|
|
|
- Eugenia Caldwell
- 10 years ago
- Views:
Transcription
1 Cisco Self Defending Networks Schutz v o n Stun d e 0 a n! Michael Schwäm m lein I n t er n et wo r k in g C o n s u lt an t C is co Sy s t em s G m b H 1 1
2 Agenda Einfüh r u ng in S e c u r it y S D N S t r a t e g ie S D N D ie näc h s t e P h a s e : S t u nd e 0 S e c u r it y M a na g e m e nt Z u s a m m e nfa s s u ng 2 2
3 Einfüh ru ng in S e c u rit y 3 3
4 E i nf üh r u ng i n S ec u r i t y D a s J a hr i m Rück b l i ck : Wür m e r, V i r e n, Sp a m,. Wür m e r, Wür m e r, u nd no c h m e h r Wür m e r B l a s t e S a p h e S a s s e M y D o o m, u d g a e B a e r, r, r, nd ie nz nd D a s e ig e ne S y s t e m a l s Wa ffe E-m a il A nh a ng a l s Türöffne r für Würm e r u nd V ire n A ng r iff a u f d ie Wir t s c h a ft M y D o o m V iru s l e g t d ie G e s c h äft s p ro z e s s e l a h m (S C O, D e u t s c h e P o s t, ) 4 4
5 E i nf üh r u ng i n S ec u r i t y Se cur i ty ha t s i ch g e än d e r t I n d e n g u t e n a l t e n Ta g e n S e c u rit y w a r w ic h t ig, a b e r (re l a t iv ) e infa c h F ire w a l l s w a re n d ie b e k a nnt e n We rk z e u g e P e rim e t e r D e fe ns e w a r d ie w ic h t ig s t e S t ra t e g ie S e c u rit y A nfo rd e ru ng e n w u rd e n a l s B a rrie re für d e n Eins a t z v ie l e r A p p l ik a t io ne n a ng e s e h e n S e c u rit y d a s u ng e l ie b t e K ind v s. 5 5
6 E i nf üh r u ng i n S ec u r i t y Se cur i ty ha t s i ch g e än d e r t Und j e t z t S e c u ri t y i s t de r H a u p t g e da nk e für a l l e B e t e i l i g t e n B e dro h u ng e n s i nd v i e l k o mp l e x e r g e w o rde n S i c h e e i t s s y s t e s e w e s e l i c h e l l i g e e s e i rh me müs n nt i nt nt r n D e fe ns e in D e p t h i s t di e w i c h t i g s t e S t ra t e g i e g e w o rde n S e c u ri t y g i l t i nz w i s c h e n a l s G ru nda nfo rde ru ng i n de r E nt w i c k l u ng v o n A p p l i k a t i o ne n v s. 6 6
7 M a E v o l u t i o n der S i c h er h ei t s anf o r der u ngen VV ee rg aa ng ee nh ee it NN oo tt ww ee nd ig ee M a ßna hh mm ee n Reaktiv A u to matis c h, P r o aktiv, E in z elp r o d u kte P r o d u ktp o s itio n ier u n g I n teg r ier t üb er alle S c h ic h ten Lös u n g s d es ig n / M n g. S ec. S er vic e Üb b ee rr gg rr ee ii ff ee nn dd ee rr Lös s un gg ss aa nn ss aa tz Se ll f f DD ee ff ee nn dd ii nn g g NN ee tw oo rr kk 7 7
8 S D N S t ra t e g ie 8 8
9 S el f D ef endi ng N et w o r k S t r at egi e I N T E G RA T E D S E C U RI T Y Secure C onnectiv ity T h rea t D ef ens e T rus t & I dentity A u to mated, P r o ac tive II nn itiative AA n n in itiative zz uu r r VV er to bb es d d rr amatic ss er uu nn g g ally dd er NN etz imp ww er rr kf o o ve äh th ig keiten e nn etw,, oo BB rr ed k s rr ooab hh uility u nn gg en zz u u er to ken id nnen en tif,, y zy z, u, u pp ver rr even hh in t, dd er an n n d d uu nn d d ss ic h h ddad er ap nn eu t to en th rrss eats itu atio n n an zz uu pp as ss en A D V A N C E D S E C U RI T Y T E C H N O LO G I E S Endpoint Security A ppl ica tion F irew a l l SSL V P N N etw ork A nom a l y D etection S Y S T E M LE V E L S O LU T I O N S Endpoints + N etw + P ol icies Serv ices P a rtners h ips ork s 9 9
10 C i s co s I n te g r i e r te s N e tzw e r k s i che r he i ts s y s te m Threat Defense Defend the Edge: Integrated Network FW+IPS Detects and Prevents External Attacks P r o tec t the I nter i o r : C atal y s t Integrated Sec u ri ty Pro tects Ag ai nst I nternal Attacks G u a r d the Endp o i nts : C i s c o Sec u ri ty A gent ( C SA ) Pro tects H o sts Ag ai nst I nf ecti o n I nter net I ntr a net Trust and I de nti ty V er i fy the U s er a nd Dev i c e: Identi ty -B as ed Networki ng/ NA C C o ntro l W h o / W h at H as Access Si Si S e c ure C o m m. S u r T r a p o r M V o i C o i ec e the ns t: IPSec VPN SSL VPN PL S Pro tects Data/ ce nf denti ali ty 10 10
11 5 E i g e n s c h a f t e n e i n e s S e l f -D e f e n d i n g N e t w o r k s K o n tr o lle d er E n d p u n kte an h an d d er P o lic y N etw o r k A dm i s s i o n C o ntr o l, I denti ty B a s ed N etw o r k S er v i c es, S S L Dev i c e P r o tec ti o n S c h u tz d er N etz w er kko mp o n en ten C o o l P l a P o l i c i A u u r C P U M o r y T l s i c P r o k o l l ntr ne ng, to -S ec e, em hr es ho di ng, her e to e F lex ib le u n d S ic h er e V er b in d u n g en Dy na m i c M u l ti p o i nt V P N, V L A N D y n amis c h er D aten au s tau s c h E lemen te ein z eln er N etfl o w, N etw o r k B a s ed A p p l i c a ti o n R ec o gni ti o n (N B A R ), Dy na m i c I ntr u s i o n P r o tec ti o n, T hr ea t R es p o ns e, A r e Y o u T her e? A u to matis c h e Reaktio n au f B ed r o h u n g en C i s c o S u r i A N o r k A m a l y o i v N I ec ty gent, etw no Detec ti n (R er hea d), DS 11 11
12 SDN Di e näc h s t e P h a s e 12 12
13 O Stän d i g k l e i n e r w e r d e n d e R e a k ti o n s f e n s te r Vu l nerab V iel i tyi D i s c ov ered P EPatc PI h Is s u ed Patc E h ExI p l oi t Is s u ed Pu b l i s h ed Inc i dent Ex p l oi t c c u Pu rs b l i s h ed Inc i dent O c c u rs O p e rati o n S l o t (#vulnerability & resources) B l as ter: 2 5 N ach i : Wenn Sl am m er: d 1 er 8 0 E x p l o i t v o w r i deem w o lp l en a t c S h i e d a en u f tv r io t t r f a l l v er h i nd er n, N imd s el b a: s t3 3 1 T ag e b ei m a x i m a l er A ns t r eng u ng? Day-Zero Attack 13 13
14 D a y Z e r o Sc h u tz C is c o d ef in ier t H o s t-b as ed I n tr u s io n P r even tio n als d ie F äh ig keit, D ay z er o malic io u s C o d es o h n e N eu ko n f ig u r atio n o d er U p d ates z u s to p p en C S A h at d ie w eltw eit b es te au f g ez eic h n ete U n ter b in d u n g vo n Z er o D ay ex p lo its, Wür mer n, u n d V ir en üb er d ie letz ten 4 J ah r e: C o de R ed, N i m da (a l l e 5 ex p l o i ts ), P enta go ne (G o nner ) S i r c a m, Deb p l o i t, S Q L S na k e, B u gb ea r, S Q L S l a m m er, S o B i g, B l a s ter / W el c hi a, F i z z er M y Do o m, B a gl e, S a s s er, J P EG b r o w s er ex p l o i t (M S ), R P C - DC O M ex p l o i t (M S ), B u ffer O v er fl o w i n W o r k s ta ti o n s er v i c e (M S ) I nter net Ex p l o r er C o m m a nd Ex ec u ti o n V u l ner a b i l i ty K ein e N eu ko n f ig u r atio n d er C S A D ef au lt E in s tellu n g en o d er U p d ates z u d en C S A B in ar ies s in d d af ür n ötig 14 14
15 C i s c o Se c u r i ty A g e n t ( C SA ) R e g e l b a s i e r te s V e r f a h r e n, Z e r o U p d a te R e g e l b a s i e r e n d ( w h i t e l i s t ) K E I N E S i g n a t u r -U p d a t e s n o t w e n d i g Z e n t r a l e I n s t a l l a t i o n u n d L i z e n s i e r u n g Erstes Auftreten T i m eli ne C C S S A g g esc esc h h ütz ütz tt D D a a y y -Z -Z ero ero P P ro ro tec tec ti ti o o n 15 15
16 CSA: m e h r f a c h e Si c h e r h e i t s -F u n k t i o n a l i t ät e n P e r s o n a l F i r e w a l l S y s t e m H a r d e n i n g A p p l i c a t i o n P o l i c y E n f o r c e m H o s t b a s e d I D S / I P S M a l i c i o u s C o d e P r o t e c t i o n F i l e I n t e g r i t y e n t 16 16
17 C i s c o Se c u r i ty A g e n t ( C SA ) Regelbasierender S c h u t z v o r A ngrif f en 1. L earn ab ou t th e s y s tem 2. T ry i ng v ari ou s v u l nerab i l i ti es Sc h nel l e Änderu ng Ständi ge SIG -U p dates T ei l wei s e u ngenau gegenüb er neu en A ngri ffen T arget 3. C reate b ac kdoors 4. Ex tend attac k to oth er s y s tem s 5. D os, get i nform ati on Sc h adens p otenti al Ändern s i c h s eh r l angs am Ins p i rati on für C SA 17 17
18 W i e d e r C SA A n g i f f e s to p p t A lle A n g r if f e müs s en b es timmte V er h alten s w eis en f o lg en u m er f o lg r eic h z u s ein : Der A n g ri f f c o d e m u s s i n d er Z i el -C P U a u s g ef üh rt w erd en B u f f er o v erf l o w, ex ec u t e s h el l s c ri p t s, d o w n l o a d u n d ex ec u t e c o d e, u.a. D a es n u r ein e b eg r en z te Z ah l vo n Weg en in ein S y s tem vo m N etz w er k au s g ib t, w er d en ein e o d er meh r er e d ies er V er h alten s w eis en vo n d en A n g r if f en ver w en d et D ie Üb er w ac h u n g u n d K o n tr o lle d ies es S c h lüs s elver h alten s läß t d en C S A A n g r if f e b lo c kier en Weil alle A n g r if f e d ie g leic h en w eg e b en u tz en müs s en, is t d er C S A s eh r ef f ektiv b eim S to p p en vo n b ekan n ten u n d u n b ekan n ten ( D ay Z er o ) A n g r if f en 18 18
19 C SA - I N C O R E A r c h i te c tu r e Der C i s c o S ec u ri t y A g en t c h ec k t d i e S y s t em a u f ru f e u n d en t s c h ei d et m i t a l l o w / d en y R eg el n, o b d er A u f ru f g es t a t t et i s t o d er n i c h t. Di es e T ec h o l o g i e h ei ßt I N C O R E I N C O RE I N t erc ep t C O rrel a t e Ru l es En g i n e Z ero U p d a t e A rc h i t ek t u r K ei n e S i g n a t u ren n o t w en i g u m ei n en A n g ri f f erf o l g rei c h a b z u w eh ren! 19 19
20 C G C SA - V e r te i l u n g d e r P o l i c i e s üb e r P U L L - A n s a tz eneri eru ng der A gent K i ts Ins tal l ati on der K i ts ( m i t Z erti fi kat) C S AM CA Agent Kits R egi s tri eru ng u nd PU L L der Pol i c y v i a SSL SSL Agent CA SSL CA CA CA CA Agent Agent Agent Agent 20 20
21 Netzwerk: O u tb rea k P rev en ti o n S erv i c e Adressiert den w ic h tig sten T eil ein es L eb en sz y k l u ses v o n V iren u n d Würm ern : O u tb rea k P rev en tio n Sehr s c hn el l R ea k t i o n a u f n eu e Au sb rüc h e w irk t g eg en b eides: Würm er u n d V iren S y stem -l ev el An sa tz : C isc o I n fra stru k tu r üb erg reifen d G a u K o n l l l l a n n P o l y M w r s s g r b en e tro e der in sta tio ein er eu en ic Automatic mode an ual mode ith comp eh en iv e con tr ol ov er ev en ts an d ex cep tion on a dev ices or oup as is E rw eiteru n g der C isc o S el f-d efen din g N etw o rk I n itia tiv e 21 21
22 O O O O O O O u tb rea k P rev en ti o n S erv i c e Schnelle R ea k t i o n a u f neu e V i r en u nd Wür m er Die ein z el n en B es t a n d t eil e: TrendLabs w el t w ei t es real -t i m e M o ni t o ri ng u nd S i g nat u renent w i c k l u ng st eam S o ft w are: C i sc o I nc i dent C o nt ro l S erv er ( I C S ) H i l fsm i t t el für di e A dm i ni st rat i o n u nd das A u sro l l en v o n V i ren u nd Würm ern bez o g enen Lösu ng en Z i el si nd N et z w erk g erät e, di e di esen S erv i c e z u r V erfüg u ng st el l en T r end L a b s O u t b r e a k & t h r e a t i n f o r m a t i o n h r e a t l e v e l e t a i l e d d e s c r i p t i o n y p i c a l i m p a c t / v e c t o r s e c o m m e n d e d O P T D T R ACL P o l i c y / e x c e p t i o n s M a n u a l o r a u t o m a t i c F u l l c o n t r o l : D e v i c e s, g r o u p s, e t c. R e c o m m e n d e d o r m o d i f i e d O P ACL Ca t a l y s t I P S B l a d e M a l w a r e O u tb r ea k! t= 0 P ACL P S i g P AC L t= 3 0 m i n m a x / 1 5 ty p Cisco Incident Contr ol S er v er ( ICS ) P ACL P S i g P S i g t= m i n m a x / 6 0 ty p Ca t a l y s t R o u t e r I P S S e r i e s R o u t e r I P S i n S o f t w a r e AS A I P S B l a d e 22 22
23 Outbreak Prevention Service Service T y p en Zwei L ev el v o n O P S S er v ic e b a s ier en d a u f d en F u n k t io n a l it ät en d es en t s p r ec h en en G er ät es L ev el I S o l u tio n : O P AC L a u f I O S dev ic es O u k P n L ( O P L ) w n a l b v o n 3 0 m. ( ~ 1 5 p. ) n a c h l c h v o n T a b p u b l tb rea rev en tio AC AC ird in erh in ty ein em festg estel ten Au sb ru den ren dl s iz iert Z iel g eräte: R o u ters, S w itc h es O P AC L E x a m p l es: W O R M _ M S B L A S T. A ( T CP P or t ) : deny tcp a ny a ny eq W O R M _ N A CH I. A ( ICM P ) : deny icm p a ny a ny W O R M _ B A G L E. B ( T CP / U D P P or t ) : deny tcp a ny a ny eq , deny u dp a ny a ny eq
24 Outbreak Prevention Service Service T y p en L ev el I I S o l u tio n : O P AC L + O P S ig a u f I P S dev ic es O u k P n L ( O P L ) w n a l b v o n 3 0 m. ( ~ 1 5 p. ) n a c h l c h v o n T a b p u b l tb rea rev en tio AC AC ird in erh in ty ein em festg estel ten Au sb ru den ren dl s iz iert O P AC L w ird en tfern t u n d du rc h ein e O u tb rea k P rev en tio n S ig n a tu r ( O P S ig ) ersetz t. T y p isc h erw eise in n erh a l b v o n c a M in u ten n a c h Au sb ru c h Z iel e der S ig n a tu r: a l l e I P S -en a b l ed G eräte: I P S series sen so rs, I D S M 2 für C a t6 K, I O S R o u ters m it S ec u rity I m a g e ( S W I P S ) 24 24
25 Outbreak Prevention Service M a n a g em en t & M o n it o rin g S u p p o r t in C S -M A R S S y s l o g c l ien t s u p p o r t f o r u s e wit h o t h er r ep o r t in g t o o l s 25 25
26 CONVERGED MANAGEMENT, MONITORING, AND RES P ONS E Security Management
27 Management, Monitoring & P l anu ng Geringe K o m p l ex ität Device Managem ent SS yy stem Managem ent Integriertes, ww eb -b aa sierend es MM aa na gem ent A ll ll -in-o ne KK oo nf igu ra tio n FF W W,, IP S S,, VV PP N N,, AA V V RR ea ll -tim e mm oo nito ring to oo ll s Cisco Device Manager Meh rere PP rod uu kk te integriert in einem Managem ent HH oh e SS kk al ierb ark eit Cisco SS ecu rity Manager Monitoring and Mitigation Mu ll ti-p ll atform EE vent Managem ent and RR esp onse AA uu sgek ll ügel te KK orrel ation Cisco SS ecu rity MA RR SS CiscoW ork s SS II MS AA uu dd iting Üb erp rüfu ng dd er SS ecu rity KK onform ität dd es GG erätes nach II nd uu strie b est pp ractices uu nd RR egu ll arien Cisco SS ecu rity AA uu dd itor 27 27
28 C is c o D ev ic e Manager Integriert, W eb -b a s iertes M a na gem ent u nd M o nito ring Managem ent u nd Monitoring d er Cisco Lösu ngen V ol l e U nterstütz u ng für d ie K onfigu ration von: - A ccess control - A p p l ication secu rity - A nti-x & attack svcs - V P N p ol icies - R ou ting - A A A u nd m eh r U nterstütz t Monitoring von: - S y sl og ( real -tim e) - Connections - T h rou gh p u t - S y stem statu s & m eh r
29 C is co Security M anag em ent Suite S ec u rity M a na ger D ev ic e C entric P o l ic y V iew 29 29
30 C is co Security M anag em ent Suite S ec u rity M a na ger M a p C entric V iew B iet et m u l t i-l a y er m a p B iet et G er ät e R ep l ik a t io n O p er a t io n a l e F ea t u r es Config roll back D e p loy A u f r u f a n d er er T o o l s V P N bu ild e r Dep l o y m ent Device Settings V P N F ir ew a l l I P S O th er R u le s t able D e v ice s e t t ings 30 30
31 W S el f -D ef end ing N etw ork E v ent G eneratoren A t t a c k er V i ru s o rm User S c r ip t K id d ie Z om b ie / DDoS 31 31
32 Defense-I n-dep th = Höh er e K o m p l ex i tät I nfected H ost Log/ A l ert 32 32
33 A u f gab e d es S ec -A d min: F irew al l u nd N I D S L ogs S wit c h L o g s F ir ewa l l L o g s R o u t er L o g s I P S L o g s 33 33
34 C is c o Mitigation and R es p ons e S y s tem ( MA R S ) N u t z u n g d er v o r h a n d en en N et z wer k in f r a s t r u k t u r z u r S ic h er h eit s a n a l y s e D a t en k o r r el l ier u n g im k o m p l et t en N et z N I D S, F ire w all, R ou t e r, S w it ch e s, CS A S y s S N M P, R D E P, S D E E, N e t F, E p e v e log, low nd oint nt logs S c h n el l e L o k a l is ier u n g v o n A n g r if f en u n d E in l eit u n g v o n G eg en m a ßn a h m en K ey F ea t u r es M e ld e t S e cu rit y incidents bas ie re nd au f D ev ice m essa g es, ev ents, u nd sessio ns I w e e h d e T d s t e ncidents rd n grap is ch in r op ologie arge llt G e ge nm aßnah m e n au f L 2 p ort s u nd L 3 G e rät e n S kalie rbarke it au ch in kom p le x e re n U m ge bu nge n 34 34
35 CS-M A R S: W i e e s f u n k t i o n i e r t? S c h n el l es E r f a s s en v o n u n t er s c h ied l ic h en D a t en : d a t a f l o ws, l o g s, a l er t s, t o p o l o g y D y n a m is c h e R ed u z ier u n g, K o r r el ier u n g u n d Üb er p r üf u n g V is u a l is ier u n g d er p r io r is ier t en, r ea l en V o r f äl l en a u f d er N et z wer k -T o p o l o g iek a r t e A u t o m a t is c h es z en t r a l e I n v es t ig a t io n, A u d it in g u n d R ep o r t in g V h d t u n d s t o p p t A n g r f d u r c h s o g. E n f o r c t d er in er if e em en ev ic es ContextCorrelation S u rev ec tor A naly s is Network, Fw, NAT, Netflow Capture NAT, CVE, Anomaly, Rule Correlate VA, Fw, Sw, Rule Validate Drill-Down Visualize, Prioritize, Investigate Logs, Alerts, Traffic flow Leveraged Mitigation A u tom itig ate Rapid Query, Audit, Report 35 35
36 CS-M A R S: Üb e r s i c h t u n d K o n t r o l l e 36 36
37 CS-M A R S: D a t e n k o r r e l i e r u n g Genaue Darstellung des Angriffsweges H o s t A P o r t S c a n s T a r g e t X, f o l l o w e d b y H o s t A B u f f e r O v e r f l o w A t t a c k t o T a r g e t X W h e r e X i s v u l n e r a b l e t o A t t a c k, f o l l o w e d b y T a r g e t X e x e c u t e s p a s s w o r d a t t a c k o n T a r g e t Y 37 37
38 C S -MA R S : E inl eitu ng v on G egenmaßnah men Nutzung d e r A b w e h r m ögl i c h e i te n i nne r h a l b d e s Ne tzw e r k s Graphische D arstel l u n g path. Geg en m aßn ahm en w erd en au f d em N etz w erk g erät d u rchg ef ührt. d es L ay er 2 3 attack S wit c h C isco M A R S k o n f ig u riert Geg en m aßn ahm en R o u t er F ir ewa l l ] 38 38
39 CONVERGED MANAGEMENT, MONITORING, AND RES P ONS E Zusammenfassung
40 Se c u r i t y i s t n i c h t o p t i o n a l! Security Optional Security als Sch w A d d -On ierig e I nteg ration N ich t K os tenef f ek tiv K eine K onz entration auf d ie G es ch äf ts proz es s e Security als T eil eines Sys tem s Security is t eing eb aut I ntellig ente Z us am m enarb eit A b g es tim m t auf d ie G es ch äf ts proz es s e 40 40
41 41 41
1.- L a m e j o r o p c ió n e s c l o na r e l d i s co ( s e e x p li c a r á d es p u é s ).
PROCEDIMIENTO DE RECUPERACION Y COPIAS DE SEGURIDAD DEL CORTAFUEGOS LINUX P ar a p od e r re c u p e ra r nu e s t r o c o rt a f u e go s an t e un d es a s t r e ( r ot u r a d e l di s c o o d e l a
H ig h L e v e l O v e r v iew. S te p h a n M a rt in. S e n io r S y s te m A rc h i te ct
H ig h L e v e l O v e r v iew S te p h a n M a rt in S e n io r S y s te m A rc h i te ct OPEN XCHANGE Architecture Overview A ge nda D es ig n G o als A rc h i te ct u re O ve rv i ew S c a l a b ili
G ri d m on i tori n g w i th N A G I O S (*) (*) Work in collaboration with P. Lo Re, G. S av a and G. T ortone WP3-I CHEP 2000, N F N 10.02.2000 M e e t i n g, N a p l e s, 29.1 1.20 0 2 R o b e r 1
Enterprise Data Center A c h itec tu re Consorzio Operativo Gruppo MPS Case S t u d y : P r o g et t o D i sast er R ec o v er y Milano, 7 Febbraio 2006 1 Il G r u p p o M P S L a B a n c a M o n t e d
m Future of learning Zehn J a hr e N et A c a d ei n E r f o l g s p r o g r a m Cisco E x p o 2 0 0 7 2 6. J u n i 2 0 0 7, M e sse W ie n C. D or n in g e r, b m u k k 1/ 12 P r e n t t z d e r p u t
Application Note: Cisco A S A - Ce r t if ica t e T o S S L V P N Con n e ct ion P r of il e Overview: T h i s a p p l i ca ti o n n o te e x p l a i n s h o w to co n f i g u r e th e A S A to a cco m
Der Bologna- P roz es s u nd d i e S t aat s ex am Stefan Bienefeld i na Service-St el l e B o l o g n a d er H R K Sem in a r D er B o l o g n a P ro z es s U m s et z u n g u n d M it g es t a l t u
W Cisco Kompetanse eek end 2 0 0 8 SMB = Store Mu ll ii gg hh eter! Nina Gullerud ng ulleru@ c is c o. c o m 1 Vår E n t e r p r i s e e r f a r i n g... 2 S m å o g M e llo m s t o r e B e d r i f t e
Device I n s t r u m en t a t io n E x a m p l es : I P S L A s & N et F l o w Presented by Emmanuel Tychon Techni cal M ark eti ng Eng i neer TU D resden, J anuary 1 7 th 2 0 0 7 1. C is co I O S I P
First A S E M R e c to rs C o n f e re n c e : A sia E u ro p e H ig h e r E d u c a tio n L e a d e rsh ip D ia l o g u e Fre ie U n iv e rsitä t, B e rl in O c to b e r 2 7-2 9 2 0 0 8 G p A G e e a
EM EA. D is trib u te d D e n ia l O f S e rv ic e
EM EA S e c u rity D e p lo y m e n t F o ru m D e n ia l o f S e rv ic e U p d a te P e te r P ro v a rt C o n s u ltin g S E p p ro v a rt@ c is c o.c o m 1 A g e n d a T h re a t U p d a te IO S Es
IronPort Gateway Security Products The Leader in Communication Security Reiner Baumann IronPort Systems The Principles of Industry Leadership A n a l y s t L e a d e r s h i p R e c o g n i z e d a s t
PSTN. Gateway. Switch. Supervisor PC. Ethernet LAN. IPCC Express SERVER. CallManager. IP Phone. IP Phone. Cust- DB
M IPCC EXPRESS Product Solution (IPCC - IP Co n t a c t Ce n t e r ) E i n f ü h r u n g Ü b e r h u nd e r t M il l io ne n N u t ze r - P r o g no s e n zu f o l g e w e r d e n e s in d ie s e m J ah
Campus Sustainability Assessment and Related Literature
Campus Sustainability Assessment and Related Literature An Annotated Bibliography and Resource Guide Andrew Nixon February 2002 Campus Sustainability Assessment Review Project Telephone: (616) 387-5626
W Regional Cooperation in the Field of A u tom otiv e E ngineering in S ty ria Dr. Peter Riedler 2 9.1 1.2 0 1 1 i e n GmbH Graz B u s ines s S trategy S ty ria 2 0 2 0 H is tory 1 9 9 4 1 9 9 5 1 9 9
ACE-1/onearm #show service-policy client-vips
M A C E E x a m Basic Load Balancing Using O ne A r m M ode w it h S ou r ce N A T on t h e C isco A p p licat ion C ont r ol E ngine Goal Configure b a s ic l oa d b a l a nc ing (L a y er 3 ) w h ere
SCO TT G LEA SO N D EM O Z G EB R E-
SCO TT G LEA SO N D EM O Z G EB R E- EG Z IA B H ER e d it o r s N ) LICA TIO N S A N D M ETH O D S t DVD N CLUDED C o n t e n Ls Pr e fa c e x v G l o b a l N a v i g a t i o n Sa t e llit e S y s t e
e Videobewaking ov er I P Marty K n o p e rt 1 A l l m z u l l b t g r u m a k h w k h w k z a l z r E p r m a r k t t c m a r k t Video vision: e vor en va n video en in de na ij e oek om st eb ik en
Data Center end users for 40G/100G and market dy nami c s for 40G/100G on S M F Adam Carter Ci s c o 1 W Now that 40GbE is part of the IEEE 802.3ba there will be a wid er array of applic ation s that will
Positioning 40 and 100 GbE in data center inter-sw itch l ink ap p l ications and 40GbE PM D recom m endations Adam Carter, Cisco Al essan dro B arb ieri, Cisco 1 m Data Center inter-s w itc h l ink ap
i n g S e c u r it y 3 1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his å ] í d : L : g u id e Scanned by CamScanner
í d : r ' " B o m m 1 E x p e r i e n c e L : i i n g S e c u r it y. 1-1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his g u id e å ] - ew i c h P e t e r M u la e n PACKT ' TAÞ$Æo
SIV for VoiceXM 3.0: a n g u a g e a n d A p p l ica t ion D es ig n C on s id era t ion s Ken Rehor C i s c o S y s t em s, I nc. [email protected] March 05, 2009 G VoiceXM Application Architecture PSTN
IT-S i c h e r h e i t Stephan Meier s m eier@ c is c o. c o m 1 The Evolution d er Z iele Vom H ob b y i s t e n z u m P r of e s s i on a l T hreats b ec o m ing inc reas ing l y d if f ic u l t to d
The Business Case for D om aink ey s I d ent ified M ail Andy Spillane V ic e P r es ident, Y ah o o! M February 13, 2006 ail 1 Fighting Spam & Email Abuse R eq uir es a M ulti-fac eted Appr o ac h DomainKeys
C o a t i a n P u b l i c D e b tm a n a g e m e n t a n d C h a l l e n g e s o f M a k e t D e v e l o p m e n t Z a g e bo 8 t h A p i l 2 0 1 1 h t t pdd w w wp i j fp h D p u b l i c2 d e b td S t
M Fast forward into th e fu tu re Accelerating b u s ines s o p p o rtu nity and natio nal p ro s p erity Viktor Kovacs anaging D irecto r H u ngary & Ad riatic R egio n C h a n g e t h e w o r l d» O
How To Know If You Are A Good Or Bad Person
QuesCom I P -T E L E F O N I E & G S M -G A T E W A Y S Robert Urban D i rec tor I nternati onal S al es Agenda Üb e r Q u e s C o m K u n d e n M a r k t üb e r s i c h t Q u e s c o m Lös u n g Q u e
Video og IP TV - h v or da n p هv ir k es n et t v er k en e? t t a d A c c o u n t M a n a g S P / T o m S m t Ole-P et er R s er elec eg en 1 Hva gjorde vi u t en T V.... 2 2 0 0 m il l s am t idige
FORT WAYNE COMMUNITY SCHOOLS 12 00 SOUTH CLINTON STREET FORT WAYNE, IN 468 02 6:02 p.m. Ma r c h 2 3, 2 015 OFFICIAL P ROCEED ING S Ro l l Ca l l e a r d o f h o o l u e e o f t h e r t y m m u t y h o
SCHOOL PESTICIDE SAFETY AN D IN TEG R ATED PEST M AN AG EM EN T Statutes put into law by the Louisiana Department of Agriculture & Forestry to ensure the safety and well-being of children and school personnel
I n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y
I n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y and KB rl iak s iol mi a, hme t a ro cp hm a5 a 2k p0r0o 9f i,e ls hv oa nr t ds eu rmv oedye l o nf dae cr
Unit 16 : Software Development Standards O b jec t ive T o p r o v id e a gu ide on ho w t o ac h iev e so f t wa r e p r o cess improvement through the use of software and systems engineering standards.
UNDERSTANDING FLOW PROCESSING WITHIN THE CISCO ACE M ODULE Application de liv e r y pr odu cts can distr ib u te tr af f ic to applications and w e b se r v ice s u sing v ar y ing le v e ls of application
Collaboration in Public H e alth be tw e e n U niv e rs ity of H e id e lbe rg and U niv e rs ity of D ar e s S alaam How t h e c oop e r a t i on e m e r g e d Informal c ont ac t s from e arly 1 9
A n d r e w S P o m e r a n tz, M D
T e le h e a lth in V A : B r in g in g h e a lth c a r e to th e u n d e r s e r v e d in c lin ic a n d h o m e A n d r e w S P o m e r a n tz, M D N a tio n a l M e n ta l H e a lth D ir e c to r f
M P L S /V P N S e c u rity. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d.
M P L S /V P N S e c u rity M ic h a e l B e h rin g e r < m b e h rin g @ c is c o.c o m > M b e h rin g - M P L S S e c u rity 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. 1 W h
B a rn e y W a r f. U r b a n S tu d ie s, V o l. 3 2, N o. 2, 1 9 9 5 3 6 1 ±3 7 8
U r b a n S tu d ie s, V o l. 3 2, N o. 2, 1 9 9 5 3 6 1 ±3 7 8 T e le c o m m u n ic a t io n s a n d th e C h a n g in g G e o g r a p h ie s o f K n o w le d g e T r a n s m is s io n in th e L a te
AN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL 1978-1981. P. A. V a le s, Ph.D.
AN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL 1978-1981 P. A. V a le s, Ph.D. SYNOPSIS Two in d ep en d en t tre a tm e n t g ro u p s, p a r t ic ip
G S e r v i c i o C i s c o S m a r t C a r e u ي a d e l L a b o r a t o r i o d e D e m o s t r a c i n R ل p i d a V e r s i n d e l S e r v i c i o C i s c o S m a r t C a r e : 1 4 ع l t i m a A c
M Mobile Based Clinical Decision Support System Bhudeb Chakravarti & Dr. Suman Bhusan Bhattacharyya Provider & Public Health Group, VBU-HL P S aty am C om puter S ervices L im ited Bhudeb_ C hak ravarti@
W h a t is m e tro e th e rn e t
110 tv c h a n n e ls to 10 0 0 0 0 u s e rs U lf V in n e ra s C is c o S y s te m s 2 0 0 2, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. 1 W h a t is m e tro e th e rn e t O b je c tiv
CIS CO S Y S T E M S. G u ille rm o A g u irre, Cis c o Ch ile. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d.
CIS CO S Y S T E M S A c c e s s T e c h n o lo g y T e le c o m /IT Co n n e c tiv ity W o rk s h o p G u ille rm o A g u irre, Cis c o Ch ile g m o.a g u irre @ c is c o.c o m S e s s io n N u m b e
Bonn Declaration on Regional Cooperation in Quality Assurance in Higher Education Adopted on 20 June 2007 during the Conference Enhancing Quality Across Borders R egional Cooperation in Quality Assurance
1. Oblast rozvoj spolků a SU UK 1.1. Zvyšování kvalifikace Školení Zapojení do projektů Poradenství 1.2. Financování 1.2.1.
1. O b l a s t r o z v o j s p o l k a S U U K 1. 1. Z v y š o v á n í k v a l i f i k a c e Š k o l e n í o S t u d e n t s k á u n i e U n i v e r z i t y K a r l o v y ( d á l e j e n S U U K ) z í
Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management
The EU D a t a G r i d D a t a M a n a g em en t (EDG release 1.4.x) T h e Eu ro p ean Dat agri d P ro j ec t T eam http://www.e u - d a ta g r i d.o r g DataGrid is a p ro j e c t f u n de d b y th e
COMTECH 2005 Dresden Ci sc o I P - Tel efo ni e i n der P ra x i s Dirk E b e rh a rd t I n t e rn e t w o rkin g C o n s u l t a n t 1 Aktuelle M a r ktz a h len Kundenzahl s t ei g t w ei t er an 28,000+
w ith In fla m m a to r y B o w e l D ise a se. G a s tro in te s tin a l C lin ic, 2-8 -2, K a s h iw a z a, A g e o C ity, S a ita m a 3 6 2 -
E ffic a c y o f S e le c tiv e M y e lo id L in e a g e L e u c o c y te D e p le tio n in P y o d e r m a G a n g re n o su m a n d P so r ia sis A sso c ia te d w ith In fla m m a to r y B o w e l D
Victims Compensation Claim Status of All Pending Claims and Claims Decided Within the Last Three Years
Claim#:021914-174 Initials: J.T. Last4SSN: 6996 DOB: 5/3/1970 Crime Date: 4/30/2013 Status: Claim is currently under review. Decision expected within 7 days Claim#:041715-334 Initials: M.S. Last4SSN: 2957
Practice Writing the Letter A
Aa Practice Writing the Letter A A a A a Write a in the blank to finish each word. c t re h d Write A in the blank to finish each word. nn US ndy Bb Practice Writing the Letter B B b B l P b Write b in
Internationalization strategy of the SEPT Program Design of market-oriented training and ed u c ation p rod u c ts Utz D o r n b e r g e r ( Un i v e r s i ty o f L e i p zi g ) & N g u y e n T h i T h
B R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g S y s te m
Symposium on Public Transportation in Indian Cities with Special focus on Bus Rapid Transit (BRT) System New Delhi 20-21 Jan 2010 B R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g
B rn m e d s rlig e b e h o v... 3 k o n o m i... 6. S s k e n d e tils k u d o g k o n o m is k frip la d s... 7 F o r ld re b e ta lin g...
V e lf rd s s e k re ta ria te t S a g s n r. 1 4 3 4 1 5 B re v id. 9 9 3 9 7 4 R e f. S O T H D ir. tlf. 4 6 3 1 4 0 0 9 s o fie t@ ro s k ild e.d k G o d k e n d e ls e s k rite rie r fo r p riv a tin
Understanding, Modelling and Improving the Software Process. Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1
Process Improvement Understanding, Modelling and Improving the Software Process Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1 Process improvement Understanding existing processes
proxy cert request dn, cert, Pkey, VOMS cred. (short lifetime) certificate: dn, ca, Pkey mod_ssl pre-process: parameters->
Overview of the New S ec u rity M od el WP6 Meeting V I D t G R I D C o nf er enc e B r c el o ne, 1 2-1 5 M y 2 0 0 3 Overview focus is on VOMS C A d e t il s r e in D 7. 6 Se cur it y D e sig n proxy
T c k D E GR EN S. R a p p o r t M o d u le Aa n g e m a a k t o p 19 /09 /2007 o m 09 :29 u u r BJB 06 013-0009 0 M /V. ja a r.
D a t a b a n k m r in g R a p p o r t M Aa n g e m a a k t o p 19 /09 /2007 o m 09 :29 u u r I d e n t if ic a t ie v a n d e m S e c t o r BJB V o lg n r. 06 013-0009 0 V o o r z ie n in g N ie u w la
R e t r o f i t o f t C i r u n i s g e C o n t r o l
R e t r o f i t o f t C i r u n i s g e C o n t r o l VB Sprinter D e s c r i p t i o n T h i s r e t r o f i t c o n s i s t s o f i n s t a l l i n g a c r u i s e c o n t r o l s wi t c h k i t i n
Erfa rin g fra b y g g in g a v
Erfa rin g fra b y g g in g a v m u ltim e d ia s y s te m e r Eirik M a u s e irik.m a u s @ n r.n o N R o g Im e d ia N o rs k R e g n e s e n tra l fo rs k n in g s in s titu tt in n e n a n v e n d
Middagserie Eschatologie Oosterparkkerk, Amsterdam, December 2007
Amserdam m Middagserie Eschalgie Oserparkkerk, Amserdam, December 2007 Onderweg na a r rgen Serie kerkdiensen ver chriselijke ekm sverw a ching f escha lg ie A m s e r d a m D e c e m b e r 2 0 0 7 V r
/* ------------------------------------------------------------------------------------
Pr o g r a m v a r e fo r tr a fik k b e r e g n in g e r b a s e r t p å b a s is k u r v e m e to d e n n M a tr ix * x M a tr ix E s ta lp h a B e ta ; n M a tr ix * z M a tr ix ; g e n M a tr ix X
How To Be A Successful Thai
D The Joint Master of Science eg ree C ou rse in V eterinary P u b l ic H eal th ( MScVPH), F U -C MU Dr. L e rt ra k S ri k i t j a k a rn R e g i o n a l C e n t re f o r V e t e ri n a ry P u b l i
Cisco Security Agent (CSA) CSA je v í c eúčelo v ý s o f t w a r o v ý ná s t r o j, k t er ý lze p o už í t k v ynuc ení r ů zný c h b ezp ečno s t ní c h p o li t i k. CSA a na lyzuje c h o v á ní a
CORSO AVANZATO DI NEGOZIAZIONE Un laboratorio intensivo per lo sviluppo e la pratic a d elle c apac ità neg oz iali Scotwork Italia S.r.l. C op y rig h t 2 0 0 6 1 O I m p l t l t z o l N o z n n l h l
Using Predictive Modeling to Reduce Claims Losses in Auto Physical Damage
Using Predictive Modeling to Reduce Claims Losses in Auto Physical Damage CAS Loss Reserve Seminar 23 Session 3 Private Passenger Automobile Insurance Frank Cacchione Carlos Ariza September 8, 23 Today
BLADE 12th Generation. Rafał Olszewski. Łukasz Matras
BLADE 12th Generation Rafał Olszewski Łukasz Matras Jugowice, 15-11-2012 Gl o b a l M a r k e t i n g Dell PowerEdge M-Series Blade Server Portfolio M-Series Blades couple powerful computing capabilities
Put the human back in Human Resources.
Put the human back in Human Resources A Co m p l et e Hu m a n Ca p i t a l Ma n a g em en t So l u t i o n t h a t em p o w er s HR p r o f essi o n a l s t o m eet t h ei r co r p o r a t e o b j ect
J a re k G a w o r, J o e B e s te r, M a th e m a tic s & C o m p u te r. C o m p u ta tio n In s titu te,
1 4 th IE E E In te r n a tio n a l S y m p o s iu m o n H ig h P e r fo r m a n c e D is tr ib u te d C o m p u tin g (H P D C -1 4 ), R e s e a rc h T ria n g le P a rk, N C, 2 4-2 7 J u ly 2 0 0 5.
Bewährte Six Sigma Tools in der Praxis
Frankfurt School of Finance & Management 2. ProcessLab-Workshop 03.2.2008, 8h Bewährte Six Sigma Tools in der Praxis A. Raab BB Certified GE Commercial Finance Agenda Intro Teaser Vortrag Break Out Sessions
Future Trends in Airline Pricing, Yield. March 13, 2013
Future Trends in Airline Pricing, Yield Management, &AncillaryFees March 13, 2013 THE OPPORTUNITY IS NOW FOR CORPORATE TRAVEL MANAGEMENT BUT FIRST: YOU HAVE TO KNOCK DOWN BARRIERS! but it won t hurt much!
How to Subnet a Network How to use this paper Absolute Beginner: Read all Sections 1-4 N eed a q uick rev iew : Read Sections 2-4 J ust need a little h elp : Read Section 4 P a r t I : F o r t h e I P
JCUT-3030/6090/1212/1218/1325/1530
JCUT CNC ROUTER/CNC WOODWORKING MACHINE JCUT-3030/6090/1212/1218/1325/1530 RZNC-0501 Users Guide Chapter I Characteristic 1. Totally independent from PC platform; 2. Directly read files from U Disk; 3.
Overview of Spellings on www.spellzoo.co.uk
Overview of Spellings on www.spellzoo.co.uk Year 1 Set 1: CVC words Set 2: CVC and CCVC words Set 3: CVC, CCVC and CCVCC words Set 4: Words containing 'ch', 'sh', 'th' and 'wh' Set 5: Words ending in 'll',
Online Department Stores. What are we searching for?
Online Department Stores What are we searching for? 2 3 CONTENTS Table of contents 02 Table of contents 03 Search 06 Fashion vs. footwear 04 A few key pieces 08 About SimilarWeb Stepping up the Competition
CUSTOMER INFORMATION SECURITY AWARENESS TRAINING
CUSTOMER INFORMATION SECURITY AWARENESS TRAINING IN T RO DUCT ION T h i s c o u r s e i s d e s i g n e d to p r o v i d e yo u w i t h t h e k n o w l e d g e to p r o t e c t y o u r p e r s o n a l
CREATE SHAPE VISUALIZE
SHAPE VISUALIZE B I M E q u i t y BIM Workflow Guide SHAPE VISUALIZE Introduction We o e to t e r t ook i t e BIM Workflow erie I t e o owi ter we wi o er e eryt i eeded or you to ter t e i o re ti i d
The SmartView Tracker
CHAPTER 5 S m a r tv ie w T r a c k e r In This Chapter The Need for Tracking p ag e 8 9 The C heck P oint S olu tion for Tracking p ag e 9 0 Tracking C onsiderations p ag e 9 6 Tracking C onfigu ration
Ontwikkelingen van R o u ter N etwer ken Fred Rabouw 1 3-t i e r R o u t e r N e t w e r k e n. Core: forwarden van grote h oeveel h eden data. D i s tri b u ti e: Cl as s i fi c eren en fi l teren A c
T ra d in g A c tiv ity o f F o re ig n In s titu tio n a l In v e s to rs a n d V o la tility
T ra d in g A c tiv ity o f F o re ig n In s titu tio n a l In v e s to rs a n d V o la tility V. Ravi Ans human Indian Ins titute of Manag ement B ang alore Rajes h Chakrabarti Indian S chool of Bus ines
IntИg r a ti o n d e s s o l u ti o ns IB M e t C i s c o : C o l l a b o r a ti o n e t C o m m u ni c a ti o ns U ni f i Иe s ( U C 2 ) Mathieu in tr at Sales Business ev elop ent anag er om unic at
Opis przedmiotu zamówienia - zakres czynności Usługi sprzątania obiektów Gdyńskiego Centrum Sportu
O p i s p r z e d m i o t u z a m ó w i e n i a - z a k r e s c z y n n o c i f U s ł u i s p r z» t a n i a o b i e k t ó w G d y s k i e C eo n t r u m S p o r t us I S t a d i o n p i ł k a r s k i
C + + a G iriş 2. K o n tro l y a p ıla rı if/e ls e b re a k co n tin u e g o to sw itc h D ö n g ü le r w h ile d o -w h ile fo r
C + + a G iriş 2 K o n tro l y a p ıla rı if/e ls e b re a k co n tin u e g o to sw itc h D ö n g ü le r w h ile d o -w h ile fo r F o n k s iy o n la r N e d ir? N a s ıl k u lla n ılır? P ro to tip v
C e r t ifie d Se c u r e W e b
C r t ifi d S c u r W b Z r t ifizi r t Sic h r h it im W b 1 D l gat s N ic o las M ay n c o u r t, C EO, D r am lab T c h n o lo gi s A G M ar c -A n d r é B c k, C o n su lt an t, D r am lab T c h n
G d y n i a U s ł u g a r e j e s t r a c j i i p o m i a r u c z a s u u c z e s t n i k ó w i m p r e z s p o r t o w y c h G d y s k i e g o O r o d k a S p o r t u i R e k r e a c j i w r o k u 2 0
Vom prozessorientierten Wissensmanagement zum intelligenten Engineering-Portal
Vom prozessorientierten Wissensmanagement zum intelligenten Engineering-Portal Praxisbericht aus der Entwicklung von Hochauftriebsystemen für Verkehrsflugzeuge KnowTech Stuttgart, 24.-25.10.2012 Thomas
O s OAM Requirements for 40/100 GE Eth ernet AI S? Gary Nicholl C is co S ys t e m I E E E 8 0 2. 3 b a T as k F orce M arch 1 8, 2 0 0 8 rlan d o, F L 1 O O O O Background E t h e r n e t i s r a p i
d e f i n i c j i p o s t a w y, z w i z a n e j e s t t o m. i n. z t y m, i p o jі c i e t o
P o s t a w y s p o і e c z e t s t w a w o b e c o s у b n i e p e і n o s p r a w n y c h z e s z c z e g у l n y m u w z g lb d n i e n i e m o s у b z z e s p o і e m D o w n a T h e a t t i t uodf
Intralogistics Solutions Little space. Plenty of room. - Innovative packaging producer relies on the combination of planning know-how and modern
Intralogistics Solutions Little space. Plenty of room. - Innovative packaging producer relies on the combination of planning know-how and modern technology for efficient logistics. Philipp Hoops, Rhea
III Bienal de Autismo Página 1 / 43
III Bienal de Autismo Página 1 / 43 A Direcção da APPDA N ort e dá -v os as B oas V in das à I I I B ien al de Au t is m q u e es t a corres p on da à s v os s as ex p ect at iv as com o t em a em deb
M Official Bologna S e m inar Joint d e gr e e s- A H allm ar k of t h e E u r op e an H igh e r E d u cat ion A r e a? R e s u l t s o f q u e s t i o n n a i r e s e n t t o B o l o g n a F o l l o w
Üb e r s e t z u n g d e r N e t A c a d C u r r i c u l a Carsten Johnson c arsj ohn@ c i sc o. c om 1 NetAcad C u r r i cu l a i m Üb er s etz u n g s p r o z es s W w d s u w W S v W k h m h I T E s
HR DEPARTMENTAL SUFFIX & ORGANIZATION CODES
HR DEPARTMENTAL SUFFIX & ORGANIZATION CODES Department Suffix Organization Academic Affairs and Dean of Faculty, VP AA 1100 Admissions (Undergraduate) AD 1330 Advanced Ceramics, Colorado Center for--ccac
od e r D ie E v olution im D a ta C e n te r.. a uc h ( od e r g e ra d e? ) m it " S tora g e ov e r I P "! $ # % " & +, ' ' % ( *)
Multiprotokoll-S w itc h e D ie Z ukun f t im N e tz w e rk DECUS LUG Hamburg November 2004 HB T GmbH Regional Channel Account Manager K ai B ielf eld t # ",+ ' *) ' ( od e r D ie E v olution im D a ta
<?xml version="1.0" encoding="utf-8"?> <soapenv:envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"
Applicazioni Java W S con Ax is sistema di tr ac c iab il ità ag r o al imen tar e Ing. Mario G.C.A. Cimino M.G.C.A.Cimino, Applicazioni Java-W S con Ax is, D ipar t ime nt o d i I ng e g ne r ia d e ll
3 k t h R e m e A c c e s s b t t t V T T c h t h p V T. Cl ic e ot rad io ut on nex o PN unnel yp e and oose e ap rop riat e PN unnel Int erfac e. 4.
C i s c o P r o f i l e C o n t a c t s & F e e d b a c k H e l p Cisc o SM B Sup p ort Assist ant Configure ASA/PIX as Easy VPN Server or Client H om e > W ork W it h M y Sec urit y D ev ic es > Cisc
Cisco Self-D efen d in g N et w Adaptive Threat Defense or k Latest Product Announcements 1 N ew Secu r it y Ch a llen g es E d g e F i r e w a l l i n g I n t r u s i o n & W o r m M i t i g a t i o n
UNIK4250 Security in Distributed Systems University of Oslo Spring 2012. Part 7 Wireless Network Security
UNIK4250 Security in Distributed Systems University of Oslo Spring 2012 Part 7 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s charter to develop
Open Source Software Open Standards
after and there's Open Source Software Open Standards Open Content Jan Willem Broekema e- government From open to closed source software Hardware was limited to few models, if more than one Business models
az 1995. évi L X V. tv. 28. -á ra figyelem m el 20. sz á m ú UTASÍTÁSA B u d a p e s t, 1 9 6 7. é v i jú liu s hó 2 8 -á n.
BELÜGYMINISZTÉRIUM SZOLGÁLATI HASZNÁLATRA! 1 0-2 4 /2 0 /1 9 6 7. A M I N Ő S Í T É S M E G S Z Ű N T az 1995. évi L X V. tv. 28. -á ra figyelem m el A MAGYAR NÉPKÖZTÁRSASÁG BELÜGYMINISZTERHELYETTESÉNEK
