How to network
-
In this study, MCS is applied to compute the reliability of the nodes and the network under uncertain demand and roughness, and to determine how reliability is distributed among the various nodes of WDN, as well as assessing the reliability of the network as a series or parallel system. The effect of the resilience index on the nodal and network reliability is also assessed.
199p runthenight05 01-03-2023 9 3 Download
-
This thesis is dedicated to study how the charging behaviours of plug-in hybrid vehicles affect the local distribution network. This study focuses on two issues: the power loss and charging cost optimization. The multi-objective particle swarm optimization technique is applied to achieve the optimal charging schedule, resulting in acceptable additional power loss ratio and charging cost.
89p runthenight07 01-03-2023 7 2 Download
-
This project examines how the moving image can be used as a vehicle of memory, to express what is lost, what is gained and what changes occur in relation to personal family migratory history—a messy and ambiguous process. This practice-led research project investigates video work, using filmed materials and objects, to focus attention on the non-linear aspect of time as it is subjected to individual and collective memories. The outcomes highlight the sometimes disconnecting and unpredictable experiences of migration, storytelling, and memory.
62p runthenight04 02-02-2023 7 2 Download
-
This study focuses on exploring the effects of networks on the process of commercialisation in the biotechnology industry. The biotechnology industry itself has a specific position in the industrial markets because of its capability of successfully employing network knowledge to innovate products and services. However, the industry struggles to implement the resource networks to take innovations to market.
248p runthenight04 02-02-2023 9 3 Download
-
Lecture Information technology project management (Eighth Edition): Chapter 6, after studying this section will help you understand: Understand the importance of project schedules and good project time management; Discuss the process of planning schedule management; Define activities as the basis for developing project schedules; Describe how project managers use network diagrams and dependencies to assist in activity sequencing.
58p cuchoami2510 18-02-2022 31 6 Download
-
Overcoming drug resistance is critical for increasing the survival rate of prostate cancer (PCa). Doc‑ etaxel is the first cytotoxic chemotherapeutical approved for treatment of PCa. However, 99% of PCa patients will develop resistance to docetaxel within 3 years. Understanding how resistance arises is important to increasing PCa survival.
14p vielonmusk 21-01-2022 12 1 Download
-
This paper aims to incorporate rules of origin into international taxation into firms’ global operations. The purposes of this research are to develop a new model for the global logistics network design of an assembly system with rules of origin and to analyze how the changes of international relationships will affect logistics network design and evaluation functions.
11p enzoenzo 29-01-2020 32 3 Download
-
Module 3: Enabling access to internet resources. This module explains how to provide access to Internet resources for internal corporate clients while maintaining network security. The module discusses different ways to implement this and also how to configure rules for access.
36p nomoney2 10-02-2017 41 4 Download
-
Module 1: Overview of Microsoft ISA Server 2004. This module provides an introduction to ISA Server 2004. It introduces the core functionality provided by ISA Server 2004 and presents an overview of how ISA Server 2004 integrates with other security practices to form a defense-in-depth approach to network security. The module also describes the most common deployment scenarios for ISA Server 2004.
15p nomoney2 10-02-2017 52 3 Download
-
Module 5: Configuring access to internal resources. This module explains how to configure Web and server publishing rules to publish internal network resources to the Internet without compromising internal network security.
36p nomoney2 10-02-2017 50 4 Download
-
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server. This module explains how Microsoft Exchange Server is a critical network service that is virtually always accessible from the Internet and how ISA Server 2004 can be used to provide security for Exchange Server and for securing client connections to Exchange.
34p nomoney2 10-02-2017 49 4 Download
-
Module 4: Configuring ISA server as a firewall. This module explains how to configure ISA Server 2004 to provide firewall capabilities and restrict traffic into and out of the network. The module describes how to configure firewall policies and rules to provide specific functionality.
31p nomoney2 10-02-2017 35 3 Download
-
Module 7: Advanced application and web filtering. This module explains how application and Web filtering can be used for very specific filtering of traffic that flows through the ISA Server. The module shows how to configure application and Web filtering to provide advanced protection for the internal network.
23p nomoney2 10-02-2017 49 3 Download
-
Module 8: Configuring virtual private network access for remote clients and networks. This module explains how to provide access to the internal network for remote users while maintaining network security by implementing a virtual private network (VPN). The module shows how to configure ISA Server 2004 to provide a VPN solution.
38p nomoney2 10-02-2017 47 4 Download
-
Module 10: Monitoring ISA Server 2004. This module explains how administrators can use monitoring features of ISA Server to track network activity and monitor ISA Server performance. After completing this module, students will be able to: Describe how to use monitoring features on ISA Server 2004, configure alerts on ISA Server 2004, configure monitoring of connectivity on ISA Server 2004,...
41p nomoney2 10-02-2017 41 4 Download
-
Module 11: Implementing ISA Server 2004 enterprise edition. This module will focus on the concepts related to planning and implementing an ISA Server 2004 infrastructure. This module will highlight the differences between ISA Server 2004 Standard Edition and Enterprise Edition and explain how to implement the Enterprise Edition features.
31p nomoney2 10-02-2017 44 3 Download
-
Chapter 2 - Authentication. After studying this chapter you will be able to: Understand AAA (3A),create strong passwords and store them securely, understand the Kerberos authentication process, understand how CHAP works, understand what mutual authentication is and why it is necessary, understand how digital certificates are created and why they are used,...
55p nhanmotchut_3 20-10-2016 64 4 Download
-
Chapter 3 - Attacks and malicious code (part 1). After reading the material in this chapter, you should be able to: Explain denial-of-service (DoS) attacks, explain and discuss ping-of-death attacks, identify major components used in a DDoS attack and how they are installed, understand major types of spoofing attacks.
43p nhanmotchut_3 20-10-2016 63 4 Download
-
Chapter 4 - Remote access. Objectives in this chapter: Understand implications of IEEE 802.1x and how it is used, understand VPN technology and its uses for securing remote access to networks, understand how RADIUS authentication works, understand how TACACS+ operates, understand how PPTP works and when it is used,...
54p nhanmotchut_3 20-10-2016 78 5 Download
-
Chapter 8 - Network security topologies. Objectives in this chapter: Explain network perimeter’s importance to an organization’s security policies, identify place and role of the demilitarized zone in the network, explain how network address translation is used to help secure networks, spell out the role of tunneling in network security, describe security features of virtual local area networks.
40p nhanmotchut_3 20-10-2016 66 4 Download