What people are saying - Write a review
User Review - Flag as inappropriate
aqui tengo que hacer mi trabajo
User Review - Flag as inappropriate
22/02/2009 - Network Management
Adaptec Altiris application array backup server backup software boot building cable client cluster configuration connected copy corruption create database deleted destination devices disaster recovery disk image document domain e-mail Ethernet Fibre Channel field editors Figure file system filename extensions firewall folder full backup hacker happen hard drive hardware host installed interface Internet IP address JBOD layer Mac OS X mail server Mbps Microsoft mirrored monitoring multiple name servers NetBackup offsite Open File Backup operating system options organization packet partition Postini primary problems RAID controller redundancy replication restart restore Retrospect router running SCSI selector setup SMART SNMP storage Storage Replicator stored striped Table tape drive there's throughput Unix updates UPSes users VERITAS volume Windows workstations write Xserve
Page xxii - We cannot live only for ourselves. A thousand fibers Connect us with our fellow men; and among those fibers as sympathetic threads, our actions run as causes, and they come back to us as effects.
Page 204 - Snort is an open source network Intrusion Detection System, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching, and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, 8MB probes, OS fingerprinting attempts, and much more.
Page 209 - To reopen this window at any time, click Start, point to Programs, point to Administrative Tools, and then click Configure Your Server Return to Server Choices page.
Page 190 - ... modular architecture that allows you to fit it to your needs. Scans can be tailored to seek out only those vulnerabilities you deem important. Each security test is written as an external plug-in. This way, you can easily add your own test without having to read the code of the Nessus engine. The Nessus scanner is made up of two parts: a server, which performs the security tests, and a client that serves as the front end. You can run the server and the client on different systems. Additionally,...
Page 204 - It can perform protocol analysis, content searching/matching, and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Snort uses a flexible rules language to describe traffic that it should collect or pass, as well as a detection engine that utilizes a modular plugin architecture. Snort has a real-time alerting capability as well, incorporating alerting mechanisms for syslog, a user...
Page 327 - ... used to store information necessary to configure the system for one or more users, applications, and hardware devices. The Registry contains information that Windows continually references during operation, such as profiles for each user, the applications installed on the computer and the types of documents each can create, property sheet settings for folders and application icons, what hardware exists on the system, and which ports are being used. The Registry replaces most of the text-based...
Page 607 - ISP you must enter your username and password. This information is passed to a RADIUS server, which checks that the information is correct and then authorizes access to the ISP system.
Page 163 - An error-checking technique used to ensure the accuracy of transmitting digital code over a communications channel. The transmitted messages are divided into predetermined lengths which, used as dividends, are divided by a fixed divisor. The remainder of the calculation is appended onto and sent with the message. At the receiving end, the computer recalculates the remainder. If it doesn't match the transmitted remainder, an error is detected.
Page 411 - Select the system you want to use to start up your computer Mac OS X, 10.4.7 on Macintosh HD Mac OS X, 10.4.7 on MonoPod Network Startup Von have selected Mac OS X, 10.4.7 on the volume "MonoPod.
From other books
From Google Scholar
Kimberly Keeton, Cipriano Santos, Dirk Beyer, Jeffrey Chase, John Wilkes
Kimberly Keeton, Dirk Beyer, Ernesto Brau, Arif Merchant, Cipriano Santos, Alex Zhang
Kanapaty Pelly Periasamy, Lim Mei-Ling, Charissa Tan Ngee Wei
All Scholar search results »
Yanlong Wang, Zhanhuai Li, Wei Lin
Symantec Marketing Campaigns
The Backup Book -- Chapter 1, When Bad Things Happen To Good ...
OSXFAQ - Technical News and Support for Mac OS X
Recommended Books on Business Continuity and Disaster Recovery
Pacific Connection February.2006 Issue of Software Design
HP Storage Media
Practice data defense, not data indifference, book's authors say ...
How to Create a Nimble Backup Architecture for Your Data Center ...
perfectdisk: Information and Much More from Answers.com