Angebote zu "Email" (21 Treffer)

Kategorien

Shops

Sophos UTM SW FullGuard Net/Web/Email/Webserver...
4.474,64 € *
ggf. zzgl. Versand

Sophos UTM SW FullGuard Net/Web/Email/Webserver/Wireless UP TO 75 24 MOS (Fgsb2Csaa)

Anbieter: Rakuten
Stand: 23.01.2020
Zum Angebot
Sophos UTM SW FullGuard Net/Web/Email/Webserver...
6.136,86 € *
ggf. zzgl. Versand

Sophos UTM SW FullGuard Net/Web/Email/Webserver/Wireless UP TO 75 36 MOS (Fgsb3Csaa)

Anbieter: Rakuten
Stand: 23.01.2020
Zum Angebot
Sophos UTM SW FullGuard Net/Web/Email/Webserver...
3.974,45 € *
ggf. zzgl. Versand

Sophos UTM SW FullGuard Net/Web/Email/Webserver/Wireless UP TO 150 12 MOS (Fgsh1Csaa)

Anbieter: Rakuten
Stand: 23.01.2020
Zum Angebot
Sophos UTM SW FullGuard Net/Web/Email/Webserver...
6.955,58 € *
ggf. zzgl. Versand

Sophos UTM SW FullGuard Net/Web/Email/Webserver/Wireless UP TO 150 24 MOS (Fgsh2Csaa)

Anbieter: Rakuten
Stand: 23.01.2020
Zum Angebot
Network Monitoring
29,00 € *
ggf. zzgl. Versand

High Quality Content by WIKIPEDIA articles! The term network monitoring describes the use of a system that constantly monitors a computer network for slow or failing components and that notifies the network administrator in case of outages via email, pager or other alarms. It is a subset of the functions involved in network management. While an intrusion detection system monitors a network for threats from the outside, a network monitoring system monitors the network for problems caused by overloaded and/or crashed servers, network connections or other devices. For example, to determine the status of a webserver, monitoring software may periodically send an HTTP request to fetch a page, for email servers, a test message might be sent through SMTP and retrieved by IMAP or POP3.

Anbieter: Dodax
Stand: 23.01.2020
Zum Angebot
Network Monitoring
29,90 € *
ggf. zzgl. Versand

High Quality Content by WIKIPEDIA articles! The term network monitoring describes the use of a system that constantly monitors a computer network for slow or failing components and that notifies the network administrator in case of outages via email, pager or other alarms. It is a subset of the functions involved in network management. While an intrusion detection system monitors a network for threats from the outside, a network monitoring system monitors the network for problems caused by overloaded and/or crashed servers, network connections or other devices. For example, to determine the status of a webserver, monitoring software may periodically send an HTTP request to fetch a page, for email servers, a test message might be sent through SMTP and retrieved by IMAP or POP3.

Anbieter: Dodax AT
Stand: 23.01.2020
Zum Angebot
Linux Security Cookbook
33,17 € *
ggf. zzgl. Versand

Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-follow recipes--short, focused pieces of code that administrators can use to improve security and perform common tasks securely.The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax. The book begins with recipes devised to establish a secure system, then moves on to secure day-to-day practices, and concludes with techniques to help your system stay secure.Some of the "recipes" you'll find in this book are: Controlling access to your system from firewalls down to individual services, using iptables, ipchains, xinetd, inetd, and more Monitoring your network with tcpdump, dsniff, netstat, and other tools Protecting network connections with Secure Shell (SSH) and stunnel Safeguarding email sessions with Secure Sockets Layer (SSL) Encrypting files and email messages with GnuPG Probing your own security with password crackers, nmap, and handy scripts.This cookbook's proven techniques are derived from hard-won experience. Whether you're responsible for security on a home Linux system or for a large corporation, or somewhere in between, you'll find valuable, to-the-point, practical recipes for dealing with everyday security issues. This book is a system saver.

Anbieter: Dodax
Stand: 23.01.2020
Zum Angebot
Linux Security Cookbook
33,18 € *
ggf. zzgl. Versand

Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-follow recipes--short, focused pieces of code that administrators can use to improve security and perform common tasks securely.The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax. The book begins with recipes devised to establish a secure system, then moves on to secure day-to-day practices, and concludes with techniques to help your system stay secure.Some of the "recipes" you'll find in this book are: Controlling access to your system from firewalls down to individual services, using iptables, ipchains, xinetd, inetd, and more Monitoring your network with tcpdump, dsniff, netstat, and other tools Protecting network connections with Secure Shell (SSH) and stunnel Safeguarding email sessions with Secure Sockets Layer (SSL) Encrypting files and email messages with GnuPG Probing your own security with password crackers, nmap, and handy scripts.This cookbook's proven techniques are derived from hard-won experience. Whether you're responsible for security on a home Linux system or for a large corporation, or somewhere in between, you'll find valuable, to-the-point, practical recipes for dealing with everyday security issues. This book is a system saver.

Anbieter: Dodax AT
Stand: 23.01.2020
Zum Angebot
Arduino
15,30 € *
ggf. zzgl. Versand

Arduino ist eine Hard- und Software Open Source Plattform. Die Hardware besteht aus einem einfachen Board mit analogen und digitalen Ein- und Ausgängen. Als Rechnerkern dient ein Atmel AVR-Mikrocontroller. Beim hier verwendeten Arduino Uno ist es ein ATmega328.Arduino kommt mit einer eigenen Entwicklungsumgebung, die Editor und GCC-Einbindung bereit hält. Neben der avr-gcc-Library können weitere Arduino-Libraries eingebunden werden. Die Programmerstellung wird dadurch stark vereinfacht.Im Buch werden Programmbeispiele gezeigt, die ein recht breites Anwendungsspektrum abdecken und Anregung für eigene Erweiterungen geben sollen. Betrachtet werden AD/DA-Umsetzung und die Ansteuerung von RGB-LEDs, RTC und SD Card, RFID Reader, LCD und Motoren. Die Nutzung von Arduino im Netzwerk wird mit Webserver-, Twitter- und eMail-Anwendungen verdeutlicht. Ein umfangreiches Kapitel befasst sich mit den Interrupts des ATmega328 und deren Programmierung auf Registerebene.Es sind bereits zahlreiche Bücher zu den Arduino Grundlagen erschienen, die gleichsam elektrotechnische Grundlagen vermitteln. Hierauf wir an dieser Stelle nicht eingegangen.Angesprochen werden sollen Leser, die bereits erste Erfahrungen mit Mikrocontrollern gesammelt haben und nach einer effektiven Plattform für das Umsetzen eigener Ideen in Hard- und Software suchen. Grundkenntnisse zu den AVR-Mikrocontrollern und zur Programmiersprache C/C++ sind für das Nachvollziehen der Programmbeispiele von Vorteil.

Anbieter: Dodax AT
Stand: 23.01.2020
Zum Angebot