Maintenance and security

Xem 1-20 trên 36 kết quả Maintenance and security
  • As an open source, distributed, big data store, HBase scales to billions of rows, with millions of columns and sits on top of the clusters of commodity machines. If you are looking for a way to store and access a huge amount of data in real time, then look no further than HBase. HBase Administration Cookbook provides practical examples and simple step-by-step instructions for you to administrate HBase with ease. The recipes cover a wide range of processes for managing a fully distributed, highly available HBase cluster on the cloud.

    pdf332p hotmoingay3 09-01-2013 30 5   Download

  • Oracle Audit Vault is an enterprise-class audit consolidation and management solution that enables organizations to simplify compliance reporting, proactively detect threats, reduce costs, and secure audit data. Faced with numerous regulatory mandates and increasing concerns about insider threats, organizations are utilizing database audit data as an important security measure, enforcing the trust-but-verify principle.

    pdf28p yasuyidol 02-04-2013 29 4   Download

  • Tham khảo sách 'red hat linux networking and system administration', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf50p ptng13 16-05-2012 71 26   Download

  • When you purchase most home appliances, they come with an owner’s manual. The owner’s manual is the bible of information for that appliance. It tells you what each button does and how to set up and configure your new appliance to get it ready for operation.The owner’s manual also includes the actual steps to operate the appliance, and it often contains information on how and where to obtain service and parts, basic troubleshooting tips, and precautions you should be aware of before using the appliance....

    pdf303p ptng13 16-05-2012 63 11   Download

  • Wi-Fi can further enhance your organization's productivity and savings by increasing portability and eliminating charges for PBX maintenance and for wire-line and cellular phone service. However, concerns about the QoS of Wi-Fi and VoIP prevent many organizations from realizing the full savings and productivity improvements that Wi-Fi can deliver. This guide to deploying Wi-Fi telephony helps you overcome these concerns by showing in detail how to engineer each component of Wi-Fi for reliable, high- quality voice transmission.

    pdf278p ken333 14-06-2012 86 8   Download

  • This book is the work of a great team. First I’d like to thank my editor Suzanne Goraj for her excellent job on the editing process. The production editor Elizabeth Campbell was always a pleasure to work with and kept the book moving along and on schedule. Thanks also to technical editor Donald Fuller for his thorough edit and for keeping me honest. I would like to thank Neil Edde, associate publisher and James Chellis who both helped develop and nurtured the MCSE series of books since the beginning.

    pdf623p japet75 30-01-2013 20 5   Download

  • A widely cited application of sensor networks is event- detection, where a large network of nodes is used to iden- tify regions or resources that are experiencing some phe- nomenon of particular concern to the user.

    pdf12p nhacsihuytuan 06-04-2013 25 3   Download

  • To inform the development of Ministers’ High Level Output Specification (HLOS), and to provide support to the wider industry and its supply chain going forward, ATOC has been working with partners to develop a high- level rolling stock strategy. This approach has been welcomed and supported in the recent Command Paper as an important mechanism to support the delivery of improved value for money throughout the rail sector.

    pdf26p quaivattim 04-12-2012 14 2   Download

  • The regulatory function of stock exchanges was in the past mostly limited to issuing rules and clarifying aspects of existing frameworks. The standard-setting role of stock exchanges was essentially exercised through the issuance of listing, ongoing disclosure, maintenance and de-listing requirements. On the enforcement side, stock exchanges have shared their regulatory function with capital market supervisory agencies.

    pdf33p bocapchetnguoi 05-12-2012 20 1   Download

  • Margin Loans. A national bank may use an alternative approach to calculate its capital requirement for certain eligible bank margin loans to customers for the purpose of buying or carrying margin stock.

    pdf32p bi_ve_sau 17-01-2013 13 1   Download

  • As many as half of the GB-wide total of 18 franchises and concessions are ending by the end of 2014. A key element of the franchising procurement process will be for bidders to assess whether rolling stock requirements are best addressed through new builds or continued operation of existing vehicles, with or without refurbishment and re-engineering. Their assessments will take into account a number of factors, including costs, reliability, maintenance arrangements, the strategy for the implementation of ETCS4 , as well as financial and commercial issues.

    pdf5p quaivattim 04-12-2012 22 0   Download

  • The information in this guide applies to the following ASA 5500 series adaptive security appliance models: ASA 5505, ASA 5510, ASA 5520, ASA 5540, and ASA 5550. In this guide, references to “Cisco ASA 5500 series adaptive security appliance” and “adaptive security appliance” apply to all models unless specifically noted otherwise.

    pdf60p duypha 10-08-2009 720 141   Download

  • The adaptive security appliance delivers unprecedented levels of defense against threats to the network with deeper web inspection and flow-specific analysis, improved secure connectivity via end-point security posture validation, and voice and video over VPN support. It also provides enhanced support for intelligent information networks through improved network integration, resiliency, and scalability. The adaptive security appliance software combines firewall, VPN concentrator, and intrusion prevention software functionality into one software image.

    pdf62p duypha 10-08-2009 178 62   Download

  • This module explains the steps that are typically involved in the Web application design process, what role security considerations play in each of these steps, and finally, how these steps interrelate with one another. In this module, students will focus on the threat analysis step in the design process by identifying Web-accessible assets and the threats that are posed to those assets, and by calculating the exposure of those assets to those threats. Finally, students will learn about developing an implementation and maintenance plan for securing Web applications....

    pdf30p maiphuong 10-08-2009 125 34   Download

  • A database administrator in any company is responsible for establishing policies and procedures pertaining to the management, security, maintenance and use of database management systems. Besides planning, implementing and maintaining databases for a company, they also play a key role in training users, programmers and test engineers on database use and procedures. A Database administrator's role requires knowledge in the following area

    pdf30p thachcotran 04-02-2010 68 24   Download

  • SQL, or structured query language, is the international standard language for creating and maintaining relational databases. It is the basis of all major databases in use today and is essential for the storage and retrieval of database information. This fun and friendly guide takes SQL and all its related topics and breaks it down into easily digestible pieces for you to understand. You’ll get the goods on relational database design, development, and maintenance, enabling you to start working with SQL right away!...

    pdf748p hoa_can 26-01-2013 26 13   Download

  • The content of this document is the property of Airbus. It is supplied in confidence and commercial security on its contents must be maintained. It must not be used for any purpose other than that for which it is supplied, nor may information contained in it be disclosed to unauthorized persons. It must not be reproduced in whole or in part without permission in writing from the owners of the copyright. Requests for reproduction of any data in this document and the media authorized for it must be addressed to Airbus....

    pdf607p ngayduocbay 13-12-2012 48 12   Download

  • LINUX IS A MULTIUSER, multitasking operating system from the ground up, and in this regard the system administrator has flexibility — and responsibility — far beyond those of other operating systems. Now, Red Hat has employed innovations that extend these duties even for the experienced Linux user. In this chapter, we look at those requirements.

    pdf889p quanght_cntt 04-12-2012 35 11   Download

  • Under certain conditions, the Company may use options and futures on securities, indices and interest rates, as described in Section 3.2. "Sub-Fund Details" and Appendix 3 "Restrictions on the use of techniques and instruments" for the purpose of investment, hedging and efficient portfolio management. In addition, where appropriate, the Company may hedge market and currency risks using futures, options or forward foreign exchange contracts. Transactions in futures carry a high degree of risk.

    pdf361p dangsuynghi 15-03-2013 21 7   Download

  • On first glance, official identification of human remains and certification of the cause of death appear to be mundane endeavors that serve mainly private needs of families, insurers, and litigants. In truth, however, valid and reliable data on the circumstances and causes of deaths serve a variety of important public needs, including fair and accurate adjudication in criminal and civil cases, maintenance of accurate vital statistics, effective public health surveillance and response, advances in health and safety research, and improvement in quality of heath care....

    pdf86p bimap_5 30-12-2012 22 6   Download

Đồng bộ tài khoản