Netstat

Page 8 of 10 - About 96 Essays
  • Premium Essay

    Test

    SECURITY TECHNICAL IMPLEMENTATION GUIDE ON ENCLAVE SECURITY Version 1, Release 1 30 March 2001 [pic] DISA FIELD SECURITY OPERATIONS This page is intentionally left blank. TABLE OF CONTENTS 1. INTRODUCTION 1 1.1 Background 1 1.2 Definitions 1 1.3 Writing Conventions 3 1.4 STIG Distribution 3 1.5 Document Revisions 4 1.6 INFOCON 5 2. ENCLAVE SECURITY GUIDANCE 7 2.1 Traditional Security 7 2.2 Enclave Perimeter Security

    Words: 19685 - Pages: 79

  • Free Essay

    Linux as a Personal Desktop Operating System

    Table of Contents Beginning Red Hat Linux 9 ...............................................................................................................................1 Introduction.........................................................................................................................................................4 Who Is This Book For?...........................................................................................................................4 What You Need

    Words: 155032 - Pages: 621

  • Free Essay

    Linux

    Red Hat Enterprise Linux 5.3 Release Manifest Package Manifest for all Architectures. Red Hat Enterprise Linux Documentation Don Domingo Copyright © 2008 . This material may only be distributed subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version of the OPL is presently available at http://www.opencontent.org/openpub/). Red Hat and the Red Hat "Shadow Man" logo are registered trademarks of Red Hat, Inc. in the United States and other countries

    Words: 32183 - Pages: 129

  • Premium Essay

    Microsoft

    M I C R O S O F T T E C H N O L O G Y A S S O C I AT E Student Study Guide EXAM 98-366 Networking Fundamentals Preparing for MTA Certification for Cert ca n Certification MICROSOFT TECHNOLOGY ASSOCIATE (MTA TECHNOLOGY ASSOCIATE (MTA) ECHNOLOGY C (MTA A) STUDENT STUDY GUIDE F UDY FOR IT PROS 98-366 Networking Fundamentals Authors Shari Due (Networking). Shari is an IT Network Specialist Instructor at Gateway Technical College in Racine, Wisconsin where she has worked for the past

    Words: 12317 - Pages: 50

  • Premium Essay

    Computer Book

    The Linux Command Line Second Internet Edition William E. Shotts, Jr. A LinuxCommand.org Book Copyright ©2008-2013, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA. Linux® is the registered trademark of Linus Torvalds. All other trademarks

    Words: 100185 - Pages: 401

  • Premium Essay

    Nt2640

    NT2640 IP Networking INSTRUCTOR GUIDE Onsite Credit hours: 4.5 Contact /Instructional hours: 34 Theory, 22 Lab Prerequisite: NT1210 Introduction to Networking or equivalent Course Revision Table Change Date Updated Section Change Description Change Rationale Implementation Quarter 07/18/2011 All New Curriculum New Curriculum September 2011 02/19/2013 All Updated labs across the course to map the 2nd edition of lab manual Immediately 02/27/2013

    Words: 22068 - Pages: 89

  • Premium Essay

    Ccna

    CCNA Portable Command Guide Second Edition Scott Empson Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA ii CCNA Portable Command Guide, Second Edition Scott Empson Copyright© 2008 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information

    Words: 64092 - Pages: 257

  • Premium Essay

    Alksdjf

    CCNA Portable Command Guide Second Edition Scott Empson Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA ii CCNA Portable Command Guide, Second Edition Scott Empson Copyright© 2008 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and

    Words: 64092 - Pages: 257

  • Free Essay

    Hadoop

    www.linuxidc.com Hadoop入门实战手册 更多Hadoop相关信息见Hadoop 专题页面 http://www.linuxidc.com/topicnews.aspx?tid=13 北京宽连十方数字技术有限公司 技术研究部 (2011年7月) Linux¹«Éç(LinuxIDC.com) ÊÇ°üÀ¨Ubuntu,Fedora,SUSE¼¼Êõ£¬×îÐÂIT×ÊѶµÈLinuxרҵÀàÍøÕ¾¡£ www.linuxidc.com 目录 1  概述 ........................................................................................................................... 4  1.1  什么是Hadoop? ...............................................................................................

    Words: 8590 - Pages: 35

  • Free Essay

    Gestion de Riesgos

    UNIVERSIDAD TÉCNICA PARTICULAR DE LOJA La Universidad Católica de Loja MODALIDAD PRESENCIAL ESCUELA DE CIENCIAS DE LA COMPUTACIÓN Análisis de Vulnerabilidades de la Red LAN de la UTPL Trabajo de fin de carrera previa a la obtención del título de Ingeniera en Sistemas Informáticos y Computación. AUTOR. Srta. Angélica del Cisne Espinosa Otavalo. DIRECTOR. Ing. Carlos Gabriel Córdova E. CO-DIRECTOR Mgs. María Paula Espinosa V. LOJA – ECUADOR 2010 Análisis de Vulnerabilidades de la Red LAN de la

    Words: 22543 - Pages: 91

Page   1 2 3 4 5 6 7 8 9 10