Angebote zu "Gateways" (33 Treffer)

Kategorien

Shops

Check Point Next Generation Security Policy Man...
23.751,00 € *
ggf. zzgl. Versand

Kurzinfo: Next Generation Security Policy Management - Lizenzerweiterung - 150 Gateways - Upgrade von 50 Gateways Gruppe Anwendungen Hersteller Check Point Software Hersteller Art. Nr. CPSB-GW-EXT-50 EAN/UPC Produktbeschreibung: Next Generation Security Policy Management - Lizenzerweiterung - 150 Gateways Produkttyp Lizenzerweiterung Kategorie Online- & Appliance-basierte Services - Sicherheitsmanagement Anzahl Lizenzen 150 Gateways Upgrade von Next Generation Security Policy Management 50 Gateways Ausführliche Details Allgemein Kategorie Online- & Appliance-basierte Services - Sicherheitsmanagement Produkttyp Lizenzerweiterung Upgrade von Next Generation Security Policy Management 50 Gateways Lizenzierung Lizenztyp 150 Gateways

Anbieter: JACOB Computer
Stand: 24.11.2020
Zum Angebot
Check Point Next Generation Security Policy Man...
9.153,06 € *
ggf. zzgl. Versand

Kurzinfo: Next Generation Security Policy Management - Lizenz - 5 Gateways Gruppe Anwendungen Hersteller Check Point Software Hersteller Art. Nr. CPSM-NGSM5 EAN/UPC Produktbeschreibung: Next Generation Security Policy Management - Lizenz - 5 Gateways Produkttyp Lizenz Kategorie Online- & Appliance-basierte Services - Sicherheitsmanagement Anzahl Lizenzen 5 Gateways Ausführliche Details Allgemein Kategorie Online- & Appliance-basierte Services - Sicherheitsmanagement Produkttyp Lizenz Lizenzierung Lizenztyp 5 Gateways

Anbieter: JACOB Computer
Stand: 24.11.2020
Zum Angebot
Check Point Next Generation Security Policy Man...
8.007,48 € *
ggf. zzgl. Versand

Kurzinfo: Next Generation Security Policy Management - Lizenz - 5 Gateways Gruppe Anwendungen Hersteller Check Point Software Hersteller Art. Nr. CPSM-NGSM5 EAN/UPC Produktbeschreibung: Next Generation Security Policy Management - Lizenz - 5 Gateways Produkttyp Lizenz Kategorie Online- & Appliance-basierte Services - Sicherheitsmanagement Anzahl Lizenzen 5 Gateways Ausführliche Details Allgemein Kategorie Online- & Appliance-basierte Services - Sicherheitsmanagement Produkttyp Lizenz Lizenzierung Lizenztyp 5 Gateways

Anbieter: JACOB Computer
Stand: 24.11.2020
Zum Angebot
Effizienter Einsatz spambekämpfender Maßnahmen ...
19,99 € *
ggf. zzgl. Versand

Bachelorarbeit aus dem Jahr 2010 im Fachbereich BWL - Unternehmensführung, Management, Organisation, Note: 89,00%, FH Krems, Sprache: Deutsch, Abstract: Die digitalen Postfächer der User werden von Tag zu Tag mehr mit Spam-Mails (siehe Begriffsdefinition Kapitel 2.1) überflutet, was für Mitarbeiter einen zusätzlichen Arbeitsaufwand zur Folge hat, da sie die nicht arbeitsrelevante Post von der erwünschten trennen müssen. Die Zeitperioden, in welchen die Mitarbeiter durchdiese unproduktive Tätigkeit am Fortschreiten ihrer Arbeit gehindert werden, kosten dem Unternehmen Geld (vgl. Schäfer, 2005, S. 1).Es gibt eine Vielzahl an Tools, mit deren Hilfe es möglich ist, die Flut an Spam-Mails einzudämmen. Einige Möglichkeiten, die in der Praxis Anwendung finden sind zum Beispiel folgende:- Greylisting (Im Zuge dieser Arbeit wird auf "Postgrey" eingegangen, einer Greylisting-Implementierung für Postfix)- RBLs (Realtime Blackhole List)- Kontrolle der MX-Einträge in DNS- DKIM (DomainKeys Identified Mail) + SPF (Sender Policy Framework)- Inhaltsprüfung mittels Suchbegriffen oder Hash-Werten (z.B.: SpamAssassin)Neben weiteren Möglichkeiten gehören die oben genannten zu den bekanntesten und haben sich in vielen Unternehmen bereits bewährt und etabliert.Ziel der vorliegenden Bachelorarbeit ist es, dem Leser Ansätze zur wirkungsvollen Spam- und Phishing-Bekämpfung näherzubringen. Außerdem stellen sich die Fragen, welche Bordmittel die großen Mailserver Exchange, Lotus Domino oder Postfix mit sich bringen und was z.B. mit Zusatzaufwand verbessert werden (Open-Source-Software, Mail-Gateways wie Symantec Brightmail etc.) kann.Nach der wissenschaftlichen und literarischen Ausarbeitung erfolgt die Erläuterung zur Implementierung eines Systems um die steigende "Spam-Flut" einzudämmen - anhand eines praktischen Beispiels für ein Klein- und Mittelunternehmen inklusive Ist-Analyse. Daraus ableitend ergibt sich für den Autor folgende Forschungsfrage:"Welche Maßnahmen stehen einem Klein- und Mittelunternehmen bei der Spambekämpfung zur Verfügung und wie läuft die Konfiguration eines Mail-Gateways in der Praxis ab?"

Anbieter: Dodax
Stand: 24.11.2020
Zum Angebot
Personal Networking Environments
49,00 € *
ggf. zzgl. Versand

In this doctoral thesis, the author investigates method and strategies for efficient routing and mobility management in personal environments. The concept of Personal Ubiquitous Environments(PUE) is introduced which accommodates heterogeneous devices and access networks of different users and sustain the notion of sharing resources in a distributed manner. A prerequisite for achieving the resource (devices, networks) sharing in personal environments is the deployment of suitable communication protocols which establish efficient multi-hop routes betweens the devices of the PUE. Personal Network Routing Protocol (PNRP) has been developed to perform policy-based routing in personal environments. Moreover, in certain personal networking scenarios, the infrastructure network components (i.e. gateways) are more than one-hop distance from the user's devices, Adaptive Distributed gateway Discovery (ADD) protocol is thereby proposed to efficiently discover the multi-hop routes towards the gateway in a totally distributed manner. Finally, an efficient mobility management architecture is also proposed which offers unified location management and seamless handover experience to personal nodes.

Anbieter: Dodax
Stand: 24.11.2020
Zum Angebot
Dynamic Negotiation of Security Protocols in Di...
44,90 € *
ggf. zzgl. Versand

Nowadays, recent technological innovations in low-power, low-cost communication miniature computing devices and sensors, make it possible to use them in an increasingly wide range of objects. Furthermore, their communication capabilities make it possible to build Networked Embedded Systems (NES) in which devices collaborate with each other and exhibit autonomous and coordinated behavior. Security, is a crucial requirement for an increasing number of embedded systems, ranging from low-end systems such as PDAs and networked sensors to high-end systems such as routers, gateways and storage servers. Technological growth, that spurred the development of these electronic types of systems, also ushered in the growth of adversary powers and sophistication in making attacks to those systems. In this work SecCom component has been implemented, it provides the secure communication service according to the application security policy. A security policy defines the sets of protocols that have to be applied in order to protect the communication among components in different physical devices. SecCom could negotiate the secure communication protocol as well as the cryptographic algorithms.

Anbieter: Dodax
Stand: 24.11.2020
Zum Angebot
Juniper SRX Series
61,53 € *
ggf. zzgl. Versand

This complete field guide, authorized by Juniper Networks, is the perfect hands-on reference for deploying, configuring, and operating Juniper’s SRX Series networking device. Authors Brad Woodberg and Rob Cameron provide field-tested best practices for getting the most out of SRX deployments, based on their extensive field experience.While their earlier book, Junos Security, covered the SRX platform, this book focuses on the SRX Series devices themselves. You'll learn how to use SRX gateways to address an array of network requirements—including IP routing, intrusion detection, attack mitigation, unified threat management, and WAN acceleration. Along with case studies and troubleshooting tips, each chapter provides study questions and lots of useful illustrations.* Explore SRX components, platforms, and various deployment scenarios* Learn best practices for configuring SRX’s core networking features* Leverage SRX system services to attain the best operational state* Deploy SRX in transparent mode to act as a Layer 2 bridge* Configure, troubleshoot, and deploy SRX in a highly available manner* Design and configure an effective security policy in your network* Implement and configure network address translation (NAT) types* Provide security against deep threats with AppSecure, intrusion protection services, and unified threat management tools

Anbieter: Dodax
Stand: 24.11.2020
Zum Angebot
The Retreat from Public Education
96,29 € *
ggf. zzgl. Versand

In recent decades the pendulum is swinging away from the idea and ideals of public education, and a new ethos increasingly takes over the shrinking public space of education. In the 1980s markets were elevated to social and economic icons, becoming a new secular faith. Privatizing public education became a credible policy in many countries and there have been an increasing number of attempts to restructure and deregulate state schooling. Global trade agreements foster domestic and international trade in education services treating education as a commodity to be sold and purchased, and many countries adopt various forms of market-related practices in education. These are not neutral, technical, managerial changes in the production and delivery of public education. They transform education in ways that have profound social and edu- tional consequences. To justify the introduction of market reforms in education public schools and educators are being defamed and accused of a series of vices, such as inef?ciency and laziness. We must be reminded that public education, i. e. , mandatory publicly ?nanced schooling, that was introduced in Austria as early as in 1874 and spread to other countries, was considered the most progressive movement of the nineteenth and twentieth centuries. Public schools were established to make education univ- sally available to all children, free of charge, and have been recognized as gateways to opportunity (Kober, 2006).

Anbieter: Dodax
Stand: 24.11.2020
Zum Angebot
Female Genital Mutilation around The World:
140,61 € *
ggf. zzgl. Versand

This book uses global household data to examine the prevalence, trends and geographic variation of female genital mutilation (FGM) around the world. It also addresses the underlying legal and policy aspects as well as explores the medical consequences, both immediate and long term, for those undergoing the practice. The book analyses the position of victims of this gender-based violence both from the medical and legal perspective and adopts a largely practical approach to the study of the practices, offering a fresh thinking into one of the challenges in global health and the law. In addition, it offers some insights into how health professionals can approach this category of victims and how legal practitioners can obtain a good legal result for their clients before domestic and international forums. The book addresses fundamental issues such as state liability and defences in enforcement proceedings for actions or omission of state or non-state actors, and due diligence standard in international human rights law, the main gateways available for obtaining relief for the victims of FGM. This book goes beyond the traditional debate between zero tolerance and those who wish to see the practice medicalised and tolerated and favours an advocacy programme standing firmly in favour of the right of FGM victims. This book offers a unique perspective likely to assist victims and their representatives to secure a remedy against perpetrators and the state. As such this book will be of interest to medical professionals, national and international lawyers, academics and policymakers in the field of public health.

Anbieter: Dodax
Stand: 24.11.2020
Zum Angebot