Mostrando 821 - 840 Resultados de 1,060 Para Buscar 'Firefall~', tiempo de consulta: 1.63s Limitar resultados
  1. 821
    por Grant, Rickford
    Publicado 2010
    Tabla de Contenidos: “…-- The First Line of Defense -- Software Firewalls -- ClamAV: Antivirus Software, Linux Style -- Project 19A: Virus Scanning with avast! …”
    Libro electrónico
  2. 822
    por Guthrie, Forbes
    Publicado 2013
    Tabla de Contenidos: “…-- Separation of Duties -- Risk Scenario -- Risk Mitigation -- vCenter Server Permissions -- Risk Scenario -- Risk Mitigation -- Security in vCenter Linked Mode -- Risk Scenario -- Risk Mitigation -- Command-Line Access to ESXi Hosts -- Risk Scenario -- Risk Mitigation -- Managing Network Access -- Risk Scenario -- Risk Mitigation -- The DMZ -- Risk Scenario -- Risk Mitigation -- Firewalls in the Virtual Infrastructure -- The Problem -- The Solution -- Change Management -- Risk Scenario -- Risk Mitigation -- Protecting the VMs -- Risk Scenario -- Risk Mitigation -- Protecting the Data -- Risk Scenario -- Risk Mitigation -- Cloud Computing -- Risk Scenario -- Risk Mitigation -- Auditing and Compliance -- The Problem -- The Solution -- Summary -- Chapter 10 Monitoring and Capacity Planning -- Nothing Is Static -- Building Monitoring into the Design -- Determining the Tools to Use -- Selecting the Items to Monitor -- Selecting Thresholds -- Taking Action on Thresholds -- Alerting the Operators -- Incorporating Capacity Planning in the Design -- Planning before Virtualization -- Planning during Virtualization -- Summary -- Chapter 11 Bringing a vSphere Design Together -- Sample Design -- Business Overview for XYZ Widgets -- Hypervisor Design -- vSphere Management Layer -- Server Hardware -- Networking Configuration -- Shared Storage Configuration -- VM Design -- VMware Datacenter Design -- Security Architecture -- Monitoring and Capacity Planning -- Examining the Design -- Hypervisor Design -- vSphere Management Layer -- Server Hardware -- Networking Configuration…”
    Libro electrónico
  3. 823
    Publicado 2020
    “…Indeed, the system is able to create any new network with any kind of virtual resource (e.g. switches, routers, LSRs, optical paths, firewalls, SIP-based servers, devices, servers, access points, etc.). …”
    Libro electrónico
  4. 824
    Publicado 2004
    Tabla de Contenidos: “…Creating an exposed serial process -- 11.1 Business scenario -- 11.2 Business process model -- 11.3 Design guidelines -- 11.3.1 Design overview -- 11.3.2 Using firewalls -- 11.3.3 Web services security -- 11.3.4 Web services gateway -- Part 5 Appendixes -- Appendix A. …”
    Libro electrónico
  5. 825
    Publicado 2022
    Tabla de Contenidos: “…Logging Levels/Severity Levels -- 00-FMindd 18 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Interface Statistics/Status -- Link State (Up/Down) -- Speed/Duplex -- Send/Receive Traffic -- Cyclic Redundancy Checks (CRCs) -- Protocol Packet and Byte Counts -- Interface Errors or Alerts -- CRC Errors -- Giants -- Runts -- Encapsulation Errors -- Environmental Factors and Sensors: Temperature, Humidity, Electrical, Flooding -- Baselines -- NetFlow Data -- Uptime/Downtime -- REVIEW -- 31 QUESTIONS -- 31 ANSWERS -- Objective 32 Explain the purpose of organizational documents -- and policies -- Plans and Procedures -- Change Management -- Incident Response Plan -- Disaster Recovery Plan -- Business Continuity Plan -- System Life Cycle -- Standard Operating Procedures -- Hardening and Security Policies -- Password Policy -- Acceptable Use Policy -- Bring Your Own Device (BYOD) Policy -- Remote Access Policy -- Onboarding and Offboarding Policy -- Security Policy -- Data Loss Prevention -- Common Documentation -- Physical Network Diagram -- Logical Network Diagram -- Wiring Diagram -- Site Survey Report -- 00-FMindd 19 22/04/22 11:12 AM -- xx Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Audit and Assessment Report -- Baseline Configurations -- Common Agreements -- Non-Disclosure Agreement (NDA) -- Service-Level Agreement (SLA) -- Memorandum of Understanding (MOU) -- REVIEW -- 32 QUESTIONS -- 32 ANSWERS -- Objective 33 Explain high availability and disaster recovery -- concepts and summarize which is the best solution -- Load Balancing -- Multipathing -- Network Interface Card (NIC) Teaming -- Redundant Hardware/Clusters -- Switches -- Routers -- Firewalls -- Facilities and Infrastructure Support -- Uninterruptible Power Supply (UPS) -- Power Distribution Units (PDUs) -- Generator -- HVAC -- Fire Suppression -- Redundancy and High Availability (HA) Concepts -- Cold Site -- Warm Site -- Hot Site -- Cloud Site -- Active-Active vs Active-Passive -- Mean Time to Repair (MTTR) -- Mean Time Between Failure (MTBF) -- Recovery Time Objective (RTO) -- Recovery Point Objective (RPO) -- Network Device Backup/Restore -- Configuration -- State -- REVIEW -- 33 QUESTIONS -- 33 ANSWERS -- 00-FMindd 20 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- 40 Network Security -- Objective 41 Explain common security concepts -- Confidentiality, Integrity, Availability (CIA) -- Threats -- Internal -- External -- Vulnerabilities -- Common Vulnerabilities and Exposures (CVE) -- Zero-Day -- Exploits -- Least Privilege -- Role-Based Access -- Zero Trust -- Defense in Depth -- Network Segmentation Enforcement -- Screened Subnet [Previously Known as Demilitarized Zone (DMZ)] -- Separation of Duties -- Network Access Control -- Honeypot -- Authentication Methods -- Multifactor -- Terminal Access Controller Access-Control System Plus (TACACS+) -- Remote Authentication Dial-in User Service (RADIUS) -- Single Sign-On (SSO) -- LDAP -- Kerberos -- Local Authentication -- Extensible Authentication Protocol (EAP) -- 8021X -- Risk Management -- Security Risk Assessments -- Business Risk Assessments -- Security Information and Event Management (SIEM) -- REVIEW -- 41 QUESTIONS -- 41 ANSWERS -- Objective 42 Compare and contrast common types of attacks -- Technology-Based -- Denial-of-Service (DoS)/Distributed Denial-of-Service (DDoS) -- On-Path Attack (Previously Known as Man-in-the-Middle Attack) -- 00-FMindd 21 22/04/22 11:12 AM -- xxii Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- ARP Spoofing -- DNS Poisoning -- VLAN Hopping -- Rogue DHCP -- Rogue Access Point (AP) -- Evil Twin -- Ransomware -- Password Attacks -- MAC Spoofing -- IP Spoofing -- Deauthentication -- Malware -- Human and Environmental -- Social Engineering -- REVIEW -- 42 QUESTIONS -- 42 ANSWERS -- Objective 43 Given a scenario, apply network -- hardening techniques -- Best Practices -- Secure SNMP -- Router Advertisement (RA) Guard -- Port Security -- Dynamic ARP Inspection -- Control Plane Policing -- Private VLANs -- Disable Unneeded Switchports -- Disable Unneeded Network Services -- Change Default Passwords -- Password Complexity/Length -- Enable DHCP Snooping -- Change Default VLAN -- Patch and Firmware Management -- Access Control List -- Firewall Rules -- Role-Based Access -- Wireless Security -- MAC Filtering -- Antenna Placement -- Power Levels -- Wireless Client Isolation -- Guest Network Isolation -- 00-FMindd 22 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Preshared Keys (PSKs) -- EAP -- Geofencing -- Captive Portal -- IoT Access Considerations -- REVIEW -- 43 QUESTIONS -- 43 ANSWERS -- Objective 44 Compare and contrast remote access methods -- and security implications -- Site-to-Site VPN -- Client-to-Site VPN -- Clientless VPN -- Split Tunnel vs Full Tunnel -- Remote Desktop Connection -- Remote Desktop Gateway -- SSH -- Virtual Network Computing (VNC)…”
    Libro electrónico
  6. 826
    Publicado 2017
    Tabla de Contenidos: “…. -- CRUSH tunables -- The evolution of CRUSH tunables -- Argonaut - legacy -- Firefly - CRUSH_TUNABLES3 -- Hammer - CRUSH_V4 -- Jewel - CRUSH_TUNABLES5 -- Ceph and kernel versions that support given tunables -- Warning when tunables are non-optimal -- A few important points -- Ceph cluster map -- High availability monitors -- Ceph authentication and authorization -- Ceph authentication -- Ceph authorization -- How to do it... -- I/O path from a Ceph client to a Ceph cluster -- Ceph Placement Group -- How to do it... -- Placement Group states -- Creating Ceph pools on specific OSDs -- How to do it... -- Chapter 10: Production Planning and Performance Tuning for Ceph -- Introduction -- The dynamics of capacity, performance, and cost -- Choosing hardware and software components for Ceph -- Processor -- Memory -- Network -- Disk -- Partitioning the Ceph OSD journal -- Partitioning Ceph OSD data -- Operating system -- OSD filesystem -- Ceph recommendations and performance tuning -- Tuning global clusters -- Tuning Monitor -- OSD tuning -- OSD general settings -- OSD journal settings -- OSD filestore settings -- OSD recovery settings -- OSD backfilling settings -- OSD scrubbing settings -- Tuning the client -- Tuning the operating system -- Tuning the network -- Sample tuning profile for OSD nodes -- How to do it... -- Ceph erasure-coding -- Erasure code plugin -- Creating an erasure-coded pool -- How to do it... -- Ceph cache tiering -- Writeback mode -- Read-only mode -- Creating a pool for cache tiering -- How to do it... -- See also -- Creating a cache tier -- How to do it... -- Configuring a cache tier -- How to do it... -- Testing a cache tier -- How to do it... -- Cache tiering - possible dangers in production environments -- Known good workloads -- Known bad workloads -- Chapter 11: The Virtual Storage Manager for Ceph -- Introductionc…”
    Libro electrónico
  7. 827
    Publicado 2014
    Tabla de Contenidos: “…6 PUESTA EN MARCHA DEL SISTEMA -- 6.1 ADMINISTRACIÓN DE USUARIOS -- 6.1.1 Usuarios -- 6.1.2 El administrador de usuarios -- 6.1.3 Directivas de seguridad local -- 6.2 SISTEMA DE FICHEROS -- 6.2.1 Administrador de discos -- 6.2.2 Cuotas de disco -- 6.3 PERMISOS -- 7 ADMINISTRACIÓN BÁSICA DEL SISTEMA -- 7.1 ARRANQUE Y PARADA -- 7.1.1 Configuración del gestor de arranque del SO -- 7.1.2 Servicios del sistema -- 7.1.3 Procesos -- 7.1.4 Programación de tareas -- 7.1.5 Proceso de parada del sistema -- 7.2 MONITORIZACIÓN DEL SISTEMA -- 7.2.1 Monitor de confiabilidad y rendimiento -- 7.2.2 Visor de eventos -- 7.3 COPIAS DE SEGURIDAD -- 7.3.1 Realizar una copia de seguridad -- 7.3.2 Recuperar una copia de seguridad -- 7.3.3 Configurar opciones de rendimiento -- 8 ADMINISTRACIÓN DE LA RED -- 8.1 ESQUEMA BÁSICO DE RED -- 8.1.1 Configuración de la red -- 8.1.2 Enrutamiento -- 8.1.3 Firewall de Windows -- 8.1.4 DHCP -- 8.1.5 DNS -- 8.2 TERMINAL SERVER -- 8.2.1 Escritorio remoto -- 8.2.2 Servidor de aplicaciones -- 8.2.3 Cliente de Terminal Server -- 8.3 WINDOWS SERVER UPDATE SERVICES -- 8.3.1 Instalación -- 8.3.2 Cliente -- 8.3.3 Administración -- 9 SERVIDORES DE IMPRESIÓN Y DE ARCHIVOS -- 9.1 COMPARTIR ARCHIVOS E IMPRESORAS -- 9.1.1 Compartir una carpeta -- 9.1.2 Acceso a un recurso compartido -- 9.1.3 Administrar recursos compartidos -- 9.1.4 Instantáneas -- 9.1.5 Sistemas de archivos distribuidos -- 9.2 SERVIDORES DE IMPRESIÓN -- 9.2.1 Compartir impresora -- 9.2.2 Servidor de impresión y documentos -- 9.2.3 Cliente -- 10 SERVICIOS DE INTERNET -- 10.1 SERVIDOR WEB -- 10.1.1 Instalación -- 10.1.2 Administración -- 10.1.3 Creación de un nuevo sito web -- 10.1.4 Creación de un directorio virtual -- 10.1.5 Extensiones de servicio web -- 10.1.6 Seguridad -- 10.2 SERVIDOR FTP -- 10.2.1 Instalación -- 10.2.2 Creación de un nuevo sitio FTP…”
    Enlace del recurso
    Libro electrónico
  8. 828
    Publicado 2016
    Tabla de Contenidos: “…Part 5: Security And Maintenance: -- System Security: -- Tools to fight the bad guys -- Take Action Against The Barbarian Hoard: -- Finding the action center -- Setting up the Windows Firewall -- Protecting the PC with Windows Defender -- Paying attention to the UAC warnings -- System Privacy Settings: -- Setting the screen saver lock -- Reviewing Windows 10 privacy options -- Latest Version: -- Updating and upgrading -- Updating Windows -- That All-Important Safety Copy: -- File You Had Yesterday: -- Obtaining an external backup device -- Configuring Windows 10 file history -- Setting up Windows 7 backup -- Recovering a previous version of a file -- Restoring files from a backup -- Exploring Internet backup utilities -- Compressed Folder Archives: -- Compressing files -- Working with a compressed folder -- Installing software from a compressed folder -- Maintenance Chores: -- Storage Utilities: -- Freeing storage space -- Checking for errors -- Running defrag -- Network troubleshooting -- Manage The PC's Power: -- Setting power options in Windows 10 -- Configuring a power management plan -- Adding the hibernate option -- Windows 10 do-over --…”
    Libro electrónico
  9. 829
    por Lovelace, Mary
    Publicado 2005
    Tabla de Contenidos: “…3.1.1 Configurations -- 3.1.2 Installation prerequisites -- 3.1.3 TCP/IP ports used by TotalStorage Productivity Center -- 3.1.4 Default databases created during install -- 3.2 Pre-installation check list -- 3.2.1 User IDs and security -- 3.2.2 Certificates and key files -- 3.3 Services and service accounts -- 3.3.1 Starting and stopping the managers -- 3.3.2 Uninstall Internet Information Services -- 3.3.3 SNMP install -- 3.4 IBM TotalStorage Productivity Center for Fabric -- 3.4.1 The computer name -- 3.4.2 Database considerations -- 3.4.3 Windows Terminal Services -- 3.4.4 Tivoli NetView -- 3.4.5 Personal firewall -- 3.4.6 Change the HOSTS file -- 3.5 Installation process -- 3.5.1 Prerequisite product install: DB2 and WebSphere -- 3.5.2 Installing IBM Director -- 3.5.3 Tivoli Agent Manager -- 3.5.4 IBM TotalStorage Productivity Center for Disk and Replication Base -- 3.5.5 IBM TotalStorage Productivity Center for Disk -- 3.5.6 IBM TotalStorage Productivity Center for Replication -- 3.5.7 IBM TotalStorage Productivity Center for Fabric -- Chapter 4. …”
    Libro electrónico
  10. 830
    por Ballew, Joli
    Publicado 2013
    Tabla de Contenidos: “…Contents note continued: Opening and closing desktop apps -- Using menus -- Using ribbons -- Formatting text -- Using the Clipboard -- Inserting objects -- Printing a document -- Saving a file -- Exploring other desktop apps -- Adding a device -- Troubleshooting device installations -- Connecting to a Bluetooth device -- Connecting to a private network -- Sharing with a homegroup -- Troubleshooting network connectivity -- Connecting to a public network -- Changing network settings -- Using Airplane Mode -- Enabling Windows Firewall -- Allowing apps to access your personal information or location -- Using Windows Defender -- Creating new users -- Creating a picture password -- Creating a PIN -- Switching among user accounts -- Managing User Account Control settings -- Turning on Family Safety -- Working with Family Safety settings -- Choosing settings to sync to SkyDrive -- Choosing files to save to SkyDrive -- Saving files to SkyDrive -- Creating a new folder in SkyDrive --…”
    Libro electrónico
  11. 831
    por Chicano Tejada, Ester
    Publicado 2023
    Tabla de Contenidos: “…Gestión de registros de elementos de red y filtrado (router, switch, firewall, IDS/IPS, etc.) -- 10. Resumen -- Ejercicios de repaso y autoevaluación -- Capítulo 6 Selección del sistema de registro en función de los requerimientos de la organización -- 1. …”
    Libro electrónico
  12. 832
    por Chicano Tejada, Ester
    Publicado 2023
    Tabla de Contenidos: “…Gestión de registros de elementos de red y filtrado (router, switch, firewall, IDS/IPS, etc.) -- 10. Resumen -- Ejercicios de repaso y autoevaluación -- Capítulo 6 Selección del sistema de registro en función de los requerimientos de la organización -- 1. …”
    Libro electrónico
  13. 833
    por Chicano Tejada, Ester
    Publicado 2023
    Tabla de Contenidos: “…Gestión de registros de elementos de red y filtrado (router, switch, firewall, IDS/IPS, etc.) -- 10. Resumen -- Ejercicios de repaso y autoevaluación -- Capítulo 6 Selección del sistema de registro en función de los requerimientos de la organización -- 1. …”
    Libro electrónico
  14. 834
    Publicado 2018
    Tabla de Contenidos: “…-- Creating an Elastic File System -- Extending EFS to Elastic Beanstalk -- Planning your next steps -- Summary -- Chapter 4: Securing Workloads Using AWS WAF -- Introducing AWS Web Application Firewall -- Concepts and terminologies -- Getting started with WAF -- Creating the web ACL -- Creating the conditions -- Creating rules -- Assigning a WAF Web ACL to CloudFront distributions…”
    Libro electrónico
  15. 835
    Publicado 2013
    Tabla de Contenidos: “…Task 2: RC on Launch to Landing, No Power -- Task 3: RC on Launch and Landing, Low Power, Cut Throttle -- Task 4: RC on Launch and Landing, Increasing Power -- Task 5: Turning -- The Wind -- Overall Good Strategies for Learning to Fly -- Skill Building -- Precision Landing -- Hit the Balloon -- Fly in Stressful Situations -- Aerobatics -- Conclusion -- 6 Keeping You and Your Airplane Alive: Diagnostics and Repair -- Preflight Checklists of Use -- The Brief Preflight in 3 Seconds: Servos, Up, Down, Left, Right, Power, Launch -- More Complete Checklist for Aircraft of Questionable Integrity -- Crash Kit -- Basic Crash Kit -- More Complete Crash Kit -- Kinds of Repairs -- The Big-Crash Postflight Inspection -- More Specific Fixes -- Completely Dead Airplane -- Completely Dead Airplane: Rebind the Receiver -- Completely Dead Airplane: ESC Not Sending Power to the Receiver -- Completely Dead Airplane: Receiver/Servo -- Completely Dead Airplane: Transmitter -- Water Immersion -- Servos Operate But Motor Does Not -- Evaluating Motor Damage -- Symptom: Motor Has Weak Thrust -- Motor Vibrates -- Motor Gets Very Hot -- Motor Doesn't Work at All -- Battery Damage -- Highly Suspect Battery -- Check Battery Pack -- Battery Disposal -- Servo Damage -- Servo Not Moving -- Servo Arms Are No Longer Vertical When Trim Tabs Are Centered -- Busted Servo Arm -- Broken Propeller -- Kinds of Prop Damage -- Flutter -- Poor Radio Connection -- Conclusion -- 7 Make Your Plane Look Good for Day Flying -- General Considerations to Keep in Mind -- Examples -- Mouse: Avery Stick-on Labels and Sharpies -- Purple Monster: Wrapping Paper -- Big Pink Angst: Fresnel-Lens Plastic -- Silver Shark: Plastic Film 2 -- Brooklyn Aerodrome Orange Plane (BAOP) Paint on Foam -- Blue Angel and Others in Printed Tyvek -- Flying Heart: Sign Vinyl -- Firefly: Balloon Film -- Decorating with Tape…”
    Libro electrónico
  16. 836
    Publicado 2024
    Tabla de Contenidos: “…-- Types of ACLs -- Understanding firewall rules -- What does this mean for a network architect? …”
    Libro electrónico
  17. 837
    Publicado 2023
    Tabla de Contenidos: “…_OS sicherer als Windows? -- 7.2 GUFW - die Firewall -- 7.3 ClamTK - Virenscanner -- 7.4 Déjà Dup - Backups -- 7.5 Timeshift - Systemwiederherstellung -- 7.5.1 Timeshift am Terminal nutzen…”
    Libro electrónico
  18. 838
    Publicado 2012
    Tabla de Contenidos: “…Cover -- Brief Contents -- Contents -- Foreword -- Preface -- Chapter 1: Web Foundations -- 1.1 The Evolution of the Web -- 1.2 A Peek into the History of the Web -- 1.3 Internet Applications -- 1.4 Networks -- 1.4.1 From Moore to Metcalf -- 1.5 TCP/IP -- 1.5.1 Internet Address Structure -- 1.5.2 IPv6 -- 1.6 Higher Level Protocols -- 1.6.1 FTP -- 1.6.2 Telnet -- 1.6.3 E-mail Related Protocols -- 1.6.4 HTTP -- 1.7 Important Components of the Web -- 1.7.1 Firewalls -- 1.7.2 Routers -- 1.7.3 Browser -- 1.7.4 Browser Caches -- 1.8 Web Search Engines -- 1.9 Web Servers -- 1.10 Application Server -- 1.11 Internet Organizations' Who's Who -- 1.11.1 ISOC - Internet Society -- 1.11.2 IETF - Internet Engineering Task Force -- 1.11.3 IESG - Internet Engineering Steering Group -- 1.11.4 IANA - Internet Assigned Numbers Authority -- 1.11.5 IAB - Internet Architecture Board -- 1.11.6 IRTF - Internet Research Task Force -- 1.11.7 W3C - World Wide Web Consortium -- 1.12 Summary -- Exercises -- Caselet Activity -- Chapter 2: Client-Side-HTML -- 2.1 SGML Framework -- 2.2 HTML -- 2.3 HTML Tags -- 2.3.1 Attributes -- 2.4 HTML File Structure -- 2.5 Common HTML Tags -- 2.5.1 HTML Tag -- 2.5.2 Meta -- 2.5.3 Title -- 2.5.4 Body -- 2.5.5 Headings -- 2.5.6 Anchor -- 2.5.7 Lists -- 2.5.8 Table -- 2.5.9 Frames -- 2.5.10 HTML Forms -- 2.6 XHTML -- 2.6.1 HTML Validator -- 2.7 Block and Inline Elements -- 2.8 HTML5 -- 2.9 Summary -- Exercises -- Project Activities -- Caselet Activity -- Chapter 3: Client-Side-CSS -- 3.1 CSS Declarations -- 3.2 Using CSS -- 3.3 Sample CSS File -- 3.4 Selectors -- 3.5 Box Model -- 3.5.1 Concept -- 3.5.2 Padding -- 3.6 Float -- 3.6.1 Using Float and Clear -- 3.7 Z-Index -- 3.7.1 Websites -- 3.8 Benefits of CSS -- 3.9 Summary -- Exercises -- Project Activities -- Caselet Activity -- Chapter 4: Client-Side-Behavior -- 4.1 JavaScript…”
    Libro electrónico
  19. 839
    Publicado 2012
    Tabla de Contenidos: “…Multitier Networking Data Design Considerations -- Logical Deployment Diagram and Corresponding Physical Deployment Diagram of All Relevant Devices -- Secure Infrastructure Design -- Storage Integration -- Advanced Configuration of Routers, Switches, and Other Network Devices -- ESB -- SOA -- SIEM -- Database Access Monitor (DAM) -- Service Enabled -- WS-Security -- Two-Minute Drill -- Q&amp -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 5 Host Security Controls -- Host-based Firewalls -- Trusted OS -- Endpoint Security Software -- Host Hardening -- Asset Management (Inventory Control) -- Data Exfiltration -- HIPS/HIDS -- NIPS/NIDS -- Two-Minute Drill -- Q&amp -- A Self Test -- Lab Question -- Self Test Answers -- Lab Answer -- 6 Application Security -- Web Application Security Design Considerations -- Specific Application Issues -- Application Sandboxing -- Application Security Frameworks -- Secure Coding Standards -- Exploits Resulting from Improper Error and Exception Handling -- Privilege Escalation -- Improper Storage of Sensitive Data -- Fuzzing/False Injection -- Secure Cookie Storage and Transmission -- Client-Side Processing vs. …”
    Libro electrónico
  20. 840
    Publicado 2012
    Tabla de Contenidos: “…Afterglow Emission-II (Theory) -- GRB AFTERGLOW -- THEORETICAL ASPECTS OF THE FIREBALL SCENARIO -- SIMILARITIES: GRB 940217, GBR 090926A AND GRB 980923 -- Chapter VII. …”
    Libro electrónico