Mostrando 961 - 980 Resultados de 1,060 Para Buscar 'Firefall~', tiempo de consulta: 1.57s Limitar resultados
  1. 961
    por Kaeo, Merike
    Publicado 2004
    “…This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. …”
    Libro electrónico
  2. 962
    por Gagné, Marcel
    Publicado 2005
    “…Deploy Linux with your existing PCs, printers, and IT/network infrastructure Centrally manage users and security through Webmin's convenient Web interface Deliver reliable email services with Postfix, or integrate Linux mail clients with Microsoft Exchange servers Configure Windows file sharing with Samba, and Linux file sharing with NFS Secure network communications with Linux firewalls and OpenSSH Plan and deploy LTSP thin clients and diskless workstations and the server support for them Provide LDAP directory services to all your clients Support users by "remote control"—without leaving your desk From network security to spam reduction, automated backup/restore to collaboration groupware, Gagné offers specific solutions and proven techniques for leveraging the full power of Linux in your business. …”
    Libro electrónico
  3. 963
    por Garrett, Aviva
    Publicado 2003
    “…Other topics covered include: Router architecture and hardware components, including the T-series routing platforms and M-series routers CLI configuration and system management with SNMP Router interfaces, including Ethernet, SONET/SDH, tunnel, and channelized interfaces Class of service (CoS) IP Security (IPSec) Routing policy and firewall filters Routing protocols, including IS-IS, OSPF, RIP, BGP, PIM, DVMRP, IGMP, SAP, SDP, MSDP, and multicast scoping IPv6, including IPv4-to-IPv6 transition mechanisms Various MPLS applications Virtual Private Networks, covering Layer 2 and Layer 3 VPNs In addition, this pragmatic guide features sample configurations that come directly from the Juniper Networks testing labs, as well as a summary of all the critical JUNOS software monitoring commands. …”
    Libro electrónico
  4. 964
    por Hudson, Andrew, 1978-
    Publicado 2008
    “…Install and configure the Fedora 8 Linux distribution Manage Linux services and users Run a printer server with CUPS Connect to a local network and the Internet Set up and administer a web server with Apache Secure your machine and your network from intruders Rebuild and install a new Linux kernel Learn shell scripting Run other operating systems on Fedora with Xen Share files with Windows users using Samba Get productive with OpenOffice.org Play games on Linux Use Linux multimedia programs Use a database with Fedora Set up a firewall Set up a DNS server Work with the X Window system Learn Linux programming (including Mono) Fedora 8 on DVD: DVD includes the Fedora 8 binary distribution with all the base Fedora packages plus hundreds of additional programs and utilities. …”
    Libro electrónico
  5. 965
    Publicado 2018
    “…. • Install, customize, and use SQL Server 2017’s key administration and development tools • Manage memory, storage, clustering, virtualization, and other components • Architect and implement database infrastructure, including IaaS, Azure SQL, and hybrid cloud configurations • Provision SQL Server and Azure SQL databases • Secure SQL Server via encryption, row-level security, and data masking • Safeguard Azure SQL databases using platform threat protection, firewalling, and auditing • Establish SQL Server IaaS network security groups and user-defined routes • Administer SQL Server user security and permissions • Efficiently design tables using keys, data types, columns, partitioning, and views • Utilize BLOBs and external, temporal, and memory-optimized tables • Master powerful optimization techniques involving concurrency, indexing, parallelism, and execution plans • Plan, deploy, and perform disaster recovery in traditional, cloud, and hybrid environments For Experienced SQL Server Administrators and Other Database Professionals • Your role: Intermediate-to-advanced level SQL Server database administrator, architect, developer, or performance tuning expert • Prerequisites: Basic understanding of database administration procedures…”
    Libro electrónico
  6. 966
    Publicado 2017
    “…Learn how changing data center requirements have driven the evolution to overlays, evolved control planes, and VXLAN BGP EVPN spine-leaf fabrics Discover why VXLAN BGP EVPN fabrics are so scalable, resilient, and elastic Implement enhanced unicast and multicast forwarding of tenant traffic over the VXLAN BGP EVPN fabric Build fabric underlays to efficiently transport uni- and multi-destination traffic Connect the fabric externally via Layer 3 (VRF-Lite, LISP, MPLS L3VPN) and Layer 2 (VPC) Choose your most appropriate Multi-POD, multifabric, and Data Center Interconnect (DCI) options Integrate Layer 4-7 services into the fabric, including load balancers and firewalls Manage fabrics with POAP-based day-0 provisioning, incremental day 0.5 configuration, overlay day-1 configuration, or day-2 operations…”
    Libro electrónico
  7. 967
    Publicado 2019
    “…In addition to the quantitative and qualitative challenges, data pressure in systems and networks also comes from various sources such as end systems, routers, firewalls, intrusion sensors, and the newly emerging network elements speaking with different syntax and semantics, which makes organizing and incorporating the generated data difficult for extensive analysis. …”
    Libro electrónico
  8. 968
    por Klevinsky, T. J.
    Publicado 2002
    “…Specific topics covered in this book include: Hacking myths Potential drawbacks of penetration testing Announced versus unannounced testing Application-level holes and defenses Penetration through the Internet, including zone transfer, sniffing, and port scanning War dialing Enumerating NT systems to expose security holes Social engineering methods Unix-specific vulnerabilities, such as RPC and buffer overflow attacks The Windows NT Resource kit Port scanners and discovery tools Sniffers and password crackers Web testing tools Remote control tools Firewalls and intrusion detection systems Numerous DoS attacks and tools 0201719568B01042002…”
    Libro electrónico
  9. 969
    Publicado 2013
    “…Individuals seeking to learn more about the system administration discipline Individuals with some existing Linux command line experience looking to deepen their knowledge Users returning to Linux wishing to learn new tricks or refresh their skills What You Will Learn: How to use Vagrant and VirtualBox as a makeshift lab environment Linux’s history and background Shell shortcuts and basic bash scripting The Linux startup and shutdown procedures Management of user accounts The use of sudo to control access to privileged commands Interact with processes from the command line The filesystem layout File permissions and attributes Log file management with syslog and logrotate Linux on a TCP/IP network Network debugging with tcpdump and ping Using SSH for remote management The iptables host-based firewall How to secure a Linux system Course Requirements: Some existing familiarity with operating systems concepts The fundamentals of TCP/IP networking (what an IP address and subnet mask are, the purpose of DNS, ICMP)…”
    Video
  10. 970
    por Callaghan, Brent
    Publicado 2000
    “…Specific topics of interest include: NFS version 4, highlighting performance improvements, security features, and cross-platform interoperability for Internet operation RPC authentication and security Differences between NFS versions 2 and 3 Implementation issues for clients and servers Read-ahead and write-behind Caching policies The Lock Manager protocol Automounting NFS variants, including Spritely NFS, NQNFS, Trusted NFS, and NASD NFS NFS competitors: RFS, AFS, DCE/DFS, and CIFS The PCNFS protocol for implementing NFS on PC operating systems SPEC SFS benchmarks, WebNFS, and firewalls Comprehensive and current, NFS Illustrated is an essential resource for network professionals who want to use this widespread and evolving technology to its fullest…”
    Libro electrónico
  11. 971
    Publicado 2012
    “…Fall thoroughly introduces ARP, DHCP, NAT, firewalls, ICMPv4/ICMPv6, broadcasting, multicasting, UDP, DNS, and much more. …”
    Libro electrónico
  12. 972
    Publicado 2022
    “…Angels’ mama split her tongue and hissed her words like silent / soldier / crisis in the torment of her sunken trailer in the summer where Angels practiced lighting cigarettes with her eyes fetching fireflies making tinctures of dead tissue becoming extraordinarily promiscuous. …”
    Libro electrónico
  13. 973
    Publicado 2022
    “…Next, you will understand security concepts, defense-in-depth, and key security services such as Network Security Groups and Azure Firewall, as well as security operations tooling such as Azure Security Center and Azure Sentinel. …”
    Grabación no musical
  14. 974
    Publicado 2018
    “…The other volumes contain the following content: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, IBM Job Entry Subsystem 2 (JES2) and JES3, link pack area (LPA), LNKLST, authorized libraries, System Modification Program Extended (SMP/E), IBM Language Environment Volume 4: Communication Server, TCP/IP, and IBM VTAM® Volume 5: Base and IBM Parallel Sysplex®, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart manager (ARM), IBM Geographically Dispersed Parallel SysplexTM (IBM GDPS) Volume 6: Introduction to security, IBM RACF®, Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries firewall technologies, LDAP, and Enterprise Identity Mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server, and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to IBM z/Architecture®, the IBM Z platform, IBM Z connectivity, LPAR concepts, HCD, and DS Storage Solution. …”
    Libro electrónico
  15. 975
    Publicado 2017
    “…Understand TCP/IP’s role, how it works, and how it continues to evolve Work with TCP/IP’s Network Access, Internet, Transport, and Application layers Design modern networks that will scale and resist attack Address security and privacy issues with encryption, digital signatures, VPNs, Kerberos, web tracking, cookies, anonymity networks, and firewalls Discover how IPv6 differs from IPv4, and how to migrate or coexist with IPv6 Configure dynamic addressing, DHCP, NAT, and Zeroconf Establish efficient and reliable routing, subnetting, and name resolution Use TCP/IP in modern cloud-based environments Integrate IoT devices into your TCP/IP network Improve your efficiency with the latest TCP/IP tools and utilities Support high-performance media streaming and webcasting Troubleshoot problems with connectivity, protocols, name resolution, and performance Walk through TCP/IP network implementation, from start to finish…”
    Libro electrónico
  16. 976
    “…Readers of Cisco Networks will learn How to configure Cisco switches, routers, and data center devices in typical corporate network architectures The skills and knowledge needed to pass Cisco CCENT, CCNA, and CCNP certification exams How to set up and configure at-home labs using virtual machines and lab exercises in the book to practice advanced Cisco commands How to implement networks of Cisco devices supporting WAN, LAN, and data center configurations How to implement secure network configurations and configure the Cisco ASA firewall How to use black-hat tools and network penetration techniques to test the security of your network…”
    Libro electrónico
  17. 977
    Publicado 2021
    “…In addition to the quantitative and qualitative challenges, data pressure in systems and networks also comes from various sources such as end systems, switches, firewalls, intrusion sensors, and the newly emerging network elements speaking with different syntax and semantics, which makes organizing and incorporating the generated data difficult for extensive analysis. …”
    Libro electrónico
  18. 978
    Publicado 2019
    “…What you will learn Things you will learn: Become well versed in networking topologies and concepts Understand network infrastructures such as intranets, extranets, and more Explore network switches, routers, and other network hardware devices Get to grips with different network protocols and models such as OSI and TCP/IP Work with a variety of network services such as DHCP, NAT, firewalls, and remote access Apply networking concepts in different real-world scenarios Who this book is for If you're new to the IT industry or simply want to gain a thorough understanding of networking, this book is for you. …”
    Libro electrónico
  19. 979
    Publicado 2023
    “…Therefore, it becomes challenging for firewalls to be up-to-date according to network policies. …”
    Libro electrónico
  20. 980
    Publicado 2020
    “…Minimize security threats and build reliable firewalls and routers with Netfilter (iptables and nftables) and Linux. …”
    Libro electrónico