Firewall policies and VPN configurations [[electronic resource] /] / Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress, c2006 |
Descrizione fisica | 1 online resource (513 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
CantrellChris
HenmiAnne LucasMark SinghAbhishek |
Soggetto topico |
Computer networks - Security measures
Firewalls (Computer security) |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-07834-4
9786611078348 0-08-050651-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Firewall Policies and VPN Configurations; Copyright Page; Contents; Part I: Security Policy; Chapter 1. Network Security Policy; Introduction; Defining Your Organization; Different Access for Different Organizations; Untrusted Networks; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Using Your Policies to Create Firewall and VPN Configurations; Introduction; What Is a Logical Security Configuration?; Planning Your Logical Security Configuration; Writing Logical Security Configurations; Summary; Solutions Fast Track; Frequently Asked Questions
Part II: Firewall ConceptsChapter 3. Defining a Firewall; Introduction; Why Have Different Types of Firewalls?; Back to Basics-Transmission Control Protocol/Internet Protocol; Firewall Types; Application Proxy; Gateway; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Deciding on a Firewall; Introduction; Appliance/Hardware Solution; Software Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Part III: VPN Concepts; Chapter 5. Defining a VPN; Introduction; What Is a VPN?; Public Key Cryptography; IPSec; SSL VPNs; Layer 2 Solutions; SSH Tunnels; Others SummarySolutions Fast Track; Frequently Asked Questions; Chapter 6. Deciding on a VPN; Introduction; Appliance/Hardware Solution; Software Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Part IV: Implementing Firewalls and VPNs (Case Studies); Chapter 7. IT Infrastructure Security Plan; Introduction; Infrastructure Security Assessment; Project Parameters; Project Team; Project Organization; Project Work Breakdown Structure; Project Risks and Mitigation Strategies; Project Constraints and Assumptions; Project Schedule and Budget; IT Infrastructure Security Project Outline SummarySolutions Fast Track; Chapter 8. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Medium Business (<2000 People); Introduction; Mapping Your Systems; Improving Accountability with Identity Management; VPN Connectivity; Summary; Solutions Fast Track; Frequently Asked Questions; Index |
Record Nr. | UNINA-9910451065903321 |
Rockland, MA, : Syngress, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Firewall policies and VPN configurations [[electronic resource] /] / Anne Henmi, technical editor ; Mark Lucas, Abhishek Singh, Chris Cantrell |
Edizione | [1st edition] |
Pubbl/distr/stampa | Rockland, MA, : Syngress, c2006 |
Descrizione fisica | 1 online resource (513 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
CantrellChris
HenmiAnne LucasMark SinghAbhishek |
Soggetto topico |
Computer networks - Security measures
Firewalls (Computer security) |
ISBN |
1-281-07834-4
9786611078348 0-08-050651-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Firewall Policies and VPN Configurations; Copyright Page; Contents; Part I: Security Policy; Chapter 1. Network Security Policy; Introduction; Defining Your Organization; Different Access for Different Organizations; Untrusted Networks; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Using Your Policies to Create Firewall and VPN Configurations; Introduction; What Is a Logical Security Configuration?; Planning Your Logical Security Configuration; Writing Logical Security Configurations; Summary; Solutions Fast Track; Frequently Asked Questions
Part II: Firewall ConceptsChapter 3. Defining a Firewall; Introduction; Why Have Different Types of Firewalls?; Back to Basics-Transmission Control Protocol/Internet Protocol; Firewall Types; Application Proxy; Gateway; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Deciding on a Firewall; Introduction; Appliance/Hardware Solution; Software Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Part III: VPN Concepts; Chapter 5. Defining a VPN; Introduction; What Is a VPN?; Public Key Cryptography; IPSec; SSL VPNs; Layer 2 Solutions; SSH Tunnels; Others SummarySolutions Fast Track; Frequently Asked Questions; Chapter 6. Deciding on a VPN; Introduction; Appliance/Hardware Solution; Software Solutions; Summary; Solutions Fast Track; Frequently Asked Questions; Part IV: Implementing Firewalls and VPNs (Case Studies); Chapter 7. IT Infrastructure Security Plan; Introduction; Infrastructure Security Assessment; Project Parameters; Project Team; Project Organization; Project Work Breakdown Structure; Project Risks and Mitigation Strategies; Project Constraints and Assumptions; Project Schedule and Budget; IT Infrastructure Security Project Outline SummarySolutions Fast Track; Chapter 8. Case Study: SOHO (Five Computers, Printer, Servers, etc.); Introduction; Employing a Firewall in a SOHO Environment; Introducing the SOHO Firewall Case Study; Designing the SOHO Firewall; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Medium Business (<2000 People); Introduction; Mapping Your Systems; Improving Accountability with Identity Management; VPN Connectivity; Summary; Solutions Fast Track; Frequently Asked Questions; Index |
Record Nr. | UNINA-9910784058303321 |
Rockland, MA, : Syngress, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Machine Learning Using R : With Time Series and Industry-Based Use Cases in R / / by Karthik Ramasubramanian, Abhishek Singh |
Autore | Ramasubramanian Karthik |
Edizione | [2nd ed. 2019.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019 |
Descrizione fisica | 1 online resource (712 pages) |
Disciplina | 006.31 |
Soggetto topico |
Artificial intelligence
Open source software Computer programming Programming languages (Electronic computers) R (Computer program language) Artificial Intelligence Open Source Programming Languages, Compilers, Interpreters |
ISBN |
9781523150403
1523150408 9781484242155 1484242157 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: Introduction to Machine Learning -- Chapter 2: Data Exploration and Preparation -- Chapter 3: Sampling and Resampling Techniques -- Chapter 4: Visualization of Data -- Chapter 5: Feature Engineering -- Chapter 6: Machine Learning Models: Theory and Practice -- Chapter 7: Machine Learning Model Evaluation -- Chapter 8: Model Performance Improvement -- Chapter 9: Time Series Modelling -- Chapter 10: Scalable Machine Learning and related technology -- Chapter 11: Introduction to Deep Learning Models using Keras and TensorFlow. |
Record Nr. | UNINA-9910338013903321 |
Ramasubramanian Karthik | ||
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Machine Learning Using R / / by Karthik Ramasubramanian, Abhishek Singh |
Autore | Ramasubramanian Karthik |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2017 |
Descrizione fisica | 1 online resource (XXIII, 566 p. 209 illus., 155 illus. in color.) |
Disciplina | 006 |
Soggetto topico |
Artificial intelligence
Computer programming Programming languages (Electronic computers) Database management R (Computer language program) Artificial Intelligence Programming Techniques Programming Languages, Compilers, Interpreters Database Management |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: Introduction to Machine Learning and R -- Chapter 2: Data Preparation and Exploration -- Chapter 3: Sampling and Resampling Techniques -- Chapter 4: Visualization of Data -- Chapter 5: Feature Engineering -- Chapter 6: Machine Learning Models: Theory and Practice -- Chapter 7: Machine Learning Model Evaluation.-Chapter 8: Model Performance Improvement -- Chapter 9: Scalable Machine Learning and related technology.-. |
Altri titoli varianti | Comprehensive guide to machine learning |
Record Nr. | UNINA-9910156188103321 |
Ramasubramanian Karthik | ||
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Models and techniques in stroke biology / / Amit Kumar Tripathi, Abhishek Kumar Singh, editors |
Pubbl/distr/stampa | Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (vii, 115 pages) : illustrations |
Disciplina | 574.028 |
Soggetto topico |
Biology - Technique
Malalties cerebrovasculars Models biològics Manuals de laboratori |
Soggetto genere / forma | Llibres electrònics |
ISBN | 981-336-679-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Contents -- About the Editors -- Chapter 1: Rodent Stroke Model Guidelines: An Update -- 1.1 Introduction -- 1.2 The General Guideline for a Rodent Model for Stroke -- 1.3 STAIR Committee, Recommendations, and Guidelines -- 1.4 Intraluminal Model -- 1.5 Different Types of the Occluder and their Success Rate -- 1.6 PLL-Coated Occluders -- 1.7 Flame Blunted Occluders -- 1.8 Silicone-Rubber Coated Occluders -- 1.9 An Optimization Technique for Intraluminal Inserting Occluders -- 1.10 Optimization of Surgical Procedure -- 1.11 The Tamura Method of a Stroke Model -- 1.12 Infarction Area Estimation -- 1.13 Methods for Infarction Visualization -- 1.14 Direct Image of Infarction in Fresh Brain Sections Stained with TTC Solution -- 1.15 Digital Method for Defining the Infarction -- 1.16 Calculation of Infarction Volume -- 1.17 Preparation of Stroke Surgical Procedure -- 1.18 Koizumi´s Suture Method -- 1.19 Longa´s MCAO Method -- 1.20 Neurobehaviour Assessment of Functional Recovery -- 1.21 Assessment of Neurological Functional Outcomes -- 1.21.1 Composite Score -- 1.21.1.1 Bederson Scale and Neurological Deficit Scoring -- 1.21.1.2 Modified Neurological Severity Score -- 1.21.2 Motor Tests -- 1.21.2.1 Cylinder Test -- 1.21.2.2 Ledged Tapered Beam Test -- 1.21.2.3 Pellet Retrieval Task -- 1.21.3 Sensorimotor Test -- 1.21.3.1 Forelimb Flexion -- 1.21.3.2 Forelimb Placing -- 1.21.3.3 Accelerated Rotarod Test -- 1.21.3.4 Adhesive Removal Test -- 1.22 Anesthetics -- 1.23 Monitoring and Maintaining the Core Brain Temperature -- 1.24 Mechanical Ventilation, Blood Gases, Glucose, and Blood Pressure Monitoring -- 1.25 Pilot Study Plan and Implementation of a Preclinical Stroke Trial -- 1.26 Application of the Suitable Statistical Method for Data Analysis -- 1.27 Standard Operating Procedures for Creating a Stroke Model.
1.28 Conclusion and Future Direction -- References -- Chapter 2: Bilateral Common Carotid Artery Occlusion: Stroke Model -- 2.1 Introduction -- 2.2 Importance of BCCAO -- 2.3 Permanent BCCAO -- 2.4 Transient BCCAO -- 2.5 BCCAO Sham Surgery -- 2.6 Factors Affecting the BCCAO -- 2.6.1 Effect of Ischemic Preconditioning -- 2.7 Effect of ROS -- 2.8 Effect of Mitochondrial Dysfunction -- 2.9 Role of the Apoptotic Pathway -- 2.10 Effect of BCCAO Duration and Animal Model Sex -- 2.11 Effect on Blood-Brain Barrier -- 2.12 Effect of Oxygen Free Radicals -- 2.13 Conclusion -- References -- Chapter 3: Cerebral Venous Sinus Thrombosis Rodent Model -- 3.1 Introduction -- 3.2 Clinical Manifestation, Diagnosis, and Prognosis of CVST -- 3.3 Clinical Recommendation for Management of CVST Patients -- 3.4 Experimental CVST Model Protocol -- 3.5 Precautions -- 3.6 TTC Staining Technique -- 3.7 Neurological Evaluation -- 3.8 CVST as a Preclinical Model for Evaluation of Neuroprotective Agents -- References -- Chapter 4: A Non-human Primate Model for Cerebral Stroke -- 4.1 Introduction -- 4.2 Ischemia Model in NHPs -- 4.3 Major Advantages of NHPs Used as Stroke Model -- 4.4 Ethical Challenges -- 4.5 Permanent MCA Occlusion -- 4.6 Transient MCA Occlusion -- 4.7 Thrombus MCA Occlusion in NHPs -- References -- Chapter 5: Laser Doppler Flowmetry Recording for Rodent Stroke Model Confirmation -- 5.1 Introduction -- 5.2 Laser Doppler Flowmetry -- 5.3 Theory and Basic Principal Laser Doppler Flowmetry -- 5.4 Experimental Applications of Laser Doppler Flowmetry (LDF) -- 5.5 Advantages and Limitations of Laser Doppler Flow Meters -- 5.6 Conclusion -- References -- Chapter 6: Laser Speckle Imaging for Cerebral Ischemia and Reperfusion Injury -- 6.1 Introduction -- 6.2 Basic Principles of Laser Speckle Contrast Imaging -- 6.3 Application in Clinical and Biomedical Research. 6.3.1 Preclinical Application of LSCI in the Rodent Model of Cerebral Ischemic Stroke -- 6.3.2 Applications of LSCI in Stroke Induced Language Impairment -- 6.4 Limitations of the LSCI Technique -- 6.5 Conclusion and Recommendations -- References -- Chapter 7: Cerebrovascular Imaging in a Rodent Stroke Model -- 7.1 Introduction -- 7.2 Cerebrovascular Imaging -- 7.3 Cerebral Vessels Staining with a Combination of Carbon Black Inks -- 7.4 Assessment of Cerebral Vascular Network -- 7.5 Alternative Methods for Cerebral Vascular Anatomy -- 7.6 Current Challenges and Future Prospective -- References -- Chapter 8: Photothrombotic Stroke Model -- 8.1 Introduction -- 8.2 Induction of Photothrombotic Lesion -- 8.2.1 Surgery for Illumination of the Region of Interest -- 8.2.2 Injection and Activation of Rose Bengal -- 8.3 Assessment of Photothrombotic Lesion -- 8.4 Merits and Demerits of the Photothrombotic Stroke Model -- 8.5 Conclusion -- References. |
Record Nr. | UNINA-9910484098603321 |
Singapore : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|