Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
941Publicado 2020“…Every feature of this book supports both efficient exam preparation and long-term mastery: · Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council's official exam objectives · Key Topics figures, tables, and lists call attention to the information that's most crucial for exam success · Exam Preparation Tasks enable you to review key topics, define key terms, work through scenarios, and answer review questions...going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career · Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field's essential terminology This study guide helps you master all the topics on the latest CEH exam, including · Ethical hacking basics · Technical foundations of hacking · Footprinting and scanning · Enumeration and system hacking · Social engineering, malware threats, and vulnerability analysis · Sniffers, session hijacking, and denial of service · Web server hacking, web applications, and database attacks · Wireless technologies, mobile security, and mobile attacks · IDS, firewalls, and honeypots · Cryptographic attacks and defenses · Cloud computing, IoT, and botnets…”
Libro electrónico -
942por Cochran, Kodi A.“…What You Will Learn Study a step-by-step guide to conducting vulnerability assessments Follow post-exploitation techniques for maintaining access Understand essential network security concepts, including firewalls, intrusion detection systems, and other network security measures Review secure coding practices and the importance of web application security Explore mobile and IoT security best practices Review tools and practices for securing cloud environments Discover tips for recognizing and mitigating social engineering threats …”
Publicado 2024
Libro electrónico -
943Publicado 2003“…Choose the right network for you: wired or wireless, peer-to-peer or server-based Set up your hardware and Windows networking Share high-speed Internet access throughout your home or office Protect your networks with firewalls and other security tools Set up reliable, secure telecommuting Build a networked multimedia entertainment PC—and listen to MP3s anywhere Use your network and VoIP telephony instead of an expensive PBX Troubleshoot network problems quickly and easily…”
Libro electrónico -
944por Ambi Karthikeyan, Shijimol. author“…You will: Map the key Azure components to familiar concepts in infrastructure, such as virtualization, storage provisioning, switching, and firewalls Implement Azure IaaS deployment architectures Design IaaS environments in line with the Microsoft recommended best practices for scalability, resiliency, availability, performance, and security Manage the operational aspects of hosted environments, leverage automation, and fine tune for optimal performance…”
Publicado 2018
Libro electrónico -
945Publicado 2020“…Learn everything you need for the Security Fundamentals MTA Certification Understand core security principles, including security layers and network security Learn essential concepts in physical security, internet security, and wireless security Identify the different types of hardware firewalls and their characteristics Test your knowledge and practice for the exam with quiz questions in every chapter IT professionals looking to understand more about networking will gain the knowledge to effectively secure a client and server, and to confidently explain basic security concepts. …”
Libro electrónico -
946Publicado 2012“…Install and configure popular Linux distributions, including the latest versions of Fedora, CentOS, openSUSE, Debian, and Ubuntu Administer Linux servers from the GUI or from the command line (shell) Manage users, permissions, folders, and native FOSS applications Compile, tune, upgrade, and customize the latest Linux kernel 3.x series Work with proc, SysFS, and cgroup file systems Understand and manage the Linux TCP/IP networking stack and services for both IPv4 and IPv6 Build robust firewalls, and routers using Netfilter and Linux Create and maintain print, e-mail, FTP, and web servers Use LDAP or NIS for identity management Set up and administer DNS, POP3, IMAP3, and DHCP servers Use GlusterFS, NFS, and Samba for sharing and distributing file system resources Explore and implement Linux virtualization technologies using KVM…”
Libro electrónico -
947Publicado 2014“…Hunter-Gatherer: Rookies seek out experts and return with ideas and resources to address the challenges they face. Firewalker: Lacking situational confidence, rookies take small, calculated steps, moving fast and seeking feedback to stay on track. …”
Libro electrónico -
948Publicado 2023“…Topics include: Google Cloud basics Deploying virtual machines Using serverless functions to build event driven workflows Using Google BigQuery to analyze data Identity management and network security on Google Cloud Networking, including working with virtual private clouds and firewall rules Deploying a relational database using a managed services Understanding the state of your infrastructure and services your services using Cloud Monitoring and Cloud Logging Using Cloud Marketplace to deploy pre-packaged software and infrastructure to your virtual private cloud About the Instructor Dan Sullivan is a cloud architect and systems developer specializing in data architecture, data analytics, and machine learning. …”
Video -
949Publicado 2016“…Topics covered include Networking security fundamentals: concepts, policies, strategy Protecting network infrastructure: network foundations, security management planes/access; data planes (Catalyst switches and IPv6) Threat control/containment: protecting endpoints and content; configuring ACLs, zone-based firewalls, and Cisco IOS IPS Secure connectivity: VPNs, cryptology, asymmetric encryption, PKI, IPsec VPNs, and site-to-site VPN configuration ASA network security: ASA/ASDM concepts; configuring ASA basic settings, advanced settings, and VPNs Access all CCNA Security commands: use as a quick, offline resource for research and solutions Logical how-to topic groupings provide one-stop research Great for review before CCNA Security certification exams Compact size makes it easy to carry with you, wherever you go “Create Your Own Journal” section with blank, lined pages allows you to personalize the book for your needs “What Do You Want to Do?” …”
Libro electrónico -
950por Siriwardena, Prabath. author“…You will: Securely design, develop, and deploy enterprise APIs Pick security standards and protocols to match business needs Mitigate security exploits by understanding the OAuth 2.0 threat landscape Federate identities to expand business APIs beyond the corporate firewall Protect microservices at the edge by securing their APIs Develop native mobile applications to access APIs securely Integrate applications with SaaS APIs protected with OAuth 2.0.…”
Publicado 2020
Libro electrónico -
951Publicado 2003“…The addition of several new options to the iptables firewall command and new commands related to DNSSEC and ssh show the book's value as a security tool. …”
Libro electrónico -
952Publicado 2005“…What types of security should I set up? Do I need a firewall? How can I restrict what users can do after they log in? …”
Libro electrónico -
953por Welsh, Matt“…New topics include applications ready for prime time, basic security and firewalling, package management on Debian, sound configuration, ADSL, the GNOME desktop, the Postfix mail transfer agent, and the popular LAMP configuration that combines Apache, MySQL, and PHP. …”
Publicado 2003
Libro electrónico -
954Publicado 2007“…Unter anderem werden folgende Themen behandelt: Kontrolle von Hardwareerweiterungen, Systemhärtung, digitale Zertifikate, Ereignisüberwachung Schutz vor Malware, Windows Defender, Einschränkung von Zugriffsrechten, sichere Kennwörter Sichere Netzwerkanbindung, WLAN und Bluetooth, Windows-Firewall, geschützte Fernzugriffe auf Unternehmensnetzwerke, Remote Access Service Konfiguration von Internet Explorer und Windows Mail Schützenswerte Daten, sichere Datenspeicherung, Datenverschlüsselung Fokus auf die Praxis: Als ausgewiesener Sicherheitsexperte verfolgt Marcus Nasarek einen pragmatischen Ansatz: Er stellt Sicherheitskonzepte vor, die lösungsorientiert, einfach umzusetzen und gleichzeitig wirtschaftlich sind. …”
Libro electrónico -
955Publicado 2014“…Demonstrates how to configure and use these and other essential tools: Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options Vulnerability scanners: OpenVAS, Metasploit File system monitors: AIDE, Samhain, Tripwire Windows auditing tools: Nbtstat, Cain, MBSA, PsTools Command-line networking tools: Netcat, Cryptcat, Ncat, Socat Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay Port scanners: Nmap, THC-Amap Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort Network defenses: firewalls, packet filters, and intrusion detection systems War dialers: ToneLoc, THC-Scan, WarVOX Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion Privacy tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR…”
Libro electrónico -
956por Jakóbczyk, Michał Tomasz. author“…Oracle Cloud Infrastructure is part of Oracle's new generation cloud that delivers a complete and well-integrated set of Infrastructure as a Service (IaaS) capabilities (compute, storage, networking), edge services (DNS, web application firewall), and Platform as a Service (PaaS) capabilities (such as Oracle Autonomous Database which supports both transactional and analytical workloads, the certified and fully managed Oracle Kubernetes Engine, and a serverless platform based on an open-source Fn Project). …”
Publicado 2020
Libro electrónico -
957Publicado 2021“…It also explains how to integrate external devices such as firewalls, routers, and load balancers to VXLAN; how to leverage your VXLAN fabric; and how to create multiple tenant networks to secure your critical infrastructure. …”
Libro electrónico -
958por Halsey, Mike. author“…What You Will Learn: Understand your PC’s ecosystem and how to connect the dots, so you can successfully track problems to their source Create resilient backups of your operating system, files, and documents, and enable quick and easy restore Learn your way around Windows' built-in administration tools, to quickly fix the typical problems that come up Diagnose and repair a wide range of common problems with printers and other essential peripherals Solve complex startup problems that can prevent a PC form booting Make your PC safe and secure for the whole family, and for everybody in your workplace Understand the threat from malware and viruses and a range of approaches to dealing with them, depending on the situation Bomb-proof your PC with advanced security, group policy, and firewall policies Learn the top Tips and tricks for researching difficult problems, including third-party tools and useful web resources Work with the registry, file system, and Sysinternals to troubleshooting PCs in the workplace Who This Book Is For: Anyone using Windows 10 on a desktop, laptop, or hybrid device…”
Publicado 2016
Libro electrónico -
959Publicado 2011“…The contents of the volumes are as follows: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, SMP/E, Language Environment Volume 3: Introduction to DFSMS, data set basics storage management hardware and software, catalogs, and DFSMStvs Volume 4: Communication Server, TCP/IP, and VTAM Volume 5: Base and Parallel Sysplex, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart management (ARM), Geographically Dispersed Parallel Sysplex (GDPS) Volume 6: Introduction to security, RACF, Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries firewall technologies, LDAP, and Enterprise identity mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to z/Architecture, zSeries processor design, zSeries connectivity, LPAR concepts, HCD, and HMC Volume 11: Capacity planning, performance management, WLM, RMF, and SMF Volume 12: WLM Volume 13: JES3…”
Libro electrónico -
960Publicado 2012“…The contents of the volumes are as follows: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, SMP/E, Language Environment Volume 3: Introduction to DFSMS, data set basics storage management hardware and software, catalogs, and DFSMStvs Volume 4: Communication Server, TCP/IP, and VTAM Volume 5: Base and Parallel Sysplex, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart management (ARM), Geographically Dispersed Parallel Sysplex (GDPS) Volume 6: Introduction to security, RACF, Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries firewall technologies, LDAP, and Enterprise identity mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to z/Architecture, zSeries processor design, zSeries connectivity, LPAR concepts, HCD, and HMC Volume 11: Capacity planning, performance management, RMF, and SMF Volume 12: WLM Volume 13: JES3…”
Libro electrónico