Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 40
- Examinations 24
- Security measures 23
- Certification 22
- Electronic data processing personnel 18
- Computer security 12
- Engineering & Applied Sciences 12
- Electrical & Computer Engineering 10
- Telecommunications 10
- Cisco Systems, Inc 8
- Operating systems (Computers) 8
- Linux 7
- Penetration testing (Computer security) 6
- Computer programs 5
- Computing Technology Industry Association 5
- Telecommunications engineers 5
- Business enterprises 4
- Computer technicians 4
- Hackers 4
- Kali Linux 4
- Management 4
- Apache (Computer file : Apache Group) 3
- Cloud computing 3
- Computer Science 3
- Internet telephony 3
- Open source software 3
- Python (Computer program language) 3
- TCP/IP (Computer network protocol) 3
- UNIX (Computer file) 3
- Web servers 3
-
21por Rackley, SteveTabla de Contenidos: “…Analysing Wireless LAN ProblemsTroubleshooting using WLAN Analysers; Bluetooth Coexistence with 802.11 WLANs; Summary of Part III; Part IV: WIRELESS PAN IMPLEMENTATION; Chapter 10: Wireless PAN Standards; Introduction; Bluetooth (IEEE 802.15.1); Wireless USB; ZigBee (IEEE 802.15.4); IrDA; Near Field Communications; Summary; Chapter 11: Implementing Wireless PANs; Wireless PAN Technology Choices; Pilot Testing; Wireless PAN Security; Summary of Part IV; Part V: WIRELESS MAN IMPLEMENTATION; Chapter 12: Wireless MAN Standards; The 802.16 Wireless MAN Standards; Other WMAN Standards…”
Publicado 2007
Libro electrónico -
22por Meyers, Michael, 1961-Tabla de Contenidos: “…Administrative Access Control -- Malware -- Social Engineering -- Man in the Middle -- Denial of Service -- Physical Intrusion -- Attacks on Wireless Connections -- Securing User Accounts -- Authentication -- Passwords -- Controlling User Accounts -- Firewalls -- Hiding the IPs -- Port Filtering -- Packet Filtering -- MAC Filtering -- Personal Firewalls -- Network Zones -- Vulnerability Scanners -- Chapter Review -- Questions -- Answers -- Chapter 17 Virtualization -- Historical/Conceptual -- What is Virtualization? …”
Publicado 2012
Libro electrónico -
23Publicado 2018Tabla de Contenidos: “…23.13 Event handling -- 23.14 Object manipulation statements and operators -- 23.15 Exercises -- WINDOWS NT -- 24.1 Introduction -- 24.2 Novell NetWare networking -- 24.3 Servers, workstations and clients -- 24.4 Workgroups and domains -- 24.5 User and group accounts -- 24.6 New user accounts -- 24.7 File systems -- 24.8 Windows NT networking -- 24.9 Setting up TCP/IP networking on Windows NT -- 24.10 Windows sockets -- 24.11 Network dynamic data exchange (Net DDE) -- 24.12 Robust networking -- 24.13 Security model -- 24.14 TCP/IP applications -- 24.15 Windows NT network drives -- 24.16 Exercises -- NETWARE -- 25.1 Novell NetWare networking -- 25.2 NetWare and TCP/IP integration -- 25.3 NetWare architecture -- 25.4 NetWare protocols -- 25.5 IPX -- 25.6 Novell NetWare setup -- 25.7 NetWare 4.1 -- 25.8 Exercises -- UNIX -- 26.1 Introduction -- 26.2 Network setup -- 26.3 TCP/IP protocols -- 26.4 NFS -- 26.5 Network configuration files -- 26.6 Sample startup file -- 26.7 Exercises -- NETWORKING ELEMENTS -- 27.1 LANs, WANs, and MANs -- 27.2 OSI model -- 27.3 Communications standards and the OSI model -- 27.4 Standards agencies -- 27.5 Network cable types -- 27.6 LAN topology -- 27.7 Internetworking connections -- 27.8 Internet routing protocols -- 27.9 Network topologies -- 27.10 Network loading -- 27.11 Exercises -- ETHERNET -- 28.1 Introduction -- 28.2 IEEE standards -- 28.3 Ethernet - media access control (MAC) layer -- 28.4 IEEE 802.2 and Ethernet SNAP -- 28.5 OSI and the IEEE 802.3 standard -- 28.6 Ethernet transceivers -- 28.7 NIC -- 28.8 Standard Ethernet limitations -- 28.9 Ethernet types -- 28.10 Twisted-pair hubs -- 28.11 100 Mbps Ethernet -- 28.12 Ethernet security -- 28.13 Exercises -- TOKEN RING -- 29.1 Introduction -- 29.2 Operation -- 29.3 Token Ring - media access control (MAC) -- 29.4 Token Ring maintenance…”
Libro electrónico -
24
-
25Publicado 2014Tabla de Contenidos: “…Setting Up Android Emulators Smartphone Pentest Framework; Target Virtual Machines; Creating the Windows XP Target; VMware Player on Microsoft Windows; VMware Fusion on Mac OS; Installing and Activating Windows; Installing VMware Tools; Turning Off Windows Firewall; Setting User Passwords ; Setting a Static IP Address; Making XP Act Like It's a Member of a Windows Domain; Installing Vulnerable Software; Installing Immunity Debugger and Mona ; Setting Up the Ubuntu 8.10 Target; Creating the Windows 7 Target ; Creating a User Account; Opting Out of Automatic Updates; Setting a Static IP Address…”
Libro electrónico -
26Publicado 2016Tabla de Contenidos:Libro electrónico
-
27por Hillar, Gaston CarlosTabla de Contenidos: “…Reemplazando Concentradores por ConmutadoresRacks de Concentradores o Conmutadores; Características de los Conmutadores; Monitoreando y Administrando los Conmutadores; Topología Estrella Jerárquica; Topología Estrella-Anillo; Enlaces Troncales; Calculando el Ancho de Banda; Resumen de las Topologías; VLAN: LAN Virtuales; Salidas a una MAN, WAN y a Internet; Capítulo 5 Protocolos; Las Capas de los Protocolos; Los Modelos de Referencia OSI y TCP/IP; Las Capas del Modelo OSI; Las Capas del Modelo TCP/IP; TCP/IP; Direcciones IP; Subredes; IPv4 e IPv6; NetBEUI y NetBIOS; IPX/SPX…”
Publicado 2004
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
28Publicado 2017Tabla de Contenidos: “…-- Danksagung -- Teil I: Netzwerk-Grundlagen -- Kapitel 1: Einführung in Computernetzwerke -- 1.1 Die Entwicklung von Computernetzwerken -- 1.1.1 Bevor es Netzwerke gab -- 1.1.2 Die Entstehung des Internets -- 1.1.3 UNIX und C -- 1.1.4 Die TCP/IP-Protokollfamilie -- 1.1.5 Ethernet -- 1.1.6 Computernetzwerke heute -- 1.2 Komponenten eines Computernetzwerks -- 1.2.1 LAN, WAN, GAN, MAN -- 1.2.2 Und das Internet? …”
Libro electrónico -
29Publicado 2014Tabla de Contenidos: “…Cover; Einleitung; Problemaufriss; Zentrale Begriffe; Zugangsdaten; Missbrauch; Haftung; Gang der Darstellung; Technische und juristische Grundlagen; Technische Grundlagen; Internet; Zugangsdaten; Identität; Identifikationsfunktion von Accounts im Internet; Internetzugang -- IP-Adresse; Internetanschluss; WLAN; IP-Adresse; E-Mail-Adresse; Passwortgeschützte Benutzerkonten auf Internetseiten; Informationsportale; eCommerce-Seiten, Online-Shops; Internet-Auktionsplattformen mit Reputationssystem; Online-Banking; Online-Bezahldienste; Elektronische Signatur…”
Tesis -
30Publicado 2017Tabla de Contenidos: “…The Certificate Revocation List -- System date and time -- Authentication and plugins -- Usernames and passwords -- --ccd-exclusive -- Summary -- Chapter 7: Network and Routing -- Connectivity -- Inbound connection-server -- Publicly addressed server -- Privately addressed server with port forwarding -- Outbound connection-client -- Firewall filters and inspection -- TLS authentication -- Routing -- Internal routing -- External routing -- Pushing routes -- Routes behind clients -- Kernel versus process routing -- Route conflicts -- Redirect gateway -- General network concerns -- Path MTU and MSS -- Summary -- Chapter 8: Performance -- Networking -- Rate limiting -- Cryptographic performance -- Library differences -- Cipher and AES-NI -- Result summary -- Single thread -- Summary -- Chapter 9 : External Problems -- Inspection and filtering -- Obfuscation -- Encryption -- Geographic and source address exclusions -- What can be done -- Source IP address -- DNS settings -- Routing path performance -- Summary -- Useful links -- Manual or man pages -- Release notes -- Support channels -- Index…”
Libro electrónico -
31Publicado 2024“…You'll gain a solid understanding of IP addressing, subnetting, and the intricacies of both IPv4 and IPv6. …”
Vídeo online -
32por Lucas, Michael, 1967-Tabla de Contenidos: “…-- Sources of Information -- Man Pages -- Manual Sections -- Viewing Man Pages -- Finding Man Pages -- Overlapping Man Page Names -- Man Page Contents -- Man Pages on the Web -- The OpenBSD Website -- Mirrors -- The OpenBSD FAQ -- Non-Project Websites -- OpenBSD Mailing Lists -- Unofficial Mailing Lists -- Read-Only Mailing Lists -- Using OpenBSD Problem-Solving Resources -- Using the OpenBSD Website -- Using Man Pages -- Using Internet Searches -- Using Mailing Lists -- Creating a Good Help Request -- How to Be Ignored -- Sending Your Email -- Responding to Email -- 2. …”
Publicado 2013
Libro electrónico -
33Publicado 2017Tabla de Contenidos: “…-- 3-way handshake -- Modes of firewall -- Stateful packet inspection -- Stateless packet inspection -- Architecting firewall rules -- The deny all and allow some approach -- The allow all and deny some approach -- Firewall justification document -- A sample firewall justification document -- Inbound rules -- Outbound rules -- Tracking firewall changes with alarms -- Best practices -- Application layer security -- Intrusion Prevention Systems -- Overview architecture of IPS -- IPS in a cloud environment -- Implementing IPS in the cloud -- Deep Security -- Anti-malware -- Application control -- The IPS functionality -- A real-world example -- Implementation -- Advantages that IPS will bring to a cloud environment -- A web application firewall -- Architecture -- Implementation -- Network segmentation -- Understanding a flat network -- Segmented network -- Network segmentation in cloud environments -- Segmentation in cloud environments -- Rule of thumb -- Accessing management -- Bastion hosts -- The workings of bastion hosts -- The workings of SSH agent forwarding -- Practical implementation of bastion hosts -- Security of bastion hosts -- Benefits of bastion hosts -- Disadvantages of bastion hosts -- Virtual Private Network -- Routes - after VPN is connected -- Installation of OpenVPN -- Security for VPN -- Recommended tools for VPN -- Approaching private hosted zones for DNS -- Public hosted zones -- Private hosted zones -- Challenge -- Solution -- Summary -- Chapter 4: Server Hardening -- The basic principle of host-based security -- Keeping systems up-to-date -- The Windows update methodology -- The Linux update methodology -- Using the security functionality of YUM…”
Libro electrónico -
34
-
35
-
36
-
37
-
38
-
39
-
40