intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Securing your users

Xem 1-20 trên 70 kết quả Securing your users
  • Ebook Hacking exposed: Linux security secrets solutions - Part 2 includes contents: Chapter 8 elevating user privileges; chapter 9 password cracking; chapter 10 how hackers maintain access; chapter 11 mail and ftp security; chapter 12 web servers and dynamic content; chapter 13 access control and firewalls; appendixe a keeping your programs current; appendixe b turning off unneeded services; appendixe c online resources; appendixe d case studies.

    pdf316p longtimenosee05 31-03-2024 1 0   Download

  • Ebook Managing Linux systems with webmin: Part 1 includes contents: Introduction to Webmin, installing Webmin, securing your Webmin server, users and groups, disk and network filesystems, NFS file sharing, disk quotas, bootup and shutdown, scheduled commands, process management, software packages, network information service,…

    pdf393p longtimenosee05 31-03-2024 0 0   Download

  • Ebook "Learning node.js for mobile application development" includes content: Setting up your workspace, configuring persistence with mongoDB, creating an API, securing your backend, real time data and websockets, introducing ionic, building user interfaces, making our app interactive, accessing native phone features, working with apis,... and other contents.

    pdf248p haojiubujain07 20-09-2023 5 2   Download

  • Ebook Hack proofing sun solaris 8 Part 1 includes contents: Chapter 1 introducing solaris security: evaluating your risk, chapter 2 securing solaris with the bundled security tools, chapter 3 securing solaris with freeware security tools, chapter 4 securing your users, chapter 5 securing your files.

    pdf183p haojiubujain06 05-09-2023 3 2   Download

  • Ebook Information security management handbook (Volume 7): Part 1 includes the following content: Chapter 1 - securing the grid, chapter 2 - attacks in mobile environments, chapter 3 - security in the cloud, chapter 4 - getting the best out of information security projects, chapter 5 - mobility and its impact on enterprise security, chapter 6 - an introduction to digital rights management, chapter 7 - information security on the cheap, chapter 8 - organizational behavior (including institutions) can cultivate your information security program, chapter 9 - metrics for monitoring, chapter 10 ...

    pdf194p haojiubujain01 24-06-2023 6 4   Download

  • Module 8 - Creating a security design for authentication. In this module, you will learn how to determine threats and analyze risks to authentication. You will learn how to design security for authenticating local users, remote users, and users who access your network across the Internet. You will also learn when to choose multifactor authentication for additional security.

    ppt18p nomoney2 10-02-2017 35 1   Download

  • Module 6: Configuring and troubleshooting routing and remote access. To support your organization’s distributed workforce, you must become familiar with technologies that enable remote users to connect to your organization’s network infrastructure. These technologies include virtual private networks (VPNs) and DirectAccess. It is important that you understand how to configure and secure your remote access clients by using network policies. This module explains how to configure and troubleshoot routing and remote access in Windows Server 2008.

    pdf52p tangtuy20 28-07-2016 63 4   Download

  • The first step to good computer security is awareness. You should understand a ll the dangers that specifically threaten your computer system. You need to know how each threat can affect you and prioritize them accordingly. This lesson introduces you to some of the most common threats to your privacy, data, and hardware. The following lesson shows you how to protect yourself and your system.

    ppt23p tangtuy02 12-03-2016 42 1   Download

  • Whether you are an experienced Security or System Administrator or a Newbie to the industry, you will learn how to use native, "out-of-the-box", operating system capabilities to secure your UNIX environment. No need for third-party software or freeware tools to be and stay secure! This book will help you ensure that your system is protected from unauthorized users and conduct intrusion traces to identify the intruders if this does occur. It provides you with practical information to use of the native OS security capabilities without the need for a third party security software application....

    pdf44p samsung_12 07-05-2013 62 4   Download

  • This book provides a succinct, in-depth tour of all the new features and functions in IPv6. It guides you through everything you need to know to get started, including how to configure IPv6 on hosts and routers and which applications currently support IPv6. The new IPv6 protocols offers extended address space, scalability, improved support for security, real-time traffic support, and auto-configuration so that even a novice user can connect a machine to the Internet.

    pdf314p ringphone 06-05-2013 49 4   Download

  • PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the 2nd edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also delve into recent developments like mobile security, the impact of JavaScript, and the advantages of recent PHP hardening efforts. Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications.

    pdf369p goshop_123 23-04-2013 96 15   Download

  • To help ensure security, passwords should be used carefully. These recommendations will help protect your passwords: • Never write down your password. • Never share your password with anyone. • Never use your network logon password for another purpose. • Use different passwords for your network logon and the Administrator account on your computer. • Change your network password every 60 to 90 days or as often as required in your specific environment. • Change your password immediately if you think it has been compromised....

    doc4p maiyeuanh_10081990 10-04-2013 55 5   Download

  • As one of the most popular open source content management systems available today, WordPress boasts a framework that allows you to easily customize and extend it through plugins. This comprehensive book shows you how plugins work, reviews the tools and APIs available in WordPress, and demonstrates how to extend the functionality of WordPress with plugins.

    pdf554p titatu_123 09-03-2013 108 30   Download

  • pring Security 3.1" is an incremental guide that will teach you how to protect your application from malicious users. You will learn how to cleanly integrate Spring Security into your application using the latest technologies and frameworks with the help of detailed examples. This book is centred around a security audit of an insecure application and then modifying the sample to resolve the issues found in the audit.

    pdf456p titatu_123 01-03-2013 70 9   Download

  • Whether you develop web applications or mobile apps, the OAuth 2.0 protocol will save a lot of headaches. This concise introduction shows you how OAuth provides a single authorization technology across numerous APIs on the Web, so you can securely access users’ data—such as user profiles, photos, videos, and contact lists—to improve their experience of your application.

    pdf80p titatu_123 01-03-2013 67 11   Download

  • eginning ios apps with fac and twitter apis shows you how to add the power of social networking to your mobile apps on iphone, ipad, and ipod touch. with this book as your guide, you can write apps that connect to fac and twitter quickly, securely, and discreetly. instead of starting from scratch, you will build on the vast resources, data storage capacity, and familiar features of these platforms which have become part of everyday life for hundreds of millions of users worldwide.

    pdf315p hoa_can 29-01-2013 67 15   Download

  • With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You’ll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker’s opportunity to compromise your app and steal user data.

    pdf112p hoa_can 29-01-2013 41 7   Download

  • Now more than ever, it is imperative that users be able to protect their system from hackers trashing their Web sites or stealing information. Written by a reformed hacker, this comprehensive resource identifies security holes in common computer and network systems, allowing system administrators to discover faults inherent within their network- and work toward a solution to those problems.

    pdf670p muathu_102 28-01-2013 99 12   Download

  • Used to connect two private networks together via the Internet Used to connect remote users to a private network via the Internet This could be done by opening your firewall to the LAN networking protocols (NETBIOS, NFS NetWare, AppleTalk)) But… it would also make those protocols available to any one on the Internet and they could come into your LAN at will Effectively make the whole Internet your LAN Exposes all of your data Anyone can easily take advantage of vulnerabilities in your internal hosts No privacy Better solution is to use a VPN in conjunction with your firewall ...

    ppt18p muathu_102 28-01-2013 80 3   Download

  • cacls /T /E /G administrator:F d:\users\*.* Cacls will add Full Control for the adminsitrator account all files and subfolders in the Users folder of the D:\ drive. cacls /T /E /R Everyone d:\users Cacls will remove all permissions for the 'Everyone' group in all files and subfolders in the Users folder of the D:\ drive. Be sure to use the /E switch when you are just making modifications to a specific account or group. Without the /E switch, your settings will replace the current security with only what is specified. ...

    ppt19p muathu_102 28-01-2013 27 2   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
320 tài liệu
1224 lượt tải
207 tài liệu
1439 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2