
Securing your users
-
Module 8 - Creating a security design for authentication. In this module, you will learn how to determine threats and analyze risks to authentication. You will learn how to design security for authenticating local users, remote users, and users who access your network across the Internet. You will also learn when to choose multifactor authentication for additional security.
18p
nomoney2
10-02-2017
34
1
Download
-
Module 6: Configuring and troubleshooting routing and remote access. To support your organization’s distributed workforce, you must become familiar with technologies that enable remote users to connect to your organization’s network infrastructure. These technologies include virtual private networks (VPNs) and DirectAccess. It is important that you understand how to configure and secure your remote access clients by using network policies. This module explains how to configure and troubleshoot routing and remote access in Windows Server 2008.
52p
tangtuy20
28-07-2016
61
3
Download
-
The first step to good computer security is awareness. You should understand a ll the dangers that specifically threaten your computer system. You need to know how each threat can affect you and prioritize them accordingly. This lesson introduces you to some of the most common threats to your privacy, data, and hardware. The following lesson shows you how to protect yourself and your system.
23p
tangtuy02
12-03-2016
38
1
Download
-
Whether you are an experienced Security or System Administrator or a Newbie to the industry, you will learn how to use native, "out-of-the-box", operating system capabilities to secure your UNIX environment. No need for third-party software or freeware tools to be and stay secure! This book will help you ensure that your system is protected from unauthorized users and conduct intrusion traces to identify the intruders if this does occur. It provides you with practical information to use of the native OS security capabilities without the need for a third party security software application....
44p
samsung_12
07-05-2013
57
3
Download
-
This book provides a succinct, in-depth tour of all the new features and functions in IPv6. It guides you through everything you need to know to get started, including how to configure IPv6 on hosts and routers and which applications currently support IPv6. The new IPv6 protocols offers extended address space, scalability, improved support for security, real-time traffic support, and auto-configuration so that even a novice user can connect a machine to the Internet.
314p
ringphone
06-05-2013
47
3
Download
-
PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the 2nd edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also delve into recent developments like mobile security, the impact of JavaScript, and the advantages of recent PHP hardening efforts. Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications.
369p
goshop_123
23-04-2013
94
14
Download
-
To help ensure security, passwords should be used carefully. These recommendations will help protect your passwords: • Never write down your password. • Never share your password with anyone. • Never use your network logon password for another purpose. • Use different passwords for your network logon and the Administrator account on your computer. • Change your network password every 60 to 90 days or as often as required in your specific environment. • Change your password immediately if you think it has been compromised....
4p
maiyeuanh_10081990
10-04-2013
53
5
Download
-
As one of the most popular open source content management systems available today, WordPress boasts a framework that allows you to easily customize and extend it through plugins. This comprehensive book shows you how plugins work, reviews the tools and APIs available in WordPress, and demonstrates how to extend the functionality of WordPress with plugins.
554p
titatu_123
09-03-2013
104
29
Download
-
pring Security 3.1" is an incremental guide that will teach you how to protect your application from malicious users. You will learn how to cleanly integrate Spring Security into your application using the latest technologies and frameworks with the help of detailed examples. This book is centred around a security audit of an insecure application and then modifying the sample to resolve the issues found in the audit.
456p
titatu_123
01-03-2013
67
9
Download
-
Whether you develop web applications or mobile apps, the OAuth 2.0 protocol will save a lot of headaches. This concise introduction shows you how OAuth provides a single authorization technology across numerous APIs on the Web, so you can securely access users’ data—such as user profiles, photos, videos, and contact lists—to improve their experience of your application.
80p
titatu_123
01-03-2013
63
11
Download
-
eginning ios apps with fac and twitter apis shows you how to add the power of social networking to your mobile apps on iphone, ipad, and ipod touch. with this book as your guide, you can write apps that connect to fac and twitter quickly, securely, and discreetly. instead of starting from scratch, you will build on the vast resources, data storage capacity, and familiar features of these platforms which have become part of everyday life for hundreds of millions of users worldwide.
315p
hoa_can
29-01-2013
65
14
Download
-
With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You’ll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker’s opportunity to compromise your app and steal user data.
112p
hoa_can
29-01-2013
40
7
Download
-
Now more than ever, it is imperative that users be able to protect their system from hackers trashing their Web sites or stealing information. Written by a reformed hacker, this comprehensive resource identifies security holes in common computer and network systems, allowing system administrators to discover faults inherent within their network- and work toward a solution to those problems.
670p
muathu_102
28-01-2013
98
11
Download
-
Used to connect two private networks together via the Internet Used to connect remote users to a private network via the Internet This could be done by opening your firewall to the LAN networking protocols (NETBIOS, NFS NetWare, AppleTalk)) But… it would also make those protocols available to any one on the Internet and they could come into your LAN at will Effectively make the whole Internet your LAN Exposes all of your data Anyone can easily take advantage of vulnerabilities in your internal hosts No privacy Better solution is to use a VPN in conjunction with your firewall ...
18p
muathu_102
28-01-2013
79
3
Download
-
cacls /T /E /G administrator:F d:\users\*.* Cacls will add Full Control for the adminsitrator account all files and subfolders in the Users folder of the D:\ drive. cacls /T /E /R Everyone d:\users Cacls will remove all permissions for the 'Everyone' group in all files and subfolders in the Users folder of the D:\ drive. Be sure to use the /E switch when you are just making modifications to a specific account or group. Without the /E switch, your settings will replace the current security with only what is specified. ...
19p
muathu_102
28-01-2013
27
2
Download
-
Part of an overall Firewall strategy Sits between the local network and the external network Originally used primarily as a caching strategy to minimize outgoing URL requests and increase perceived browser performance Primary mission is now to insure anonymity of internal users Still used for caching of frequently requested files Also used for content filtering Acts as a go-between, submitting your requests to the external network Requests are translated from your IP address to the Proxy’s IP address E-mail addresses of internal users are removed from request headers Cause an actual brea...
15p
muathu_102
28-01-2013
75
3
Download
-
If your household harbors more than one computer, you’ve probably wondered about home networking. Maybe you’ve gone so far as to start setting up a network and given up in frustration. Well, now you can relax. Home Networking All-In-One Desk Reference For Dummies has come to the rescue! A network will make your life easier, and Home Networking All-In-One Desk Reference For Dummies makes it easier to create one.
723p
stingdau_123
21-01-2013
82
23
Download
-
In Canada, a significant portion of an insurer’s capital requirement (especially for a life insurer) arises from its exposure to credit risk. This component of the overall insurer capital requirement is determined using asset default factors. For rated short term securities, bonds, loans and private placements, these factors are based on the rating agency grade.
64p
enterroi
01-02-2013
53
3
Download
-
A firewall is a device that controls the flow of information between your computer and the internet, similar to a router. Most modern operating systems include a software firewall. In addition to the operating system’s firewall, the majority of home routers have a firewall built in. Refer to your user’s guide for instructions on how to enable your firewall. Once your firewall is enabled, consult the user’s guide to learn how to configure the security settings and set a strong password to protect it against unwanted changes. ...
5p
khongmuonnghe
04-01-2013
60
4
Download
-
Attackers can infect your computer with malicious software, or malware, in many different ways. They can take advantage of unsafe user practices and flaws in your computer’s programs (flaws including vulnerabilities and unsecured services and features) and use social engineering (in which an attacker convinces someone to perform an action such as opening a malicious email attachment or following a malicious link). Once your computer is infected, intruders can use the malware to access your computer without your knowledge to perform unwanted actions.
11p
khongmuonnghe
04-01-2013
62
3
Download
CHỦ ĐỀ BẠN MUỐN TÌM
