top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Firewall policies and VPN configurations [[electronic resource] /] / Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell
Firewall policies and VPN configurations [[electronic resource] /] / Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress, c2006
Descrizione fisica 1 online resource (513 p.)
Disciplina 005.8
Altri autori (Persone) CantrellChris
HenmiAnne
LucasMark
SinghAbhishek
Soggetto topico Computer networks - Security measures
Firewalls (Computer security)
Soggetto genere / forma Electronic books.
ISBN 1-281-07834-4
9786611078348
0-08-050651-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Firewall Policies and VPN Configurations; Copyright Page; Contents; Part I: Security Policy; Chapter 1. Network Security Policy; Introduction; Defining Your Organization; Different Access for Different Organizations; Untrusted Networks; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Using Your Policies to Create Firewall and VPN Configurations; Introduction; What Is a Logical Security Configuration?; Planning Your Logical Security Configuration; Writing Logical Security Configurations; Summary; Solutions Fast Track; Frequently Asked Questions
Part II: Firewall ConceptsChapter 3. Defining a Firewall; Introduction; Why Have Different Types of Firewalls?; Back to Basics-Transmission Control Protocol/Internet Protocol; Firewall Types; Application Proxy; Gateway; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Deciding on a Firewall; Introduction; Appliance/Hardware Solution; Software Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Part III: VPN Concepts; Chapter 5. Defining a VPN; Introduction; What Is a VPN?; Public Key Cryptography; IPSec; SSL VPNs; Layer 2 Solutions; SSH Tunnels; Others
SummarySolutions Fast Track; Frequently Asked Questions; Chapter 6. Deciding on a VPN; Introduction; Appliance/Hardware Solution; Software Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Part IV: Implementing Firewalls and VPNs (Case Studies); Chapter 7. IT Infrastructure Security Plan; Introduction; Infrastructure Security Assessment; Project Parameters; Project Team; Project Organization; Project Work Breakdown Structure; Project Risks and Mitigation Strategies; Project Constraints and Assumptions; Project Schedule and Budget; IT Infrastructure Security Project Outline
SummarySolutions Fast Track; Chapter 8. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Medium Business (<2000 People); Introduction; Mapping Your Systems; Improving Accountability with Identity Management; VPN Connectivity; Summary; Solutions Fast Track; Frequently Asked Questions; Index
Record Nr. UNINA-9910451065903321
Rockland, MA, : Syngress, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Firewall policies and VPN configurations [[electronic resource] /] / Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell
Firewall policies and VPN configurations [[electronic resource] /] / Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell
Edizione [1st edition]
Pubbl/distr/stampa Rockland, MA, : Syngress, c2006
Descrizione fisica 1 online resource (513 p.)
Disciplina 005.8
Altri autori (Persone) CantrellChris
HenmiAnne
LucasMark
SinghAbhishek
Soggetto topico Computer networks - Security measures
Firewalls (Computer security)
ISBN 1-281-07834-4
9786611078348
0-08-050651-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Firewall Policies and VPN Configurations; Copyright Page; Contents; Part I: Security Policy; Chapter 1. Network Security Policy; Introduction; Defining Your Organization; Different Access for Different Organizations; Untrusted Networks; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Using Your Policies to Create Firewall and VPN Configurations; Introduction; What Is a Logical Security Configuration?; Planning Your Logical Security Configuration; Writing Logical Security Configurations; Summary; Solutions Fast Track; Frequently Asked Questions
Part II: Firewall ConceptsChapter 3. Defining a Firewall; Introduction; Why Have Different Types of Firewalls?; Back to Basics-Transmission Control Protocol/Internet Protocol; Firewall Types; Application Proxy; Gateway; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Deciding on a Firewall; Introduction; Appliance/Hardware Solution; Software Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Part III: VPN Concepts; Chapter 5. Defining a VPN; Introduction; What Is a VPN?; Public Key Cryptography; IPSec; SSL VPNs; Layer 2 Solutions; SSH Tunnels; Others
SummarySolutions Fast Track; Frequently Asked Questions; Chapter 6. Deciding on a VPN; Introduction; Appliance/Hardware Solution; Software Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Part IV: Implementing Firewalls and VPNs (Case Studies); Chapter 7. IT Infrastructure Security Plan; Introduction; Infrastructure Security Assessment; Project Parameters; Project Team; Project Organization; Project Work Breakdown Structure; Project Risks and Mitigation Strategies; Project Constraints and Assumptions; Project Schedule and Budget; IT Infrastructure Security Project Outline
SummarySolutions Fast Track; Chapter 8. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Medium Business (<2000 People); Introduction; Mapping Your Systems; Improving Accountability with Identity Management; VPN Connectivity; Summary; Solutions Fast Track; Frequently Asked Questions; Index
Record Nr. UNINA-9910784058303321
Rockland, MA, : Syngress, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Machine Learning Using R : With Time Series and Industry-Based Use Cases in R / / by Karthik Ramasubramanian, Abhishek Singh
Machine Learning Using R : With Time Series and Industry-Based Use Cases in R / / by Karthik Ramasubramanian, Abhishek Singh
Autore Ramasubramanian Karthik
Edizione [2nd ed. 2019.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019
Descrizione fisica 1 online resource (712 pages)
Disciplina 006.31
Soggetto topico Artificial intelligence
Open source software
Computer programming
Programming languages (Electronic computers)
R (Computer program language)
Artificial Intelligence
Open Source
Programming Languages, Compilers, Interpreters
ISBN 9781523150403
1523150408
9781484242155
1484242157
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Introduction to Machine Learning -- Chapter 2: Data Exploration and Preparation -- Chapter 3: Sampling and Resampling Techniques -- Chapter 4: Visualization of Data -- Chapter 5: Feature Engineering -- Chapter 6: Machine Learning Models: Theory and Practice -- Chapter 7: Machine Learning Model Evaluation -- Chapter 8: Model Performance Improvement -- Chapter 9: Time Series Modelling -- Chapter 10: Scalable Machine Learning and related technology -- Chapter 11: Introduction to Deep Learning Models using Keras and TensorFlow.
Record Nr. UNINA-9910338013903321
Ramasubramanian Karthik  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Machine Learning Using R / / by Karthik Ramasubramanian, Abhishek Singh
Machine Learning Using R / / by Karthik Ramasubramanian, Abhishek Singh
Autore Ramasubramanian Karthik
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2017
Descrizione fisica 1 online resource (XXIII, 566 p. 209 illus., 155 illus. in color.)
Disciplina 006
Soggetto topico Artificial intelligence
Computer programming
Programming languages (Electronic computers)
Database management
R (Computer language program)
Artificial Intelligence
Programming Techniques
Programming Languages, Compilers, Interpreters
Database Management
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Introduction to Machine Learning and R -- Chapter 2: Data Preparation and Exploration -- Chapter 3: Sampling and Resampling Techniques -- Chapter 4: Visualization of Data -- Chapter 5: Feature Engineering -- Chapter 6: Machine Learning Models: Theory and Practice -- Chapter 7: Machine Learning Model Evaluation.-Chapter 8: Model Performance Improvement -- Chapter 9: Scalable Machine Learning and related technology.-.
Altri titoli varianti Comprehensive guide to machine learning
Record Nr. UNINA-9910156188103321
Ramasubramanian Karthik  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Models and techniques in stroke biology / / Amit Kumar Tripathi, Abhishek Kumar Singh, editors
Models and techniques in stroke biology / / Amit Kumar Tripathi, Abhishek Kumar Singh, editors
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (vii, 115 pages) : illustrations
Disciplina 574.028
Soggetto topico Biology - Technique
Malalties cerebrovasculars
Models biològics
Manuals de laboratori
Soggetto genere / forma Llibres electrònics
ISBN 981-336-679-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- About the Editors -- Chapter 1: Rodent Stroke Model Guidelines: An Update -- 1.1 Introduction -- 1.2 The General Guideline for a Rodent Model for Stroke -- 1.3 STAIR Committee, Recommendations, and Guidelines -- 1.4 Intraluminal Model -- 1.5 Different Types of the Occluder and their Success Rate -- 1.6 PLL-Coated Occluders -- 1.7 Flame Blunted Occluders -- 1.8 Silicone-Rubber Coated Occluders -- 1.9 An Optimization Technique for Intraluminal Inserting Occluders -- 1.10 Optimization of Surgical Procedure -- 1.11 The Tamura Method of a Stroke Model -- 1.12 Infarction Area Estimation -- 1.13 Methods for Infarction Visualization -- 1.14 Direct Image of Infarction in Fresh Brain Sections Stained with TTC Solution -- 1.15 Digital Method for Defining the Infarction -- 1.16 Calculation of Infarction Volume -- 1.17 Preparation of Stroke Surgical Procedure -- 1.18 Koizumi´s Suture Method -- 1.19 Longa´s MCAO Method -- 1.20 Neurobehaviour Assessment of Functional Recovery -- 1.21 Assessment of Neurological Functional Outcomes -- 1.21.1 Composite Score -- 1.21.1.1 Bederson Scale and Neurological Deficit Scoring -- 1.21.1.2 Modified Neurological Severity Score -- 1.21.2 Motor Tests -- 1.21.2.1 Cylinder Test -- 1.21.2.2 Ledged Tapered Beam Test -- 1.21.2.3 Pellet Retrieval Task -- 1.21.3 Sensorimotor Test -- 1.21.3.1 Forelimb Flexion -- 1.21.3.2 Forelimb Placing -- 1.21.3.3 Accelerated Rotarod Test -- 1.21.3.4 Adhesive Removal Test -- 1.22 Anesthetics -- 1.23 Monitoring and Maintaining the Core Brain Temperature -- 1.24 Mechanical Ventilation, Blood Gases, Glucose, and Blood Pressure Monitoring -- 1.25 Pilot Study Plan and Implementation of a Preclinical Stroke Trial -- 1.26 Application of the Suitable Statistical Method for Data Analysis -- 1.27 Standard Operating Procedures for Creating a Stroke Model.
1.28 Conclusion and Future Direction -- References -- Chapter 2: Bilateral Common Carotid Artery Occlusion: Stroke Model -- 2.1 Introduction -- 2.2 Importance of BCCAO -- 2.3 Permanent BCCAO -- 2.4 Transient BCCAO -- 2.5 BCCAO Sham Surgery -- 2.6 Factors Affecting the BCCAO -- 2.6.1 Effect of Ischemic Preconditioning -- 2.7 Effect of ROS -- 2.8 Effect of Mitochondrial Dysfunction -- 2.9 Role of the Apoptotic Pathway -- 2.10 Effect of BCCAO Duration and Animal Model Sex -- 2.11 Effect on Blood-Brain Barrier -- 2.12 Effect of Oxygen Free Radicals -- 2.13 Conclusion -- References -- Chapter 3: Cerebral Venous Sinus Thrombosis Rodent Model -- 3.1 Introduction -- 3.2 Clinical Manifestation, Diagnosis, and Prognosis of CVST -- 3.3 Clinical Recommendation for Management of CVST Patients -- 3.4 Experimental CVST Model Protocol -- 3.5 Precautions -- 3.6 TTC Staining Technique -- 3.7 Neurological Evaluation -- 3.8 CVST as a Preclinical Model for Evaluation of Neuroprotective Agents -- References -- Chapter 4: A Non-human Primate Model for Cerebral Stroke -- 4.1 Introduction -- 4.2 Ischemia Model in NHPs -- 4.3 Major Advantages of NHPs Used as Stroke Model -- 4.4 Ethical Challenges -- 4.5 Permanent MCA Occlusion -- 4.6 Transient MCA Occlusion -- 4.7 Thrombus MCA Occlusion in NHPs -- References -- Chapter 5: Laser Doppler Flowmetry Recording for Rodent Stroke Model Confirmation -- 5.1 Introduction -- 5.2 Laser Doppler Flowmetry -- 5.3 Theory and Basic Principal Laser Doppler Flowmetry -- 5.4 Experimental Applications of Laser Doppler Flowmetry (LDF) -- 5.5 Advantages and Limitations of Laser Doppler Flow Meters -- 5.6 Conclusion -- References -- Chapter 6: Laser Speckle Imaging for Cerebral Ischemia and Reperfusion Injury -- 6.1 Introduction -- 6.2 Basic Principles of Laser Speckle Contrast Imaging -- 6.3 Application in Clinical and Biomedical Research.
6.3.1 Preclinical Application of LSCI in the Rodent Model of Cerebral Ischemic Stroke -- 6.3.2 Applications of LSCI in Stroke Induced Language Impairment -- 6.4 Limitations of the LSCI Technique -- 6.5 Conclusion and Recommendations -- References -- Chapter 7: Cerebrovascular Imaging in a Rodent Stroke Model -- 7.1 Introduction -- 7.2 Cerebrovascular Imaging -- 7.3 Cerebral Vessels Staining with a Combination of Carbon Black Inks -- 7.4 Assessment of Cerebral Vascular Network -- 7.5 Alternative Methods for Cerebral Vascular Anatomy -- 7.6 Current Challenges and Future Prospective -- References -- Chapter 8: Photothrombotic Stroke Model -- 8.1 Introduction -- 8.2 Induction of Photothrombotic Lesion -- 8.2.1 Surgery for Illumination of the Region of Interest -- 8.2.2 Injection and Activation of Rose Bengal -- 8.3 Assessment of Photothrombotic Lesion -- 8.4 Merits and Demerits of the Photothrombotic Stroke Model -- 8.5 Conclusion -- References.
Record Nr. UNINA-9910484098603321
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui