening -- Asset Management (Inventory Control) -- Data Exfiltration -- HIPS/HIDS -- NIPS/NIDS -- Two-Minute Drill -- Q& -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 6 Application Security -- Web Application Security Design Considerations -- Specific Application Issues -- Application Sandboxing -- Application Security Frameworks -- Secure Coding Standards -- Exploits Resulting from Improper Error and Exception Handling -- Privilege Escalation -- Improper Storage of Sensitive Data -- Fuzzing/False Injection -- Secure Cookie Storage and Transmission -- Client-Side Processing vs. …”
Libro electrónico -
840Publicado 2012Tabla de Contenidos: “…Afterglow Emission-II (Theory) -- GRB AFTERGLOW -- THEORETICAL ASPECTS OF THE FIREBALL SCENARIO -- SIMILARITIES: GRB 940217, GBR 090926A AND GRB 980923 -- Chapter VII. …”
Libro electrónico