Mostrando 881 - 900 Resultados de 1,060 Para Buscar 'Firefall~', tiempo de consulta: 1.48s Limitar resultados
  1. 881
    Publicado 2004
    Tabla de Contenidos: “…Planning for Tivoli Data Warehouse 1.2 -- 2.1 Hardware and software requirements -- 2.1.1 Hardware requirements -- 2.1.2 Software requirements -- 2.1.3 Database requirements -- 2.1.4 Crystal Enterprise requirements -- 2.2 Physical and logical design considerations -- 2.2.1 Source databases -- 2.2.2 Control server -- 2.2.3 Central data warehouse -- 2.2.4 Data marts -- 2.2.5 Single machine installation -- 2.2.6 Distributed deployment on UNIX and Windows servers -- 2.2.7 Distributed deployment on z/OS, UNIX, and Windows servers -- 2.2.8 Warehouse agents -- 2.2.9 Considerations about warehouse databases on z/OS -- 2.2.10 Coexistence with other products -- 2.2.11 Selecting port numbers -- 2.3 Database sizing -- 2.4 Security -- 2.4.1 Authority required to install and maintain IBM DB2 UDB -- 2.4.2 Authority required to install Tivoli Data Warehouse -- 2.4.3 Firewalls…”
    Libro electrónico
  2. 882
    Publicado 2023
    Tabla de Contenidos: “…Evaluating your circumstances -- Use financial windfalls -- Take advantage of credit card rewards -- Consider automatic transfers into your emergency fund -- Find ways to make extra money -- Try out the gig economy -- Sell stuff around your home -- Consider renting a room -- Look into other part-time employment -- Learn a new skill -- Chapter 9 Saving for Your Retirement -- Accessing Employer-Matched Retirement -- Partial matching -- Dollar-for-dollar matching -- Tiered matching -- Making Your Money Work for You -- Set a retirement savings goal -- Max out your retirement contributions -- Consider more than one retirement account -- Keep your cost of living low -- Use catch-up contributions if they're needed -- Chapter 10 Eliminating Debt -- Looking at the Different Types of Debt -- Student loans -- Credit cards -- Home and auto loans -- Home loans -- Auto loans -- Miscellaneous debt -- Government agencies -- Court-ordered debt -- Overdue bills turned over to collection agencies -- Medical bills -- Personal loans -- Loans from friends or family -- Paying Off Your Debt -- Compiling a list of your debt -- Considering different payoff methods -- The snowball method -- The avalanche method -- The fireball method -- Applying additional strategies -- Make a debt payoff settlement -- Negotiate with creditors -- Ask about hardship programs -- Use balance transfers -- Make extra payments -- Use financial windfalls -- Avoiding Accumulating More Debt -- Look into refinancing options -- Save an emergency fund -- Say no to credit card offers -- Invest in the right insurance -- Part 4 Budgeting in Action -- Chapter 11 Budgeting in a Tough Economy -- Keeping Your Head through the Ups and Downs of Inflation -- Comparison shop to find the best deals -- Use online tools -- Apps to help you find deals -- Adjust spending categories and goals…”
    Libro electrónico
  3. 883
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Configuring and Administering vSphere 6.x Security -- Objective 1.1 - Configure and administer role-based access control -- Compare and contrast propagated and explicit permission assignments -- View/sort/export user and group lists -- Add/modify/remove permissions for users and groups on vCenter Server inventory objects -- Determine how permissions are applied and inherited in vCenter Server -- Create/clone/edit vCenter Server Roles -- Configure VMware Identity Sources -- Apply a role to a user/group and to an object or group of objects -- Change permission validation settings -- Determine the appropriate set of privileges for common tasks in vCenter Server -- Compare and contrast default system/sample roles -- Determine the correct permissions needed to integrate vCenter Server with other VMware products -- Objective 1.2 - Secure ESXi and vCenter Server 2 -- Configure encrypted vMotion -- Describe ESXi Secure Boot -- Harden ESXi hosts -- Enable/configure/disable services in the ESXi firewall -- Change ESXi default account access -- Add an ESXi Host to a directory service -- Apply permissions to ESXi Hosts using Host Profiles -- Control access to hosts (DCUI/Shell/SSH/MOB) -- Harden vCenter Server -- Control datastore browser access -- Create/Manage vCenter Server Security Certificates -- Control MOB access -- Change vCenter default account access -- Restrict administrative privileges -- Understand the implications of securing a vSphere environment -- Objective 1.3 - Configure and Enable SSO and Identity Sources -- Describe PSC architecture and components -- Differentiate available authentication methods with VMware vCenter -- Perform a multi-site PSC installation -- Configure/manage identity sources…”
    Libro electrónico
  4. 884
    Publicado 2004
    Tabla de Contenidos: “…Connecting your iSeries to the Internet: Scenarios -- 8.1 Connecting to Internet from behind a firewall: HTTP Server -- 8.1.1 Planning worksheet for connecting to the Internet -- 8.1.2 Configure iSeries server AS24 via Internet Connection Wizard -- 8.1.3 Implement security setting on iSeries server AS24 -- 8.1.4 Test the configuration -- 8.1.5 Review, conclusions, and references -- 8.2 Connecting to the Internet from DMZ: Host to host VPN -- 8.2.1 Planning worksheet for configuring a host to host VPN connection -- 8.2.2 Configure iSeries server AS24 for the initiating VPN connection -- 8.2.3 Configure iSeries server AS25 for the receiving VPN connection…”
    Libro electrónico
  5. 885
    Publicado 2024
    Tabla de Contenidos: “…-- Intune Administrator Licensing -- Entra group-based licensing -- Setting the mobile device management authority -- Enabling Windows automatic enrollment -- Using Azure Virtual Desktop with Microsoft Intune -- Microsoft Intune device restrictions for Windows -- Blocking personal Windows devices -- Microsoft Intune device limit restrictions for Windows -- Customizing Intune Company Portal apps, the Company Portal website, and the Intune app -- Microsoft Intune - network URL firewall requirements -- Access for managed devices -- Network requirements for PowerShell scripts and Win32 apps -- Microsoft Store endpoint URLs -- Windows 365 endpoint URLs -- Windows Push Notification Services - required URLs -- Windows 365 and Azure Virtual Desktop - required URLs -- Universal Print - required URLs -- Delivery Optimization -- Summary -- Questions -- Answers -- Further reading -- Section II: Windows 365 -- Chapter 4: What Is Windows 365? …”
    Libro electrónico
  6. 886
    Publicado 2023
    Tabla de Contenidos: “…Tip #3 - Delineate objectives -- Tip #4 - Apply an agile methodology to your digital transformation -- Tip #5 - Encourage risk-taking -- Tip #6 - One-way door vs. two-way door decisions -- Tip #7 - Clear delineation of roles and responsibilities -- Digital transformation pitfalls -- Lack of commitment from the C-suite -- Not having the right team in place -- Internal resistance from the ranks -- Going too fast -- Going too slow -- Outdated rules and regulations -- The AWS Cloud Adoption Framework (AWS CAF) -- Architectures to provide high availability, reliability, and scalability -- Active architecture -- Active/passive architecture -- Active/active architecture -- Sharding architecture -- Chaos engineering -- Summary -- Chapter 4: Networking in AWS -- Learning about the AWS Global Infrastructure -- Regions, Availability Zones, and Local zones -- AWS Regions -- AWS AZs -- AWS LZs -- Benefits of the AWS Global Infrastructure -- AWS networking foundations -- Amazon Virtual Private Cloud (VPC) -- AWS TGW -- AWS PrivateLink -- Edge networking -- Route 53 -- Amazon CloudFront -- AWS Global Accelerator (AGA) -- AWS Wavelength -- Building hybrid cloud connectivity in AWS -- AWS Virtual Private Network (VPN) -- AWS Direct Connect -- AWS Cloud WAN -- AWS cloud network security -- AWS Network Firewall (ANFW) -- AWS network security patterns - best practices -- AWS network security anti-patterns -- AWS network security with third-party solutions -- Summary -- Chapter 5: Storage in AWS - Choosing the Right Tool for the Job -- Understanding Amazon Elastic Block Store -- General-purpose Solid-State Devices (SSDs) -- Provisioned IOPS SSD -- Throughput Optimized HDD -- Cold HDD -- Amazon EBS Snapshots -- Choosing the right EBS volume -- Investigating Amazon Elastic File System (EFS) -- Using Amazon FSx to manage file systems…”
    Libro electrónico
  7. 887
    por Sabin-Wilson, Lisa
    Publicado 2024
    Tabla de Contenidos: “…Establishing Your Domain -- Understanding domain name extensions -- Considering the cost of a domain name -- Registering your domain name -- Finding a Home for Your Site -- Getting help with hosting WordPress -- Dealing with disk space and bandwidth -- Managing disk space -- Choosing the size of your bandwidth pipe -- Chapter 2 Using Secure File Transfer Protocol -- Understanding SFTP Concepts -- Setting Up SFTP on Your Hosting Account -- Finding and Using Free and Easy SFTP Programs -- Connecting to the web server via SFTP -- Transferring files from point A to point B -- Editing files by using SFTP -- Changing file permissions -- Chapter 3 Installing WordPress on Your Web Server -- Exploring Preinstalled WordPress -- Installing WordPress Manually -- Setting up the MySQL database -- Downloading the WordPress software -- Uploading the WordPress files via SFTP -- Running the installation script -- Chapter 4 Configuring WordPress for Optimum Security -- Understanding the Basics of Web Security -- Updating WordPress -- Installing patches -- Using a firewall -- Using Trusted Sources -- Managing Users and Passwords -- Hardening WordPress -- Enabling multifactor authentication using the Two Factor Authentication plugin -- Limiting login attempts -- Disabling theme and plugin editors -- Filtering by IP address -- Killing PHP execution -- Chapter 5 Updating WordPress -- Getting Notified of an Available Update -- Backing Up Your Database -- Updating WordPress Automatically -- Updating WordPress Manually -- Chapter 6 Backing Up, Packing Up, and Moving to a New Host -- Migrating Your Existing Site to WordPress -- Movin' on up -- Preparing for the big move -- Converting templates -- Moving your site to WordPress -- Importing from Blogger -- Importing from LiveJournal -- Importing from Movable Type and TypePad -- Importing from Tumblr -- Importing from WordPress…”
    Libro electrónico
  8. 888
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
    Libro electrónico
  9. 889
    Publicado 2019
    Tabla de Contenidos: “…11.1.1 Creating applications with the mix tool -- 11.1.2 The application behavior -- 11.1.3 Starting the application -- 11.1.4 Library applications -- 11.1.5 Creating a to-do application -- 11.1.6 The application folder structure -- 11.2 Working with dependencies -- 11.2.1 Adding a dependency -- 11.2.2 Adapting the pool -- 11.2.3 Visualizing the system -- 11.3 Building a web server -- 11.3.1 Choosing dependencies -- 11.3.2 Starting the server -- 11.3.3 Handling requests -- 11.3.4 Reasoning about the system -- 11.4 Configuring applications -- 11.4.1 Application environment -- 11.4.2 Varying configuration -- 11.4.3 Config script considerations -- Summary -- 12 Building a distributed system -- 12.1 Distribution primitives -- 12.1.1 Starting a cluster -- 12.1.2 Communicating between nodes -- 12.1.3 Process discovery -- 12.1.4 Links and monitors -- 12.1.5 Other distribution services -- 12.2 Building a fault-tolerant cluster -- 12.2.1 Cluster design -- 12.2.2 The distributed to-do cache -- 12.2.3 Implementing a replicated database -- 12.2.4 Testing the system -- 12.2.5 Detecting partitions -- 12.2.6 Highly available systems -- 12.3 Network considerations -- 12.3.1 Node names -- 12.3.2 Cookies -- 12.3.3 Hidden nodes -- 12.3.4 Firewalls -- Summary -- 13 Running the system -- 13.1 Running a system with Elixir tools -- 13.1.1 Using the mix and elixir commands -- 13.1.2 Running scripts -- 13.1.3 Compiling for production -- 13.2 OTP releases -- 13.2.1 Building a release with distillery -- 13.2.2 Using a release -- 13.2.3 Release contents -- 13.3 Analyzing system behavior -- 13.3.1 Debugging -- 13.3.2 Logging -- 13.3.3 Interacting with the system -- 13.3.4 Tracing -- Summary -- Index -- Lists of Figures, Tables and Listings -- List of Illustrations -- List of Tables -- List of Listings…”
    Libro electrónico
  10. 890
    Publicado 2003
    Tabla de Contenidos: “…Solutions and offerings "best practices" -- 5.1 High Performance Computing (HPC) environment -- 5.1.1 A hypothetical solution -- 5.1.2 Solution architecture -- 5.1.3 Solution discussion -- 5.1.4 Cluster management considerations -- 5.2 Transition from SP nodes to LPARs -- 5.2.1 System migration by utilizing alternate disk migration -- 5.3 Virtual Serial port implications with LPARS -- 5.3.1 Console device -- 5.3.2 Serial port implication in an LPAR/SP environment -- 5.3.3 Virtual terminal window -- 5.4 HMC considerations -- 5.4.1 Redundant HMC -- 5.5 Web-based System Manager client solutions -- 5.5.1 Web-based System Manager functionality through the firewall -- Appendix A. Performance -- A.1 Switch performance -- A.2 Adapter performance -- A.3 Node I/O slot performance -- A.4 Application performance -- A.5 MPI/user space -- A.6 TCP/IP -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Help from IBM -- Abbreviations and acronyms -- Index -- Back cover…”
    Libro electrónico
  11. 891
    Publicado 2017
    Tabla de Contenidos: “…Turaga and Mihaela van der Schaar / /10.1 Introduction: Smarter Planet 234 / /10.2 Illustrative Problem: Transportation 237 / /10.3 Stream Processing Characteristics 238 / /10.4 Distributed Stream Processing Systems 239 / /10.4.1 State of the Art 239 / /10.4.2 Stream Processing Systems 240 / /10.5 Distributed Online Learning Frameworks 244 / /10.5.1 State of the Art 244 / /10.5.2 Systematic Framework for Online Distributed Ensemble Learning 247 / /10.5.3 Online Learning of the Aggregation Weights 250 / /10.5.4 Collision Detection Application 254 / /10.6 What Lies Ahead 257 / /Acknowledgment 258 / /References 258 / /11 Securing the Internet of Things: Need for a New Paradigm and Fog Computing 261 /Tao Zhang, Yi Zheng, Raymond Zheng, and Helder Antunes / /11.1 Introduction 261 / /11.2 New IoT Security Challenges That Necessitate Fundamental Changes to the Existing Security /Paradigm 263 / /11.2.1 Many Things Will Have Long Life Spans but Constrained and Difficult-to-Upgrade Resources 264 / /11.2.2 Putting All IoT Devices Inside Firewalled Castles Will Become Infeasible or Impractical 264 / /11.2.3 Mission-Critical Systems Will Demand Minimal-Impact Incident Responses 265 / /11.2.4 The Need to Know the Security Status of a Vast Number of Devices 266 / /11.3 A New Security Paradigm for the Internet of Things 268 / /11.3.1 Help the Less Capable with Fog Computing 269 / /11.3.2 Scale Security Monitoring to Large Number of Devices with Crowd Attestation 272 / /11.3.3 Dynamic Risk / Benefit-Proportional Protection with Adaptive Immune Security 277 / /11.4 Summary 281 / /Acknowledgment 281 / /References 281 / /INDEX 285.…”
    Libro electrónico
  12. 892
    Publicado 2017
    Tabla de Contenidos: “…VPN -- 2.1.4. TLS/SSL -- 2.2. Firewalls -- 2.3. Intrusion Detection…”
    Libro electrónico
  13. 893
    Publicado 2021
    Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- Acknowledgments -- Editors -- Contributors -- Section I -- Chapter 1: Secure Fog-Cloud of Things: Architectures, Opportunities and Challenges -- 1.1 Introduction -- 1.1.1 Chapter Road Map -- 1.2 Secure Fog-Cloud of Things -- 1.2.1 Environment -- 1.2.2 Architecture -- 1.3 Threats, Vulnerabilities and Exploits in Fog-Cloud of Things Ecosystems -- 1.4 Key Machine Learning Kits for Secure Fog-Cloud of Things Architecture -- 1.5 Applications -- 1.6 Opportunities and Challenges in Improving Security in Fog-Cloud of Things -- 1.6.1 Opportunities -- 1.6.2 Challenges -- 1.7 Future Trends -- 1.8 Conclusion -- References -- Chapter 2: Collaborative and Integrated Edge Security Architecture -- 2.1 Background -- 2.2 Edge Security Challenges -- 2.3 Perspectives of Edge Security Architecture -- 2.4 Emerging Trends and Enablers for Edge Security Architecture -- 2.4.1 The Edge Computing Architecture -- 2.4.2 Leveraging Fog-Based Security Architecture for Edge Networks -- 2.5 Collaborative and Integrated Security Architecture for Edge Computing -- 2.5.1 Overview -- 2.5.2 Distributed Virtual Firewall (DFWs) -- 2.5.3 Distributed Intrusion Detection Systems (IDSs) -- 2.6 Conclusion and Future Research -- References -- Chapter 3: A Systemic IoT-Fog-Cloud Architecture for Big-Data Analytics and Cyber Security Systems: A Review of Fog Computing -- 3.1 Introduction -- 3.2 Fog Computing Systems -- 3.2.1 Description of Fog -- 3.2.2 Characteristics of Fog -- 3.2.3 Systemic Architecture of IoT-Fog-Cloud -- 3.2.4 Applications of IoT, Fog and Cloud Systems -- 3.3 Cyber Security Challenges -- 3.4 Security Solutions and Future Directions -- 3.5 Conclusion -- References -- Chapter 4: Security and Organizational Strategy: A Cloud and Edge Computing Perspective -- 4.1 Introduction…”
    Libro electrónico
  14. 894
    por Srinivasan, A.
    Publicado 2014
    Tabla de Contenidos: “…-- 2.4.2 Migrating to the Cloud: Deployment Considerations -- 2 .4.3 Benefits of the Cloud -- 2 .4.4 Communication Revolution -- 2 .4.5 Cloud Case Studies -- 2.4.6 Cloud Inside the Firewall -- 2.4.7 Secure Sensitive Data -- 2.4.8 Trusted Partners -- 2.4.9 Applications on Cloud Platform -- 2.4.10 Consumer versus Enterprise -- 2.4.11 Remotely Mirrored Servers -- 2.4.12 Payment Procedure -- 2.5 Seven-step Model -- Summary -- Key Terms -- Review Questions -- Chapter 3: Types of Cloud -- 3.1 Public and Private Cloud -- 3.1.1 Types of Cloud Computing…”
    Libro electrónico
  15. 895
    Publicado 2023
    “…You’ll also review the advanced networking and security options available in the platform that help reinforce the level of security with features like traditional Gateway Firewall, Distributed Firewall, Micro-segmentation, Identity Firewall, and IDS/IPS. …”
    Libro electrónico
  16. 896
    Publicado 2002
    “…The book does not cover firewalls, but covers the more common situation where an organization protects its hub using other systems as firewalls, often proprietary firewalls. …”
    Libro electrónico
  17. 897
    Publicado 2019
    “…Understand load balancing—what it is and why it’s important Explore load balancing in Azure, including the traffic manager and application gateway Learn how NGINX Plus on Azure lets you create an ideal end-to-end application platform Walk through three load balancing options with Azure and NGINX Plus Explore security choices including NGINX management, NGINX Web Application Firewall, and Azure Firewall integration…”
    Libro electrónico
  18. 898
    Publicado 2005
    Tabla de Contenidos: “…Runtime pattern -- 3.1 An introduction to the node types -- 3.1.1 User node -- 3.1.2 Client node -- 3.1.3 Pervasive client services node -- 3.1.4 ISP Gateway (Pervasive services) node -- 3.1.5 Protocol firewall node -- 3.1.6 Connectivity and access for pervasive services node -- 3.1.7 Web server redirector node -- 3.1.8 Telephony connector -- 3.1.9 Voice gateway node -- 3.1.10 Presentation server node -- 3.1.11 Personalization server node -- 3.1.12 Directory and security services node -- 3.1.13 Application server node -- 3.1.14 Pervasive extension services node -- 3.1.15 Existing data and applications node -- 3.1.16 Database node -- 3.1.17 Collaboration server node -- 3.2 Runtime patterns for pervasive access -- 3.2.1 Pervasive Device Adapter::Runtime pattern (composed with Portal runtime pattern) -- 3.2.2 Pervasive Device Adapter=Voice::Runtime pattern -- 3.2.3 Rich Device::Runtime pattern…”
    Libro electrónico
  19. 899
    por Ebner, Jürgen
    Publicado 2023
    Tabla de Contenidos: “…3.3.4 Installation abschließen und neu starten -- 3.4 Dual-Boot - Kali Linux und Windows -- 3.5 Installation auf einem vollständig verschlüsselten Dateisystem -- 3.5.1 Einführung in LVM -- 3.5.2 Einführung in LUKS -- 3.5.3 Konfigurieren verschlüsselter Partitionen -- 3.6 Kali Linux auf Windows Subsystem for Linux -- 3.6.1 Win-KeX‌ -- 3.7 Kali Linux auf einem Raspberry Pi -- 3.8 Systemeinstellungen und Updates -- 3.8.1 Repositories -- 3.8.2 NVIDIA-Treiber für Kali Linux installieren -- 3.8.3 Terminal als Short-Cut (Tastenkombination) -- 3.9 Fehlerbehebung bei der Installation‌ -- 3.9.1 Einsatz der Installer-Shell zur Fehlerbehebung -- 3.10 Zusammenfassung -- Kapitel 4: Erste Schritte mit Kali -- 4.1 Konfiguration von Kali Linux -- 4.1.1 Netzwerkeinstellungen -- 4.1.2 Verwalten von Benutzern und Gruppen -- 4.1.3 Services konfigurieren -- 4.2 Managing Services -- 4.3 Hacking-Labo‌r einrichten -- 4.3.1 Kali Linux - Test Lab Environment -- 4.4 Sichern und Überwachen mit Kali Linux -- 4.4.1 Sicherheitsrichtlinie‌n definieren -- 4.4.2 Mögliche Sicherheitsmaßnahmen -- 4.4.3 Netzwerkservices absichern -- 4.4.4 Firewall- oder Paketfilterung -- 4.5 Weitere Tools installieren -- 4.5.1 Meta-Packages mit kali-tweaks‌ installieren -- 4.5.2 Terminator statt Terminal -- 4.5.3 OpenVAS zur Schwachstellenanalyse -- 4.5.4 SSLstrip2 -- 4.5.5 Dns2proxy‌ -- 4.6 Kali Linux ausschalten -- 4.7 Zusammenfassung -- Teil II: Einführung in Penetration Testing -- Kapitel 5: Einführung in Security Assessments -- 5.1 Kali Linux in einem Assessment -- 5.2 Arten von Assessments -- 5.2.1 Schwachstellenanalyse -- 5.2.2 Compliance-Test -- 5.2.3 Traditioneller Penetrationstest -- 5.2.4 Applikations-Assessment -- 5.3 Normierung der Assessments -- 5.4 Arten von Attacken -- 5.4.1 Denial of Service‌s (D‌oS) -- 5.4.2 Speicherbeschädigungen -- 5.4.3 Schwachstellen von Webseiten…”
    Libro electrónico
  20. 900
    Publicado 2018
    Tabla de Contenidos: “…15.2 Private-key encryption -- 15.3 Public-key encryption -- 15.4 Exercises -- TCP/IP -- 16.1 Introduction -- 16.2 TCP/IP gateways and hosts -- 16.3 Function of the IP protocol -- 16.4 Internet datagram -- 16.5 ICMP -- 16.6 TCP/IP internets -- 16.7 Domain name system -- 16.8 Internet naming structure -- 16.9 Domain name server -- 16.10 Bootp protocol -- 16.11 Example network -- 16.12 Exercises -- TCP/IP II -- 17.1 Introduction -- 17.2 IP Ver6 -- 17.3 Transmission control protocol -- 17.4 TCP/IP commands -- 17.5 Exercises -- ELECTRONIC MAIL -- 18.1 Introduction -- 18.2 Shared-file approach versus client/server approach -- 18.3 Electronic mail overview -- 18.4 Internet email address -- 18.5 SMTP -- 18.6 X.400 -- 18.7 MIME -- 18.8 Exercises -- THE WORLD WIDE WEB -- 19.1 Introduction -- 19.2 Advantages and disadvantages of the WWW -- 19.3 Client/server architecture -- 19.4 Web browsers -- 19.5 Internet resources -- 19.6 Universal resource locators (URLs) -- 19.7 Universal resource identifier -- 19.8 Intranets -- 19.9 Firewalls -- 19.10 Exercises -- HTTP -- 20.1 Introduction -- 20.2 HTTP operation -- 20.3 Intermediate systems -- 20.4 Cache -- 20.5 HTML messages -- 20.6 Exercises -- HTML (INTRODUCTION) -- 21.1 Introduction -- 21.2 Links -- 21.3 Lists -- 21.4 Colors -- 21.5 Background images -- 21.6 Displaying images -- 21.7 Horizontal lines -- 21.8 Exercises -- HTML (TABLES, FORMS AND HELPERS) -- 22.1 Introduction -- 22.2 Anchors -- 22.3 Tables -- 22.4 CGI scripts -- 22.5 Forms -- 22.6 Multimedia -- 22.7 Exercises -- JAVA/JAVASCRIPT -- 23.1 Introduction -- 23.2 JavaScript -- 23.3 JavaScript values, variables and literals -- 23.4 Expressions and operators -- 23.5 JavaScript operators -- 23.6 JavaScript statements -- 23.7 Conditional statements -- 23.8 Loops -- 23.9 Comments -- 23.10 Functions -- 23.11 Objects and properties -- 23.12 Document objects…”
    Libro electrónico