Mostrando 4,041 - 4,060 Resultados de 5,483 Para Buscar '"suite"', tiempo de consulta: 0.13s Limitar resultados
  1. 4041
    Publicado 2023
    Tabla de Contenidos: “…-- Types of computer networks -- Local Area Networks -- Wide Area Networks -- Virtual Private Networks -- Introducing network protocols -- Packet switching -- TCP/IP suite -- Understanding network issues -- Security -- Packet loss -- Latency -- Introducing the Unreal Engine multiplayer system -- Network modes and server types -- The replication system -- Network role -- Pawns and PlayerControllers -- Relevance and priority -- Remote Procedure Calls -- Summary -- Credits -- Chapter 3: Testing the Multiplayer System with a Project Prototype -- Technical requirements -- Creating a multiplayer game prototype -- Setting up the project from a template -- Adding Quixel Megascans -- Modifying the Player Controller -- Testing a multiplayer game locally -- Playing as a Listen Server -- Updating over the network -- Adding additional character spawn points -- Updating properties over the network…”
    Libro electrónico
  2. 4042
    Tabla de Contenidos: “…Tarifs d'accès dégroupé aux services de la boucle locale et prix indicatifs des services de détail en aval, hors TVA (au 1er septembre 2001)1 (suite) -- Tableau A.8. Tarifs concernant les boucles locales au Canada : prix de détail et tarifs d'accès à la boucle locale dégroupée (BLD) -- Chapitre 3. …”
    Libro electrónico
  3. 4043
    Tabla de Contenidos: “…L'Accès aux Marchés 19 -- Remarques générales 19 -- Structure des droits prévalant dans les pays de l'OCDE à la suite du cycle d'Uruguay 19 -- Contingents tarifaires 33 -- Aspects économiques des différentes approches d'attribution des contingents tarifaires 42 -- Part III. …”
    Libro electrónico
  4. 4044
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Bypassing Network Access Control -- Technical requirements -- Bypassing MAC filtering - considerations for the physical assessor -- Configuring a Kali wireless access point to bypass MAC filtering -- Design weaknesses - exploiting weak authentication mechanisms -- Capturing captive portal authentication conversations in the clear -- Layer-2 attacks against the network -- Bypassing validation checks -- Confirming the Organizationally Unique Identifier -- Passive Operating system Fingerprinter -- Spoofing the HTTP User-Agent -- Breaking out of jail - masquerading the stack -- Following the rules spoils the fun - suppressing normal TCP replies -- Fabricating the handshake with Scapy and Python -- Summary -- Questions -- Further reading -- Chapter 2: Sniffing and Spoofing -- Technical requirements -- Advanced Wireshark - going beyond simple captures -- Passive wireless analysis -- Targeting WLANs with the Aircrack-ng suite -- WLAN analysis with Wireshark -- Active network analysis with Wireshark -- Advanced Ettercap - the man-in-the-middle Swiss Army Knife -- Bridged sniffing and the malicious access point -- Ettercap filters - fine-tuning your analysis -- Killing connections with Ettercap filters -- Getting better - spoofing with BetterCAP -- ICMP redirection with BetterCAP -- Summary -- Questions -- Further reading -- Chapter 3: Windows Passwords on the Network -- Technical requirements -- Understanding Windows passwords -- A crash course on hash algorithms -- Password hashing methods in Windows -- If it ends with 1404EE, then it's easy for me - understanding LM hash flaws -- Authenticating over the network-a different game altogether -- Capturing Windows passwords on the network…”
    Libro electrónico
  5. 4045
    Publicado 2018
    Tabla de Contenidos: “…VoIP exploitation -- VoIP attacks -- Denial-of-Service -- Eavesdropping -- SIP attacks -- SIP registration hijacking -- Spam over Internet Telephony -- Embedding malware -- Viproy - VoIP penetration testing kit -- VoLTE Exploitation -- VoLTE attacks -- SiGploit - Telecom Signaling Exploitation Framework -- Summary -- Chapter 10: Insecure VPN Exploitation -- Cryptography -- Cryptosystems -- Ciphers -- Classical ciphers -- Modern ciphers -- Kerckhoffs' principle for cryptosystems -- Cryptosystem types -- Symmetric cryptosystem -- Asymmetric cryptosystem -- Hash functions and message integrity -- Digital signatures -- Steganography -- Key management -- Cryptographic attacks -- VPN fundamentals -- Tunneling protocols -- IPSec -- Secure Sockets Layer/Transport Layer Security -- SSL attacks -- DROWN attack (CVE-2016-0800) -- POODLE attack (CVE-2014-3566) -- BEAST attack (CVE-2011-3389) -- CRIME attack (CVE-2012-4929) -- BREACH attack (CVE-2013-3587) -- Heartbleed attack -- Qualys SSL Labs -- Summary -- Chapter 11: Routing and Router Vulnerabilities -- Routing fundamentals -- Exploiting routing protocols -- Routing Information Protocol -- RIPv1 reflection DDoS -- Open Shortest Path First -- OSPF attacks -- Disguised LSA -- MaxAge LSAs -- Remote false adjacency -- Seq++ attack -- Persistent poisoning -- Defenses -- Interior Gateway Routing Protocol -- Enhanced Interior Gateway Routing Protocol -- Border Gateway Protocol -- BGP attacks -- Exploiting routers -- Router components -- Router bootup process -- Router attacks -- The router exploitation framework -- Summary -- Chapter 12: Internet of Things Exploitation -- The IoT ecosystem -- IoT project architecture -- IoT protocols -- The IoT communication stack -- IP Smart Objects protocols suite -- Standards organizations -- IoT attack surfaces -- Devices and appliances -- Firmware -- Web interfaces…”
    Libro electrónico
  6. 4046
    Publicado 2018
    Tabla de Contenidos: “…Identifying HTTP methods using Nmap -- Testing web servers using auxiliary modules in Metasploit -- Identifying HTTPS configuration and issues -- OpenSSL client -- Scanning TLS/SSL configuration with SSLScan -- Scanning TLS/SSL configuration with SSLyze -- Testing TLS/SSL configuration using Nmap -- Spidering web applications -- Burp Spider -- Application login -- Directory brute forcing -- DIRB -- ZAP's forced browse -- Summary -- Chapter 4: Authentication and Session Management Flaws -- Authentication schemes in web applications -- Platform authentication -- Basic -- Digest -- NTLM -- Kerberos -- HTTP Negotiate -- Drawbacks of platform authentication -- Form-based authentication -- Two-factor Authentication -- OAuth -- Session management mechanisms -- Sessions based on platform authentication -- Session identifiers -- Common authentication flaws in web applications -- Lack of authentication or incorrect authorization verification -- Username enumeration -- Discovering passwords by brute force and dictionary attacks -- Attacking basic authentication with THC Hydra -- Attacking form-based authentication -- Using Burp Suite Intruder -- Using THC Hydra -- The password reset functionality -- Recovery instead of reset -- Common password reset flaws -- Vulnerabilities in 2FA implementations -- Detecting and exploiting improper session management -- Using Burp Sequencer to evaluate the quality of session IDs -- Predicting session IDs -- Session Fixation -- Preventing authentication and session attacks -- Authentication guidelines -- Session management guidelines -- Summary -- Chapter 5: Detecting and Exploiting Injection-Based Flaws -- Command injection -- Identifying parameters to inject data -- Error-based and blind command injection -- Metacharacters for command separator -- Exploiting shellshock -- Getting a reverse shell…”
    Libro electrónico
  7. 4047
    Publicado 2021
    Tabla de Contenidos: “…-- Culture Fit -- Ability to Buy -- Motivation -- Competence in M&amp -- A -- Trust and Alignment of Values -- Vetting Buyers for the Right Fit -- Research -- M&amp -- A Professionals -- Interview Others -- Build Personal Relationships -- Become a Customer or Vendor -- Partner Up -- Using Partnerships to Trigger Acquisitions -- How to Make Contact with Interested Parties -- Introductions and Referrals -- Networking -- Cold Emails -- Be So Good They Can't Ignore You -- Move Up the List in Reverse Order -- Use Brokers -- The Golden Rule in Making Contact -- Chapter 9 The Communication Process with Buyers -- Liabilities and Responsibilities -- How to Handle Communications -- Gauging Initial Interest -- Nailing the Follow-Up -- Awareness and Discovery -- Learning -- Consideration -- Comparison Shopping -- Trust -- Due Diligence -- Negotiation -- Finding the Decision-Maker -- C-Suite Executives -- Corporate Development -- Advisors -- Transaction Leads -- Business Unit Leaders -- Chapter 10 Preparing for a Successful First Meeting…”
    Libro electrónico
  8. 4048
    Publicado 2021
    Tabla de Contenidos: “…Configuring, linking, and triggering your App Clip -- Testing your App Clip Experiences -- Summary -- Chapter 15: Recognition with Vision Framework -- Technical requirements -- Introduction to the Vision framework -- Recognizing text in images -- Region of interest -- Recognizing hand landmarks in real time -- Understanding hand landmarks -- Implementing hand detection -- Summary -- Chapter 16: Creating Your First Widget -- Technical requirements -- Introducing widgets and WidgetKit -- Widget options -- Widget guidelines -- Developing your first widget -- Creating a widget extension -- Implementing multiple-size widgets -- Providing the widget with data and configuration -- Refreshing the widget's data -- Summary -- Chapter 17: Using Augmented Reality -- Understanding ARKit -- Understanding how ARKit renders content -- Understanding how ARKit tracks the physical environment -- Using ARKit Quick Look -- Implementing the ARKit Quick Look view controller -- Exploring SpriteKit -- Creating a SpriteKit scene -- Exploring SceneKit -- Creating a basic SceneKit scene -- Implementing an Augmented Reality gallery -- Adding image tracking -- Preparing images for tracking -- Building the image tracking experience -- Placing your own content in 3D space -- Summary -- Chapter 18: Creating a macOS app with Catalyst -- Technical requirements -- Discovering Mac Catalyst -- Exploring new Mac Catalyst features -- Building your first Mac Catalyst app -- Exploring the iPad app -- Scaling your iPad app for Mac -- Optimizing your iPad app for Mac -- Summary -- Chapter 19: Ensuring App Quality with Tests -- Testing logic with XCTest -- Understanding what it means to test code -- Setting up a test suite with XCTest -- Optimizing code for testability -- Introducing the question loader -- Mocking API responses -- Using models for consistency…”
    Libro electrónico
  9. 4049
    Publicado 2021
    Tabla de Contenidos: “…Directory services -- Security services -- What's Important in a Server -- Scalability -- Reliability -- Availability -- Service and support -- Components of a Server Computer -- Motherboard -- Processor -- Memory -- Hard drives -- Network interfaces -- Video -- Power supply -- Considering Server Form Factors -- Tower case -- Rack mount -- Blade servers -- Considering Virtualization -- Chapter 6 Cloud Computing -- Introducing Cloud Computing -- Looking at the Benefits of Cloud Computing -- Detailing the Drawbacks of Cloud Computing -- Examining Three Basic Kinds of Cloud Services -- Applications -- Platforms -- Infrastructure -- Public Clouds versus Private Clouds -- Introducing Some of the Major Cloud Providers -- Amazon -- Google -- Microsoft -- Getting Into the Cloud -- Book 2 Understanding Network Protocols -- Chapter 1 Network Protocols and Standards -- Understanding Protocols -- Understanding Standards -- Seeing the Seven Layers of the OSI Reference Model -- The physical layer -- The data link layer -- The network layer -- Logical addressing -- Routing -- The transport layer -- The session layer -- The presentation layer -- The application layer -- Following a Packet through the Layers -- The Ethernet Protocol -- Standard Ethernet -- Fast Ethernet -- Gigabit Ethernet -- Beyond gigabit -- The TCP/IP Protocol Suite -- IP -- TCP -- UDP -- Other Protocols Worth Knowing About -- Chapter 2 TCP/IP and the Internet -- What Is the Internet? …”
    Libro electrónico
  10. 4050
    Android smartphones for seniors
    Android Smartphones For Seniors For Dummies
    Publicado 2022
    Tabla de Contenidos: “…Exercise Your Android Camera's Capabilities -- Just point-and-shoot either stills or video -- Add interest with your camera's tools -- Expand your reach with Google Lens -- Access camera features on the scrolling menu -- Go Pro with Pro Mode -- Discovering the Pro settings -- Applying the Pro settings -- Edit Your Photos -- Finding editing options -- Applying the photo editor's tools -- Playing with filters, colors, and more -- Part 4 Exploring Android Apps -- Chapter 13 Preinstalled Tools You Want to Use -- Take a Shortcut to Features with Android Quick Settings -- Customizing the Quick Settings -- Meeting popular Quick Settings -- Quick Settings That Offer Valuable Options -- Opting for Dark mode -- Maximizing eye comfort -- Avoiding interruptions -- Sharing with "close" friends -- Phone-Resident Android Apps -- Recording your voice -- Taking a screen shot -- Staying on task with Google Calendar -- Frequenting the Google Play Store -- Chapter 14 Google Mobile Services Apps for Android -- Find Popular Google Apps -- Google Photos -- Storing and retrieving -- Syncing and deleting -- Sharing -- Searching -- Google Maps -- Finding your way to an appointment -- Employing the Directions screen options -- Find My Device -- Take Note(s) with Google Keep -- Chapter 15 Apps You Might Like in Google Play Store -- Establish App Privacy Permissions -- Connect to Radio (Yes, Radio), Podcasts, and Music -- Configuring your speakers' volume -- Making a wired connection -- Using a Bluetooth connection -- Find Favorite and Fun Apps - a Consensus -- Radio, podcasts, and music -- Video apps -- Travel -- Games -- News -- Books -- Engage Social Media -- Try Out the Android Accessibility Suite -- Part 5 Android Today and Tomorrow -- Chapter 16 Marsha's MUST-DO Things for Your Phone -- Make the Orientation Decision -- Configure Do Not Disturb…”
    Libro electrónico
  11. 4051
    Tabla de Contenidos: “…Priorités des pays de la zone euro telles que définies dans Objectif croissance -- Graphique 2.4. Gains potentiels suite à un vaste ensemble de réformes -- La hausse de la croissance à moyen terme contribuerait à améliorer la dynamique de la dette -- Graphique 2.5. …”
    Libro electrónico
  12. 4052
    Publicado 2017
    Tabla de Contenidos: “…. -- Obtaining information from subversion source code control systems -- Auditing the strength of cipher suites in SSL servers -- How to do it... -- How it works... -- There's more... -- Scrapping e-mail accounts from web servers -- How to do it... -- How it works... -- There's more... -- Chapter 5: Scanning Databases -- Introduction -- Listing MySQL databases -- How to do it... -- How it works... -- There's more... -- Listing MySQL users -- How to do it... -- How it works... -- There's more... -- Listing MySQL variables -- How to do it... -- How it works... -- There's more... -- Brute forcing MySQL passwords -- How to do it... -- How it works... -- There's more... -- Finding root accounts with an empty password in MySQL servers -- How to do it... -- How it works... -- There's more... -- Detecting insecure configurations in MySQL servers -- How to do it... -- How it works... -- There's more... -- Brute forcing Oracle passwords -- How to do it... -- How it works…”
    Libro electrónico
  13. 4053
    Publicado 2014
    Tabla de Contenidos: “…Predefined Queries -- Getting Help with Discoverer -- Summary -- Chapter 2: Users and Databases -- What Starts Right Stays Right -- The Responsibility of the End User -- Your Business -- Your Reporting Requirements -- Your Database -- The Discoverer Library Concept -- The Definition of a Library -- The Definition of a Library Manager -- The Report Writer Concept -- The Definition of a Report Writer -- The Benefits of Having Report Writers -- The Benefits of Being a Report Writer -- Choosing Your Report Writers -- Summary -- Chapter 3: Getting Started in Discoverer -- Key Personnel -- Discoverer Manager -- Library Manager -- Database Administrator -- E-Business Suite Administrator -- Report Writers -- Gaining Access to Discoverer -- Key Definitions -- Workbooks and Worksheets -- Queries -- Reports -- Libraries -- Sticky Features -- Main Features of Discoverer -- Discoverer Login Sequence -- Connecting Using Discoverer Desktop -- Launching 11g Discoverer Plus or Viewer -- Starting a Workbook -- Summary -- Chapter 4: The Workbook Wizard: The Essential Steps -- The Workbook Wizard -- The Workbook Wizard Steps -- A Simple Workflow -- The Workbook Wizard Options…”
    Libro electrónico
  14. 4054
    Publicado 2017
    Tabla de Contenidos: “…. -- Managing TLS cipher suites -- Getting ready -- How to do it... -- How it works... -- There's more... -- Configuring a central certificate store -- Getting ready -- How to do it... -- How it works... -- Configuring IIS bindings -- Getting ready -- How to do it... -- How it works... -- There's more ... -- Configuring IIS logging and log files -- Getting ready -- How to do it... -- How it works... -- There's more... -- Managing applications and application pools -- Getting ready -- How to do it... -- How it works... -- There's more... -- Managing and monitoring network load balancing -- Getting ready -- How to do it... -- How it works... -- There's more... -- Chapter 11: Managing Hyper-V -- Introduction -- Installing and configuring Hyper-V feature -- Getting ready -- How to do it... -- How it works... -- There's more... -- Using Windows PowerShell Direct -- Getting ready…”
    Libro electrónico
  15. 4055
    Publicado 2020
    Tabla de Contenidos: “…Naming your document -- Exporting documents -- Collaboration with Sheets -- Tracking Versions of Your Spreadsheet -- Using Sheets Offline -- Chapter 10 Preparing Presentations -- Navigating Google Slides -- Creating your presentation -- Surveying the Slides menu area -- Customizing your view -- Styling Your Presentation -- Changing background color or background image -- Applying a different theme -- Importing a presentation theme -- Working with Text -- Adding and deleting text boxes -- Resizing, moving, and rotating a text box -- Copying and pasting text boxes -- Formatting text -- Aligning your text -- Clearing formatting -- Working with Images -- Adding images to your presentation -- Resizing, rotating, and relocating images -- Cropping images -- Viewing Presentations in Presentation Mode -- Presenting on additional displays -- Using Presenter View -- Saving Presentations -- Naming your presentation -- Exporting your presentation -- Collaborating in Slides -- Tracking Revisions -- Using Slides Offline -- Chapter 11 Using Other Office Tools -- Getting Started with Office Online -- Verifying your Office account -- OneDrive -- Outlook Email -- Outlook Calendar -- Outlook Contacts -- Word -- Excel -- PowerPoint -- OneNote -- Collaborating in OneDrive -- Skype -- Checking Out Apple's iCloud Suite -- iCloud file storage -- Pages -- Numbers -- Keynote -- Using Adobe Reader -- Part 3 The Chromebook Recreational Vehicle -- Chapter 12 Mustering Your Music -- Getting Started with Google Play -- Creating a Standard Account -- Upgrading to a Premium Account -- Accessing Music in Google Play -- Google Play Library -- Google Play Radio -- Mini Player -- Searching for an artist's station -- Purchasing music you hear on a radio station -- Uploading music -- Creating Playlists -- Sharing playlists -- Playing music on external devices…”
    Libro electrónico
  16. 4056
    Publicado 2022
    Tabla de Contenidos: “…(d) The Appropriate Representatives -- (e) A Structured Process for the Selection of Data -- (f) High-Quality Documentation Which Provides Clear Reasoning and Evidence Supporting the Scenario Output -- (g) Independent Challenge and Oversight -- (h) A Process That Is Responsive to Changes -- (i) Mechanisms for Mitigating Biases -- Scenario Analysis Output -- Key Points -- Review Questions -- Notes -- Chapter 12 Capital Modeling -- Operational Risk Capital -- Basic Indicator Approach -- Standardized Approach -- Alternative Standardized Approach -- Future of the Basic and Standardized Approaches -- Advanced Measurement Approach -- Quantitative Requirements of an AMA Model -- Loss Distribution Approach to Modeling Operational Risk Capital -- Scenario Analysis Approach to Modeling Operational Risk Capital -- Hybrid Approach to Modeling Operational Risk Capital -- Insurance -- Future of Capital Requirements: Basel III -- Basel III Standardized Approach -- Disclosure -- Key Points -- Review Questions -- Notes -- Chapter 13 Reporting -- Role of Reporting -- Operational Risk Event Reporting -- Impact of Gains on Internal Event Reporting -- Trends in Internal Losses -- Internal Losses by Risk Category -- Timeliness -- External Loss Data Reporting -- Risk and Control Self-Assessment Reporting -- Key Risk Indicator Reporting -- Scenario Analysis Reporting -- Capital Reporting -- Action Tracking Reporting -- A Consolidated View -- Dashboards -- Key Points -- Review Question -- Chapter 14 Risk Appetite -- The Role of Risk Appetite -- Regulatory Expectations -- Implementing a Risk Appetite Framework -- The Risk Appetite Framework as a Strategic Decision-Making Tool -- Appetite Governance: The Board, "C-Suite," and Business Lines -- Promoting a Firmwide Risk Appetite Framework -- Monitoring the Firm's Risk Profile within the Risk Appetite Framework…”
    Libro electrónico
  17. 4057
    Publicado 2024
    Tabla de Contenidos: “…-- How multiple cameras are synchronized -- Suggestions for filming to suit multicam editing -- Audio -- The two-minute rule -- Color balance -- Settings before multicam editing -- Importing and categorizing media -- Creating a new multicam clip -- Manual multicam synchronization -- Multicam angle timeline adjustments -- Fixing audio and video mismatches -- Adjusting the angle viewer -- Actions in the multicam angle timeline -- Audio synchronization -- Global adjustments -- Audio levels -- Color matching -- Editing the multicam project -- Setting up angles -- Switching angles -- Correcting the angle -- Stabilization -- Multicam audio -- Simulating a multicam shoot from one camera's footage -- Summary -- Chapter 9: Project Workflows - Pace and Structure -- Interviews -- Pre-editing -- Cutting -- Restoring removed clips -- Hiding jump cuts -- Removing fillers -- Audio in sync -- Conferences and seminars -- One long event -- Short, independent videos -- Weddings -- Organizing media -- Synchronizing cameras -- Full-length movies and documentaries -- Pacing -- Continuity editing -- Parallel editing (cross-cutting) -- J and L cuts -- Social media videos…”
    Libro electrónico
  18. 4058
    por Hersent, Olivier
    Publicado 2012
    Tabla de Contenidos: “…10.5.1 Reference Topology and Network Elements 171 -- 10.5.2 C12.22 Node to C12.22 Network Communications 173 -- 10.5.3 C12.22 Device to C12.22 Communication Module Interface 174 -- 10.5.4 C12.19 Updates 176 -- 10.6 Other Parts of ANSI C12 Protocol Suite 176 -- 10.7 RFC 6142: C12.22 Transport Over an IP Network 176 -- 10.8 REST-Based Interfaces to C12.19 177 -- 11 DLMS/COSEM 179 -- 11.1 DLMS Standardization 179 -- 11.1.1 The DLMS UA 179 -- 11.1.2 DLMS/COSEM, the Colored Books 179 -- 11.1.3 DLMS Standardization in IEC 180 -- 11.2 The COSEM Data Model 181 -- 11.3 The Object Identification System (OBIS) 182 -- 11.4 The DLMS/COSEM Interface Classes 184 -- 11.4.1 Data-Storage ICs 185 -- 11.4.2 Association ICs 185 -- 11.4.3 Time- and Event-Bound ICs 186 -- 11.4.4 Communication Setup Channel Objects 186 -- 11.5 Accessing COSEM Interface Objects 186 -- 11.5.1 The Application Association Concept 186 -- 11.5.2 The DLMS/COSEM Communication Framework 187 -- 11.5.3 The Data Communication Services of COSEM Application Layer 189 -- 11.6 End-to-End Security in the DLMS/COSEM Approach 191 -- 11.6.1 Access Control Security 191 -- 11.6.2 Data-Transport Security 192 -- Part IV THE NEXT GENERATION: IP-BASED PROTOCOLS -- 12 6LoWPAN and RPL 195 -- 12.1 Overview 195 -- 12.2 What is 6LoWPAN? …”
    Libro electrónico
  19. 4059
    Publicado 2022
    Tabla de Contenidos: “…HTTPS-Based Web Service Interfaces to/from SAP PI/PO -- Internal and Full External Access -- Example Landscape Setup -- Active Directory -- AWS Managed Microsoft Active Directory Service -- Self-Managed ADDS Deployment in the AWS Cloud -- Extend the Existing On-Premises ADDS to AWS -- AWS Managed Microsoft Active Directory Service -- Implementation Considerations for AWS Managed Microsoft Active Directory As Central ADDS -- Implementation Considerations for AWS Managed AD with SAP S/4HANA DR Consideration -- How to Create an AWS Managed Microsoft Active Directory -- DNS Name Resolution with Route 53 Resolver -- Set up an Integrated DNS View for Amazon VPCs and On-Premise Networks -- Working Solution for Scenario: Query from On-Premise to AWS Route 53 -- Working Solution for Scenario: Query from AWS Resource for On-Premise DNS -- Monitoring AWS Managed ADDS -- Dynamic Host Configuration Protocol (DHCP) -- Working with DHCP Options Sets -- Create DHCP Options Set -- Edit DHCP Options Set -- Summary -- Chapter 5: SAP S/4HANA on AWS Elastic Compute Cloud - Deployment -- Exemplary Architecture -- Deployment Scenarios -- Single-AZ and Single-Node Architecture -- Single-AZ and Multinode Architecture -- Multi-AZ, Single-Node SAP S/4 High Availability Architecture -- Option A: Overlay IP Using AWS Transit Gateway -- Option B: Overlay IP Routing with Network Load Balancer -- SAP HA Cluster Setup -- SAP NetWeaver/HANA High Availability Setup on RHEL and SUSE -- SAP NetWeaver Availability Setup on Windows Platform -- Windows Server Failover Clustering (WSFC) Using Amazon FSx File Share Solution -- Windows Server Failover Clustering (WSFC) Using SIOS Protection Suite on AWS -- Compute -- Available EC2 Instance Family -- EC2 Instance Licenses -- SAP S/4 Certified EC2 Instance Types -- EC2 Provisioning -- Manual Deployment with AWS Console…”
    Libro electrónico
  20. 4060
    Publicado 2003
    Tabla de Contenidos: “…. -- 5.4.3 Find a match for the registration Self-Service business pattern -- 5.4.4 Collaboration business pattern for customer assistance -- 5.4.5 Collaboration business pattern for notification -- 5.4.6 Information Aggregation pattern for catalog population -- 5.4.7 Information aggregation for technical documentation repository population -- 5.4.8 Access Integration pattern for single sign-on -- 5.4.9 Application Integration patterns -- 5.5 Constructing the proposal -- 5.5.1 Setting the scene -- 5.5.2 High-level summary -- 5.5.3 Overview -- 5.5.4 Solution -- 5.5.5 Risks -- 5.5.6 Dependencies -- 5.5.7 Requirements -- 5.5.8 Out of scope -- 5.5.9 Product suite -- 5.5.10 Proposed project phases -- 5.6 Functional view of the architecture -- 5.6.1 Component list -- 5.6.2 Component relationships -- 5.6.3 Component interactions -- Chapter 6. …”
    Libro electrónico