Mostrando 21 - 40 Resultados de 112 Para Buscar 'Ip Man', tiempo de consulta: 0.11s Limitar resultados
  1. 21
    por Rackley, Steve
    Publicado 2007
    Tabla de Contenidos: “…Analysing Wireless LAN ProblemsTroubleshooting using WLAN Analysers; Bluetooth Coexistence with 802.11 WLANs; Summary of Part III; Part IV: WIRELESS PAN IMPLEMENTATION; Chapter 10: Wireless PAN Standards; Introduction; Bluetooth (IEEE 802.15.1); Wireless USB; ZigBee (IEEE 802.15.4); IrDA; Near Field Communications; Summary; Chapter 11: Implementing Wireless PANs; Wireless PAN Technology Choices; Pilot Testing; Wireless PAN Security; Summary of Part IV; Part V: WIRELESS MAN IMPLEMENTATION; Chapter 12: Wireless MAN Standards; The 802.16 Wireless MAN Standards; Other WMAN Standards…”
    Libro electrónico
  2. 22
    por Meyers, Michael, 1961-
    Publicado 2012
    Tabla de Contenidos: “…Administrative Access Control -- Malware -- Social Engineering -- Man in the Middle -- Denial of Service -- Physical Intrusion -- Attacks on Wireless Connections -- Securing User Accounts -- Authentication -- Passwords -- Controlling User Accounts -- Firewalls -- Hiding the IPs -- Port Filtering -- Packet Filtering -- MAC Filtering -- Personal Firewalls -- Network Zones -- Vulnerability Scanners -- Chapter Review -- Questions -- Answers -- Chapter 17 Virtualization -- Historical/Conceptual -- What is Virtualization? …”
    Libro electrónico
  3. 23
    Publicado 2018
    Tabla de Contenidos: “…23.13 Event handling -- 23.14 Object manipulation statements and operators -- 23.15 Exercises -- WINDOWS NT -- 24.1 Introduction -- 24.2 Novell NetWare networking -- 24.3 Servers, workstations and clients -- 24.4 Workgroups and domains -- 24.5 User and group accounts -- 24.6 New user accounts -- 24.7 File systems -- 24.8 Windows NT networking -- 24.9 Setting up TCP/IP networking on Windows NT -- 24.10 Windows sockets -- 24.11 Network dynamic data exchange (Net DDE) -- 24.12 Robust networking -- 24.13 Security model -- 24.14 TCP/IP applications -- 24.15 Windows NT network drives -- 24.16 Exercises -- NETWARE -- 25.1 Novell NetWare networking -- 25.2 NetWare and TCP/IP integration -- 25.3 NetWare architecture -- 25.4 NetWare protocols -- 25.5 IPX -- 25.6 Novell NetWare setup -- 25.7 NetWare 4.1 -- 25.8 Exercises -- UNIX -- 26.1 Introduction -- 26.2 Network setup -- 26.3 TCP/IP protocols -- 26.4 NFS -- 26.5 Network configuration files -- 26.6 Sample startup file -- 26.7 Exercises -- NETWORKING ELEMENTS -- 27.1 LANs, WANs, and MANs -- 27.2 OSI model -- 27.3 Communications standards and the OSI model -- 27.4 Standards agencies -- 27.5 Network cable types -- 27.6 LAN topology -- 27.7 Internetworking connections -- 27.8 Internet routing protocols -- 27.9 Network topologies -- 27.10 Network loading -- 27.11 Exercises -- ETHERNET -- 28.1 Introduction -- 28.2 IEEE standards -- 28.3 Ethernet - media access control (MAC) layer -- 28.4 IEEE 802.2 and Ethernet SNAP -- 28.5 OSI and the IEEE 802.3 standard -- 28.6 Ethernet transceivers -- 28.7 NIC -- 28.8 Standard Ethernet limitations -- 28.9 Ethernet types -- 28.10 Twisted-pair hubs -- 28.11 100 Mbps Ethernet -- 28.12 Ethernet security -- 28.13 Exercises -- TOKEN RING -- 29.1 Introduction -- 29.2 Operation -- 29.3 Token Ring - media access control (MAC) -- 29.4 Token Ring maintenance…”
    Libro electrónico
  4. 24
    Publicado 2017
    Libro electrónico
  5. 25
    Publicado 2014
    Tabla de Contenidos: “…Setting Up Android Emulators Smartphone Pentest Framework; Target Virtual Machines; Creating the Windows XP Target; VMware Player on Microsoft Windows; VMware Fusion on Mac OS; Installing and Activating Windows; Installing VMware Tools; Turning Off Windows Firewall; Setting User Passwords ; Setting a Static IP Address; Making XP Act Like It's a Member of a Windows Domain; Installing Vulnerable Software; Installing Immunity Debugger and Mona ; Setting Up the Ubuntu 8.10 Target; Creating the Windows 7 Target ; Creating a User Account; Opting Out of Automatic Updates; Setting a Static IP Address…”
    Libro electrónico
  6. 26
    Publicado 2016
    Tabla de Contenidos:
    Libro electrónico
  7. 27
    por Hillar, Gaston Carlos
    Publicado 2004
    Tabla de Contenidos: “…Reemplazando Concentradores por ConmutadoresRacks de Concentradores o Conmutadores; Características de los Conmutadores; Monitoreando y Administrando los Conmutadores; Topología Estrella Jerárquica; Topología Estrella-Anillo; Enlaces Troncales; Calculando el Ancho de Banda; Resumen de las Topologías; VLAN: LAN Virtuales; Salidas a una MAN, WAN y a Internet; Capítulo 5 Protocolos; Las Capas de los Protocolos; Los Modelos de Referencia OSI y TCP/IP; Las Capas del Modelo OSI; Las Capas del Modelo TCP/IP; TCP/IP; Direcciones IP; Subredes; IPv4 e IPv6; NetBEUI y NetBIOS; IPX/SPX…”
    Libro electrónico
  8. 28
    Publicado 2017
    Tabla de Contenidos: “…-- Danksagung -- Teil I: Netzwerk-Grundlagen -- Kapitel 1: Einführung in Computernetzwerke -- 1.1 Die Entwicklung von Computernetzwerken -- 1.1.1 Bevor es Netzwerke gab -- 1.1.2 Die Entstehung des Internets -- 1.1.3 UNIX und C -- 1.1.4 Die TCP/IP-Protokollfamilie -- 1.1.5 Ethernet -- 1.1.6 Computernetzwerke heute -- 1.2 Komponenten eines Computernetzwerks -- 1.2.1 LAN, WAN, GAN, MAN -- 1.2.2 Und das Internet? …”
    Libro electrónico
  9. 29
    Publicado 2014
    Tabla de Contenidos: “…Cover; Einleitung; Problemaufriss; Zentrale Begriffe; Zugangsdaten; Missbrauch; Haftung; Gang der Darstellung; Technische und juristische Grundlagen; Technische Grundlagen; Internet; Zugangsdaten; Identität; Identifikationsfunktion von Accounts im Internet; Internetzugang -- IP-Adresse; Internetanschluss; WLAN; IP-Adresse; E-Mail-Adresse; Passwortgeschützte Benutzerkonten auf Internetseiten; Informationsportale; eCommerce-Seiten, Online-Shops; Internet-Auktionsplattformen mit Reputationssystem; Online-Banking; Online-Bezahldienste; Elektronische Signatur…”
    Tesis
  10. 30
    Publicado 2017
    Tabla de Contenidos: “…The Certificate Revocation List -- System date and time -- Authentication and plugins -- Usernames and passwords -- --ccd-exclusive -- Summary -- Chapter 7: Network and Routing -- Connectivity -- Inbound connection-server -- Publicly addressed server -- Privately addressed server with port forwarding -- Outbound connection-client -- Firewall filters and inspection -- TLS authentication -- Routing -- Internal routing -- External routing -- Pushing routes -- Routes behind clients -- Kernel versus process routing -- Route conflicts -- Redirect gateway -- General network concerns -- Path MTU and MSS -- Summary -- Chapter 8: Performance -- Networking -- Rate limiting -- Cryptographic performance -- Library differences -- Cipher and AES-NI -- Result summary -- Single thread -- Summary -- Chapter 9 : External Problems -- Inspection and filtering -- Obfuscation -- Encryption -- Geographic and source address exclusions -- What can be done -- Source IP address -- DNS settings -- Routing path performance -- Summary -- Useful links -- Manual or man pages -- Release notes -- Support channels -- Index…”
    Libro electrónico
  11. 31
    Publicado 2024
    “…You'll gain a solid understanding of IP addressing, subnetting, and the intricacies of both IPv4 and IPv6. …”
    Vídeo online
  12. 32
    por Lucas, Michael, 1967-
    Publicado 2013
    Tabla de Contenidos: “…-- Sources of Information -- Man Pages -- Manual Sections -- Viewing Man Pages -- Finding Man Pages -- Overlapping Man Page Names -- Man Page Contents -- Man Pages on the Web -- The OpenBSD Website -- Mirrors -- The OpenBSD FAQ -- Non-Project Websites -- OpenBSD Mailing Lists -- Unofficial Mailing Lists -- Read-Only Mailing Lists -- Using OpenBSD Problem-Solving Resources -- Using the OpenBSD Website -- Using Man Pages -- Using Internet Searches -- Using Mailing Lists -- Creating a Good Help Request -- How to Be Ignored -- Sending Your Email -- Responding to Email -- 2. …”
    Libro electrónico
  13. 33
    Publicado 2017
    Tabla de Contenidos: “…-- 3-way handshake -- Modes of firewall -- Stateful packet inspection -- Stateless packet inspection -- Architecting firewall rules -- The deny all and allow some approach -- The allow all and deny some approach -- Firewall justification document -- A sample firewall justification document -- Inbound rules -- Outbound rules -- Tracking firewall changes with alarms -- Best practices -- Application layer security -- Intrusion Prevention Systems -- Overview architecture of IPS -- IPS in a cloud environment -- Implementing IPS in the cloud -- Deep Security -- Anti-malware -- Application control -- The IPS functionality -- A real-world example -- Implementation -- Advantages that IPS will bring to a cloud environment -- A web application firewall -- Architecture -- Implementation -- Network segmentation -- Understanding a flat network -- Segmented network -- Network segmentation in cloud environments -- Segmentation in cloud environments -- Rule of thumb -- Accessing management -- Bastion hosts -- The workings of bastion hosts -- The workings of SSH agent forwarding -- Practical implementation of bastion hosts -- Security of bastion hosts -- Benefits of bastion hosts -- Disadvantages of bastion hosts -- Virtual Private Network -- Routes - after VPN is connected -- Installation of OpenVPN -- Security for VPN -- Recommended tools for VPN -- Approaching private hosted zones for DNS -- Public hosted zones -- Private hosted zones -- Challenge -- Solution -- Summary -- Chapter 4: Server Hardening -- The basic principle of host-based security -- Keeping systems up-to-date -- The Windows update methodology -- The Linux update methodology -- Using the security functionality of YUM…”
    Libro electrónico
  14. 34
    Publicado 2023
    Video
  15. 35
    Publicado 2023
    Video
  16. 36
    Publicado 2023
    Video
  17. 37
    Publicado 2023
    Video
  18. 38
    Publicado 2023
    Video
  19. 39
    Publicado 2023
    Video
  20. 40
    Publicado 2023
    Video