Mostrando 1,021 - 1,040 Resultados de 1,060 Para Buscar 'Firefall~', tiempo de consulta: 1.48s Limitar resultados
  1. 1021
    Publicado 2007
    “…Streamline deployment with Kickstart Find, install, update, remove, and verify software Detect, analyze, and manage hardware Manage storage with LVM, RAID, ACLs, and quotas Use Red Hat Enterprise Linux 5 on 64-bit and multi-core systems Administer users and groups more efficiently and securely Ensure trustworthy backup and rapid recovery Script and schedule tasks to run automatically Provide unified identity management services Configure Apache, BIND, Samba, and Sendmail Monitor and tune the kernel and individual applications Protect against intruders with SELinux and ExecShield Set up firewalls with iptables Enable the Linux Auditing System Use virtualization to run multiple operating systems concurrently Part I Installation and Configuration Chapter 1 Installing Red Hat Enterprise Linux Chapter 2 Post-Installation Configuration Chapter 3 Operating System Updates Part II Operating System Core Concepts Chapter 4 Understanding Linux Concepts Chapter 5 Working with RPM Software Chapter 6 Analyzing Hardware Chapter 7 Managing Storage Chapter 8 64-Bit, Multi-Core, and Hyper-Threading Technology Processors Part III System Administration Chapter 9 Managing Users and Groups Chapter 10 Techniques for Backup and Recovery Chapter 11 Automating Tasks with Scripts Part IV Network Services Chapter 12 Identity Management Chapter 13 Network File Sharing Chapter 14 Granting Network Connectivity with DHCP Chapter 15 Creating a Web Server with the Apache HTTP Server Chapter 16 Hostname Res..…”
    Libro electrónico
  2. 1022
    Publicado 2009
    “…You learn how to use Cisco IOS® and ASA firewalls and ACLs to selectively filter IPv6 traffic. …”
    Libro electrónico
  3. 1023
    Publicado 2009
    “…This is the only book that: Introduces every component of a complete CTS solution and shows how they work together Walks through connecting CTS in real-world environments Demonstrates how to secure virtual meetings using Cisco firewalls and security protocols Includes a full chapter on effective TelePresence room design Walks through every aspect of SIP call signaling design, including both single-cluster and intercluster examples for use in a TelePresence environment Provides prequalification, room, and network path assessment considerations to help you anticipate and avoid problems Tim Szigeti, CCIE® No. 9794, technical leader within the Cisco® Enterprise Systems Engineering team, is responsible for defining Cisco TelePresence network deployment best practices. …”
    Libro electrónico
  4. 1024
    Publicado 2003
    “…Implement DSL end-to-end solutions for all six current DSL architectures Coverage includes: All DSL varieties: U.S. and international varieties include ANSI and ITU standards as well as legacy and proprietary xDSL varieties, such as CAP Cisco DSL-related equipment that supports all the xDSL varieties and configurations in both Cisco IOS(r) Software and the graphical user interface Cisco DSL Manager (CDM) software All six architectures that implement DSL using TCP/IP, with in-depth discussion of the four most commonly-used architectures New standards and deregulation issues, including the ITU SHDSL standard and the evolving VDSL technology International regulatory and infrastructure issues, with measurements expressed for both U.S. and international audiences Common challenges and their solutions when deploying or migrating using xDSL, including voice-over-IP (VoIP) and multimedia traffic Using MPLS to move DSL-generated traffic through networks Bonus appendixes provide an overview of ATM as well as a tour of Cisco Long-Reach Ethernet (LRE) Virtual private networks, firewall security, e-commerce applications, multiple voice lines, and e-learning programs: Digital Subscriber Line (DSL) can bring all of these services to even the smallest network at an affordable price. …”
    Libro electrónico
  5. 1025
    Publicado 2010
    “…Compared with the other Linux books out there, A Practical Guide to FedoraTM and Red Hat® Enterprise Linux®, Fifth Edition, delivers Complete, up-to-the-minute coverage of Fedora 12 and RHEL 5 Deeper coverage of the command line and the newest GUIs, including desktop customization More practical coverage of file sharing using Samba, NFS, and FTP More and better coverage of automating administration with Perl More usable, realistic coverage of Internet server configuration, including Apache, sendmail , NFS, DNS/BIND, and LDAP More state-of-the-art security techniques, including SELinux (Security Enhanced Linux), ACLs (Access Control Lists), firewall setup using both the Red Hat GUI and iptables , and a full chapter on OpenSSH More and better coverage of system/network administration tasks, including new coverage of network monitoring with Cacti Complete instructions on keeping Linux systems up-to-date using yum And much more, including a 500+ term glossary and a comp..…”
    Libro electrónico
  6. 1026
    por Poulton, Don
    Publicado 2012
    “…The study guide helps you master all the topics on the MCTS 70-642 exam, including IPv4/IPv6 address configuration and troubleshooting DHCP configuration, installation, management, and troubleshooting Routing configuration, tables, RRAS, management, and maintenance Windows Firewall, Advanced Security, and IPsec DNS installation, configuration, zones, replication, and records Client name resolution File services, shared folders, permissions, and encryption DFS, namespaces, and replication Backup/restore File Server Resource Manager (FSRM) Print services Remot..…”
    Libro electrónico
  7. 1027
    por Vachon, Bob
    Publicado 2012
    “…Topics covered include *; Networking security fundamentals: concepts, policies, strategies, and more *; Securing network infrastructure: network foundations, CCP, management plane and access, and data planes (IPv6/IPv4) *; Secure connectivity: VPNs, cryptography, IPsec, and more *; Threat control and containment: strategies, ACL threat mitigation, zone-based firewalls, and Cisco IOS IPS *; Securing networks with ASA: ASDM, basic and advanced settings, and ASA SSL VPNs Bob Vachon is a professor at Cambrian College. …”
    Libro electrónico
  8. 1028
    Publicado 2020
    “…By the end of the book, you'll have developed the skills you need to work confidently with efficient exploitation techniques What you will learn Develop advanced and sophisticated auxiliary, exploitation, and post-exploitation modules Learn to script automated attacks using CORTANA Test services such as databases, SCADA, VoIP, and mobile devices Attack the client side with highly advanced pentesting techniques Bypass modern protection mechanisms, such as antivirus, IDS, and firewalls Import public exploits to the Metasploit Framework Leverage C and Python programming to effectively evade endpoint protection Who this book is for If you are a professional penetration tester, security engineer, or law enforcement analyst with basic knowledge of Metasploit, this book will help you to master the Metasploit framework and guide you in developing your exploit and module development skills. …”
    Libro electrónico
  9. 1029
    por Raymond, Eric S.
    Publicado 2004
    “…Bellovin , co-creator of Usenet and co-author of Firewalls and Internet Security . Stuart Feldman , a member of the Bell Labs UNIX development group and the author of make and f77 . …”
    Libro electrónico
  10. 1030
    Publicado 2020
    “…Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time, including Basic system management: Installation, tools, file management, text files, RHEL8 connections, user/group management, permissions, and network configuration Operating running systems: Managing software, processes, storage, and advanced storage; working with systemd; scheduling tasks; and configuring logging Advanced system administration: Managing the kernel and boot procedures, essential troubleshooting, bash shell scripting Managing network services: Configuring SSH, firewalls, and time services; managing Apache HTTP services and SE Linux; and accessing network storage Companion Website The website contains two free, complete practice exams and two full hours of video training from the author’s Red Hat Certified System Ad..…”
    Libro electrónico
  11. 1031
    Publicado 2015
    “…--Understand modern network topologies, protocols, and infrastructure --Implement networks based on specific requirements --Install and configure DNS and DHCP --Monitor and analyze network traffic --Understand IPv6 and IPv4 addressing, routing, and switching --Perform basic router/switch installation and configuration --Explain network device functions in cloud environments --Efficiently implement and troubleshoot WANs --Install, configure, secure, and troubleshoot wireless networks --Apply patches/updates, and support change/configuration management --Describe unified communication technologies --Segment and optimize networks --Identify risks/threats, enforce policies and physical security, configure firewalls, and control access --Understand essential network forensics concepts --Troubleshoot routers, switches, wiring, connectivity, and security Companion CD The companion CD contains a digital edition of the Cram Sheet and the powerful Pearson IT Certification Practice Test engine, complete with hundreds of exam-realistic questions and two complete practice exams. …”
    Libro electrónico
  12. 1032
    Publicado 2017
    “…To help you manage a vSphere host overall, you will learn how to manage vSphere ESXi hosts, host profiles, host services, host firewall, and deploy and upgrade ESXi hosts using Image Builder and Auto Deploy. …”
    Libro electrónico
  13. 1033
    Publicado 2015
    “…The CD also contains 90 minutes of video training on CCP, NAT, object groups, ACLs, port security on a Layer 2 switch, CP3L, and zone-based firewalls. Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time. …”
    Libro electrónico
  14. 1034
    Publicado 2015
    “…Major topics include: Part 1: Performing Basic System Management Tasks 1: Installing Red Hat Enterprise Linux Server 2: Using Essential Tools 3: Essential File Management Tools 4: Working with Text Files 5: Connecting to a RHEL Server 6: Managing Users and Groups 7: Connecting to an LDAP Server 8: Managing Permissions 9: Configuring Networking Part 2: Operating Red Hat Enterprise Linux Servers 10: Managing Processes 11: Managing Software 12: Working with Virtual Machines 13: Scheduling Tasks 14: Configuring Logging 15: Managing Partitions 16: Managing LVM Logical Volumes Part 3: Performing Advanced System Administration Tasks 17: Managing the Kernel 18: Using Kickstart 19: Managing and Understanding the Boot Procedure 20: Applying Essential Troubleshooting Skills Part 4: Managing Network Services 21: Managing HTTP Services 22: Managing SELinux 23: Configuring a Firewall 24: Configuring FTP Services 25: Configuring Time Services..…”
    Video
  15. 1035
    Publicado 2016
    “…The video lessons cover the following topics: Module 1: Linux Operating System Security Lesson 1: Keeping Linux up-to-date Lesson 2: Managing file system security properties Lesson 3: Securing server access Lesson 4: Configuring system logging Lesson 5: Managing system auditing Lesson 6: Managing mandatory access control (MAC) Lesson 7: Managing kernel security Module 2: Managing Linux User Security Lesson 8: Managing Linux permissions and attributes Lesson 9: Managing user accounts Lesson 10: Installing central authentication Module 3: Securing Linux Services Lesson 11: Securing services Lesson 12: Securing network file systems Lesson 13: Applying secure remote access solutions Module 4: Securing Linux Infrastructure Lesson 14: Sniffing and port scanning Lesson 15: Configuring analyzing and intrusion detection tools Lesson 16: Managing firewalls Lesson 17: Managing certificates and public key infrastructures Lesson 18: Managing GPG About the Instructor Sander van Vugt is an independent Linux trainer, author, and..…”
    Video
  16. 1036
    por Gregg, Michael
    Publicado 2014
    “…This study guide helps you master all the topics on the CEH v8 (312-50) exam, including Ethical hacking basics Technical foundations of hacking Footprinting and scanning Enumeration and system hacking Linux distros and automated assessment tools Trojans and backdoors Sniffers, session hijacking, and denial of service Web server hacking, web applications, and database attacks Wireless technologies, mobile security, and mobile attacks IDS, firewalls, and honeypots Buffer overflows, viruses, and worms Cryptographic attacks and defenses Physical security and social engineering Companion CD The CD contains two free, complete practice exams, plus memory tables and answers to help you study more efficiently and effectively. …”
    Libro electrónico
  17. 1037
    Publicado 2007
    “…Set up and maintain Windows Server Update Services (WSUS) Use the Group Policy Management Console (GPMC) Intelligently select the appropriate disk storage technology when deciding between basic versus dynamic disks and between MBR versus GPT disks Take advantage of command-line tools such as DSADD, DSGET, DSMOD, DSMOVE, DSQUERY, and DSRM Discover the enhanced functionality of Microsoft Management Console (MMC) 3.0 under the R2 edition of Windows Server 2003 Harness the power of the increased security that Service Pack 1 (SP1) offers, such as the Security Configuration Wizard (SCW) and Access-based Enumeration filtering of network files and folders Perform bulk imports and exports of Active Directory user accounts using the CSVDE and LDIFDE command-line utilities Manage Windows Firewall settings under SP1 and R2 Configure shadow copies of shared folders so that users can easily retrieve previous versions of data files on their own WRITTEN BY LEADING 70-290 EXPERTs: Dan Balter is the chief technology officer for InfoTechnology Partners, Inc., a Microsoft Certified Partner company. …”
    Libro electrónico
  18. 1038
    por Casad, Joe, 1958-
    Publicado 2009
    “…7 Hour 2 How TCP/IP Works 21 Part II: The TCP/IP Protocol System Hour 3 The Network Access Layer 35 Hour 4 The Internet Layer 47 Hour 5 Subnetting and CIDR 69 Hour 6 The Transport Layer 83 Hour 7 The Application Layer 107 Part III: Networking with TCP/IP Hour 8 Routing 121 Hour 9 Getting Connected 143 Hour 10 Firewalls 175 Hour 11 Name Resolution 185 Hour 12 Automatic Configuration 215 Hour 13 IPv6--The Next Generation 229 Part IV: TCP/IP Utilities Hour 14 TCP/IP Utilities 243 Hour 15 Monitoring and Remote Access 275 Part V: TCP/IP and the Internet Hour 16 The Internet: A Closer Look 297 Hour 17 HTTP, HTML, and the World Wide Web 305 Hour 18 Email 321 Hour 19 Streaming and Casting 339 Part VI: Advanced Topics Hour 20 Web Services 353 Hour 21 The New Web 363 Hour 22 Network Intrusion 375 Hour 23 TCP/IP Security 391 Hour 24 Implementing a TCP/IP Network--Seven Days in the Life of a Sys Admin 413 Index…”
    Libro electrónico
  19. 1039
    Publicado 2015
    “…In this book, Knittel and McFedries will: Take you on an in-depth tour of the new Windows 10 user interface Show you how to upgrade an older version of Windows, or how to install Windows 10 on a new computer Teach you how to configure your Windows settings to maximize this powerful new OS Show you how to navigate the new Modern user interface and apps How to use a plethora of desktop accessory apps, accessibility tools, and managing documents and files Show you Microsoft’s new (or revived, depending on how long you've been using Windows) Start button Guide you through using Cortana, Microsoft's new online personal digital assistant Explain how to get the most out of Windows Media Player, imaging devices, document scanners, and more Show you how to use Microsoft Edge, the replace to Internet Explorer Teach you how to set up a LAN, share printers, and how to network with other operating systems Show you how to troubleshoot your network Teach you how configure, maintain and troubleshoot your system like a pro Give you the detail on tweaking the Windows Registry, and using the command line interface and utilities Guide you through setting up your computer’s firewall, defending yourself from spyware and viruses, and protecting yourself from online fraud Show you how to get the most out of your laptop or tablet PC when traveling Get up and running with the Windows touch interface Teach you how to ..…”
    Libro electrónico
  20. 1040
    Publicado 2014
    “…The other volumes contain the following content: Volume 2: z/OS implementation and daily maintenance, defining subsystems, IBM Job Entry Subsystem 2 (JES2) and JES3, link pack area (LPA), LNKLST, authorized libraries, System Modification Program/Extended (SMP/E), IBM Language Environment® Volume 3: Introduction to Data Facility Storage Management Subsystem (DFSMS), data set basics, storage management hardware and software, catalogs, and DFSMS Transactional Virtual Storage Access Method (VSAM), or DFSMStvs Volume 4: z/OS Communications Server, Transmission Control Protocol/Internet Protocol (TCP/IP), and IBM Virtual Telecommunications Access Method (IBM VTAM®) Volume 5: Base and IBM Parallel Sysplex®, z/OS System Logger, Resource Recovery Services (RRS), Global Resource Serialization (GRS), z/OS system operations, z/OS Automatic Restart Manager (ARM), IBM Geographically Dispersed Parallel SysplexTM (IBM GDPS®) Volume 6: Introduction to security, IBM Resource Access Control Facility (IBM RACF®), Digital certificates and public key infrastructure (PKI), Kerberos, cryptography and IBM eServerTM z990 integrated cryptography, zSeries firewall technologies, Lightweight Directory Access Protocol (LDAP), and Enterprise Identity Mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server, and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to IBM z/Architecture®, zSeries processor design, zSeries connectivity, LPAR concepts, HCD, and IBM DS8000® Volume 11: Capacity planning, IBM Performance Management, z..…”
    Libro electrónico