intTypePromotion=1 Tuyển sinh 2024 dành cho Gen-Z

Securing your files

Xem 1-20 trên 45 kết quả Securing your files
  • Ebook Managing Linux systems with webmin: Part 1 includes contents: Introduction to Webmin, installing Webmin, securing your Webmin server, users and groups, disk and network filesystems, NFS file sharing, disk quotas, bootup and shutdown, scheduled commands, process management, software packages, network information service,…

    pdf393p longtimenosee05 31-03-2024 0 0   Download

  • Ebook Networking with Microsoft Windows Vista: Your guide to easy & secure Windows Vista networking - Part 1 includes content: Chapter 1 understanding ethernet networking, chapter 2 understanding wireless networking, chapter 3 configuring your router, chapter 4 putting your network together, chapter 5 working with vista’s basic network tools and tasks, chapter 6 managing network connections, chapter 7 managing wireless network connections, chapter 8 accessing and sharing network resources, chapter 9 setting up vista as a digital media hub, chapter 10 taking advantage of your network, chapte...

    pdf295p longtimenosee03 22-02-2024 8 2   Download

  • Linux utilities cookbook includes contents: Chapter 1, Using the Terminal / Command Line, covers how to get the most out of the Linux command line. Chapter 2, The Desktop, introduces some of the desktop environments available for Linux. Chapter 3, Files and Directories, explains files, directories, and how to manage them. Chapter 4, Networking and the Internet, covers connectivity and how to fix it when it goes down. Chapter 5, Permissions, Access, and Security, gives a brief overview of Linux security features. Chapter 6, Processes, explains how to manage processes in Linux.

    pdf224p haojiubujain010 14-12-2023 5 3   Download

  • Doing the actual math behind modern encryption is admittedly quite difficult, but using the tools that do the work for you isn’t difficult at all once you have a rudimentary understanding of when to use which sort of encryption. PGP & GPG: Email for the Practical Paranoid will take you step by step through the world of encryption and digital signatures and teach you how to use the tools that will allow you to protect your confidential information while sharing it as you desire.

    pdf216p haojiubujain06 23-10-2023 4 3   Download

  • Ebook Practical oracle security: Your unauthorized guide to relational database security includes contents: Chapter 1: Oracle security: the big picture; Chapter 2: File system; Chapter 3: TNS listener security; Chapter 4: Managing default accounts; Chapter 5: PUBLIC privileges; Chapter 6: Software updates; Chapter 7: Passwords and password controls; Chapter 8: Database activity monitoring; Chapter 9: Implementation guide.

    pdf262p haojiubujain06 23-10-2023 5 3   Download

  • Ebook "Data protection for photographers: A guide to storing and protecting your valuable digital assets" explains current data protection and storage technologies in everyday terms. It describes effective procedures for protecting data, from capture to backup and archiving. Descriptions of specific products applicable to Windows, MacOS, and Linux systems are provided.

    pdf177p loivantrinh 29-10-2023 7 3   Download

  • Ebook "Node.js recipes" includes content: Understanding node.js; networking with node.js; using the file system; building a web server; using events and child processes; implementing security and cryptography; discovering other node.js modules; creating a websocket server; using web server frameworks; connecting to a data store; testing in node.js; debugging and deploying your application.

    pdf369p haojiubujain07 20-09-2023 5 3   Download

  • Ebook Hack proofing sun solaris 8 Part 1 includes contents: Chapter 1 introducing solaris security: evaluating your risk, chapter 2 securing solaris with the bundled security tools, chapter 3 securing solaris with freeware security tools, chapter 4 securing your users, chapter 5 securing your files.

    pdf183p haojiubujain06 05-09-2023 3 2   Download

  • Ebook Hardening Linux Part 1 includes contents: Chapter 1 hardening the basics, chapter 2 firewalling your hosts, chapter 3 securing connections and remote administration, chapter 4 securing files and file systems, chapter 5 understanding logging and log monitoring.

    pdf309p haojiubujain06 05-09-2023 6 3   Download

  • Encryption is the process of protecting data by using an algorithm to scramble it. The data is unintelligible, undetectable, unreadable and irretrievable unless a key is used to reverse the encryption, or decrypt, the data. Encryption is used all the time, often without you even realising it. Whenever you buy something online and make a transaction, all your details are heavily encrypted until they reach the other end, making sure that no third party could be listening in.

    pdf27p namde04 08-05-2013 46 4   Download

  • One of the great things about PHP is its vibrant and active community. Developers enjoy many online meeting points, including the SitePoint Forums, 1 where de­ velopers get together to help each other out with problems they face on a daily basis, from the basics of how PHP works, to solving design problems like “How do I val­ idate a form?”As a way to get help, these communities are excellent—they’re replete with all sorts of vital fragments you’ll need to make your projects successful.

    pdf207p namde04 04-05-2013 55 10   Download

  • You must apply for a new driver’s license by visiting a Driver Services facility within 30 days of legally changing your name. You must provide documentation that links your new name to the name on your current driver’s license card and on file with the Secretary of State’s office. The name displayed on your driver’s license will be your full given name and surname as recorded at birth, recorded at marriage, recorded with the Social Security Administration or otherwise established through legal action. The appropriate fee must be paid to receive a new license and/or ID card. ...

    pdf64p nhacsihuytuan 13-04-2013 44 3   Download

  • Developing Secure Applications with Visual Basic first provides you with an understanding of encryption, and then guides you through adding security features to your own applications using the Microsoft CryptoAPI, and the new security features of Windows 2000. Developers who have been confused by the high-end, academic style of other encryption books and cryptography theory will delight with Chapman's understandable style and hands-on methods.

    pdf606p trac2_123 11-04-2013 68 17   Download

  • As one of the most popular open source content management systems available today, WordPress boasts a framework that allows you to easily customize and extend it through plugins. This comprehensive book shows you how plugins work, reviews the tools and APIs available in WordPress, and demonstrates how to extend the functionality of WordPress with plugins.

    pdf554p titatu_123 09-03-2013 108 30   Download

  • You can earn a maximum of four credits each year. In 2010, the amount earned to accrue one credit was $1,120. This amount changes annually. Therefore, to earn four credits in 2010 you would need to earn a minimum of $4, 480. If you operate a home-based business while living overseas, you will need to file and pay your self-employment tax which will include a Social Security and Medicare payment. All credits earned will remain in your Social Security Account, even through years when you are not working or contributing. You can only earn...

    pdf27p bi_ve_sau 05-02-2013 43 2   Download

  • One reason many family members decide to work inside one of our U.S. missions is to accrue retirement benefits. This is a valuable benefit if you are in a Family Member Appointment, but you can create your own retirement benefits with a home-based business by contributing credits to your Social Security plan. When you are posted in the United States, contributing to your Social Security is done through the self-employment tax.

    pdf47p bi_ve_sau 05-02-2013 48 4   Download

  • cacls /T /E /G administrator:F d:\users\*.* Cacls will add Full Control for the adminsitrator account all files and subfolders in the Users folder of the D:\ drive. cacls /T /E /R Everyone d:\users Cacls will remove all permissions for the 'Everyone' group in all files and subfolders in the Users folder of the D:\ drive. Be sure to use the /E switch when you are just making modifications to a specific account or group. Without the /E switch, your settings will replace the current security with only what is specified. ...

    ppt19p muathu_102 28-01-2013 27 2   Download

  • Part of an overall Firewall strategy Sits between the local network and the external network Originally used primarily as a caching strategy to minimize outgoing URL requests and increase perceived browser performance Primary mission is now to insure anonymity of internal users Still used for caching of frequently requested files Also used for content filtering Acts as a go-between, submitting your requests to the external network Requests are translated from your IP address to the Proxy’s IP address E-mail addresses of internal users are removed from request headers Cause an actual brea...

    ppt15p muathu_102 28-01-2013 76 3   Download

  • If your household harbors more than one computer, you’ve probably wondered about home networking. Maybe you’ve gone so far as to start setting up a network and given up in frustration. Well, now you can relax. Home Networking All-In-One Desk Reference For Dummies has come to the rescue! A network will make your life easier, and Home Networking All-In-One Desk Reference For Dummies makes it easier to create one.

    pdf723p stingdau_123 21-01-2013 82 23   Download

  • If a violation does occur, enforcement action may be taken by law enforcement or through the civil court system. Law enforcement officers may be able to assist you by treating your order as if it were issued in their jurisdiction. Depending on the laws and policies of that jurisdiction, officers may be allowed to pick up children, or even arrest for violation of the custody provision in your protection order. An advocate will be able to give you information regarding the law enforcement response in the jurisdiction.

    pdf6p enter1cai 12-01-2013 44 3   Download


207 tài liệu
1439 lượt tải

nocache searchPhinxDoc


Đồng bộ tài khoản