Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 276
- Security measures 242
- Computer security 165
- Engineering & Applied Sciences 162
- Operating systems (Computers) 135
- Examinations 110
- Linux 92
- Certification 91
- Computer Science 85
- Electrical & Computer Engineering 84
- Telecommunications 83
- Electronic data processing personnel 80
- Cloud computing 78
- Firewalls (Computer security) 61
- Microsoft Windows (Computer file) 48
- Management 46
- Computers 34
- Access control 31
- Application software 31
- Internet 31
- Penetration testing (Computer security) 31
- Client/server computing 29
- Development 28
- Open source software 26
- Virtual computer systems 24
- Computer programs 23
- Web services 23
- Microsoft Azure (Computing platform) 19
- Programming 19
- Mac OS 18
-
981por Sobell, Mark G.“…The full Fedora Core operating system on 4 CDs (not the truncated "Publisher's Edition") AND complete coverage of Fedora Core and the 2.6 Linux kernel, PLUS coverage of Red Hat Enterprise Linux Deeper coverage of GNOME and KDE, including customization More practical coverage of file sharing with Samba, NFS, and FTP Easier-to-follow coverage of Internet server configuration including Apache, sendmail, NFS, and DNS More up-to-date coverage of security, including SELinux (Security Enhanced Linux), OpenSSH, and firewall setup using iptables Better coverage of "meat-and-potatoes" system/network administration tasks A more practical introduction to writing bash shell scripts More complete coverage of configuring local and network printers using CUPS And much more...including a 500+ word glossary and a comprehensive index to help you find what you need fast! …”
Publicado 2005
Libro electrónico -
982por Joines, Stacy“…Other specific topics include: Performance best practices for servlets, JavaServer PagesTM, and Enterprise JavaBeansTM The impact of servlets, threads, and queuing on performance The frozen Web site danger JavaTM Virtual Machine garbage collection and multithreading issues The performance impact of routers, firewalls, proxy servers, and NICs Test scenario and script building Test execution and monitoring, including potential pitfalls Tuning the Web site environment Component monitoring (servers, JavaTM Virtual Machines, and networks) Symptoms and solutions of common bottleneck issues Analysis and review of performance test results Performance Analysis for JavaTM Web Sites not only provides clear explanations and expert practical guidance, it also serves as a reference, with extensive appendixes that include worksheets for capacity planning, checklists to help you prepare for different stages of performance testing, and a list of performance-test tool vendors. 0201844540B08142002…”
Publicado 2003
Libro electrónico -
983por Pitt, Esmond“…All you need to know about: understanding RMI in the context of Java and object-oriented programming using RMI to create applications in networked environments ranging from LANs to the Internet mastering serialization, remote interfaces, clients, the RMI registry, servers, security, and mobile code applying advanced concepts e.g. activation, socket factories, Internet firewalls, distributed garbage collection, and design patterns working with alternatives or extensions to the standard RMI implementation e.g., JNDI naming services and CORBA IIOP. …”
Publicado 2001
Libro electrónico -
984Publicado 2008“…--Install the latest version of the Windows network operating system --Design and implement Active Directory Forests, Trees, and Domains --Configure Windows servers for a number of different roles including domain controller, remote access server, file server, print server, Web server, and much more --Add users to your domain’s Active Directory and organize users in groups and organizational units --Implement network services such as DNS, DHCP, Windows Deployment Services, and Routing and Remote Access --Secure your servers with the Windows Firewall and IPSec and make your domain more secure using the Active Directory Certificate Services Register your book at informit.com/sams/title/9780672330124 for convenient access to updates and corrections as they become available…”
Libro electrónico -
985Publicado 2019“…Network Devices: In this lesson, you’ll learn about the operation of network devices such as routers, switches, and firewalls. Network Topologies and Categories: In this lesson, you’ll learn about ways to categorize networks based on size and where resources are located. …”
-
986Publicado 2021“…Once you've learned how to work with the command line, you'll explore the essential Linux commands for managing users, processes, and daemons and discover how to secure your Linux environment using application security frameworks and firewall managers. As you advance through the chapters, you'll work with containers, hypervisors, virtual machines, Ansible, and Kubernetes. …”
Libro electrónico -
987Publicado 2018“…The contents of all the volumes are as follows: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, SMP/E, IBM Language Environment® Volume 3: Introduction to DFSMS, data set basics storage management hardware and software, catalogs, and DFSMStvs Volume 4: Communication Server, TCP/IP, and IBM VTAM® Volume 5: Base and IBM Parallel Sysplex®, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart management (ARM), IBM Geographically Dispersed Parallel SysplexTM (IBM GDPS®) Volume 6: Introduction to security, IBM RACF®, Digital certificates and PKI, Kerberos, cryptography and z990 integrated cryptography, zSeries firewall technologies, LDAP, and Enterprise Identity Mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to z/Architecture, z14 processor design, IBM Z connectivity, LPAR concepts, and HCD Volume 11: Capacity planning, performance management, WLM, IBM RMFTM, and SMF Volume 12: WLM Volume 13: JES3, JES3 SDSF…”
Libro electrónico -
988Publicado 2016“…What You Will Learn Learning proven security testing and penetration testing techniques Building multi-layered complex architectures to test the latest network designs Applying a professional testing methodology Determining whether there are filters between you and the target and how to penetrate them Deploying and finding weaknesses in common firewall architectures. Learning advanced techniques to deploy against hardened environments Learning methods to circumvent endpoint protection controls In Detail Security flaws and new hacking techniques emerge overnight ? …”
Libro electrónico -
989Publicado 2019“…As you progress through the chapters, you will gain insights into how to carry out various key scanning tasks, including firewall detection, OS detection, and access management to detect vulnerabilities in your network. …”
Libro electrónico -
990Publicado 2017“…This book will work as a perfect guide for anyone who wants to have a practical approach in leveraging penetration testing mechanisms using Kali Linux What You Will Learn Acquire the key skills of ethical hacking to perform penetration testing Learn how to perform network reconnaissance Discover vulnerabilities in hosts Attack vulnerabilities to take control of workstations and servers Understand password cracking to bypass security Learn how to hack into wireless networks Attack web and database servers to exfiltrate data Obfuscate your command and control connections to avoid firewall and IPS detection In Detail Kali Linux is a Linux distribution designed for penetration testing and security auditing. …”
Libro electrónico -
991Publicado 2007“…Install and configure Ubuntu Get all your system’s devices and peripherals up and running Configure and use the X Window System Manage Linux services and users Run a printer server Connect to a local network and the Internet Set up and administer a web server with Apache Secure your machine and your network from intruders Learn shell scripting Share files with Windows users using Samba Get productive with OpenOffice.org Play games on Linux Use Linux multimedia programs Create and maintain a MySQL database Configure a firewall Set up an FTP server Use Ubuntu’s development and programming tools Tune your Ubuntu system for maximum performance Learn to manage and compile the kernel and modules Andrew Hudson is a regular freelance contributor to Linux Format magazine, the UK’s largest Linux magazine. …”
Libro electrónico -
992Publicado 2007“…You’ll learn how to: • Replace nonstop crisis response with a systematic approach to security improvement • Understand the differences between “good” and “bad” metrics • Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk • Quantify the effectiveness of security acquisition, implementation, and other program activities • Organize, aggregate, and analyze your data to bring out key insights • Use visualization to understand and communicate security issues more clearly • Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources • Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you’re an engineer or consultant responsible for security and reporting to management–or an executive who needs better information for decision-making– Security Metrics is the resource you have been searching for. …”
Libro electrónico -
993por Dowd, Mark“…Coverage includes • Code auditing: theory, practice, proven methodologies, and secrets of the trade • Bridging the gap between secure software design and post-implementation review • Performing architectural assessment: design review, threat modeling, and operational review • Identifying vulnerabilities related to memory management, data types, and malformed data • UNIX/Linux assessment: privileges, files, and processes • Windows-specific issues, including objects and the filesystem • Auditing interprocess communication, synchronization, and state • Evaluating network software: IP stacks, firewalls, and common application protocols • Auditing Web applications and technologies This book is an unprecedented resource for everyone who must deliver secure software or assure the safety of existing software: consultants, security specialists, developers, QA staff, testers, and administrators alike. …”
Publicado 2007
Libro electrónico -
994Publicado 2003“…Some of the topics covered include: Station Security for Linux, FreeBSD, Open BSD, Mac OS X and Windows Setting Up Access Point Security Gateway Security, including building Gateways, firewall Rules, Auditing, etc. Authentication and Encryption FreeBSD IPsec client and gateway configuration Linux IPsec client and gateway configuration 802.1x authentication 802.11 Security is a book whose time has come. …”
Libro electrónico -
995por Day, Kevin, 1975-“…Additional material covers: Designing an enterprise security plan, including perimeter/firewall and Internal defenses, application, system, and hardware security Ongoing security measures—recurring audits, vulnerability maintenance, logging and monitoring, and incident response, plus risk assessment Choosing between open source and proprietary solutions; and wired, wireless, and virtual private networks This book is essential reading for anyone working to keep information secure. …”
Publicado 2003
Libro electrónico -
996Publicado 2006“…In-depth coverage of all the new and improved Windows Vista tools and technologies A tour of the new Windows Vista interface, including Aero Glass What hardware you need to get the most out of Windows Vista Vista’s file system improvements, including tags, Quick Search, and virtual folders A review of Vista’s new performance and stability features A critical look at the beefed-up security features, including Windows Defender, the new Firewall, and User Account Control A complete look at Vista’s totally redesigned networking tools In-depth coverage of Vista’s new and improved tools for notebooks and Tablet PCs, digital media, and gaming Paul McFedries is the president of Logophilia Limited, a technical writing company. …”
Libro electrónico -
997Publicado 2009“…He demonstrates how to run IT when critical elements of customer, product, and business data and processes extend far beyond the firewall—and how to use all that information to deliver real-time answers about everything from an individual customer’s credit to the location of a specific cargo container. …”
Libro electrónico -
998por Trost, Ryan“…Coverage includes Assessing the strengths and limitations of mainstream monitoring tools and IDS technologies Using Attack Graphs to map paths of network vulnerability and becoming more proactive about preventing intrusions Analyzing network behavior to immediately detect polymorphic worms, zero-day exploits, and botnet DoS attacks Understanding the theory, advantages, and disadvantages of the latest Web Application Firewalls Implementing IDS/IPS systems that protect wireless data traffic Enhancing your intrusion detection efforts by converging with physical security defenses Identifying attackers’ “geographical fingerprints” and using that information to respond more effectively Visualizing data traffic to identify suspicious patterns more quickly Revisiting intrusion detection ROI in light of new threats, compliance risks, and technical alternatives Includes contributions from these leading network security experts: Jeff Forristal, a.k.a. …”
Publicado 2009
Libro electrónico -
999Publicado 2020“…Topics include: Module 1: Cybersecurity Fundamentals Module 2: Software Defined Networking Security and Network Programmability Module 3: AAA, Identity Management, Network Visibility, and Segmentation Module 4: Infrastructure Security, Firewalls, and Intrusion Prevention Systems Module 5: Virtual Private Networks (VPNs) Module 6: Securing the Cloud and Content Security Module 7: Endpoint Security and Cisco Threat Response About the Instructor Omar Santos is the author of more than 20 books and video courses; numerous white papers, articles, and security configuration guidelines and best practices. …”
-
1000Publicado 2020“…This includes everything from using firewalls and load balancers to secure endpoints, to leveraging Cognito for managing users and authentication. …”
Libro electrónico