Mostrando 701 - 720 Resultados de 745 Para Buscar '"ASA"', tiempo de consulta: 0.05s Limitar resultados
  1. 701
    por Illescas, Gonzalo de, 1518-1583
    Publicado 1804
    Accés lliure
    Accés Lliure
    Libro
  2. 702
    Publicado 1790
    Otros
  3. 703
    por Vachon, Bob
    Publicado 2012
    “…Topics covered include *; Networking security fundamentals: concepts, policies, strategies, and more *; Securing network infrastructure: network foundations, CCP, management plane and access, and data planes (IPv6/IPv4) *; Secure connectivity: VPNs, cryptography, IPsec, and more *; Threat control and containment: strategies, ACL threat mitigation, zone-based firewalls, and Cisco IOS IPS *; Securing networks with ASA: ASDM, basic and advanced settings, and ASA SSL VPNs Bob Vachon is a professor at Cambrian College. …”
    Libro electrónico
  4. 704
  5. 705
    por Diego de la Presentación, Fray
    Publicado 1657
    991005594259706719
  6. 706
    Publicado 1768
    Accés lliure
    991006856099706719
  7. 707
  8. 708
    Publicado 1806
    Libro
  9. 709
    por Demòstenes, 384 aC-322 aC
    Publicado 1547
    991005761819706719
  10. 710
    Publicado 1762
    991004999949706719
  11. 711
  12. 712
  13. 713
  14. 714
    por Gimeno Beviá, Jordi
    Publicado 2014
    “…(BPara ello se ha analizado la regulacin actual, la jurisprudencia existente, asɚ como las soluciones que ofrece el Derecho comparado, especialmente la regulacin norteamericana y la aplicacin de los programas de cumplimiento o "compliance" como elemento indispensable para la exencin de la responsabilidad penal de la persona jurídica…”
    Datos de acceso al recurso electrónico
    Acceso a la plataforma Legalteca, busque el título una vez dentro.
    Libro
  15. 715
  16. 716
    por Barcia y Zambrana, José de
    Publicado 1686
    Libro
  17. 717
  18. 718
    Publicado 2017
    “…Review evolving security challenges associated with borderless networks, ubiquitous mobility, and consumerized IT Understand Cisco Secure Access, the Identity Services Engine (ISE), and the building blocks of complete solutions Design an ISE-enabled network, plan/distribute ISE functions, and prepare for rollout Build context-aware security policies for network access, devices, accounting, and audit Configure device profiles, visibility, endpoint posture assessments, and guest services Implement secure guest lifecycle management, from WebAuth to sponsored guest access Configure ISE, network access devices, and supplicants, step by step Apply best practices to avoid the pitfalls of BYOD secure access Set up efficient distributed ISE deployments Provide remote access VPNs with ASA and Cisco ISE Simplify administration with self-service onboarding and registration Deploy security group acc..…”
    Libro electrónico
  19. 719
    por Bhaiji, Fahim Hussain Yusuf
    Publicado 2008
    “…Filter traffic with access lists and implement security features on switches Configure Cisco IOS router firewall features and deploy ASA and PIX Firewall appliances Understand attack vectors and apply Layer 2 and Layer 3 mitigation techniques Secure management access with AAA Secure access control using multifactor authentication..…”
    Libro electrónico
  20. 720