Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 40
- Examinations 24
- Security measures 23
- Certification 22
- Electronic data processing personnel 18
- Computer security 12
- Engineering & Applied Sciences 12
- Electrical & Computer Engineering 10
- Telecommunications 10
- Cisco Systems, Inc 8
- Operating systems (Computers) 8
- Linux 7
- Penetration testing (Computer security) 6
- Computer programs 5
- Computing Technology Industry Association 5
- Telecommunications engineers 5
- Business enterprises 4
- Computer technicians 4
- Hackers 4
- Kali Linux 4
- Management 4
- Apache (Computer file : Apache Group) 3
- Cloud computing 3
- Computer Science 3
- Internet telephony 3
- Open source software 3
- Python (Computer program language) 3
- TCP/IP (Computer network protocol) 3
- UNIX (Computer file) 3
- Web servers 3
-
61Publicado 2022Tabla de Contenidos: “…Acknowledgments -- Introduction -- 10 Networking Fundamentals -- Objective 11 Compare and contrast the Open Systems Interconnection -- (OSI) model layers and encapsulation concepts -- OSI Model -- Layer 1 -- Physical -- Layer 2 -- Data Link -- Layer 3 -- Network -- Layer 4 -- Transport -- Layer 5 -- Session -- Layer 6 -- Presentation -- Layer 7 -- Application -- Data Encapsulation and Decapsulation Within the OSI Model Context -- Ethernet Header, Internet Protocol (IP) Header, Transmission Control -- Protocol (TCP)/User Datagram Protocol (UDP) Headers, Payload -- TCP Flags -- Maximum Transmission Unit (MTU) -- REVIEW -- 1 1 QUESTIONS -- 1 1 ANSWERS -- Objective 12 Explain the characteristics of network topologies -- and network types -- Bus -- Ring -- Hybrid -- Star/Hub-and-Spoke -- Mesh -- 00-FMindd 11 22/04/22 11:12 AM -- xii Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Network Types and Characteristics -- Client-Server -- Peer-to-Peer -- Local Area Network (LAN) -- Wide Area Network (WAN) -- Metropolitan Area Network (MAN) -- Wireless Local Area Network (WLAN) -- Personal Area Network (PAN) -- Campus Area Network (CAN) -- Storage Area Network (SAN) -- Multiprotocol Label Switching (MPLS) -- Software-Defined Wide Area Network (SDWAN) -- Multipoint Generic Routing Encapsulation (mGRE) -- Service-Related Entry Point -- Demarcation Point -- Smartjack -- Virtual Network Concepts -- Hypervisor -- Virtual Network Interface Card (vNIC) -- vSwitch -- Network Function Virtualization -- Provider Links -- Satellite -- Digital Subscriber Line (DSL) -- Cable -- Leased Line -- Metro-Optical -- REVIEW -- 12 QUESTIONS -- 12 ANSWERS -- Objective 13 Summarize the types of cables and connectors -- and explain which is the appropriate type for a solution -- Copper -- Twisted Pair -- Coaxial/RG-6 -- Twinaxial -- Termination Standards -- Fiber -- Single-mode -- Multimode -- 00-FMindd 12 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Connector Types -- Local Connector (LC), Straight Tip (ST), Subscriber Connector (SC), -- Mechanical Transfer (MT), Registered Jack (RJ) -- RJ11, RJ45, F-type Connector -- Transceivers/Media Converters -- Transceiver type -- Cable Management -- Patch Panel/Patch Bay -- Fiber Distribution Panel -- Punchdown Block -- Ethernet Standards -- Copper -- Fiber -- REVIEW -- 13 QUESTIONS -- 13 ANSWERS -- Objective 14 Given a scenario, configure a subnet and use -- appropriate IP addressing schemes -- Public vs Private -- RFC 1918 -- Network Address Translation (NAT) -- Port Address Translation (PAT) -- IPv4 vs IPv6 -- Automatic Private IP Addressing (APIPA), Link-Local -- Extended Unique Identifier (EUI-64) -- Broadcast -- Multicast -- Unicast -- Anycast -- Loopback -- Default Gateway -- IPv4 Subnetting -- Classful -- Classless (Variable-Length Subnet Mask) -- Classless Inter-Domain Routing (CIDR) Notation -- IPv6 Concepts -- Tunneling -- Dual Stack -- Shorthand Notation -- Router Advertisement, Stateless Address Autoconfiguration (SLAAC) -- 00-FMindd 13 22/04/22 11:12 AM -- xiv Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Virtual IP (VIP) -- Subinterfaces -- REVIEW -- 14 QUESTIONS -- 14 ANSWERS -- Objective 15 Explain common ports and protocols, their application, -- and encrypted alternatives -- Protocols and Ports -- Types of Ports -- Port States -- Commonly Used Ports -- IP Protocol Types -- TCP and UDP -- Internet Control Message Protocol (ICMP) -- Generic Routing Encapsulation (GRE) -- Internet Protocol Security (IPsec) -- Connectionless vs Connection-Oriented -- REVIEW -- 15 QUESTIONS -- 15 ANSWERS -- Objective 16 Explain the use and purpose of network services -- DHCP -- Scope, Scope Options -- Lease Time, Available Leases -- Dynamic Assignment -- Static Assignment -- Exclusion Ranges -- Reservation -- DHCP Relay, IP Helper/UDP Forwarding -- DNS -- Zone Transfers -- Global Hierarchy -- Time to Live (TTL), DNS Caching -- Recursive Lookup/Iterative Lookup -- Record Types -- Reverse DNS/Reverse Lookup/Forward Lookup -- Internal vs External DNS -- NTP -- Stratum, Clients, Servers -- REVIEW -- 16 QUESTIONS -- 16 ANSWERS -- 00-FMindd 14 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Objective 17 Explain basic corporate and datacenter network -- architecture -- Three-Tiered -- Access/Edge -- Distribution/Aggregation Layer -- Core -- Software-Defined Networking -- Control Layer, Infrastructure Layer -- Management Plane, Application Layer -- Spine and Leaf -- Software-Defined Network -- Top-of-Rack Switching -- Backbone -- Traffic Flows -- North-South -- East-West -- Branch Office vs On-Premises Datacenter vs Colocation -- Storage Area Networks -- Connection Types -- REVIEW -- 17 QUESTIONS -- 17 ANSWERS…”
Libro electrónico -
62Publicado 2018Tabla de Contenidos: “…Group management -- Login management -- Summary -- Questions -- Further reading -- Chapter 4: Managing Azure -- Technical requirements -- Storage services -- Storage accounts -- Managed disks -- Azure Files -- Blob storage -- Networking -- Virtual network -- Subnets -- Network Security Group -- Public IP address and network interface -- Components for your virtual machine -- Azure profile -- Resource group -- Storage account -- Virtual network -- NSG -- Public IP address and network interface -- Summary -- Questions -- Further reading -- Chapter 5: Advanced Linux Administration -- Technical requirements -- Software management -- The RPM software manager -- The DPKG software manager -- Software management with YUM -- Software management with Zypp -- Software management with apt -- Networking -- Identifying the network interfaces -- Identifying the IP address -- Showing the route table -- Network configuration -- Changes in the network configuration -- Hostname -- DNS -- Storage -- Storage provided by block devices -- Adding a data disk -- Partitioning -- Filesystems in Linux -- Ext4 filesystem -- XFS filesystem -- ZFS filesystem -- BTRFS filesystem -- Swap filesystem -- Linux software RAID -- Systemd -- Working with units -- Services -- Targets -- Scheduled tasks -- Mounting local filesystems -- Mounting remote filesystems -- Summary -- Questions -- Further reading -- Chapter 6: Managing Linux Security and Identities -- Linux security tips -- Technical requirements -- Linux firewall -- Firewalld zones -- Firewalld services -- Firewalld network sources -- Linux Security Modules -- SELinux -- SELinux configuration -- SELinux context on ports -- SELinux context on files -- SELinux Boolean -- AppArmor -- AppArmor status -- Generating AppArmor profiles -- Systemd security -- Restricting access to the filesystem -- Restricting network access…”
Libro electrónico -
63Publicado 2023Tabla de Contenidos: “…-- Deciding what to back up -- Backing up SW, rsync, and recovery -- Summary -- Chapter 11: Network Fundamentals, File Sharing, and SSH -- Network basics -- IPv4 address -- IPv6 address -- Hostname -- DNS and WWW -- Local network configuration basics -- Pinging a computer in our local network -- Router -- Static and dynamic IPs -- Local and public IP -- Scanning the network -- Subnet mask of a network -- Short network sharing introduction -- A bit of NFS history and characteristics -- Enabling time synchronization for NFS -- Sharing on the server side -- Essential commands for NFS status -- Getting access to a shared directory on the client side -- Synchronization on the client side -- Mounting permanently on the client side based on a static IP -- Automating all the commands -- Accessing NFS shared data by server name -- Accessing data via an encrypted connection -- Windows clients -- macOS clients -- Sharing via Samba Server -- Sharing directories by ourselves via Terminal and all configurations -- Secure Shell (SSH) and working remotely -- Enabling SSH on the server side -- Connecting from another Linux machine locally -- Connecting remotely from the internet -- Connecting remotely from the internet through a VPN -- Connecting from a Windows machine -- Sharing via SSHFS -- Summary -- Chapter 12: Internet, Network Security, Firewalls, and VPNs -- How the internet works, network protocols, and ports -- TCP/IP and OSI network models -- All types of network protocols and the ports for them -- UDP versus TCP and others -- A few other essential protocols -- The Linux basic network modules and a port-scan tool -- Attacks, security advice, and firewalls -- When is a Linux distribution in danger? …”
Libro electrónico -
64Publicado 2020Tabla de Contenidos: “…-- SPOOFING -- ATAQUES MAN IN THE MIDDLE -- ¿CÓMO PODEMOS PROTEGERNOS? …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
65
-
66por Cohen, D. S.Tabla de Contenidos: “…No Scheduling; Who Owns the Schedules?; Man-Month Schedule; Milestones: How They Affect Everything; Scrum, Waterfall, Agile, and Cowboy Coding; Elements of a Schedule; Troubleshooting; Other Teams' Needs and Schedules; Hardware; DLC, Expansion Packs, and Sequels; Marketing, PR, and Sales Needs; Screenshots and PR/Marketing Materials; Holidays and Vacation…”
Publicado 2009
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
67por Boyraz, GuvenTabla de Contenidos: “…-- Key advantages of DNS firewalls -- Domain categorization -- Domains without an IP address -- DNS tunneling -- Important elements of detection techniques -- Summary -- Chapter 8: The Road Ahead of Endpoint Security -- Summary of this book -- The future of endpoint security -- Index -- Other Books You May Enjoy…”
Publicado 2024
Libro electrónico -
68Publicado 2017“…Participants must understand basic internet terms (e.g., IP addresses), the command line, and the package manager for their Linux distribution of choice. …”
Video -
69Publicado 2020Tabla de Contenidos: “…PROTOCOLOS TCP/IP -- 13.10.3. CARACTERÍSTICAS DE TCP/IP -- 13.11. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
70
-
71
-
72Publicado 2014Tabla de Contenidos:Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico
-
73por Coar, Ken A. L.Tabla de Contenidos: “…Table of Contents; Preface; What's in This Book; Platform Notes; Other Books; Other Sources; How This Book Is Organized; Conventions Used in This Book; Programming Conventions; Typesetting Conventions; Documentation Conventions; The online manual ("man") pages on a Unixish system; The Apache Web server documentation; Using Code Examples; We'd Like to Hear from You; Safari® Enabled; Acknowledgments; Ken Coar; Rich Bowen; Chapter 1. …”
Publicado 2008
Libro electrónico -
74Publicado 2012Tabla de Contenidos: “…HyperText Transfer Protocol and HyperText Transfer Protocol Secure -- Domain Name System -- Network File System -- File Transfer Protocols -- Tunneling Protocols -- Routing Protocols -- Telnet -- Secure Shell -- Internet Protocol Security -- Secure Sockets Layer and Transport Layer Security -- E-mail Protocols -- Network News Transfer Protocol -- Electronic Data Interchange -- Mapping Well-Known Ports to Protocols -- Comparing Internetwork Architectures -- Comparing Public and Private IP Addresses -- Using NAT -- Exploring Wireless Technologies -- Comparing WEP, WPA, and WPA2 -- Wireless Device Administrator Password -- Wireless Service Set Identifier -- MAC Filtering -- Bluetooth -- Radio-Frequency Identification -- GSM -- 3G -- WiMAX -- NFC -- Protecting Mobile Devices -- Questions -- Answers -- Chapter 4 Advanced Networking and Communications -- Understanding Telecommunications -- Internet Connections -- VoIP -- Securing Phones -- Understanding Firewalls -- Packet Filtering Firewall -- Stateful Inspection Firewall -- Application Firewall -- Defense Diversity -- Comparing Network-based and Host-based Firewalls -- Using Proxy Servers -- Exploring Remote Access Solutions -- Risks and Vulnerabilities -- Tunneling Protocols -- Authentication -- Access and Admission Control -- Questions -- Answers -- Chapter 5 Attacks -- Comparing Attackers -- Hackers and Crackers -- Insiders -- Script Kiddies -- Phreaks -- Exploring Attack Types -- DoS -- DDoS -- Botnets and Zombies -- Spam -- Sniffing Attack -- Ping Sweep -- Port Scan -- Salami -- Man-in-the-Middle -- Session Hijacking -- Replay -- Buffer Overflow Attacks -- Scareware and Ransomware -- Password Attacks -- Covert Channel -- Cramming -- Zero Day Exploits -- Advanced Persistent Threat -- Understanding Social Engineering -- Piggybacking -- Impersonation -- Dumpster Diving -- Shoulder Surfing -- Phishing…”
Libro electrónico -
75Publicado 2012Tabla de Contenidos: “…IPS -- Where on the Network Will the IDS System Be Placed? …”
Libro electrónico -
76Publicado 2004“…The book explains the differences among various MAN technologies, getting you up to speed on the solutions you need to use. …”
Libro electrónico -
77Publicado 2012Tabla de Contenidos: “…Using the Cut, Copy, and Paste -- Copying Cells Using Fill Handle -- Dragging Cells -- Math and Trig Functions -- Logical Functions -- Statistical Functions -- Text Functions -- Date and Time Functions -- Page Tab -- Margins Tab -- Header/Footer Tab -- Sheet Tab -- Multiple-choice Questions -- Answers -- Chapter 12: Microsoft Office Power Point 2003 -- Using the Auto Content Wizard -- Using Design Template -- Using Blank Presentation -- Normal View -- Slide Sorter View -- Slide Show View -- Slide Master -- Notes Master -- Handout Master -- Adding Text Using Placeholder -- Adding Text Using Text Box -- Adding Text to an Auto Shape -- Custom Animations -- Multiple-choice Questions -- Answers -- Chapter 13: Data Communication and Computer Networks -- Analog Signal -- Digital Signals -- Guided or Wired Media -- Unguided or Wireless Media -- Amplitude Modulation (AM) -- Frequency Modulation (FM) -- Phase Modulation (PM) -- Asynchronous Transmission -- Synchronous Transmission -- Circuit Switching -- Packet Switching -- Message Switching -- LAN -- MAN -- WAN -- Bus Topology -- Ring Topology -- Star Topology -- Tree Topology -- Mesh Topology -- Multiple-choice Questions -- Answers -- Chapter 14: Internet -- TCP/IP -- FTP -- HTTP -- SMTP -- NNTP -- Electronic Mail -- FTP -- Telnet -- Internet Relay Chat (IRC) -- Chatting and Instant Messaging -- Internet Telephony -- Video Conferencing -- Commerce Through Internet -- Mailing Lists (Listserver) -- Creating an E-mail Account -- Multiple-choice Questions -- Answers -- Chapter 15: Computer Security -- Secret-key Cryptography -- Public-key Cryptography -- Hash Functions -- Packet-filtering Router -- Application-level Gateway -- Circuit-level Gateway -- Multiple-choice Questions -- Answers -- Chapter 16: Database Management Systems -- Data -- Information -- Knowledge -- Entity -- Attribute -- Relationship…”
Libro electrónico -
78Publicado 2005“…You don't have time for endless newsgroup searches, confusing man pages, emails to the developers... it's an emergency! …”
Libro electrónico -
79Publicado 2019“…For Hematological diseases, Ghia reviews how studies of B cell development help the understanding of Leukemia development, Kim and Schaniel review how iPS technology helps the understanding of hematological diseases and Hellmann et al. describe development of new therapeutic antibody drug conjugates. …”
Libro electrónico -
80Publicado 2018Tabla de Contenidos: “…-- HA in OpenShift -- Virtual IPs -- IP failover -- OpenShift infrastructure nodes -- OpenShift masters -- OpenShift etcd -- OpenShift nodes -- External storage for OpenShift persistent data -- OpenShift backup and restore -- Etcd key-value store backup -- OpenShift masters -- OpenShift nodes -- Persistent storage -- Summary -- Questions -- Further reading -- Chapter 19: OpenShift HA Design for Single and Multiple DCs -- OpenShift single-DC HA design -- OpenShift infrastructure nodes -- OpenShift masters -- OpenShift nodes -- Etcd key-value store -- Persistent storage -- Physical placement consideration -- Design considerations…”
Libro electrónico