Mostrando 8,361 - 8,380 Resultados de 8,486 Para Buscar '"P2"', tiempo de consulta: 0.43s Limitar resultados
  1. 8361
    por Gavin, Lee
    Publicado 2004
    Tabla de Contenidos: “…Configure the AS2 connection -- 10.1 Install iSoft for supplier -- 10.1.1 Run Buildcfg5 -- 10.1.2 p2pagent.cfg -- 10.1.3 Generate keys -- 10.2 Install iSoft for test receiver -- 10.3 Unit test for send RCIR and receive MDN -- Chapter 11. …”
    Libro electrónico
  2. 8362
  3. 8363
  4. 8364
  5. 8365
  6. 8366
  7. 8367
  8. 8368
  9. 8369
  10. 8370
  11. 8371
  12. 8372
    por Antoine, Paul Gabriel (S.I.)
    Publicado 1778
    Libro
  13. 8373
  14. 8374
  15. 8375
  16. 8376
  17. 8377
  18. 8378
    Publicado 2019
    “…Run an Ethereum client, create and transmit basic transactions, and program smart contracts Learn the essentials of public key cryptography, hashes, and digital signatures Understand how "wallets" hold digital keys that control funds and smart contracts Interact with Ethereum clients programmatically using JavaScript libraries and Remote Procedure Call interfaces Learn security best practices, design patterns, and anti-patterns with real-world examples Create tokens that represent assets, shares, votes, or access control rights Build decentralized applications using multiple peer-to-peer (P2P) components…”
    Libro electrónico
  19. 8379
  20. 8380
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1 - Effective and Efficient Security Management and Operations in Azure -- Chapter 1: Identity Foundations with Azure Active Directory and Microsoft Entra -- Protecting users' identities and securing the value chain - the importance of IAM in decentralized organizations -- Authentication and authorization in Azure -- Engaging and collaborating with employees, partners, and customers -- The significance of digital identities in the modern IT landscape -- Modernizing your IAM with Microsoft Azure AD -- Life cycle management -- Leveraging the Microsoft Cloud Adoption Framework -- Azure AD terminology, explained -- Securing applications with the Microsoft identity platform -- Securing cloud-based workloads with Microsoft Entra's identity-based access control -- Azure AD -- Microsoft Entra Permissions Management -- Microsoft Entra Verified ID -- Microsoft Entra workload identities -- Microsoft Entra Identity Governance -- Microsoft Entra admin center -- Summary -- Chapter 2: Managing Access to Resources Using Azure Active Directory -- Understanding the need for IAM -- Understanding Azure AD (now Microsoft Entra ID) -- Exploring the Microsoft Entra ID editions -- Microsoft Entra ID Premium P2 -- Understanding the capabilities of Microsoft Entra ID -- Task 1 - creating a new Azure AD tenant using the Azure portal -- Task 2 - creating and configuring Azure AD users -- Task 3 - creating an Azure AD group with dynamic membership -- Hybrid identity - integrating your on-premises directories (Azure AD Connect sync and cloud sync) -- Azure AD Connect sync -- Azure AD Connect cloud sync -- Azure AD Application Proxy -- Azure AD Conditional Access -- Azure AD PIM -- Assigning roles in PIM -- Summary…”
    Libro electrónico