Configuration

Results: 7616



#Item
731Computer security / Security Content Automation Protocol / Evaluation / Federal Desktop Core Configuration / Computing / Federal Information Security Management Act / Validation / National Voluntary Laboratory Accreditation Program

ITL Bulletin, Updates to the NIST SCAP Validation Program and Associated Test Requirements (March 2016)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-03-15 12:05:28
732

TRIPWIRE ENTERPRISE SINGLE-POINT ENTERPRISE CONFIGURATION AUDITING AND CONTROLToday Systems. Co., Ltd. 제품 개요

Add to Reading List

Source URL: www.todaysystems.co.kr

Language: Korean - Date: 2014-11-25 20:09:00
    733

    White Paper Captive Portal Configuration Guide June 2014 This document describes the protocol flow, configuration process and

    Add to Reading List

    Source URL: meraki.cisco.com

    Language: English - Date: 2014-10-09 16:36:12
      734

      System FileSystem Everything is a Stream What is it? • General registry of configuration data

      Add to Reading List

      Source URL: wiki.netbeans.org

      Language: English - Date: 2009-11-04 13:59:31
        735

        Practical Steps for Prevention and Protection o Computer software and configuration  Password protect all your computers, phones, tablets, devices (rotate the frequency of your shields)  Use current anti-virus soft

        Add to Reading List

        Source URL: social.education.purdue.edu

        Language: English - Date: 2012-08-10 16:00:22
          736IEEE standards / Defect tracking / Product testing / Software configuration management / Bug tracking system / Software bug / Software development / Collaboration tool

          Defect Tracking Systems in Global Software Development – a work practice study Gabriela Avram, Anne Sheehan and Daniel K. Sullivan Interaction Design Centre, Department of Computer Science & Information Systems, Univer

          Add to Reading List

          Source URL: www.idc.ul.ie

          Language: English - Date: 2009-07-13 10:05:47
          737Public-key cryptography / Public key infrastructure / Key management / Secure communication / Transport Layer Security / Certificate authority / HTTPS / Public key certificate / Self-signed certificate / Cipher suite / X.509 / TLS-SRP

          ISY994 Series – Network Security Configuration Guide Requires firmware version 3.3.1+ Requires Java 1.8+ 1

          Add to Reading List

          Source URL: www.universal-devices.com

          Language: English
          738

          HOW-TO GUIDE INSTALLING AND INTEGRATING NCM INTRODUCTION Network Configuration Manager (NCM) delivers powerful automation to help network engineers save time and improve reliability. You can use NCM to:

          Add to Reading List

          Source URL: cdn.swcdn.net

          Language: English - Date: 2015-11-03 13:28:21
            739Computing / Information technology management / Version control systems / Configuration management / Information technology / Technical communication / Computer network security / Method engineering / Baseline / Business process management / Software configuration management / Computer security

            T H R E AT STA C K OV ER SIGHT SM

            Add to Reading List

            Source URL: www.threatstack.com

            Language: English - Date: 2016-02-16 12:27:49
            740

            Bento Default Configuration files Openbox user configuration Symlinks to a lang subdirectory : $HOME/.config/openbox/autostart $HOME/.config/openbox/menu.xml $HOME/.config/openbox/rc.xml

            Add to Reading List

            Source URL: meets.free.fr

            Language: English - Date: 2015-07-31 15:56:52
              UPDATE