Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 31
- Normalización 29
- Normas generales 29
- Security measures 28
- Historia 26
- Engineering & Applied Sciences 25
- Electrical & Computer Engineering 22
- Telecommunications 22
- Economics 16
- Firewalls (Computer security) 11
- Història 11
- Educación superior 10
- Documentales 9
- Novela sueca 9
- Obres anteriors al 1800 9
- Medios de comunicación social 8
- Certification 7
- Examinations 7
- History 7
- Pintura 7
- Management 6
- metodología 6
- Antropología 5
- Antropología social 5
- Biografia 5
- Crítica e interpretación 5
- Dret 5
- Electronic data processing personnel 5
- Etnología 5
- Legislació 5
-
701
-
702
-
703por Vachon, Bob“…Topics covered include *; Networking security fundamentals: concepts, policies, strategies, and more *; Securing network infrastructure: network foundations, CCP, management plane and access, and data planes (IPv6/IPv4) *; Secure connectivity: VPNs, cryptography, IPsec, and more *; Threat control and containment: strategies, ACL threat mitigation, zone-based firewalls, and Cisco IOS IPS *; Securing networks with ASA: ASDM, basic and advanced settings, and ASA SSL VPNs Bob Vachon is a professor at Cambrian College. …”
Publicado 2012
Libro electrónico -
704
-
705
-
706
-
707
-
708
-
709
-
710
-
711
-
712
-
713
-
714por Gimeno Beviá, Jordi“…(BPara ello se ha analizado la regulacin actual, la jurisprudencia existente, asɚ como las soluciones que ofrece el Derecho comparado, especialmente la regulacin norteamericana y la aplicacin de los programas de cumplimiento o "compliance" como elemento indispensable para la exencin de la responsabilidad penal de la persona jurídica…”
Publicado 2014
Datos de acceso al recurso electrónico
Acceso a la plataforma Legalteca, busque el título una vez dentro.
Libro -
715
-
716
-
717
-
718Publicado 2017“…Review evolving security challenges associated with borderless networks, ubiquitous mobility, and consumerized IT Understand Cisco Secure Access, the Identity Services Engine (ISE), and the building blocks of complete solutions Design an ISE-enabled network, plan/distribute ISE functions, and prepare for rollout Build context-aware security policies for network access, devices, accounting, and audit Configure device profiles, visibility, endpoint posture assessments, and guest services Implement secure guest lifecycle management, from WebAuth to sponsored guest access Configure ISE, network access devices, and supplicants, step by step Apply best practices to avoid the pitfalls of BYOD secure access Set up efficient distributed ISE deployments Provide remote access VPNs with ASA and Cisco ISE Simplify administration with self-service onboarding and registration Deploy security group acc..…”
Libro electrónico -
719por Bhaiji, Fahim Hussain Yusuf“…Filter traffic with access lists and implement security features on switches Configure Cisco IOS router firewall features and deploy ASA and PIX Firewall appliances Understand attack vectors and apply Layer 2 and Layer 3 mitigation techniques Secure management access with AAA Secure access control using multifactor authentication..…”
Publicado 2008
Libro electrónico -
720por López de la Huerta, José
Publicado 1799Biblioteca Universitat Ramon Llull (Otras Fuentes: Bibliotecas de la Diócesis de Teruel y Albarracín, Biblioteca Central de Capuchinos de España)Accés Lliure
Accés lliure
Libro