top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Microsoft Windows Security : Essentials / / Darril Gibson
Microsoft Windows Security : Essentials / / Darril Gibson
Autore Gibson Darril
Edizione [1st ed.]
Pubbl/distr/stampa Hoboken, : Wiley, 2011
Descrizione fisica 1 online resource (374 p.)
Disciplina 005.8
621.3916076
Collana Sybex serious skills
Essentials (Indianapolis, Ind.)
Soggetto topico Electronic data processing personnel - Certification
Computer networks - Examinations
Computer networks -- Examinations -- Study guides
Computer security - Examinations
ISBN 1-283-17725-0
9786613177254
1-118-11454-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Microsoft Windows Security Essentials; Introduction; Who Should Read This Book; What You Will Learn; Prerequisites; What You Need; What Is Covered in This Book; Chapter 1: Understanding Core Security Principles; Understanding Risk; Exploring the Security Triad; Protecting Against Loss of Confidentiality; Protecting Against Loss of Availability; Protecting Against Loss of Integrity; Implementing a Defense-in-Depth Security Strategy; Enforcing the Principle of Least Privilege; Hardening a Server; Reducing the Attack Surface; Keeping a System Updated; Enabling the Firewall
Installing Antivirus Software Chapter 2: Understanding Malware and Social Engineering; Comparing Malware; Viruses; Worms; Trojan Horses; Buffer-Overflow Attacks; Spyware; Understanding the Threat; Protecting Against Malware; Using Antivirus Software; Using Microsoft Security Essentials on Desktops; Thwarting Social-Engineering Attacks; Social Engineering in Person; Social Engineering with a Phone Call; Recognizing Phishing Attempts; Recognizing Pharming; Protecting Email; Chapter 3: Understanding User Authentication; Comparing the Three Factors of Authentication
Using Passwords for Authentication Comparing Password Attack Methods; Creating Strong Passwords; Enforcing Strong Passwords; Exploring Account Lockout Policies; Unlocking an Account; Resetting a Password; Changing a Password; Creating a Password-Reset Disk; Using Smart Cards and Token Devices for Authentication; Using Biometrics for Authentication; Starting Applications with Run As Administrator; Preventing Time Skew with Kerberos; Identifying RADIUS Capabilities; Identifying Unsecure Authentication Protocols; LM; NTLM (NTLMv1); Chapter 4: Securing Access with Permissions
Comparing NTFS Permissions Identifying Basic NTFS Permissions; Identifying Advanced NTFS Permissions; Combining Permissions; Enabling and Disabling Permission Inheritance; Moving and Copying Files; Comparing NTFS and FAT; Exploring Share Permissions; Identifying Share Permissions; Combining NTFS and Share Permissions; Identifying Active Directory Permissions; Viewing Active Directory Users and Computers; Comparing NTFS and Active Directory Permissions; Viewing Active Directory Permissions; Assigning Registry Permissions; Chapter 5: Using Audit Policies and Network Auditing
Exploring Audit Policies Exploring Object Access Auditing; Comparing Account Logon and Logon Events; Exploring Directory Service Access Auditing; Understanding Account Management Auditing; Understanding System Events Auditing; Understanding Privilege Use Auditing; Understanding Policy Change Auditing; Understanding Process Tracking; Enabling Auditing; Enabling Object Access Auditing; Enabling Directory Service Access Auditing; Viewing Audit Information; Managing Security Logs; Saving Audit Information; Securing Audit Information; Auditing a Network with MBSA; Installing MBSA; Running MBSA
Chapter 6: Protecting Clients and Servers
Record Nr. UNINA-9910810340503321
Gibson Darril  
Hoboken, : Wiley, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network+ study guide & practice exams [[electronic resource] ] : Exam N10-003 / / Robert J. Shimonski, Michael Cross, Laura Hunter
Network+ study guide & practice exams [[electronic resource] ] : Exam N10-003 / / Robert J. Shimonski, Michael Cross, Laura Hunter
Autore Shimonski Robert
Edizione [1st edition]
Pubbl/distr/stampa Rockland, Mass., : Syngress Publishing, c2005
Descrizione fisica 1 online resource (969 p.)
Disciplina 004.6/076
Soggetto topico Computer networks - Examinations
Electronic data processing personnel - Certification
Microsoft software - Examinations
Soggetto genere / forma Electronic books.
ISBN 1-281-03582-3
9786611035822
0-08-048944-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Exam Objective Map; Contents; Introduction; Media and Topologies; Network Fundamentals; Network Media; Network Devices; Wireless Technologies; Protocols and Standards; OSI Model; Network Protocols; WAN and Security Standards and Services; Network Operating Systems; Network Implementation; Network Infrastructure and Security; Fault Management and Disaster Recovery; Network Support; Network Troubleshooting Tools; Network Troubleshooting Methodology; Self Test Appendix; Index; Related Titles
Record Nr. UNINA-9910455665303321
Shimonski Robert  
Rockland, Mass., : Syngress Publishing, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network+ study guide & practice exams [[electronic resource] ] : Exam N10-003 / / Robert J. Shimonski, Michael Cross, Laura Hunter
Network+ study guide & practice exams [[electronic resource] ] : Exam N10-003 / / Robert J. Shimonski, Michael Cross, Laura Hunter
Autore Shimonski Robert
Edizione [1st edition]
Pubbl/distr/stampa Rockland, Mass., : Syngress Publishing, c2005
Descrizione fisica 1 online resource (969 p.)
Disciplina 004.6/076
Soggetto topico Computer networks - Examinations
Electronic data processing personnel - Certification
Microsoft software - Examinations
ISBN 1-281-03582-3
9786611035822
0-08-048944-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Exam Objective Map; Contents; Introduction; Media and Topologies; Network Fundamentals; Network Media; Network Devices; Wireless Technologies; Protocols and Standards; OSI Model; Network Protocols; WAN and Security Standards and Services; Network Operating Systems; Network Implementation; Network Infrastructure and Security; Fault Management and Disaster Recovery; Network Support; Network Troubleshooting Tools; Network Troubleshooting Methodology; Self Test Appendix; Index; Related Titles
Record Nr. UNINA-9910780014603321
Shimonski Robert  
Rockland, Mass., : Syngress Publishing, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network+ study guide & practice exams : Exam N10-003 / / Robert J. Shimonski, Michael Cross, Laura Hunter
Network+ study guide & practice exams : Exam N10-003 / / Robert J. Shimonski, Michael Cross, Laura Hunter
Autore Shimonski Robert
Edizione [1st edition]
Pubbl/distr/stampa Rockland, Mass., : Syngress Publishing, c2005
Descrizione fisica 1 online resource (969 p.)
Disciplina 004.6/076
Soggetto topico Computer networks - Examinations
Electronic data processing personnel - Certification
Microsoft software - Examinations
ISBN 1-281-03582-3
9786611035822
0-08-048944-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Exam Objective Map; Contents; Introduction; Media and Topologies; Network Fundamentals; Network Media; Network Devices; Wireless Technologies; Protocols and Standards; OSI Model; Network Protocols; WAN and Security Standards and Services; Network Operating Systems; Network Implementation; Network Infrastructure and Security; Fault Management and Disaster Recovery; Network Support; Network Troubleshooting Tools; Network Troubleshooting Methodology; Self Test Appendix; Index; Related Titles
Altri titoli varianti Network+ Exam N10-003
Record Nr. UNINA-9910825663903321
Shimonski Robert  
Rockland, Mass., : Syngress Publishing, c2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Todd Lammle's CCNA IOS commands survival guide [[electronic resource] /] / Todd Lammle
Todd Lammle's CCNA IOS commands survival guide [[electronic resource] /] / Todd Lammle
Autore Lammle Todd
Pubbl/distr/stampa Hoboken, NJ, : Wiley Technology Pub., 2008
Descrizione fisica 1 online resource (314 p.)
Disciplina 004.6076
Soggetto topico Computer networks - Examinations
Telecommunications engineers - Certification
Soggetto genere / forma Electronic books.
ISBN 1-281-22235-6
9786611222352
0-470-27293-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Todd Lammle's CCNA IOS Command Survival Guide; Acknowledgments; About the Author; Contents at a Glance; Contents; Introduction; Chapter 1: Basic IOS Commands; Booting the Router; Configuring a Router; Using the show Command; Chapter 2: Managing a Cisco Internetwork; Understanding the Internal Components of a Cisco Router; Managing the Configuration Register; Backing Up and Restoring the Cisco IOS; Backing Up and Restoring the Cisco Configuration; Using Cisco Discovery Protocol (CDP); Using Telnet; Resolving Hostnames; Checking Network Connectivity and Troubleshooting
Using the sh processes CommandChapter 3: IP Routing; Routing Basics; Routing Protocol Basics; Routing Information Protocol (RIP); Chapter 4: Enhanced IGRP (EIGRP) and Open Shortest Path First (OSPF); Understanding EIGRP Basics; Understanding Open Shortest Path First (OSPF) Basics; Configuring OSPF; Verifying OSPF Configuration; Chapter 5: Layer-2 Switching and Spanning-Tree Protocol (STP); Switching Services; Chapter 6: Virtual LANs (VLANs); Understanding VLAN Basics; Configuring VLANs; Configuring VTP; Telephony: Configuring Voice VLANs; Chapter 7: Security
Perimeter Routers, Firewalls, and Internal RoutersIntroduction to Access Lists; Standard Access Lists; Extended Access Lists; Monitoring Access Lists; Chapter 8: Network Address Translation (NAT); When Do We Use NAT?; Types of Network Address Translation; NAT Names; Configuring NAT Using SDM; Chapter 9: Cisco's Wireless Technologies; Introducing Wireless Technology; Configuring Cisco Wireless Using the IOS; Configuring Cisco Wireless Using the SDM/HTTP; Chapter 10: Internet Protocol Version 6 (IPv6); Why Do We Need IPv6?; IPv6 Addressing and Expressions; IPv6 Routing Protocols
Migrating to IPv6Verifying RIPng; Verifying OSPFv3; Chapter 11: Wide Area Networks (WANs); Introduction to Wide Area Networks; High-Level Data-Link Control (HDLC) Protocol; Point-to-Point Protocol (PPP); Introduction to Frame Relay Technology; Chapter 12: Cisco's Security Device Manager (SDM); Configuring Your Router to Be Set Up Through the SDM; Using the SDM to Manage the Flash Memory; Using the SDM to Back Up, Restore, and Edit the Router's Configuration; Configuring LAN and WAN Interfaces and Verifying a Router Using SDM; Configuring RIP on a Router with SDM; Configuring OSPF with the SDM
Index
Record Nr. UNINA-9910451527603321
Lammle Todd  
Hoboken, NJ, : Wiley Technology Pub., 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Todd Lammle's CCNA IOS commands survival guide [[electronic resource] /] / Todd Lammle
Todd Lammle's CCNA IOS commands survival guide [[electronic resource] /] / Todd Lammle
Autore Lammle Todd
Pubbl/distr/stampa Hoboken, NJ, : Wiley Technology Pub., 2008
Descrizione fisica 1 online resource (314 p.)
Disciplina 004.6076
Soggetto topico Computer networks - Examinations
Telecommunications engineers - Certification
ISBN 1-281-22235-6
9786611222352
0-470-27293-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Todd Lammle's CCNA IOS Command Survival Guide; Acknowledgments; About the Author; Contents at a Glance; Contents; Introduction; Chapter 1: Basic IOS Commands; Booting the Router; Configuring a Router; Using the show Command; Chapter 2: Managing a Cisco Internetwork; Understanding the Internal Components of a Cisco Router; Managing the Configuration Register; Backing Up and Restoring the Cisco IOS; Backing Up and Restoring the Cisco Configuration; Using Cisco Discovery Protocol (CDP); Using Telnet; Resolving Hostnames; Checking Network Connectivity and Troubleshooting
Using the sh processes CommandChapter 3: IP Routing; Routing Basics; Routing Protocol Basics; Routing Information Protocol (RIP); Chapter 4: Enhanced IGRP (EIGRP) and Open Shortest Path First (OSPF); Understanding EIGRP Basics; Understanding Open Shortest Path First (OSPF) Basics; Configuring OSPF; Verifying OSPF Configuration; Chapter 5: Layer-2 Switching and Spanning-Tree Protocol (STP); Switching Services; Chapter 6: Virtual LANs (VLANs); Understanding VLAN Basics; Configuring VLANs; Configuring VTP; Telephony: Configuring Voice VLANs; Chapter 7: Security
Perimeter Routers, Firewalls, and Internal RoutersIntroduction to Access Lists; Standard Access Lists; Extended Access Lists; Monitoring Access Lists; Chapter 8: Network Address Translation (NAT); When Do We Use NAT?; Types of Network Address Translation; NAT Names; Configuring NAT Using SDM; Chapter 9: Cisco's Wireless Technologies; Introducing Wireless Technology; Configuring Cisco Wireless Using the IOS; Configuring Cisco Wireless Using the SDM/HTTP; Chapter 10: Internet Protocol Version 6 (IPv6); Why Do We Need IPv6?; IPv6 Addressing and Expressions; IPv6 Routing Protocols
Migrating to IPv6Verifying RIPng; Verifying OSPFv3; Chapter 11: Wide Area Networks (WANs); Introduction to Wide Area Networks; High-Level Data-Link Control (HDLC) Protocol; Point-to-Point Protocol (PPP); Introduction to Frame Relay Technology; Chapter 12: Cisco's Security Device Manager (SDM); Configuring Your Router to Be Set Up Through the SDM; Using the SDM to Manage the Flash Memory; Using the SDM to Back Up, Restore, and Edit the Router's Configuration; Configuring LAN and WAN Interfaces and Verifying a Router Using SDM; Configuring RIP on a Router with SDM; Configuring OSPF with the SDM
Index
Record Nr. UNINA-9910777030203321
Lammle Todd  
Hoboken, NJ, : Wiley Technology Pub., 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Todd Lammle's CCNA IOS commands survival guide / / Todd Lammle
Todd Lammle's CCNA IOS commands survival guide / / Todd Lammle
Autore Lammle Todd
Edizione [1st ed.]
Pubbl/distr/stampa Hoboken, NJ, : Wiley Technology Pub., 2008
Descrizione fisica 1 online resource (314 p.)
Disciplina 004.6076
Soggetto topico Computer networks - Examinations
Telecommunications engineers - Certification
ISBN 1-281-22235-6
9786611222352
0-470-27293-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Todd Lammle's CCNA IOS Command Survival Guide; Acknowledgments; About the Author; Contents at a Glance; Contents; Introduction; Chapter 1: Basic IOS Commands; Booting the Router; Configuring a Router; Using the show Command; Chapter 2: Managing a Cisco Internetwork; Understanding the Internal Components of a Cisco Router; Managing the Configuration Register; Backing Up and Restoring the Cisco IOS; Backing Up and Restoring the Cisco Configuration; Using Cisco Discovery Protocol (CDP); Using Telnet; Resolving Hostnames; Checking Network Connectivity and Troubleshooting
Using the sh processes CommandChapter 3: IP Routing; Routing Basics; Routing Protocol Basics; Routing Information Protocol (RIP); Chapter 4: Enhanced IGRP (EIGRP) and Open Shortest Path First (OSPF); Understanding EIGRP Basics; Understanding Open Shortest Path First (OSPF) Basics; Configuring OSPF; Verifying OSPF Configuration; Chapter 5: Layer-2 Switching and Spanning-Tree Protocol (STP); Switching Services; Chapter 6: Virtual LANs (VLANs); Understanding VLAN Basics; Configuring VLANs; Configuring VTP; Telephony: Configuring Voice VLANs; Chapter 7: Security
Perimeter Routers, Firewalls, and Internal RoutersIntroduction to Access Lists; Standard Access Lists; Extended Access Lists; Monitoring Access Lists; Chapter 8: Network Address Translation (NAT); When Do We Use NAT?; Types of Network Address Translation; NAT Names; Configuring NAT Using SDM; Chapter 9: Cisco's Wireless Technologies; Introducing Wireless Technology; Configuring Cisco Wireless Using the IOS; Configuring Cisco Wireless Using the SDM/HTTP; Chapter 10: Internet Protocol Version 6 (IPv6); Why Do We Need IPv6?; IPv6 Addressing and Expressions; IPv6 Routing Protocols
Migrating to IPv6Verifying RIPng; Verifying OSPFv3; Chapter 11: Wide Area Networks (WANs); Introduction to Wide Area Networks; High-Level Data-Link Control (HDLC) Protocol; Point-to-Point Protocol (PPP); Introduction to Frame Relay Technology; Chapter 12: Cisco's Security Device Manager (SDM); Configuring Your Router to Be Set Up Through the SDM; Using the SDM to Manage the Flash Memory; Using the SDM to Back Up, Restore, and Edit the Router's Configuration; Configuring LAN and WAN Interfaces and Verifying a Router Using SDM; Configuring RIP on a Router with SDM; Configuring OSPF with the SDM
Index
Altri titoli varianti Todd Lammle's CCNA Cisco Internetwork Operating System commands survival guide
Record Nr. UNINA-9910807005103321
Lammle Todd  
Hoboken, NJ, : Wiley Technology Pub., 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui