Mostrando 941 - 960 Resultados de 1,060 Para Buscar 'Firefall~', tiempo de consulta: 1.52s Limitar resultados
  1. 941
    Publicado 2020
    “…Every feature of this book supports both efficient exam preparation and long-term mastery: · Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council's official exam objectives · Key Topics figures, tables, and lists call attention to the information that's most crucial for exam success · Exam Preparation Tasks enable you to review key topics, define key terms, work through scenarios, and answer review questions...going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career · Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field's essential terminology This study guide helps you master all the topics on the latest CEH exam, including · Ethical hacking basics · Technical foundations of hacking · Footprinting and scanning · Enumeration and system hacking · Social engineering, malware threats, and vulnerability analysis · Sniffers, session hijacking, and denial of service · Web server hacking, web applications, and database attacks · Wireless technologies, mobile security, and mobile attacks · IDS, firewalls, and honeypots · Cryptographic attacks and defenses · Cloud computing, IoT, and botnets…”
    Libro electrónico
  2. 942
    por Cochran, Kodi A.
    Publicado 2024
    “…What You Will Learn Study a step-by-step guide to conducting vulnerability assessments Follow post-exploitation techniques for maintaining access Understand essential network security concepts, including firewalls, intrusion detection systems, and other network security measures Review secure coding practices and the importance of web application security Explore mobile and IoT security best practices Review tools and practices for securing cloud environments Discover tips for recognizing and mitigating social engineering threats …”
    Libro electrónico
  3. 943
    Publicado 2003
    “…Choose the right network for you: wired or wireless, peer-to-peer or server-based Set up your hardware and Windows networking Share high-speed Internet access throughout your home or office Protect your networks with firewalls and other security tools Set up reliable, secure telecommuting Build a networked multimedia entertainment PC—and listen to MP3s anywhere Use your network and VoIP telephony instead of an expensive PBX Troubleshoot network problems quickly and easily…”
    Libro electrónico
  4. 944
    “…You will: Map the key Azure components to familiar concepts in infrastructure, such as virtualization, storage provisioning, switching, and firewalls Implement Azure IaaS deployment architectures Design IaaS environments in line with the Microsoft recommended best practices for scalability, resiliency, availability, performance, and security Manage the operational aspects of hosted environments, leverage automation, and fine tune for optimal performance…”
    Libro electrónico
  5. 945
    Publicado 2020
    “…Learn everything you need for the Security Fundamentals MTA Certification Understand core security principles, including security layers and network security Learn essential concepts in physical security, internet security, and wireless security Identify the different types of hardware firewalls and their characteristics Test your knowledge and practice for the exam with quiz questions in every chapter IT professionals looking to understand more about networking will gain the knowledge to effectively secure a client and server, and to confidently explain basic security concepts. …”
    Libro electrónico
  6. 946
    Publicado 2012
    “…Install and configure popular Linux distributions, including the latest versions of Fedora, CentOS, openSUSE, Debian, and Ubuntu Administer Linux servers from the GUI or from the command line (shell) Manage users, permissions, folders, and native FOSS applications Compile, tune, upgrade, and customize the latest Linux kernel 3.x series Work with proc, SysFS, and cgroup file systems Understand and manage the Linux TCP/IP networking stack and services for both IPv4 and IPv6 Build robust firewalls, and routers using Netfilter and Linux Create and maintain print, e-mail, FTP, and web servers Use LDAP or NIS for identity management Set up and administer DNS, POP3, IMAP3, and DHCP servers Use GlusterFS, NFS, and Samba for sharing and distributing file system resources Explore and implement Linux virtualization technologies using KVM…”
    Libro electrónico
  7. 947
    Publicado 2014
    “…Hunter-Gatherer: Rookies seek out experts and return with ideas and resources to address the challenges they face. Firewalker: Lacking situational confidence, rookies take small, calculated steps, moving fast and seeking feedback to stay on track. …”
    Libro electrónico
  8. 948
    Publicado 2023
    “…Topics include: Google Cloud basics Deploying virtual machines Using serverless functions to build event driven workflows Using Google BigQuery to analyze data Identity management and network security on Google Cloud Networking, including working with virtual private clouds and firewall rules Deploying a relational database using a managed services Understanding the state of your infrastructure and services your services using Cloud Monitoring and Cloud Logging Using Cloud Marketplace to deploy pre-packaged software and infrastructure to your virtual private cloud About the Instructor Dan Sullivan is a cloud architect and systems developer specializing in data architecture, data analytics, and machine learning. …”
    Video
  9. 949
    Publicado 2016
    “…Topics covered include Networking security fundamentals: concepts, policies, strategy Protecting network infrastructure: network foundations, security management planes/access; data planes (Catalyst switches and IPv6) Threat control/containment: protecting endpoints and content; configuring ACLs, zone-based firewalls, and Cisco IOS IPS Secure connectivity: VPNs, cryptology, asymmetric encryption, PKI, IPsec VPNs, and site-to-site VPN configuration ASA network security: ASA/ASDM concepts; configuring ASA basic settings, advanced settings, and VPNs Access all CCNA Security commands: use as a quick, offline resource for research and solutions Logical how-to topic groupings provide one-stop research Great for review before CCNA Security certification exams Compact size makes it easy to carry with you, wherever you go “Create Your Own Journal” section with blank, lined pages allows you to personalize the book for your needs “What Do You Want to Do?” …”
    Libro electrónico
  10. 950
    por Siriwardena, Prabath. author
    Publicado 2020
    “…You will: Securely design, develop, and deploy enterprise APIs Pick security standards and protocols to match business needs Mitigate security exploits by understanding the OAuth 2.0 threat landscape Federate identities to expand business APIs beyond the corporate firewall Protect microservices at the edge by securing their APIs Develop native mobile applications to access APIs securely Integrate applications with SaaS APIs protected with OAuth 2.0.…”
    Libro electrónico
  11. 951
    Publicado 2003
    “…The addition of several new options to the iptables firewall command and new commands related to DNSSEC and ssh show the book's value as a security tool. …”
    Libro electrónico
  12. 952
    Publicado 2005
    “…What types of security should I set up? Do I need a firewall? How can I restrict what users can do after they log in? …”
    Libro electrónico
  13. 953
    por Welsh, Matt
    Publicado 2003
    “…New topics include applications ready for prime time, basic security and firewalling, package management on Debian, sound configuration, ADSL, the GNOME desktop, the Postfix mail transfer agent, and the popular LAMP configuration that combines Apache, MySQL, and PHP. …”
    Libro electrónico
  14. 954
    Publicado 2007
    “…Unter anderem werden folgende Themen behandelt: Kontrolle von Hardwareerweiterungen, Systemhärtung, digitale Zertifikate, Ereignisüberwachung Schutz vor Malware, Windows Defender, Einschränkung von Zugriffsrechten, sichere Kennwörter Sichere Netzwerkanbindung, WLAN und Bluetooth, Windows-Firewall, geschützte Fernzugriffe auf Unternehmensnetzwerke, Remote Access Service Konfiguration von Internet Explorer und Windows Mail Schützenswerte Daten, sichere Datenspeicherung, Datenverschlüsselung Fokus auf die Praxis: Als ausgewiesener Sicherheitsexperte verfolgt Marcus Nasarek einen pragmatischen Ansatz: Er stellt Sicherheitskonzepte vor, die lösungsorientiert, einfach umzusetzen und gleichzeitig wirtschaftlich sind. …”
    Libro electrónico
  15. 955
    Publicado 2014
    “…Demonstrates how to configure and use these and other essential tools: Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options Vulnerability scanners: OpenVAS, Metasploit File system monitors: AIDE, Samhain, Tripwire Windows auditing tools: Nbtstat, Cain, MBSA, PsTools Command-line networking tools: Netcat, Cryptcat, Ncat, Socat Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay Port scanners: Nmap, THC-Amap Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort Network defenses: firewalls, packet filters, and intrusion detection systems War dialers: ToneLoc, THC-Scan, WarVOX Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion Privacy tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR…”
    Libro electrónico
  16. 956
    “…Oracle Cloud Infrastructure is part of Oracle's new generation cloud that delivers a complete and well-integrated set of Infrastructure as a Service (IaaS) capabilities (compute, storage, networking), edge services (DNS, web application firewall), and Platform as a Service (PaaS) capabilities (such as Oracle Autonomous Database which supports both transactional and analytical workloads, the certified and fully managed Oracle Kubernetes Engine, and a serverless platform based on an open-source Fn Project). …”
    Libro electrónico
  17. 957
    Publicado 2021
    “…It also explains how to integrate external devices such as firewalls, routers, and load balancers to VXLAN; how to leverage your VXLAN fabric; and how to create multiple tenant networks to secure your critical infrastructure. …”
    Libro electrónico
  18. 958
    por Halsey, Mike. author
    Publicado 2016
    “…What You Will Learn: Understand your PC’s ecosystem and how to connect the dots, so you can successfully track problems to their source Create resilient backups of your operating system, files, and documents, and enable quick and easy restore Learn your way around Windows' built-in administration tools, to quickly fix the typical problems that come up Diagnose and repair a wide range of common problems with printers and other essential peripherals Solve complex startup problems that can prevent a PC form booting Make your PC safe and secure for the whole family, and for everybody in your workplace Understand the threat from malware and viruses and a range of approaches to dealing with them, depending on the situation Bomb-proof your PC with advanced security, group policy, and firewall policies Learn the top Tips and tricks for researching difficult problems, including third-party tools and useful web resources Work with the registry, file system, and Sysinternals to troubleshooting PCs in the workplace Who This Book Is For: Anyone using Windows 10 on a desktop, laptop, or hybrid device…”
    Libro electrónico
  19. 959
    Publicado 2011
    “…The contents of the volumes are as follows: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, SMP/E, Language Environment Volume 3: Introduction to DFSMS, data set basics storage management hardware and software, catalogs, and DFSMStvs Volume 4: Communication Server, TCP/IP, and VTAM Volume 5: Base and Parallel Sysplex, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart management (ARM), Geographically Dispersed Parallel Sysplex (GDPS) Volume 6: Introduction to security, RACF, Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries firewall technologies, LDAP, and Enterprise identity mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to z/Architecture, zSeries processor design, zSeries connectivity, LPAR concepts, HCD, and HMC Volume 11: Capacity planning, performance management, WLM, RMF, and SMF Volume 12: WLM Volume 13: JES3…”
    Libro electrónico
  20. 960
    Publicado 2012
    “…The contents of the volumes are as follows: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, SMP/E, Language Environment Volume 3: Introduction to DFSMS, data set basics storage management hardware and software, catalogs, and DFSMStvs Volume 4: Communication Server, TCP/IP, and VTAM Volume 5: Base and Parallel Sysplex, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart management (ARM), Geographically Dispersed Parallel Sysplex (GDPS) Volume 6: Introduction to security, RACF, Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries firewall technologies, LDAP, and Enterprise identity mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to z/Architecture, zSeries processor design, zSeries connectivity, LPAR concepts, HCD, and HMC Volume 11: Capacity planning, performance management, RMF, and SMF Volume 12: WLM Volume 13: JES3…”
    Libro electrónico