Mostrando 61 - 80 Resultados de 112 Para Buscar 'Ip Man', tiempo de consulta: 0.11s Limitar resultados
  1. 61
    Publicado 2022
    Tabla de Contenidos: “…Acknowledgments -- Introduction -- 10 Networking Fundamentals -- Objective 11 Compare and contrast the Open Systems Interconnection -- (OSI) model layers and encapsulation concepts -- OSI Model -- Layer 1 -- Physical -- Layer 2 -- Data Link -- Layer 3 -- Network -- Layer 4 -- Transport -- Layer 5 -- Session -- Layer 6 -- Presentation -- Layer 7 -- Application -- Data Encapsulation and Decapsulation Within the OSI Model Context -- Ethernet Header, Internet Protocol (IP) Header, Transmission Control -- Protocol (TCP)/User Datagram Protocol (UDP) Headers, Payload -- TCP Flags -- Maximum Transmission Unit (MTU) -- REVIEW -- 1 1 QUESTIONS -- 1 1 ANSWERS -- Objective 12 Explain the characteristics of network topologies -- and network types -- Bus -- Ring -- Hybrid -- Star/Hub-and-Spoke -- Mesh -- 00-FMindd 11 22/04/22 11:12 AM -- xii Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Network Types and Characteristics -- Client-Server -- Peer-to-Peer -- Local Area Network (LAN) -- Wide Area Network (WAN) -- Metropolitan Area Network (MAN) -- Wireless Local Area Network (WLAN) -- Personal Area Network (PAN) -- Campus Area Network (CAN) -- Storage Area Network (SAN) -- Multiprotocol Label Switching (MPLS) -- Software-Defined Wide Area Network (SDWAN) -- Multipoint Generic Routing Encapsulation (mGRE) -- Service-Related Entry Point -- Demarcation Point -- Smartjack -- Virtual Network Concepts -- Hypervisor -- Virtual Network Interface Card (vNIC) -- vSwitch -- Network Function Virtualization -- Provider Links -- Satellite -- Digital Subscriber Line (DSL) -- Cable -- Leased Line -- Metro-Optical -- REVIEW -- 12 QUESTIONS -- 12 ANSWERS -- Objective 13 Summarize the types of cables and connectors -- and explain which is the appropriate type for a solution -- Copper -- Twisted Pair -- Coaxial/RG-6 -- Twinaxial -- Termination Standards -- Fiber -- Single-mode -- Multimode -- 00-FMindd 12 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Connector Types -- Local Connector (LC), Straight Tip (ST), Subscriber Connector (SC), -- Mechanical Transfer (MT), Registered Jack (RJ) -- RJ11, RJ45, F-type Connector -- Transceivers/Media Converters -- Transceiver type -- Cable Management -- Patch Panel/Patch Bay -- Fiber Distribution Panel -- Punchdown Block -- Ethernet Standards -- Copper -- Fiber -- REVIEW -- 13 QUESTIONS -- 13 ANSWERS -- Objective 14 Given a scenario, configure a subnet and use -- appropriate IP addressing schemes -- Public vs Private -- RFC 1918 -- Network Address Translation (NAT) -- Port Address Translation (PAT) -- IPv4 vs IPv6 -- Automatic Private IP Addressing (APIPA), Link-Local -- Extended Unique Identifier (EUI-64) -- Broadcast -- Multicast -- Unicast -- Anycast -- Loopback -- Default Gateway -- IPv4 Subnetting -- Classful -- Classless (Variable-Length Subnet Mask) -- Classless Inter-Domain Routing (CIDR) Notation -- IPv6 Concepts -- Tunneling -- Dual Stack -- Shorthand Notation -- Router Advertisement, Stateless Address Autoconfiguration (SLAAC) -- 00-FMindd 13 22/04/22 11:12 AM -- xiv Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Virtual IP (VIP) -- Subinterfaces -- REVIEW -- 14 QUESTIONS -- 14 ANSWERS -- Objective 15 Explain common ports and protocols, their application, -- and encrypted alternatives -- Protocols and Ports -- Types of Ports -- Port States -- Commonly Used Ports -- IP Protocol Types -- TCP and UDP -- Internet Control Message Protocol (ICMP) -- Generic Routing Encapsulation (GRE) -- Internet Protocol Security (IPsec) -- Connectionless vs Connection-Oriented -- REVIEW -- 15 QUESTIONS -- 15 ANSWERS -- Objective 16 Explain the use and purpose of network services -- DHCP -- Scope, Scope Options -- Lease Time, Available Leases -- Dynamic Assignment -- Static Assignment -- Exclusion Ranges -- Reservation -- DHCP Relay, IP Helper/UDP Forwarding -- DNS -- Zone Transfers -- Global Hierarchy -- Time to Live (TTL), DNS Caching -- Recursive Lookup/Iterative Lookup -- Record Types -- Reverse DNS/Reverse Lookup/Forward Lookup -- Internal vs External DNS -- NTP -- Stratum, Clients, Servers -- REVIEW -- 16 QUESTIONS -- 16 ANSWERS -- 00-FMindd 14 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Objective 17 Explain basic corporate and datacenter network -- architecture -- Three-Tiered -- Access/Edge -- Distribution/Aggregation Layer -- Core -- Software-Defined Networking -- Control Layer, Infrastructure Layer -- Management Plane, Application Layer -- Spine and Leaf -- Software-Defined Network -- Top-of-Rack Switching -- Backbone -- Traffic Flows -- North-South -- East-West -- Branch Office vs On-Premises Datacenter vs Colocation -- Storage Area Networks -- Connection Types -- REVIEW -- 17 QUESTIONS -- 17 ANSWERS…”
    Libro electrónico
  2. 62
    Publicado 2018
    Tabla de Contenidos: “…Group management -- Login management -- Summary -- Questions -- Further reading -- Chapter 4: Managing Azure -- Technical requirements -- Storage services -- Storage accounts -- Managed disks -- Azure Files -- Blob storage -- Networking -- Virtual network -- Subnets -- Network Security Group -- Public IP address and network interface -- Components for your virtual machine -- Azure profile -- Resource group -- Storage account -- Virtual network -- NSG -- Public IP address and network interface -- Summary -- Questions -- Further reading -- Chapter 5: Advanced Linux Administration -- Technical requirements -- Software management -- The RPM software manager -- The DPKG software manager -- Software management with YUM -- Software management with Zypp -- Software management with apt -- Networking -- Identifying the network interfaces -- Identifying the IP address -- Showing the route table -- Network configuration -- Changes in the network configuration -- Hostname -- DNS -- Storage -- Storage provided by block devices -- Adding a data disk -- Partitioning -- Filesystems in Linux -- Ext4 filesystem -- XFS filesystem -- ZFS filesystem -- BTRFS filesystem -- Swap filesystem -- Linux software RAID -- Systemd -- Working with units -- Services -- Targets -- Scheduled tasks -- Mounting local filesystems -- Mounting remote filesystems -- Summary -- Questions -- Further reading -- Chapter 6: Managing Linux Security and Identities -- Linux security tips -- Technical requirements -- Linux firewall -- Firewalld zones -- Firewalld services -- Firewalld network sources -- Linux Security Modules -- SELinux -- SELinux configuration -- SELinux context on ports -- SELinux context on files -- SELinux Boolean -- AppArmor -- AppArmor status -- Generating AppArmor profiles -- Systemd security -- Restricting access to the filesystem -- Restricting network access…”
    Libro electrónico
  3. 63
    Publicado 2023
    Tabla de Contenidos: “…-- Deciding what to back up -- Backing up SW, rsync, and recovery -- Summary -- Chapter 11: Network Fundamentals, File Sharing, and SSH -- Network basics -- IPv4 address -- IPv6 address -- Hostname -- DNS and WWW -- Local network configuration basics -- Pinging a computer in our local network -- Router -- Static and dynamic IPs -- Local and public IP -- Scanning the network -- Subnet mask of a network -- Short network sharing introduction -- A bit of NFS history and characteristics -- Enabling time synchronization for NFS -- Sharing on the server side -- Essential commands for NFS status -- Getting access to a shared directory on the client side -- Synchronization on the client side -- Mounting permanently on the client side based on a static IP -- Automating all the commands -- Accessing NFS shared data by server name -- Accessing data via an encrypted connection -- Windows clients -- macOS clients -- Sharing via Samba Server -- Sharing directories by ourselves via Terminal and all configurations -- Secure Shell (SSH) and working remotely -- Enabling SSH on the server side -- Connecting from another Linux machine locally -- Connecting remotely from the internet -- Connecting remotely from the internet through a VPN -- Connecting from a Windows machine -- Sharing via SSHFS -- Summary -- Chapter 12: Internet, Network Security, Firewalls, and VPNs -- How the internet works, network protocols, and ports -- TCP/IP and OSI network models -- All types of network protocols and the ports for them -- UDP versus TCP and others -- A few other essential protocols -- The Linux basic network modules and a port-scan tool -- Attacks, security advice, and firewalls -- When is a Linux distribution in danger? …”
    Libro electrónico
  4. 64
    Publicado 2020
    Tabla de Contenidos: “…-- SPOOFING -- ATAQUES MAN IN THE MIDDLE -- ¿CÓMO PODEMOS PROTEGERNOS? …”
    Libro electrónico
  5. 65
  6. 66
    por Cohen, D. S.
    Publicado 2009
    Tabla de Contenidos: “…No Scheduling; Who Owns the Schedules?; Man-Month Schedule; Milestones: How They Affect Everything; Scrum, Waterfall, Agile, and Cowboy Coding; Elements of a Schedule; Troubleshooting; Other Teams' Needs and Schedules; Hardware; DLC, Expansion Packs, and Sequels; Marketing, PR, and Sales Needs; Screenshots and PR/Marketing Materials; Holidays and Vacation…”
    Libro electrónico
  7. 67
    por Boyraz, Guven
    Publicado 2024
    Tabla de Contenidos: “…-- Key advantages of DNS firewalls -- Domain categorization -- Domains without an IP address -- DNS tunneling -- Important elements of detection techniques -- Summary -- Chapter 8: The Road Ahead of Endpoint Security -- Summary of this book -- The future of endpoint security -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  8. 68
    Publicado 2017
    “…Participants must understand basic internet terms (e.g., IP addresses), the command line, and the package manager for their Linux distribution of choice. …”
    Video
  9. 69
    Publicado 2020
    Tabla de Contenidos: “…PROTOCOLOS TCP/IP -- 13.10.3. CARACTERÍSTICAS DE TCP/IP -- 13.11. …”
    Libro electrónico
  10. 70
    Publicado 2008
    Libro electrónico
  11. 71
    por Wesselius, Jaap
    Publicado 2023
    Libro electrónico
  12. 72
    Publicado 2014
    Tabla de Contenidos:
    Libro electrónico
  13. 73
    por Coar, Ken A. L.
    Publicado 2008
    Tabla de Contenidos: “…Table of Contents; Preface; What's in This Book; Platform Notes; Other Books; Other Sources; How This Book Is Organized; Conventions Used in This Book; Programming Conventions; Typesetting Conventions; Documentation Conventions; The online manual ("man") pages on a Unixish system; The Apache Web server documentation; Using Code Examples; We'd Like to Hear from You; Safari® Enabled; Acknowledgments; Ken Coar; Rich Bowen; Chapter 1. …”
    Libro electrónico
  14. 74
    Publicado 2012
    Tabla de Contenidos: “…HyperText Transfer Protocol and HyperText Transfer Protocol Secure -- Domain Name System -- Network File System -- File Transfer Protocols -- Tunneling Protocols -- Routing Protocols -- Telnet -- Secure Shell -- Internet Protocol Security -- Secure Sockets Layer and Transport Layer Security -- E-mail Protocols -- Network News Transfer Protocol -- Electronic Data Interchange -- Mapping Well-Known Ports to Protocols -- Comparing Internetwork Architectures -- Comparing Public and Private IP Addresses -- Using NAT -- Exploring Wireless Technologies -- Comparing WEP, WPA, and WPA2 -- Wireless Device Administrator Password -- Wireless Service Set Identifier -- MAC Filtering -- Bluetooth -- Radio-Frequency Identification -- GSM -- 3G -- WiMAX -- NFC -- Protecting Mobile Devices -- Questions -- Answers -- Chapter 4 Advanced Networking and Communications -- Understanding Telecommunications -- Internet Connections -- VoIP -- Securing Phones -- Understanding Firewalls -- Packet Filtering Firewall -- Stateful Inspection Firewall -- Application Firewall -- Defense Diversity -- Comparing Network-based and Host-based Firewalls -- Using Proxy Servers -- Exploring Remote Access Solutions -- Risks and Vulnerabilities -- Tunneling Protocols -- Authentication -- Access and Admission Control -- Questions -- Answers -- Chapter 5 Attacks -- Comparing Attackers -- Hackers and Crackers -- Insiders -- Script Kiddies -- Phreaks -- Exploring Attack Types -- DoS -- DDoS -- Botnets and Zombies -- Spam -- Sniffing Attack -- Ping Sweep -- Port Scan -- Salami -- Man-in-the-Middle -- Session Hijacking -- Replay -- Buffer Overflow Attacks -- Scareware and Ransomware -- Password Attacks -- Covert Channel -- Cramming -- Zero Day Exploits -- Advanced Persistent Threat -- Understanding Social Engineering -- Piggybacking -- Impersonation -- Dumpster Diving -- Shoulder Surfing -- Phishing…”
    Libro electrónico
  15. 75
    Publicado 2012
    Tabla de Contenidos: “…IPS -- Where on the Network Will the IDS System Be Placed? …”
    Libro electrónico
  16. 76
    Publicado 2004
    “…The book explains the differences among various MAN technologies, getting you up to speed on the solutions you need to use. …”
    Libro electrónico
  17. 77
    Publicado 2012
    Tabla de Contenidos: “…Using the Cut, Copy, and Paste -- Copying Cells Using Fill Handle -- Dragging Cells -- Math and Trig Functions -- Logical Functions -- Statistical Functions -- Text Functions -- Date and Time Functions -- Page Tab -- Margins Tab -- Header/Footer Tab -- Sheet Tab -- Multiple-choice Questions -- Answers -- Chapter 12: Microsoft Office Power Point 2003 -- Using the Auto Content Wizard -- Using Design Template -- Using Blank Presentation -- Normal View -- Slide Sorter View -- Slide Show View -- Slide Master -- Notes Master -- Handout Master -- Adding Text Using Placeholder -- Adding Text Using Text Box -- Adding Text to an Auto Shape -- Custom Animations -- Multiple-choice Questions -- Answers -- Chapter 13: Data Communication and Computer Networks -- Analog Signal -- Digital Signals -- Guided or Wired Media -- Unguided or Wireless Media -- Amplitude Modulation (AM) -- Frequency Modulation (FM) -- Phase Modulation (PM) -- Asynchronous Transmission -- Synchronous Transmission -- Circuit Switching -- Packet Switching -- Message Switching -- LAN -- MAN -- WAN -- Bus Topology -- Ring Topology -- Star Topology -- Tree Topology -- Mesh Topology -- Multiple-choice Questions -- Answers -- Chapter 14: Internet -- TCP/IP -- FTP -- HTTP -- SMTP -- NNTP -- Electronic Mail -- FTP -- Telnet -- Internet Relay Chat (IRC) -- Chatting and Instant Messaging -- Internet Telephony -- Video Conferencing -- Commerce Through Internet -- Mailing Lists (Listserver) -- Creating an E-mail Account -- Multiple-choice Questions -- Answers -- Chapter 15: Computer Security -- Secret-key Cryptography -- Public-key Cryptography -- Hash Functions -- Packet-filtering Router -- Application-level Gateway -- Circuit-level Gateway -- Multiple-choice Questions -- Answers -- Chapter 16: Database Management Systems -- Data -- Information -- Knowledge -- Entity -- Attribute -- Relationship…”
    Libro electrónico
  18. 78
    Publicado 2005
    “…You don't have time for endless newsgroup searches, confusing man pages, emails to the developers... it's an emergency! …”
    Libro electrónico
  19. 79
    Publicado 2019
    “…For Hematological diseases, Ghia reviews how studies of B cell development help the understanding of Leukemia development, Kim and Schaniel review how iPS technology helps the understanding of hematological diseases and Hellmann et al. describe development of new therapeutic antibody drug conjugates. …”
    Libro electrónico
  20. 80
    Publicado 2018
    Tabla de Contenidos: “…-- HA in OpenShift -- Virtual IPs -- IP failover -- OpenShift infrastructure nodes -- OpenShift masters -- OpenShift etcd -- OpenShift nodes -- External storage for OpenShift persistent data -- OpenShift backup and restore -- Etcd key-value store backup -- OpenShift masters -- OpenShift nodes -- Persistent storage -- Summary -- Questions -- Further reading -- Chapter 19: OpenShift HA Design for Single and Multiple DCs -- OpenShift single-DC HA design -- OpenShift infrastructure nodes -- OpenShift masters -- OpenShift nodes -- Etcd key-value store -- Persistent storage -- Physical placement consideration -- Design considerations…”
    Libro electrónico