Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 8
- Leadership 6
- Computer security 5
- History 5
- Certification 4
- Electronic data processing personnel 4
- Examinations 4
- Security measures 4
- Business & Economics 3
- Microcomputers 3
- Pocket computers 3
- Success in business 3
- Business 2
- Computer Science 2
- Computer programming 2
- Computer technicians 2
- Computing Technology Industry Association 2
- Employees 2
- Engineering & Applied Sciences 2
- Fairs 2
- Maintenance and repair 2
- Markets 2
- Online social networks 2
- Self-Help 2
- Strategic planning 2
- Success 2
- Tablet computers 2
- Twitter 2
- Vocational guidance 2
- iPad (Computer) 2
-
21Publicado 2018“…Learn how to apply the proven principles of Hug Your Customers to refine your selling technique, boost your sales, and keep your customers coming back for more. In his groundbreaking books, Hug Your Customers-a Wall Street Journal bestseller-and Hug Your People, Jack Mitchell brought a warm human touch to the often-cold, bottom-line world of business. …”
Grabación no musical -
22Publicado 2017Libro electrónico
-
23
-
24Publicado 2014Tabla de Contenidos: “…; On top of the world; Not so smart drugs in schools; Whistle while you work; Nootropic drugs - big dilemmas, grave outcomes; The original smart drug; Full of beans; Brewing for survival; Wear and tear; Chapter takeaways; Hold On to Your Marbles - Keeping senility at bay; Over the hill…”
Libro electrónico -
25Publicado 2019Libro electrónico
-
26
-
27Publicado 2016“…In Measuring the Success of Employee Engagement, renowned experts Jack Phillips and Patti Phillips and knowledge organization expert Rebecca Ray help you make the business case for an employee engagement initiative. …”
Libro electrónico -
28
-
29
-
30
-
31Publicado 2023“…With Don's help, Jack begins the journey that will heal his organization.In the course of their first visit, Don and his Director of Continuous Improvement, Tim Stark, help Jack to make an important discovery: Copper-Bottom's executives are not showing their people respect. …”
Libro electrónico -
32por Saint-Saëns, Camille, 1835-1921
Publicado 1989Biblioteca Pública Episcopal del Seminario de Barcelona (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad Pontificia de Salamanca)Libro -
33Publicado 2022Tabla de Contenidos: “…Logging Levels/Severity Levels -- 00-FMindd 18 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Interface Statistics/Status -- Link State (Up/Down) -- Speed/Duplex -- Send/Receive Traffic -- Cyclic Redundancy Checks (CRCs) -- Protocol Packet and Byte Counts -- Interface Errors or Alerts -- CRC Errors -- Giants -- Runts -- Encapsulation Errors -- Environmental Factors and Sensors: Temperature, Humidity, Electrical, Flooding -- Baselines -- NetFlow Data -- Uptime/Downtime -- REVIEW -- 31 QUESTIONS -- 31 ANSWERS -- Objective 32 Explain the purpose of organizational documents -- and policies -- Plans and Procedures -- Change Management -- Incident Response Plan -- Disaster Recovery Plan -- Business Continuity Plan -- System Life Cycle -- Standard Operating Procedures -- Hardening and Security Policies -- Password Policy -- Acceptable Use Policy -- Bring Your Own Device (BYOD) Policy -- Remote Access Policy -- Onboarding and Offboarding Policy -- Security Policy -- Data Loss Prevention -- Common Documentation -- Physical Network Diagram -- Logical Network Diagram -- Wiring Diagram -- Site Survey Report -- 00-FMindd 19 22/04/22 11:12 AM -- xx Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Audit and Assessment Report -- Baseline Configurations -- Common Agreements -- Non-Disclosure Agreement (NDA) -- Service-Level Agreement (SLA) -- Memorandum of Understanding (MOU) -- REVIEW -- 32 QUESTIONS -- 32 ANSWERS -- Objective 33 Explain high availability and disaster recovery -- concepts and summarize which is the best solution -- Load Balancing -- Multipathing -- Network Interface Card (NIC) Teaming -- Redundant Hardware/Clusters -- Switches -- Routers -- Firewalls -- Facilities and Infrastructure Support -- Uninterruptible Power Supply (UPS) -- Power Distribution Units (PDUs) -- Generator -- HVAC -- Fire Suppression -- Redundancy and High Availability (HA) Concepts -- Cold Site -- Warm Site -- Hot Site -- Cloud Site -- Active-Active vs Active-Passive -- Mean Time to Repair (MTTR) -- Mean Time Between Failure (MTBF) -- Recovery Time Objective (RTO) -- Recovery Point Objective (RPO) -- Network Device Backup/Restore -- Configuration -- State -- REVIEW -- 33 QUESTIONS -- 33 ANSWERS -- 00-FMindd 20 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- 40 Network Security -- Objective 41 Explain common security concepts -- Confidentiality, Integrity, Availability (CIA) -- Threats -- Internal -- External -- Vulnerabilities -- Common Vulnerabilities and Exposures (CVE) -- Zero-Day -- Exploits -- Least Privilege -- Role-Based Access -- Zero Trust -- Defense in Depth -- Network Segmentation Enforcement -- Screened Subnet [Previously Known as Demilitarized Zone (DMZ)] -- Separation of Duties -- Network Access Control -- Honeypot -- Authentication Methods -- Multifactor -- Terminal Access Controller Access-Control System Plus (TACACS+) -- Remote Authentication Dial-in User Service (RADIUS) -- Single Sign-On (SSO) -- LDAP -- Kerberos -- Local Authentication -- Extensible Authentication Protocol (EAP) -- 8021X -- Risk Management -- Security Risk Assessments -- Business Risk Assessments -- Security Information and Event Management (SIEM) -- REVIEW -- 41 QUESTIONS -- 41 ANSWERS -- Objective 42 Compare and contrast common types of attacks -- Technology-Based -- Denial-of-Service (DoS)/Distributed Denial-of-Service (DDoS) -- On-Path Attack (Previously Known as Man-in-the-Middle Attack) -- 00-FMindd 21 22/04/22 11:12 AM -- xxii Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- ARP Spoofing -- DNS Poisoning -- VLAN Hopping -- Rogue DHCP -- Rogue Access Point (AP) -- Evil Twin -- Ransomware -- Password Attacks -- MAC Spoofing -- IP Spoofing -- Deauthentication -- Malware -- Human and Environmental -- Social Engineering -- REVIEW -- 42 QUESTIONS -- 42 ANSWERS -- Objective 43 Given a scenario, apply network -- hardening techniques -- Best Practices -- Secure SNMP -- Router Advertisement (RA) Guard -- Port Security -- Dynamic ARP Inspection -- Control Plane Policing -- Private VLANs -- Disable Unneeded Switchports -- Disable Unneeded Network Services -- Change Default Passwords -- Password Complexity/Length -- Enable DHCP Snooping -- Change Default VLAN -- Patch and Firmware Management -- Access Control List -- Firewall Rules -- Role-Based Access -- Wireless Security -- MAC Filtering -- Antenna Placement -- Power Levels -- Wireless Client Isolation -- Guest Network Isolation -- 00-FMindd 22 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Preshared Keys (PSKs) -- EAP -- Geofencing -- Captive Portal -- IoT Access Considerations -- REVIEW -- 43 QUESTIONS -- 43 ANSWERS -- Objective 44 Compare and contrast remote access methods -- and security implications -- Site-to-Site VPN -- Client-to-Site VPN -- Clientless VPN -- Split Tunnel vs Full Tunnel -- Remote Desktop Connection -- Remote Desktop Gateway -- SSH -- Virtual Network Computing (VNC)…”
Libro electrónico -
34Publicado 2014“…author Steve Olsher reveals his proven process that has helped thousands answer YES to these life-changing questions and cultivate a life of purpose, conviction, and contribution by identifying and creating a plan of action for bringing the 1 thing they were born to do to fruition. …”
Grabación musical -
35Publicado 2010Tabla de Contenidos: “…Cover -- Table of Contents -- Introduction -- Chapter 1 PC Technician Essentials -- PC Tools -- Preventing Electrostatic Discharge -- The CompTIA Six-Step Troubleshooting Process -- Numbering Systems Used in Computers -- Decimal Numbering System -- Binary Numbering System -- Hexadecimal Numbering System -- Measuring Data Transfer and Frequency -- Bandwidth -- Hertz (Hz) -- Important Websites -- Chapter 2 PC Anatomy 101 -- Do I Know This Already?" …”
Libro electrónico -
36
-
37Publicado 2008“…•Get past the myths that keep you from m..…”
Libro electrónico -
38
-
39
-
40Publicado 2019“…Companies are investing an unprecedented amount of money to keep their data and assets safe, yet cyberattacks are on the rise-and the problem is worsening. …”
Grabación de sonido