Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
961por Kaeo, Merike“…This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. …”
Publicado 2004
Libro electrónico -
962por Gagné, Marcel“…Deploy Linux with your existing PCs, printers, and IT/network infrastructure Centrally manage users and security through Webmin's convenient Web interface Deliver reliable email services with Postfix, or integrate Linux mail clients with Microsoft Exchange servers Configure Windows file sharing with Samba, and Linux file sharing with NFS Secure network communications with Linux firewalls and OpenSSH Plan and deploy LTSP thin clients and diskless workstations and the server support for them Provide LDAP directory services to all your clients Support users by "remote control"—without leaving your desk From network security to spam reduction, automated backup/restore to collaboration groupware, Gagné offers specific solutions and proven techniques for leveraging the full power of Linux in your business. …”
Publicado 2005
Libro electrónico -
963por Garrett, Aviva“…Other topics covered include: Router architecture and hardware components, including the T-series routing platforms and M-series routers CLI configuration and system management with SNMP Router interfaces, including Ethernet, SONET/SDH, tunnel, and channelized interfaces Class of service (CoS) IP Security (IPSec) Routing policy and firewall filters Routing protocols, including IS-IS, OSPF, RIP, BGP, PIM, DVMRP, IGMP, SAP, SDP, MSDP, and multicast scoping IPv6, including IPv4-to-IPv6 transition mechanisms Various MPLS applications Virtual Private Networks, covering Layer 2 and Layer 3 VPNs In addition, this pragmatic guide features sample configurations that come directly from the Juniper Networks testing labs, as well as a summary of all the critical JUNOS software monitoring commands. …”
Publicado 2003
Libro electrónico -
964por Hudson, Andrew, 1978-“…Install and configure the Fedora 8 Linux distribution Manage Linux services and users Run a printer server with CUPS Connect to a local network and the Internet Set up and administer a web server with Apache Secure your machine and your network from intruders Rebuild and install a new Linux kernel Learn shell scripting Run other operating systems on Fedora with Xen Share files with Windows users using Samba Get productive with OpenOffice.org Play games on Linux Use Linux multimedia programs Use a database with Fedora Set up a firewall Set up a DNS server Work with the X Window system Learn Linux programming (including Mono) Fedora 8 on DVD: DVD includes the Fedora 8 binary distribution with all the base Fedora packages plus hundreds of additional programs and utilities. …”
Publicado 2008
Libro electrónico -
965Publicado 2018“…. • Install, customize, and use SQL Server 2017’s key administration and development tools • Manage memory, storage, clustering, virtualization, and other components • Architect and implement database infrastructure, including IaaS, Azure SQL, and hybrid cloud configurations • Provision SQL Server and Azure SQL databases • Secure SQL Server via encryption, row-level security, and data masking • Safeguard Azure SQL databases using platform threat protection, firewalling, and auditing • Establish SQL Server IaaS network security groups and user-defined routes • Administer SQL Server user security and permissions • Efficiently design tables using keys, data types, columns, partitioning, and views • Utilize BLOBs and external, temporal, and memory-optimized tables • Master powerful optimization techniques involving concurrency, indexing, parallelism, and execution plans • Plan, deploy, and perform disaster recovery in traditional, cloud, and hybrid environments For Experienced SQL Server Administrators and Other Database Professionals • Your role: Intermediate-to-advanced level SQL Server database administrator, architect, developer, or performance tuning expert • Prerequisites: Basic understanding of database administration procedures…”
Libro electrónico -
966Publicado 2017“…Learn how changing data center requirements have driven the evolution to overlays, evolved control planes, and VXLAN BGP EVPN spine-leaf fabrics Discover why VXLAN BGP EVPN fabrics are so scalable, resilient, and elastic Implement enhanced unicast and multicast forwarding of tenant traffic over the VXLAN BGP EVPN fabric Build fabric underlays to efficiently transport uni- and multi-destination traffic Connect the fabric externally via Layer 3 (VRF-Lite, LISP, MPLS L3VPN) and Layer 2 (VPC) Choose your most appropriate Multi-POD, multifabric, and Data Center Interconnect (DCI) options Integrate Layer 4-7 services into the fabric, including load balancers and firewalls Manage fabrics with POAP-based day-0 provisioning, incremental day 0.5 configuration, overlay day-1 configuration, or day-2 operations…”
Libro electrónico -
967Publicado 2019“…In addition to the quantitative and qualitative challenges, data pressure in systems and networks also comes from various sources such as end systems, routers, firewalls, intrusion sensors, and the newly emerging network elements speaking with different syntax and semantics, which makes organizing and incorporating the generated data difficult for extensive analysis. …”
Libro electrónico -
968por Klevinsky, T. J.“…Specific topics covered in this book include: Hacking myths Potential drawbacks of penetration testing Announced versus unannounced testing Application-level holes and defenses Penetration through the Internet, including zone transfer, sniffing, and port scanning War dialing Enumerating NT systems to expose security holes Social engineering methods Unix-specific vulnerabilities, such as RPC and buffer overflow attacks The Windows NT Resource kit Port scanners and discovery tools Sniffers and password crackers Web testing tools Remote control tools Firewalls and intrusion detection systems Numerous DoS attacks and tools 0201719568B01042002…”
Publicado 2002
Libro electrónico -
969Publicado 2013“…Individuals seeking to learn more about the system administration discipline Individuals with some existing Linux command line experience looking to deepen their knowledge Users returning to Linux wishing to learn new tricks or refresh their skills What You Will Learn: How to use Vagrant and VirtualBox as a makeshift lab environment Linux’s history and background Shell shortcuts and basic bash scripting The Linux startup and shutdown procedures Management of user accounts The use of sudo to control access to privileged commands Interact with processes from the command line The filesystem layout File permissions and attributes Log file management with syslog and logrotate Linux on a TCP/IP network Network debugging with tcpdump and ping Using SSH for remote management The iptables host-based firewall How to secure a Linux system Course Requirements: Some existing familiarity with operating systems concepts The fundamentals of TCP/IP networking (what an IP address and subnet mask are, the purpose of DNS, ICMP)…”
-
970por Callaghan, Brent“…Specific topics of interest include: NFS version 4, highlighting performance improvements, security features, and cross-platform interoperability for Internet operation RPC authentication and security Differences between NFS versions 2 and 3 Implementation issues for clients and servers Read-ahead and write-behind Caching policies The Lock Manager protocol Automounting NFS variants, including Spritely NFS, NQNFS, Trusted NFS, and NASD NFS NFS competitors: RFS, AFS, DCE/DFS, and CIFS The PCNFS protocol for implementing NFS on PC operating systems SPEC SFS benchmarks, WebNFS, and firewalls Comprehensive and current, NFS Illustrated is an essential resource for network professionals who want to use this widespread and evolving technology to its fullest…”
Publicado 2000
Libro electrónico -
971Publicado 2012“…Fall thoroughly introduces ARP, DHCP, NAT, firewalls, ICMPv4/ICMPv6, broadcasting, multicasting, UDP, DNS, and much more. …”
Libro electrónico -
972Publicado 2022“…Angels’ mama split her tongue and hissed her words like silent / soldier / crisis in the torment of her sunken trailer in the summer where Angels practiced lighting cigarettes with her eyes fetching fireflies making tinctures of dead tissue becoming extraordinarily promiscuous. …”
Libro electrónico -
973Publicado 2022“…Next, you will understand security concepts, defense-in-depth, and key security services such as Network Security Groups and Azure Firewall, as well as security operations tooling such as Azure Security Center and Azure Sentinel. …”
Grabación no musical -
974Publicado 2018“…The other volumes contain the following content: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, IBM Job Entry Subsystem 2 (JES2) and JES3, link pack area (LPA), LNKLST, authorized libraries, System Modification Program Extended (SMP/E), IBM Language Environment Volume 4: Communication Server, TCP/IP, and IBM VTAM® Volume 5: Base and IBM Parallel Sysplex®, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart manager (ARM), IBM Geographically Dispersed Parallel SysplexTM (IBM GDPS) Volume 6: Introduction to security, IBM RACF®, Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries firewall technologies, LDAP, and Enterprise Identity Mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server, and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to IBM z/Architecture®, the IBM Z platform, IBM Z connectivity, LPAR concepts, HCD, and DS Storage Solution. …”
Libro electrónico -
975Publicado 2017“…Understand TCP/IP’s role, how it works, and how it continues to evolve Work with TCP/IP’s Network Access, Internet, Transport, and Application layers Design modern networks that will scale and resist attack Address security and privacy issues with encryption, digital signatures, VPNs, Kerberos, web tracking, cookies, anonymity networks, and firewalls Discover how IPv6 differs from IPv4, and how to migrate or coexist with IPv6 Configure dynamic addressing, DHCP, NAT, and Zeroconf Establish efficient and reliable routing, subnetting, and name resolution Use TCP/IP in modern cloud-based environments Integrate IoT devices into your TCP/IP network Improve your efficiency with the latest TCP/IP tools and utilities Support high-performance media streaming and webcasting Troubleshoot problems with connectivity, protocols, name resolution, and performance Walk through TCP/IP network implementation, from start to finish…”
Libro electrónico -
976por Carthern, Chris. author, Wilson, William. author, Rivera, Noel. author, Bedwell, Richard. author“…Readers of Cisco Networks will learn How to configure Cisco switches, routers, and data center devices in typical corporate network architectures The skills and knowledge needed to pass Cisco CCENT, CCNA, and CCNP certification exams How to set up and configure at-home labs using virtual machines and lab exercises in the book to practice advanced Cisco commands How to implement networks of Cisco devices supporting WAN, LAN, and data center configurations How to implement secure network configurations and configure the Cisco ASA firewall How to use black-hat tools and network penetration techniques to test the security of your network…”
Publicado 2015
Libro electrónico -
977Publicado 2021“…In addition to the quantitative and qualitative challenges, data pressure in systems and networks also comes from various sources such as end systems, switches, firewalls, intrusion sensors, and the newly emerging network elements speaking with different syntax and semantics, which makes organizing and incorporating the generated data difficult for extensive analysis. …”
Libro electrónico -
978Publicado 2019“…What you will learn Things you will learn: Become well versed in networking topologies and concepts Understand network infrastructures such as intranets, extranets, and more Explore network switches, routers, and other network hardware devices Get to grips with different network protocols and models such as OSI and TCP/IP Work with a variety of network services such as DHCP, NAT, firewalls, and remote access Apply networking concepts in different real-world scenarios Who this book is for If you're new to the IT industry or simply want to gain a thorough understanding of networking, this book is for you. …”
Libro electrónico -
979Publicado 2023“…Therefore, it becomes challenging for firewalls to be up-to-date according to network policies. …”
Libro electrónico -
980Publicado 2020“…Minimize security threats and build reliable firewalls and routers with Netfilter (iptables and nftables) and Linux. …”
Libro electrónico