L'Université grégorienne après Vatican II / / Hervé Carrier |
Autore | Carrier Hervé |
Pubbl/distr/stampa | Chicoutimi : , : J.-M. Tremblay, , 2010 |
Descrizione fisica | 1 online resource (298 pages) |
Disciplina | 025.04 |
Collana | Classiques des sciences sociales |
Soggetto topico | Computer network resources |
ISBN | 1-4123-7477-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | fre |
Nota di contenuto | Chapitre 1 -- L'INCULTURATION D'UNE UNIVERSITÉ -- Chapitre 2 -- LA GRÉGORIENNE AVANT LE CONCILE -- Chapitre 3 -- SOUS PIE XII, JEAN XXIII ET PAUL VI -- Chapitre 4 -- VATICAN II ET LA RÉFORME DES ÉTUDES -- Chapitre 5 -- PREMIÈRES ÉTAPES DE LA RÉFORME ACADÉMIQUE -- Chapitre 6 -- LES FACULTÉS ET L'ESPRIT DE VATICAN II -- Chapitre 7 -- NOUVEAUX CENTRES ACADÉMIQUES -- Chapitre 8 -- BIBLIOTHÈQUE, ARCHIVES, ÉDITIONS -- Chapitre 9 -- IMMEUBLES ET PROPRIÉTÉS -- Chapitre 10 -- RELATIONS PUBLIQUES ET BIENFAITEURS -- Chapitre 11 -- RELATIONS INTERNATIONALES DE L'UNIVERSITÉ -- Chapitre 12 -- CONCLUSIONS. ÉTAPES ET DÉFIS DE L'INCULTURATION -- Chapitre 13 -- BIBLIOGRAPHIE. |
Record Nr. | UNINA-9910131109103321 |
Carrier Hervé
![]() |
||
Chicoutimi : , : J.-M. Tremblay, , 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
White native relations Entrevue avec Pierrette Désy : a historical perspective / / Louise Poulin |
Autore | Poulin Louise |
Pubbl/distr/stampa | Chicoutimi : , : J.-M. Tremblay, , 2008 |
Descrizione fisica | 1 online resource (13 pages) |
Disciplina | 025.04 |
Collana | Classiques des sciences sociales |
Soggetto topico | Computer network resources |
ISBN | 1-4123-7478-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | fre |
Altri titoli varianti | White native relations Entrevue avec Pierrette Désy |
Record Nr. | UNINA-9910131109003321 |
Poulin Louise
![]() |
||
Chicoutimi : , : J.-M. Tremblay, , 2008 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Windows Server 2012 unified remote access planning and deployment [[electronic resource] ] : discover how to seamlessly plan and deploy remote access with Windows Server 2012's successor to DirectAccess / / Erez Ben-Ari, Bala Natarajan |
Autore | Ben-Ari Erez |
Pubbl/distr/stampa | Birmingham, UK, : Packt Pub., 2012 |
Descrizione fisica | 1 online resource (328 p.) |
Disciplina |
005.446
005.7/13769 |
Altri autori (Persone) | NatarajanBala |
Soggetto topico |
Windows (Computer programs)
Computer network resources |
Soggetto genere / forma | Electronic books. |
ISBN |
1-283-93805-7
1-84968-829-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1:Understanding IPv6 and IPv4-IPv6 interoperability; My network's fine, so if it ain't broken, why fix it?; The IPv6 addressing schemes; IPv6 address assignment; IPv6 and name resolution; A little more about DNS; Multiple stacks; Operating system compatibility; Protocol transition technologies; ISATAP; DNS64 and NAT64; 6to4; Teredo; IP-HTTPS; Practical considerations for IPv6 and IPv4; Unified Remote Access and Group Policy; Public Key Infrastructure (PKI); Summary
Chapter 2:Planning a Unified Remote Access DeploymentServer requirements and placement; Capacity planning for URA; Low-end server; High-end server; Server requirements - considerations; Basic scenarios; Network Location Server; URA certificates; Basic scenario considerations; PKI; PKI considerations; Group Policy; Client platforms (and unsupported clients); Additional client considerations; Cloud scenarios; Advanced scenarios; NAP; OTP; Arrays; How arrays work with load balancing; Array challenges; Multi-geographic distribution; Forced tunneling; How much can my server handle?; Summary Chapter 3:Preparing a Group Policy and Certificate InfrastructureDeploying GPO in an organization; Group Policy Management; Group policy and the registry; Linking, scoping, and filtering policies; Policy replication; Manual updates; New features with Windows Server 2012 and Windows 8 Group Policy; Planning group membership for URA clients and servers; GPO management policies and authorities; Managing GPO on URA servers and clients; Protect your stuff; Basic GPO problems and troubleshooting; Some more insight into GPOs; Diagnosing and fixing group policy problems Client specific group policy issuesIntroduction to certificates and PKI; Asymmetric encryption; Digital certificates; Authorities, roots, and the trust chain; Certificate revocation and expiration; Certificate intended purpose; Certificate validation; Certificates used by URA; Public versus private certificates; Enterprise Certificate Authority versus Standalone Certificate Authority; Root Certificate Authorities and Subordinate Certificate Authorities; Summary; Chapter 4:Installing and Configuring the Unified Remote Access Role; Adding the URA role; Configuring the basic URA scenario Connecting and testing with a clientEditing the configuration; Remote client options; Full DirectAccess or just remote management; Enable force tunneling; Helpdesk e-mail address; Remote Access Server options; Topology; Public URL or IP that clients use to connect to the server; Certificate selection for the IP-HTTPS interface; Enable and configure use of computer certificate; Enable Network Access Protection (NAP); Infrastructure Servers options; Selection of a local NLS on the URA server, or point to a separate server; Certificate selection for a local NLS Configuration of the Name Resolution Policy Table (NRPT) |
Record Nr. | UNINA-9910462467403321 |
Ben-Ari Erez
![]() |
||
Birmingham, UK, : Packt Pub., 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Windows Server 2012 unified remote access planning and deployment [[electronic resource] ] : discover how to seamlessly plan and deploy remote access with Windows Server 2012's successor to DirectAccess / / Erez Ben-Ari, Bala Natarajan |
Autore | Ben-Ari Erez |
Pubbl/distr/stampa | Birmingham, UK, : Packt Pub., 2012 |
Descrizione fisica | 1 online resource (328 p.) |
Disciplina |
005.446
005.7/13769 |
Altri autori (Persone) | NatarajanBala |
Soggetto topico |
Windows (Computer programs)
Computer network resources |
ISBN |
1-283-93805-7
1-84968-829-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1:Understanding IPv6 and IPv4-IPv6 interoperability; My network's fine, so if it ain't broken, why fix it?; The IPv6 addressing schemes; IPv6 address assignment; IPv6 and name resolution; A little more about DNS; Multiple stacks; Operating system compatibility; Protocol transition technologies; ISATAP; DNS64 and NAT64; 6to4; Teredo; IP-HTTPS; Practical considerations for IPv6 and IPv4; Unified Remote Access and Group Policy; Public Key Infrastructure (PKI); Summary
Chapter 2:Planning a Unified Remote Access DeploymentServer requirements and placement; Capacity planning for URA; Low-end server; High-end server; Server requirements - considerations; Basic scenarios; Network Location Server; URA certificates; Basic scenario considerations; PKI; PKI considerations; Group Policy; Client platforms (and unsupported clients); Additional client considerations; Cloud scenarios; Advanced scenarios; NAP; OTP; Arrays; How arrays work with load balancing; Array challenges; Multi-geographic distribution; Forced tunneling; How much can my server handle?; Summary Chapter 3:Preparing a Group Policy and Certificate InfrastructureDeploying GPO in an organization; Group Policy Management; Group policy and the registry; Linking, scoping, and filtering policies; Policy replication; Manual updates; New features with Windows Server 2012 and Windows 8 Group Policy; Planning group membership for URA clients and servers; GPO management policies and authorities; Managing GPO on URA servers and clients; Protect your stuff; Basic GPO problems and troubleshooting; Some more insight into GPOs; Diagnosing and fixing group policy problems Client specific group policy issuesIntroduction to certificates and PKI; Asymmetric encryption; Digital certificates; Authorities, roots, and the trust chain; Certificate revocation and expiration; Certificate intended purpose; Certificate validation; Certificates used by URA; Public versus private certificates; Enterprise Certificate Authority versus Standalone Certificate Authority; Root Certificate Authorities and Subordinate Certificate Authorities; Summary; Chapter 4:Installing and Configuring the Unified Remote Access Role; Adding the URA role; Configuring the basic URA scenario Connecting and testing with a clientEditing the configuration; Remote client options; Full DirectAccess or just remote management; Enable force tunneling; Helpdesk e-mail address; Remote Access Server options; Topology; Public URL or IP that clients use to connect to the server; Certificate selection for the IP-HTTPS interface; Enable and configure use of computer certificate; Enable Network Access Protection (NAP); Infrastructure Servers options; Selection of a local NLS on the URA server, or point to a separate server; Certificate selection for a local NLS Configuration of the Name Resolution Policy Table (NRPT) |
Record Nr. | UNINA-9910786096703321 |
Ben-Ari Erez
![]() |
||
Birmingham, UK, : Packt Pub., 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Windows Server 2012 unified remote access planning and deployment : discover how to seamlessly plan and deploy remote access with Windows Server 2012's successor to DirectAccess / / Erez Ben-Ari, Bala Natarajan |
Autore | Ben-Ari Erez |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Birmingham, UK, : Packt Pub., 2012 |
Descrizione fisica | 1 online resource (328 p.) |
Disciplina |
005.446
005.7/13769 |
Altri autori (Persone) | NatarajanBala |
Soggetto topico |
Windows (Computer programs)
Computer network resources |
ISBN |
1-283-93805-7
1-84968-829-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1:Understanding IPv6 and IPv4-IPv6 interoperability; My network's fine, so if it ain't broken, why fix it?; The IPv6 addressing schemes; IPv6 address assignment; IPv6 and name resolution; A little more about DNS; Multiple stacks; Operating system compatibility; Protocol transition technologies; ISATAP; DNS64 and NAT64; 6to4; Teredo; IP-HTTPS; Practical considerations for IPv6 and IPv4; Unified Remote Access and Group Policy; Public Key Infrastructure (PKI); Summary
Chapter 2:Planning a Unified Remote Access DeploymentServer requirements and placement; Capacity planning for URA; Low-end server; High-end server; Server requirements - considerations; Basic scenarios; Network Location Server; URA certificates; Basic scenario considerations; PKI; PKI considerations; Group Policy; Client platforms (and unsupported clients); Additional client considerations; Cloud scenarios; Advanced scenarios; NAP; OTP; Arrays; How arrays work with load balancing; Array challenges; Multi-geographic distribution; Forced tunneling; How much can my server handle?; Summary Chapter 3:Preparing a Group Policy and Certificate InfrastructureDeploying GPO in an organization; Group Policy Management; Group policy and the registry; Linking, scoping, and filtering policies; Policy replication; Manual updates; New features with Windows Server 2012 and Windows 8 Group Policy; Planning group membership for URA clients and servers; GPO management policies and authorities; Managing GPO on URA servers and clients; Protect your stuff; Basic GPO problems and troubleshooting; Some more insight into GPOs; Diagnosing and fixing group policy problems Client specific group policy issuesIntroduction to certificates and PKI; Asymmetric encryption; Digital certificates; Authorities, roots, and the trust chain; Certificate revocation and expiration; Certificate intended purpose; Certificate validation; Certificates used by URA; Public versus private certificates; Enterprise Certificate Authority versus Standalone Certificate Authority; Root Certificate Authorities and Subordinate Certificate Authorities; Summary; Chapter 4:Installing and Configuring the Unified Remote Access Role; Adding the URA role; Configuring the basic URA scenario Connecting and testing with a clientEditing the configuration; Remote client options; Full DirectAccess or just remote management; Enable force tunneling; Helpdesk e-mail address; Remote Access Server options; Topology; Public URL or IP that clients use to connect to the server; Certificate selection for the IP-HTTPS interface; Enable and configure use of computer certificate; Enable Network Access Protection (NAP); Infrastructure Servers options; Selection of a local NLS on the URA server, or point to a separate server; Certificate selection for a local NLS Configuration of the Name Resolution Policy Table (NRPT) |
Record Nr. | UNINA-9910823486203321 |
Ben-Ari Erez
![]() |
||
Birmingham, UK, : Packt Pub., 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|