Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
921Publicado 2016“…What You Will Learn Route an IPv6 netblock to your local network Modify your named instance to support setting hostnames for your IPv6 addresses Use SSH for remote console access Configure NGINX with TLS Secure XMPP with TLS Leverage iptables6 to firewall your IPv6 traffic Configure Samba as an Active Directory compatible directory service In Detail Linux can be configured as a networked workstation, a DNS server, a mail server, a firewall, a gateway router, and many other things. …”
Libro electrónico -
922por Barken, Lee“…Topics covered include-- Why conventional wireless LANs are so insecure--and what you can do about it "Wardriving" software, equipment, and techniques: knowing your enemy 802.11i, WPA, TKIP, and AES: the new wireless security options 802.1x and EAP: enabling port-based authentication on your WLAN Safely connecting WLANs to wired networks Securing home and small office environments, one step at a time Accessing VPNs from wireless devices Integrating firewalls and wireless access points Improving security in public access environments Securing enterprise environments with 802.1x--a start-to-finish walkthrough…”
Publicado 2004
Libro electrónico -
923Publicado 2021“…Understand application delivery and load balancing--and why they're important Explore Azure's managed load-balancing options Learn how to run NGINX on Azure Examine similarities and complementing features between Azure-managed solutions and NGINX Define, manage, and monitor the global routing for your web traffic using Azure Front Door Explore security choices using NGINX and Azure Firewall solutions…”
Libro electrónico -
924Publicado 2019“…Get an overview of today’s top cyberthreats and their impact on businesses Protect web applications from evolving threats using an integrated approach Use industry guidelines to help prevent injection, XSS, and session hijacking attacks Learn why companies are moving threat protection to third-party entities and the cloud Build layered security with firewalls, multifactor authentication, AI, secure programming, and data analytics…”
Libro electrónico -
925Publicado 2019“…Understand the benefits of adopting a multicloud architecture—along with the trade-offs and short-term costs Learn how orchestration lets you manage dozens of applications across thousands of containers in a multicloud environment Explore ways to apply a consistent security policy across all cloud platforms Implement layered security that includes vulnerability scanning, API gateway deployment, and web application firewalls Delve into specific use cases for delivering web application security across all cloud providers…”
Libro electrónico -
926Publicado 2016“…Provides a comprehensive overview of Network Function Virtualization (NFV) Discusses how to determine if network function virtualization is right for an enterprise network Presents an ideal reference for those interested in NFV Network Service Chaining, NSC network address translation (NAT), firewalling, intrusion detection, domain name service (DNS), caching, and software defined networks Includes hands-on, step-by-step guides for designing, deploying, and managing NFV in the enterprise Explains, and contrasts, all relevant NFV standards, including ETSI, IETF, Openstack, and Open Daylight…”
Libro electrónico -
927por Meyers, Michael, 1961-“…Covers all exam topics, including how to: Build a network with the OSI seven-layer model Configure network hardware, topologies, and cabling Connect multiple Ethernet components Configure wireless networks Work with network protocols, including TCP/IP, DNS, SIP, and IMAP Configure IPv4 and IPv6 routing protocols Share and access network resources Interconnect network operating systems-Windows, Mac OS, UNIX/Linux Set up clients and servers for remote access Monitor and troubleshoot networks Secure networks with firewalls, packet filtering, encryption, authentication, and other methods The CD-ROM features Hundreds of practice questions Video introduction to CompTIA Network+ A collection of Mike's favorite shareware and freeware networking tools and utilities Complete electronic book…”
Publicado 2009
Libro electrónico -
928por Gibson, Darril“…Serves as an ideal resource for gaining a solid understanding of fundamental security concepts and skills Offers a straightforward and direct approach to security basics and covers anti-malware software products, firewalls, network topologies and devices, network ports, and more Reviews all the topics you need to know for taking the MTA 98-367 exam Provides an overview of security components, looks at securing access with permissions, addresses audit policies and network auditing, and examines protecting clients and servers If you're new to IT and interested in entering the IT workforce, then Microsoft Windows Security Essentials is essential reading…”
Publicado 2011
Libro electrónico -
929Publicado 2020“…Finally, you’ll cover disk management and firewall administration. By the end of this course, you’ll have learned how to install, configure, and manage the most common roles and services found in a Microsoft Windows 2019 network…”
-
930Publicado 2011“…It offers reliable and straight-to-the-point coverage of every topic covered on the exam, including installation, upgrades, deployment, system management, user management, networking, printing, firewalls, encryption, applications, Internet Explorer, remote management, mobility, optimization, backup, and much more. …”
Libro electrónico -
931Publicado 2022“…About This Video Using UE5 Niagara particle system to create fire simulations and fireflies Material creation for foliage, terrain, and more Rendering assets in Substance and creating an environmental presentation video in UE5 In Detail Unreal Engine is a complete suite of creation tools for game development, architectural and automotive visualization, linear film and television content creation, broadcast and live event production, training and simulation, and other real-time applications. …”
Video -
932Publicado 2024“…The course also covers the use of Python scripts for enhancing security appliance API calls and differentiates between intrusion prevention and firewalling. The course wraps up with detailed insights into Cisco's security products, including Firepower devices, Web Proxy, ESA, WSA, and Cisco Umbrella. …”
Video -
933Publicado 2022“…In addition to the quantitative and qualitative challenges, data pressure in systems and networks also comes from various sources such as end systems, switches, firewalls, intrusion sensors, and the emerging network elements speaking with different syntax and semantics, which makes organizing and incorporating the generated data difficult for comprehensive analysis. …”
Libro electrónico -
934Publicado 2004“…This book: Details the many performance improvements in the virtual memory system Describes the new symmetric multiprocessor support Includes new sections on threads and their scheduling Introduces the new jail facility to ease the hosting of multiple domains Updates information on networking and interprocess communication Already widely used for Internet services and firewalls, high-availability servers, and general timesharing systems, the lean quality of FreeBSD also suits the growing area of embedded systems. …”
Libro electrónico -
935por Nielson, Seth James“…What You Will Learn Authentication technologies, including secure password storage and how hackers “crack” password lists Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC Core cryptography technology, including AES encryption and public key signatures Classical host security technologies that protect against malware (viruses, trojans, ransomware) Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them Email and social media security threats such as spam, phishing, social media, and other email threats…”
Publicado 2023
Libro electrónico -
936Publicado 2020“…You will automate useful activities using the Nmap scripting engine.You will also learn about Firewall and IDS evasion and Zenmap GUI. By the end of this course, you will be able to confidently audit your network with Nmap and scan through vulnerabilities to secure your network…”
-
937por Sutter, Herb“…Covering a broad range of C++ topics, the problems and solutions address critical issues such as: Generic programming and how to write reusable templates Exception safety issues and techniques Robust class design and inheritance Compiler firewalls and the Pimpl Idiom Name lookup, namespaces, and the Interface Principle Memory management issues and techniques Traps, pitfalls, and anti-idioms Optimization Try your skills against the C++ masters and come away with the insight and experience to create more efficient, effective, robust, and portable C++ code. 0201615622B04062001…”
Publicado 2000
Libro electrónico -
938por Penny, Benjamin“…Like many a young Victorian, he was also a keen observer of natural history, fascinated by fireflies and ants, corals and sea slugs, and the volcanic origins of the landscape. …”
Publicado 2023
Libro electrónico -
939Publicado 2022“…Every feature of this book supports both efficient exam preparation and long-term mastery: * Opening topics lists identify the topics you need to learn in each chapter and list EC-Council's official exam objectives * Key Topics figures, tables, and lists call attention to the information that's most crucial for exam success * Exam Preparation Tasks enable you to review key topics, define key terms, work through scenarios, and answer review questions...going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career * Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field's essential terminology This study guide helps you master all the topics on the latest CEH exam, including * Ethical hacking basics * Technical foundations of hacking * Footprinting and scanning * Enumeration and system hacking * Social engineering, malware threats, and vulnerability analysis * Sniffers, session hijacking, and denial of service * Web server hacking, web applications, and database attacks * Wireless technologies, mobile security, and mobile attacks * IDS, firewalls, and honeypots * Cryptographic attacks and defenses * Cloud computing, IoT, and botnets…”
Libro electrónico -
940Publicado 2016“…Understand the goals, costs, and limitations of software security Identify fifteen types of security attacks such as WebSocket, SQL injection, and TLS Heartbleed Discover six core principles of software security including Defense in Depth and Fail Securely Learn about threat modeling using tools like STRIDE, CAPEC, and attack trees Recognize the capabilities and limitations of password policies, WAFS, and Firewalls Review authentication/authorization techniques like HTTP Digest, OAuth 2 and JWT Learn about the CORS, CSP, and HSTS security policies and protocols Explore the W3C Web Cryptography Working Group’s newest security protocols Brian Sletten is a software engineer who focuses on security consulting, web architecture, resource-oriented computing, social networking, the Semantic Web, data science, 3D graphics, visualization, scalable systems, and other technologies. …”