Mostrando 661 - 680 Resultados de 1,227 Para Buscar '"Guard"', tiempo de consulta: 0.07s Limitar resultados
  1. 661
    Publicado 2013
    Tabla de Contenidos: “…Selective FunctionalityHomegrown Technology; In-house Security Intelligence Unit: FortiGuard Labs; Single Licensing Cost; Included Virtualization; Other Vendors; Evolution and Future of UTM; 2 FortiGate Hardware Overview; FortiGate Hardware Overview; The Fortinet Way; Evolution of FortiGate; Current FortiGate Solutions; Virtualized Appliances; FortiGate Custom Hardware Accelerations Overview; Features of the Last Four Generations of Content Processor (CP) ASIC Functionalities; Features of the Network Processor (NP) ASIC Functionalities; FortiGate Hardware Accelerations Behaviors…”
    Libro electrónico
  2. 662
    por Freidenreich, David M., 1977-
    Publicado 2011
    Tabla de Contenidos: “…"No distinction between Jew and Greek" : the roles of food in defining the Christ-believing community -- 7. "Be on your guard against food offered to idols" : "eidōlothuton" and early Christian identity -- 8. …”
    Click para texto completo desde fuera UPSA
    Click para texto completo desde UPSA
    Libro electrónico
  3. 663
    por André, Laurent
    Publicado 2019
    Electrónico
  4. 664
    Publicado 2017
    “…You’ll also learn how to guard against shady scripts written by users who either make mistakes or purposefully attempt to break your system. …”
    Libro electrónico
  5. 665
    por OECD
    Publicado 2022
    Tabla de Contenidos: “…Intro -- Foreword -- Acknowledgements -- Executive Summary -- 1 Introduction -- The threat of illicit trade -- Illicit trade in the MENA region -- References -- 2 Yemen -- Background to current conflict -- Illicit trade dynamics during the current conflict -- Background -- Weapons -- Illicit trade in fuel and oil -- Human Trafficking -- Narcotics -- Unregulated Financial Networks, illicit trade and illicit capital flows -- Heritage and antiquities -- Wildlife in Socotra -- Counterfeits -- Existing governance structure -- Resolution 2216/UNVIM -- IRG policy to combat Iranian fuel imports -- IRG and Saudi Led Coalition prohibited items lists: -- Yemeni waters -- Saudi Arabia -- Saudi-led Coalition / UAE -- Combined Maritime Forces (CMF) and Joint Task Force CTF-151 -- Ministry of Transport and Yemen Coast Guard -- Management of Yemeni seaports and hydrocarbon export terminals -- References -- 3 Libya -- Background to current conflict -- Illicit trade in Libya -- Weapons -- Narcotics -- Human trafficking -- Illicit Trade in cultural artefacts -- Quantitative picture - illicit trade in counterfeits in Libya -- 4 Syria -- Background to current conflict -- Illicit trade in Syria -- Weapons -- Narcotics -- Illicit trade in water rights -- Human trafficking -- Illicit trade in cultural artefacts -- Abuse of on-line environment -- Quantitative picture - illicit trade in counterfeits in Syria -- 5 Iraq -- Background to current conflict -- Illicit trade in Iraq -- Weapons -- Narcotics -- Illicit trade in human organs -- Heritage and antiquities -- Quantitative picture - illicit trade in counterfeits in Iraq -- 6 Concluding remarks -- Annex A.…”
    Libro electrónico
  6. 666
    Publicado 2006
    “…This book teaches you how to: Configure basic parameters for Catalyst switches, including SSH, system host name, and IP address management in both Cisco IOS and Cisco CatOS Employ private VLANs, VTP, and 802.1Q trunking in Cisco multilayer switched networks Deploy 802.1D, 802.1D-2004, 802.1s, and 802.1w STP and utilize advanced spanning-tree features such as UplinkFast and root guard Enable Layer 2 features such as including aggressive-mode UDLD, CDP, and Jumbo Ethernet Frames Deploy Inter-VLAN routing Implement QoS on Catalyst switches at Layers 2 and 3 Enable Layer 2 and Layer 3 multicasting features such as IGMP snooping Employ VRRP, HSRP, and Supervisor Engine redundancy for high availability Describe the requirements for IP telephony in multilayer switched networks Implement control plane and data plane security features such as 802.1X and DHCP snooping Deploy Ethernet over long distances with Metro Ethernet solutions such as DWDM and CDWM CCNP Self-Study: Building Cisco Multilayer Switched Networks (BCMSN) , Third Edition, is a Cisco® authorized, self-paced learning tool for CCNP® switching foundation learning. …”
    Libro electrónico
  7. 667
    Publicado 2014
    “…But it's not about tearing down the old guard. It's about building, it's about creating, it's about breathing life into groundbreaking new ideas. …”
    Libro electrónico
  8. 668
    Publicado 2020
    “…Thousands of left-wing militants took up arms and fought the Spanish army in the streets of Oviedo while in the rear-guard committees proclaimed a revolutionary dawn. …”
    Libro electrónico
  9. 669
    por Azis, Iwan J.
    Publicado 2024
    “…This open access book thoroughly investigates the domain of policy design tailored specifically for micro, small, and medium enterprises (MSMEs) with a central emphasis on harmonizing these policies with the preexisting social capital inherent to these enterprises, consistent with the mandate of Bank Indonesia to guard price stability and to promote financial stability, inclusive, and sustainable growth. …”
    Libro electrónico
  10. 670
    Publicado 2014
    “…Paul Crump, who robbed the Chicago stockyards on March 20, 1953, with four other black men, shot one guard to death. He was sentenced to die in the electric chair. …”
    Recurso relacionado
    DVD
  11. 671
    Publicado 2013
    “…Second, our understanding of human behavior is rooted in this outdated model. Driven by the old guard, sustainability has become little more than a fashionable idea. …”
    Libro electrónico
  12. 672
  13. 673
    por Marcus, Paul, 1953-
    Publicado 2010
    Tabla de Contenidos: “…Chapter Four: On reading a sacred book:On reading a sacred book: the wisdom of Ecclesiastes and its significance for psychoanalysis the wisdom of Ecclesiastes and its significance for psychoanalysisChapter Five: "Guard your tongue": on the psychological meaning of gossip; Chapter Six: The life and soul of good parenting:The life and soul of good parenting: on wanting, having, and raising childrenon wanting, having, and raising children; Chapter Seven: On feeling altogether miserable:On feeling altogether miserable: getting help through psychotherapygetting help through psychotherapy…”
    Libro electrónico
  14. 674
    Publicado 2015
    Tabla de Contenidos: “…Interface with other IPR Systems; 6.7. Guarding against Abuse; 6.8. Domestic IP Infrastructure (IP Office, Courts, Professionals); 6.9. …”
    Libro electrónico
  15. 675
    por Finnegan, Ruth H.
    Publicado 2011
    Tabla de Contenidos: “…-- Controlling Quotation: The Regulation of Others' Words and Voices -- Who plants and guards the flowers? Imitation, authorship, and plagiarism -- Constraining and allowing quotation: flower or weed? …”
    Libro electrónico
  16. 676
    Publicado 2002
    Tabla de Contenidos: “…part Part I PSYCHOMETRIC APPROACH -- chapter 1 Tracing Psychology’s Invisible giant and Its Visible Guards / chapter 2 g: A Diminutive General / chapter 3 Psychometric g: Definition and Substantiation / chapter 4 Practical Implications of General Intelligence and PASS Cognitive Processes / part Part II GENETIC-EPISTEMOLOGICAL APPROACH -- chapter 5 General Intelligence: Measurement, Correlates, and Interpretations of the Cultural-Genetic Construct / chapter 6 Is There a General Factor of Cognitive Development? …”
    Libro electrónico
  17. 677
    por McFedries, Paul
    Publicado 2009
    Tabla de Contenidos: “…Make Your Internet Connection More SecureChapter 3: Browsing the World Wide Web; Introducing the World Wide Web; Understanding Web Browsing Basics; Learn About Internet Explorer; Discover Firefox; Browse with Safari; Browse Multiple Web Sites Using Tabs; Fill In a Web Form; Save Your Favorite Sites; Download Files to Your Computer; Save Web Data to Your Computer; Understanding Web Error Messages; Chapter 4: Surfing the Web Safely and Securely; Protect Yourself on the Web; Protect Your Children on the Web; Set the Web Security Level; Protect Yourself from Identity Theft; Guard Against Spyware…”
    Libro electrónico
  18. 678
    Publicado 2020
    “…The article presents the analysis of the specific socio-psychological characteristics of the people who confidentially assist the operational units of the State Border Guard Service of Ukraine, with the aim of knowing the typical socio-psychological profile of the confidential informant. …”
    Enlace del recurso
    Artículo digital
  19. 679
  20. 680
    por Arquilla, John
    Publicado 1999
    “…In the case of a U.S. information strategy, this requires balancing the need to guard and secure access to many informational capabilities and resources, with the opportunity to achieve national aims by fostering as much openness as practicable. …”
    Libro electrónico