Mostrando 103,181 - 103,200 Resultados de 104,490 Para Buscar '"DOS"', tiempo de consulta: 0.28s Limitar resultados
  1. 103181
    Publicado 2018
    Tabla de Contenidos: “…Configure/manage platform services controller (PSC) -- Configure/manage VMware Certificate Authority (VMCA) -- Enable/disable SSO users -- Upgrade a single/complex PSC installation -- Configure SSO policies -- Add an ESXi host to an AD domain -- Configure and manage KMS for VM encryption -- Objective 1.4 - Secure vSphere Virtual Machines -- Enable/disable VM encryption -- Describe VM Secure Boot -- Harden virtual machine access -- Control VMware Tools installation -- Control VM data access -- Configure virtual machine security policies -- Harden a virtual machine against DoS attacks -- Control VM-VM communications -- Control VM device connections -- Configure network security policies -- Configure VM encrypted vMotion -- What is missing -- Review questions -- Summary -- Chapter 2: Configure and Administer vSphere 6.x Networking -- Objective 2.1 - Configure policies/features and verify vSphere networking -- Creating/deleting a vSphere Distributed Switch -- Adding/removing ESXi hosts from a vSphere Distributed Switch -- Adding/configuring/removing dvPort groups -- Adding/removing uplink adapters to dvUplink groups -- Configuring vSphere Distributed Switch general and dvPort group settings -- Creating/configuring/removing virtual adapters -- Migrating virtual machines to/from a vSphere Distributed Switch -- Configuring LACP on vDS given design parameters -- Describing vDS Security policies/settings -- Configuring dvPort group blocking policies -- Configuring load balancing and failover policies -- Configuring VLAN/PVLAN settings for VMs given communication requirements -- Configuring traffic shaping policies -- Enabling TCP Segmentation Offload support for a virtual machine -- Enabling jumbo frames support on appropriate components -- Recognizing the behavior of vDS auto-rollback…”
    Libro electrónico
  2. 103182
    Publicado 2023
    Tabla de Contenidos: “…Intro -- Table of Contents -- Series Page -- Title Page -- Copyright Page -- Preface -- 1 Cyber Quantum Computing (Security) Using Rectified Probabilistic Packet Mark for Big Data -- 1.1 Introduction -- 1.2 Denial-of-Service Attacks -- 1.3 Related Work -- 1.4 Proposed Methodology -- 1.5 Trace Back Mechanism for Rectified Probabilistic Packet Marking -- 1.6 Conclusion -- References -- 2 Secure Distinctive Data Transmission in Fog System Using Quantum Cryptography -- 2.1 Introduction -- 2.2 Properties of Quantum Computing -- 2.3 Applications of Quantum Computing -- 2.4 Background -- 2.5 Literature Survey -- 2.6 Proposed Work -- 2.7 Analysis of the Study -- 2.8 Conclusion -- References -- 3 DDoS Attack and Defense Mechanism in a Server -- 3.1 Introduction -- 3.2 DoS Attack -- 3.3 DDoS Attack -- 3.4 DDoS Mitigation -- 3.5 Conclusion -- Acknowledgement -- References -- 4 Dark Web Content Classification Using Quantum Encoding -- 4.1 Introduction -- 4.2 Related Work -- 4.3 Proposed Approach -- 4.4 Result and Discussion -- 4.5 Conclusion -- References -- 5 Secure E-Voting Scheme Using Blockchain -- 5.1 Introduction -- 5.2 Literature Survey -- 5.3 Implementation and Methodology -- 5.4 Result Analysis &amp -- Output -- 5.5 Conclusion and Future Directions -- References -- 6 An Overview of Quantum Computingâ€"Based Hidden Markov Models -- 6.1 Introduction -- 6.2 Elaboration of Hidden Quantum Markov Model -- 6.3 Example of HQMMs (Isolated Word Recognition in Action) -- 6.4 Matching of State Observation Density -- 6.5 Conclusion and Results -- References -- 7 Artificial Intelligence and Qubit-Based Operating Systems: Current Progress and Future Perspectives -- 7.1 Introduction to OS, AI and ML -- 7.2 Learning Configurations -- 7.3 Building ML Models -- 7.4 Work Done in Improving Process Scheduling…”
    Libro electrónico
  3. 103183
    por Pandey, Hari Mohan
    Publicado 2012
    Tabla de Contenidos: “…-- 2.8 Data Types in Java -- 2.9 Structure of a Java Program -- 2.10 Your First Program in Java -- 2.10.1 Compiling and Running the Program (DOS Based) -- 2.11 Java is Free Form -- 2.12 Programming Examples -- 2.13 Reading Using Scanner -- 2.14 Command Line Arguments -- 2.15 Using Constants -- 2.16 Bytecode and JVM -- 2.16.1 What is the Java Virtual Machine? …”
    Libro electrónico
  4. 103184
  5. 103185
  6. 103186
  7. 103187
  8. 103188
  9. 103189
  10. 103190
  11. 103191
  12. 103192
  13. 103193
  14. 103194
  15. 103195
  16. 103196
  17. 103197
  18. 103198
  19. 103199
  20. 103200