Mostrando 32,841 - 32,860 Resultados de 33,663 Para Buscar 'COPCON~', tiempo de consulta: 1.32s Limitar resultados
  1. 32841
    Publicado 2001
    “…Uttering the word "maths" in most staff common rooms is like hitting a raw nerve, and the Group have done a good job of surveying the role and place of maths in the curriculum, and how attitudes are changing.•McCracken et al. consider the actual programming fluency o f our students after we have taught them. …”
    Libro electrónico
  2. 32842
    Publicado 2015
    “…At his death due to heart disease, he weighed more than 20 stones.In this excellent biography Denis Conlon portrays Chesterton as the giant that he was, literally and metaphorically.It includes some previously unpublished photographs and illustrations and the diary of their trip to Palestine and the Holy Land reveals his empathy with all peoples of the region. …”
    991005108139706719
  3. 32843
    por Fantuzzi, Virgilio, 1937- aut
    Publicado 2017
    “…Sceneggiatrice onnipresente nei copioni del cinema italiano di qualità, Suso Cecchi D’Amico (Roma 1914-2010) ha intrapreso la sua professione mentre si trovava in un periodo critico. …”
    Artículo
  4. 32844
    por Teodoreto de Ciro
    Publicado 2006
    “…La obra "El mendigo" es uno de los tratados de cristología más importantes de su época y posiblemente el que más influyó en las deliberaciones del Concilio de Calcedonia. Se compone de un prólogo, tres diálogos y un compendio dogmático que resume los diálogos anteriores. …”
    Libro
  5. 32845
    por Lakshman, Umesh
    Publicado 2005
    “…A complete configuration manual for MPLS, MPLS VPNs, MPLS TE, QoS, Any Transport over MPLS (AToM), and VPLS Understand the crucial Cisco commands for various MPLS scenarios Understand fundamentals of MPLS operation and learn to configure basic MPLS in Frame Relay and ATM-based environments Master fundamentals of MPLS VPN operation including Multiprotocol BGP (MBGP) operation, VPNv4 route exchange, and basic MPLS VPN configuration in the provider network Understand and configure various PE-CE routing protocols in MPLS VPN networks Understand MPLS VPN provisioning in an Inter-provider VPN (Inter-AS) and Carrier Supporting Carrier (CSC) environment Learn MPLS TE and its advanced features Examine AToM with configuration examples for like-to-like and any-to-any L2 VPN implementations and VPLS components and operation, VPLS configuration and verification, and VPLS topologies Learn about MPLS QoS, including configuration and implementation of uniform and short pipe modes MPLS Configuration on Cisco IOS Software is a complete and detailed resource to the configuration of Multiprotocol Label Switching (MPLS) networks and associated features. …”
    Libro electrónico
  6. 32846
    Publicado 2004
    “…It shows how to control the content type, designate error pages, include files, and integrate JavaBeans components. Advanced topics include sharing beans, generating Excel spreadsheets, and dealing with concurrency. …”
    Libro electrónico
  7. 32847
    Publicado 2004
    “…Expert guidance on designing secure networks Understand security best practices and how to take advantage of the networking gear you already have Review designs for campus, edge, and teleworker networks of varying sizes Learn design considerations for device hardening, Layer 2 and Layer 3 security issues, denial of service, IPsec VPNs, and network identity Understand security design considerations for common applications such as DNS, mail, and web Identify the key security roles and placement issues for network security elements such as firewalls, intrusion detection systems, VPN gateways, content filtering, as well as for traditional network infrastructure devices such as routers and switches Learn 10 critical steps to designing a security system for your network Examine secure network management designs that allow your management communications to be secure while still maintaining maximum utility Try your hand at security design with three included case studies Benefit from the experience of the principal architect of the original Cisco Systems SAFE Security Blueprint Written by the principal architect of the original Cisco Systems SAFE Security Blueprint, Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. …”
    Libro electrónico
  8. 32848
    Publicado 2006
    “…What I want is a roadmap for pitfalls to avoid, and innovative solutions for common problems. That is where this book shines. All of us who found the first edition of this book to be an indispensible part of our reference library will appreciate this updated edition that describes WinForms 2.0.” …”
    Libro electrónico
  9. 32849
    por Hall, Marty, 1962-
    Publicado 2002
    “…It shows you how to configure your server, read form data and HTTP headers, handle cookies, track sessions, apply JSP scripting elements, use JavaBeans components, develop JSP tag libraries, and apply the MVC architecture. …”
    Libro electrónico
  10. 32850
    Publicado 2021
    “…As you advance, you'll discover how Datadog is integrated with popular software components that are used to build cloud platforms. The book also provides details on how to use monitoring standards such as Java Management Extensions (JMX) and StatsD to extend the Datadog platform. …”
    Libro electrónico
  11. 32851
    por Maraia, Vincent
    Publicado 2005
    “…Drawing on lessons learned, the author provides real-world examples and solutions to help you avoid the traps and pitfalls common in today's environments that require advanced and elegant software controls." …”
    Libro electrónico
  12. 32852
    por Deal, Richard
    Publicado 2005
    “…Use Cisco concentrators, routers, Cisco PIX and Cisco ASA security appliances, and remote access clients to build a complete VPN solution A complete resource for understanding VPN components and VPN design issues Learn how to employ state-of-the-art VPN connection types and implement complex VPN configurations on Cisco devices, including routers, Cisco PIX and Cisco ASA security appliances, concentrators, and remote access clients Discover troubleshooting tips and techniques from real-world scenarios based on the author’s vast field experience Filled with relevant configurations you can use immediately in your own network With increased use of Internet connectivity and less reliance on private WAN networks, virtual private networks (VPNs) provide a much-needed secure method of transferring critical information. …”
    Libro electrónico
  13. 32853
    Publicado 2007
    “…—Myrna Blyth, Founding Editor, More Magazine “Furlong displays a genuine grasp of boomer sensibilities, especially those of decency and happiness and the common good; when she speaks of value added, it is not just the markup but how the product or service adds to the pleasure of living right and well.” — Kirkus Business & Personal Finance Report As they age, America’s 78 million baby boomers will live more active, creative, inventive lives than any generation before them. …”
    Libro electrónico
  14. 32854
    Publicado 2007
    “…Wi-Fi Hotspots helps you throughout the entire process of setting up a hotspot to offer free or fee-based Internet access to the general public: Understand the benefits to your business of hosting a hotspot Decide what type of hotspot you should implement Examine what equipment is best suited for your hotspot Follow step-by-step procedures for setting up your hotspot Get the word out about your hotspot availability Ensure your hotspot is not used improperly Evaluate Wi-Fi security concerns Fix common problems hotspot users face Increase the coverage area of your Wi-Fi hotspot Whether you are a small business owner looking to attract customers and distinguish your business or you are an IT professional at a larger organization looking to establish hotspot connectivity, this book provides you with everything you need to know in order to provide public wireless Internet access. …”
    Libro electrónico
  15. 32855
    por Mathers, Todd W.
    Publicado 2004
    “…Coverage includes Terminal Services and Citrix MetaFrame: how they relate, and how to determine what you need Common implementation traps and "gotchas"—and how to avoid them Planning client hardware/software, server hardware, networking, hotfix distribution, and more Step-by-step installation, including service-pack integration and answer files Detailed checklists and tuning techniques for optimizing performance and stability New Windows Server 2003 licensing requirements: overcoming the misinterpretations Expanded coverage of security in both Terminal Services and Citrix environments New and improved solutions for client drive and printer mapping Interoperability between MetaFrame 1.8 and MetaFrame Presentation Server 3.0 User profile and account creation, configuration, and management RDP and ICA client configuration, in detail Application compatibility: using Terminal Services' application support features Using Session Dir..…”
    Libro electrónico
  16. 32856
    Publicado 2014
    “…Just some of what you will learn here includes: Choosing the right parts Building the system from the ground up Installing Windows Connecting to a network Tweaking your BIOS Overclocking your PC for raging performance Installing some of the newest PC components, including solid-state hard drives Configuring your PC for game peformance, including setting up SLI and CrossFire dual-card rigs Upgrading your laptop hard disk Upgrading your existing PC This three-hour, downloadable video is a groundbreaking compilation of four teaching formats: Pure video: Shot in a professional studio using an HD camera Camtasia: Video capture of Windows desktop and programs with voiceover PowerPoint: Slides with optional photos Photomovie: Photos converted into a movie with voiceover and transition This video is primarily a hands-on tutorial dedicated to building and repairing desktop and laptop PCs. …”
    Video
  17. 32857
    Publicado 2014
    “…Skill Level Intermediate What You Will Learn How Software-Defined Network (SDN) transitions security from being an overlay service to a core component of the network How SDN must provide secure boundaries around services and access How SDN agents and controllers can be provisioned to be a perimeter to an individual device or service How SDN can provision and enforce a security strategy with the success of this strategy depending on how well the SDN itself is protected Who Should Take This Course The target audiences for this video course are..…”
    Video
  18. 32858
    Publicado 2017
    “…Put the Adobe Flash CSX cheats to the test with the fully updated companion website with downloadable Flash source files, examples and video tutorials, and a creative commons game, developed with Adobe, to demonstrate the new functionality of CSX!…”
    Libro electrónico
  19. 32859
    Publicado 2011
    “…Cisco Firewalls shows you how to deploy Cisco firewalls as an essential component of every network infrastructure. The book takes the unique approach of illustrating complex configuration concepts through step-by-step examples that demonstrate the theory in action. …”
    Libro electrónico
  20. 32860
    por Bateman, David, 1964-
    Publicado 2011
    “…Fully updated for the new CUCM, Unity, and Unity Connection, version 8, it presents step-by-step procedures for every common and complex task that installers, integrators, and administrators will encounter. …”
    Libro electrónico