Xem 1-6 trên 6 kết quả Support of snmp
  • The purpose of this document is to provide a comprehensive introduction and overview of ZABBIX, its architecture, the features it offers and their functions. This document contains all information necessary for the successful administration of ZABBIX. Anyone involved in installation and administration of ZABBIX, and anyone else wishing to get an insight into how it works.

    pdf320p tamhnd 24-04-2009 447 102   Download

  • The prototype of the barbute may be seen in a basinet from Chalcis, dating from 4I 0 to I440, portrayed in the drawings. It retains vervelles along the edges for attaching a camail. Minus the camail, and with a rounded bowl to conform with the contour of the head, this helmet would qualify as a barbute. In fact, the transition from basinet to barbute is largely a change in propor- tion. Some basinets were so tall that they rested on ...

    pdf27p yasuyidol 01-04-2013 24 4   Download

  • More recently, a QSAR (Quantitative Structure Activity Relantionship) investigation was carried out on a series of nostoclide analogues presenting the general structure (43) to correlate molecular descriptions with their in vitro biological activity (the ability to interfere with ligh-driven reduction of ferrycianide by isolated spinach chloroplasts thylakoid membranes). The results of this investigation suggested that the degree of inhibition efficiency of this class of compounds is intimately associated with their polarity (Teixeira et al, 2009).

    pdf626p conquynho32 15-09-2012 24 9   Download

  • The adult in each household who knows the most about the health of all household members is selected to answer all survey questions during the telephone interview. This respondent answers survey questions for him/herself as well as for all other household members. Since each household member does not speak directly to the interviewer, survey answers are “reported” by the respondent. The reader will see the phrase . . .” was reported to be . . .” in this report. In places where this phrase is not used, the reader should keep in mind that...

    pdf76p quaivatxanh 01-12-2012 37 6   Download

  • The report is outlined as follows. In chapter 2, we give an overview of, and a background to, Cryptography, Public Key Infrastructure (PKI), DNS and Secure Messaging, which is used throughout this report. In chapter 3 we demonstrate our implementation of a secure mail application and of a certificate publishing application. In chapter 4 we compare LDAP and DNS for certificate locating and retrieval purposes. In chapter 5 we discuss privacy threats due to Secure DNS and present a possible remedy.

    pdf52p cao_can 02-01-2013 22 2   Download

  • Thank you for using SecurePlatform. This document describes how to prepare a hardware platform for SecurePlatform, and how to configure and administer SecurePlatform. SecurePlatform allows easy configuration of your computer and networking aspects, as well as the Check Point products installed. An easy-to-use shell provides a set of commands, required for easy configuration and routine administration of a security system, including: network settings, backup and restore utilities, upgrade utility, system log viewing, control, and much more.

    pdf72p hoangtumayman 20-08-2012 46 1   Download

Đồng bộ tài khoản