Mostrando 5,201 - 5,220 Resultados de 14,789 Para Buscar 'Honiton~', tiempo de consulta: 1.47s Limitar resultados
  1. 5201
    Publicado 1999
    Electrónico
  2. 5202
    Publicado 2013
    Tabla de Contenidos: “…Integrating scholarship and practice -- pt. VII. Over the horizon : reflective essays from the pioneers…”
    Libro electrónico
  3. 5203
    Publicado 2020
    “…You'll learn how to make payments with a flick of your wrist using Apple Pay, keep track of your activity and sleep, monitor your heart health in real time, and even turn your watch into a digital walkie-talkie. …”
    Libro electrónico
  4. 5204
    “…Quelles technologies énergétiques se profilent à l'horizon ? Quelles sont les implications du rôle grandissant joué par les pays en développement en tant que producteurs et consommateurs d'énergie ? …”
    Libro electrónico
  5. 5205
    Publicado 2002
    Tabla de Contenidos: “…1931836574.pdf; 1931836574.pdf; Cover; Table of Contents; Foreword; Chapter 1 Introduction to Sniffer Pro; Chapter 2 Installing Sniffer Pro; Chapter 3 Exploring the Sniffer Pro Interface; Chapter 4 Configuring Sniffer Pro to Monitor Network Applications; Chapter 5 Using Sniffer Pro to Monitor the Performance of a Network; Chapter 6 Capturing Network Data for Analysis; Chapter 7 Analyzing Network Issues; Chapter 8 Using Filters; Chapter 9 Understanding and Using Triggers and Alarms; Chapter 10 Reporting; Chapter 11 Detecting and Performing Security Breaches with Sniffer Pro…”
    Libro electrónico
  6. 5206
    Publicado 2015
    “…Both IBM Business Process Manager and Business Monitor build on the core capabilities of the IBM WebSphere® Application Server infrastructure. …”
    Libro electrónico
  7. 5207
    por Carter, Earl
    Publicado 2004
    “…Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policies Review techniques applicable to both network- and host-based platforms Review the security wheel concepts and apply security to AVVID using the SAFE Blueprint Install and configure the Cisco IDS to monitor your network for malicious activity Understand Cisco Threat Response (CTR) benefits and how it operates Apply alarm signatures and gain the proficiency to create your own custom signatures Deploy Cisco IDS effectively in your network using sensor and management platforms Get inside the Cisco Security Agent (CSA) architecture In addition to firewalls and other security appliances intended to limit outsider access to a network, intrusion detection and targeted countermeasures are a critical component of a complete network security plan. …”
    Libro electrónico
  8. 5208
    por Roland, John F.
    Publicado 2004
    “…Cisco authorized self-study book for CCSP 642-501 foundation learning Identify the lineup of Cisco Systems network security products and enumerate the components of a complete security policy Use Cisco Secure ACS for Windows and Cisco Secure ACS for UNIX to implement TACACS+ and RADIUS AAA support in Cisco router networks Configure AAA support on perimeter Cisco routers and Cisco IOS Firewalls Implement standard practices to secure administrative access and disable unused router protocols, services, and interfaces Use AutoSecure to configure security parameters on Cisco routers Configure Cisco IOS Firewalls for CBAC, Authentication Proxy, and AAA support Configure and manage Cisco IOS IDS router signatures and audit rules Monitor Cisco IOS IDS routers using Security Monitor or Syslog servers Configure IPSec VPN tunnels on Cisco routers using preshared keys or RSA signatures Configure Cisco routers to use IPSec with Network Address Translation Use Security Device Manager and Router Management Center to configure and manage Cisco IOS VPN and Cisco IOS Firewall policies Mitigate common router security threats with access control lists (ACLs) CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is a complete reference for security practices, protocols, software, and equipment that work on or in conjunction with Cisco IOS equipment to provide layers of security to networks. …”
    Libro electrónico
  9. 5209
    Publicado 2019
    “…Proven, actionable ways to install, manage, secure and monitor your vSphere 6.7 environments Key Features Get up to speed with the installation and life cycle management of a vSphere 6.7 environment, using a task-based approach Secure your vSphere environment using SSL Certificates Get introduced to the tools that are used to monitor the performance of the vSphere Environment Book Description VMware vSphere is the most comprehensive core suite of SDDC solutions on the market. …”
    Libro electrónico
  10. 5210
    Publicado 2016
    “…This course provides a detailed look at how to use Microsoft Project 2016 software to build, resource, cost out, monitor, and report on project plans for any size or type of project. …”
    Video
  11. 5211
    Publicado 2020
    “…Build, monitor, and manage real-time data pipelines to create data engineering infrastructure efficiently using open-source Apache projects Key Features Become well-versed in data architectures, data preparation, and data optimization skills with the help of practical examples Design data models and learn how to extract, transform, and load (ETL) data using Python Schedule, automate, and monitor complex data pipelines in production Book Description Data engineering provides the foundation for data science and analytics, and forms an important part of all businesses. …”
    Libro electrónico
  12. 5212
    Publicado 2003
    Sumario.
    Libro
  13. 5213
    por Våge, Lars
    Publicado 2010
    Tabla de Contenidos: “…The meaning of news monitoring servicesEvaluating your monitoring service; Irrelevance in news monitoring services; Sample list of news monitoring and related services; Notes; 5 Evaluating news search tools; Introduction; Frequency of spidering; Sources; Searching; Results; 6 Keeping track of the blogosphere; Introduction; What exactly is a blog?…”
    Libro electrónico
  14. 5214
    Publicado 2004
    Tabla de Contenidos: “…Planning the CallManager implementation -- Planning centralized call processing deployments -- Installing CallManager -- Backing up and restoring the environment -- Upgrading and patching CallManager -- Securing the environment -- Configuring CallManager and IP telephony components -- Managing services and parameters -- Using multilevel administration -- Mastering directory integration -- Administering call detail records -- Managing and monitoring the system -- Using real-time monitoring tool -- CallManager 4.0 new feature description…”
    Libro electrónico
  15. 5215
    por Morgera, Elisa
    Publicado 2009
    Tabla de Contenidos: “…-- A contribution of human rights monitoring bodies? -- Standard-setting by international financial institutions -- Emerging standards on corporate accountability in IEL -- Tools for compliance -- The tools of international financial institutions : conditions in loan agreements and complaints mechanisms -- Sharpening the monitoring role of other international organizations -- Integrating international standards in UN-business partnerships…”
    Libro
  16. 5216
    por Goldsmith, Ben
    Publicado 2021
    Tabla de Contenidos: “…-- Getting Started in the Project Panel -- Creating a New Project -- Switching Workspaces -- The Project Panel -- Importing Footage -- Organizing the Project Panel -- Viewing Metadata -- The Source Monitor -- Previewing Footage -- Some Notable Features -- In and Out points -- Creating a Sequence -- Creating a Sequence based off the Source Monitor -- The Timeline -- Navigating the Timeline -- Changing Your Clip Size -- The Program Monitor -- Calibrating Playback -- Adding More Clips to the Timeline -- Drag and Drop -- Preview the Timeline -- Toggle Track Output -- Disable Clip -- Basic Trimming and Rearranging -- Trimming a Clip -- Moving a Clip -- Extending a Clip -- Selecting Multiple Clips -- Move with Insert -- Move with Overwrite -- 2 Edit a Scene -- Other Ways of Adding Shots to a Timeline -- Mentally Plan the Edit -- Adding with the Source Monitor -- Adding an Insert -- The Tools -- The Tools Panel -- Track Select Forward Tool (A) -- Deleting Gaps -- Ripple Edit Tool (B) -- Rolling Edit Tool (N) -- Editing Just Video or Audio -- Rate Stretch Tool (R) -- Razor Tool (C) -- Slip Tool (Y) -- Slide Tool (U) -- The Trim Tool -- Let's Clean It Up a Little -- Pulling In Audio from Another Take -- Final Audio Touch-Ups -- Music -- Add the Music Track to the Timeline -- Adjusting Volume -- Mute and Solo -- Trim the Track -- Locking Audio -- Exporting -- The Export Dialog -- Ready to Export? …”
    Libro electrónico
  17. 5217
    Publicado 2002
    Tabla de Contenidos: “…ETI : aa multi-stakeholder approach / Mick Blowfield. Monitoring the monitors : a critique of third-party labour monitoring / Dara O'rourke. …”
    Libro
  18. 5218
    Tabla de Contenidos: “…Bosnie-Herzégovine -- Bulgarie -- Avant propos -- Albanie -- Tour d'horizon régional -- Kosovo -- Croatie -- Liste des examinateurs…”
    Libro electrónico
  19. 5219
    por Stanek, William R.
    Publicado 2009
    Tabla de Contenidos:
    Libro electrónico
  20. 5220
    Publicado 2023
    Tabla de Contenidos: “…-- Monitoring Tools -- Monitoring Kubernetes Using Prometheus -- Logging Overview -- Tools for Logging -- Logging by Using a Loki-Stack -- Alerting -- Best Practices for Monitoring, Logging, and Alerting -- Monitoring -- Logging -- Alerting -- Summary…”
    Libro electrónico