Mostrando 1,161 - 1,180 Resultados de 1,227 Para Buscar '"Guard"', tiempo de consulta: 0.06s Limitar resultados
  1. 1161
    Publicado 2006
    “…This isn't a book of theory—it isn't full of confusing jargon and detailed concepts: this is a book of which button to push, which setting to use, when to use them, and nearly two hundred of the most closely guarded photographic "tricks of the trade" to get you shooting dramatically better-looking, sharper, more colorful, more professional-looking photos with your digital camera every time you press the shutter button. …”
    Libro electrónico
  2. 1162
    Publicado 2013
    “…Here are just a few of the leadership axioms from the "Cadet Prayer": Strengthen and increase our admiration for honest dealing and clean thinking Make us to choose the harder right instead of the easier wrong Endow us with courage that is born of loyalty to all that is noble and worthy Guard us against flippancy and irreverence in the sacred things of life Grant us new ties of friendship and new opportunities of service Honesty. …”
    Libro electrónico
  3. 1163
    Publicado 2019
    “…Skill Level Beginner/Intermediate Learn How To Determine the best monitoring services for your situation Determine the difference between passive and active response Use CloudWatch Dashboard Navigate a Route 53 Failover and Route 53 health checks Use logs and metrics to determine what is happening to your system Use thresholds and alarms Use CloudTrail, GuardDuty, AWS Config, and AWS Systems Manager Who Should Take This Course AWS architects AWS SysOps professionals AWS security professionals Beginner to intermediate AWS users Course Requirements Basic understanding of the AWS ecosystem and infrastructure architecture Working knowledge of traditional monitoring techniques Experience with automation strategies, including scripting languages Lesson descriptions Lesson 1, “Foundations of Monitoring,” covers the elements of a 360-degree view of infrastructure and the differences between passive and active responses to alarms. …”
    Video
  4. 1164
    Publicado 2013
    “…With over 200 of the most closely guarded photographic “tricks of the trade,” this book gets you shooting dramatically better-looking, sharper, more colorful, more professional-looking photos every time. …”
    Libro electrónico
  5. 1165
    por Whitaker, Andrew
    Publicado 2005
    “…By detailing the method of an attack and how to spot an attack on your network, this book better prepares you to guard against hackers. You will learn how to configure, record, and thwart these attacks and how to harden a system to protect it against future internal and external attacks. …”
    Libro electrónico
  6. 1166
    Publicado 2021
    “…Section 5 provides a detailed overview of the linkages between migration and each security actor: the military, police forces, intelligence services, border guards, interior ministries, private actors, criminal justice, parliaments, independent oversight bodies and civil society. …”
    Libro electrónico
  7. 1167
    Publicado 2022
    “…Both native and 3rd-party tool are covered. Safe guard your system's privacy data and capitalize on effectively locking down the security of your Mac computers against known threats and newer trends that continue to evolve. …”
    Libro electrónico
  8. 1168
    Sefirat ha-`omer we-khavanot ha-`omer
    ספירת העומר וכונות העומר
    Publicado 1701
    Enlace del recurso
    Manuscrito
  9. 1169
    Publicado 2022
    Libro
  10. 1170
    Publicado 1759
    991004931759706719
  11. 1171
    991004928929706719
  12. 1172
    Publicado 2004
    “…Cisco authorized self-study book for CCSP 642-521 foundation learning Gain proficiency with new features of PIX Firewall version 6.3, including OSPF, 802.1Q VLANs, NAT-T, and more Learn the ins and outs of the PIX product family and its complete feature set Use the PIX Device Manager (PDM) 3.0 to configure and manage the PIX Firewall Use advanced techniques to control traffic on your network using ACLs (access control lists), content filtering, and object groups Improve security using PIX Firewall attack guards, intrusion detection, and shunning features Learn about techniques and security considerations for configuring OSPF on PIX Firewall version 6.3 Configure scalable site-to-site and client remote access VPNs using the PIX Firewall version 6.3 Configure high-availability solutions using stateful and LAN-based failover techniques Use logical interfaces and 802.1Q trunks to scale your PIX Firewall implementation Master enterprise management and maintenance techniques using CiscoWorks Management Center for Firewalls 1.2 and Auto Update Server 1.1 Configure the PIX Firewall Services Module (FWSM) The use of firewalls-devices residing at the network perimeter to protect against intrusion-is an essential building block to even the most basic security program. …”
    Libro electrónico
  13. 1173
  14. 1174
    Publicado 2022
    Libro
  15. 1175
    Publicado 2021
    “…With 200 of the most closely guarded "tricks of the trade" for travel photographers, this book gets you shooting dramatically better-looking, sharper, more colorful, more professional-looking travel photos every time. …”
    Libro electrónico
  16. 1176
    Publicado 2015
    “…LLDP, PoE, UDLD, SPAN and RSPAN, and StackWise · Virtual LAN (VLAN) and Voice VLAN theory and configuration and VLAN pruning · Trunking and VLAN Trunking Protocol (VTP) theory and configuration · Spanning Tree Protocol (STP) port states, convergence times, and variance · PVST+ calculation and configuration · MSTP and Rapid PVST+ theory and configuration · EtherChannel port options, Layer 2 and Layer 3 configuration, and troubleshooting · HSRP, VRRP, and GLBP operation and configuration · Port security, storm control, private VLANs, dynamic ARP inspection, DHCP snooping, IP source guard, and AAA Who Should Take This Course..…”
    Video
  17. 1177
    Publicado 2007
    “…Michael not only has experience in performing security audits and assessments, but also is the author of Que Publishing’s Certified Ethical Hacker Exam Prep, CISSP Exam Cram, and is the co-author of Inside Network Security Assessment: Guarding Your IT Infrastructure by Sams Publishing. …”
    Libro electrónico
  18. 1178
    Publicado 2019
    “…Power plants can go down during peak hours, and natural resources, such as coal and natural gas, are wasted keeping power plants running at higher than peak capacity, to guard against going down due to unexpected high usage. …”
    Libro electrónico
  19. 1179
    Publicado 2023
    “…Baraka's expertise is designing and maintaining database solutions for complex business needs using a wide selection of technologies, such as Oracle RAC, ASM, Data Guard, GoldenGate, WebLogic, Database Appliance, and Enterprise Manager. …”
    Video
  20. 1180
    Publicado 2020
    “…While moats, walls, drawbridges, and castle guards can be effective, you would go broke trying to build something dragon-proof. …”
    Libro electrónico