Results 11 to 20 of about 3,347,283 (277)
PROXYRENEWAL, ADMINISTRATOR GUIDE [PDF]
The proxy renewal daemon is responsible for keeping proxy certificates valid throughout all the lifetime of corresponding ...
Sustr, Zdenek
core +1 more source
MYPROXY YAIM, ADMINISTRATOR GUIDE [PDF]
The proxy renewal daemon is responsible for keeping proxy certificates valid throughout all the lifetime of corresponding ...
Aiftimiei, Cristina
core +1 more source
PSEUDONYMITY SYSTEM ADMINISTRATOR GUIDE [PDF]
EMI Pseudonymity System provides users with a way to hide their true identity behind a pseudonymous ...
White, John
core +1 more source
APEL PUBLISHER SYSTEM ADMINISTRATOR GUIDE [PDF]
APEL (Accounting Processor for Event Logs) gathers CPU accounting information by parsing batch system and blah accounting log files and inserting the data into a local MySQL database.
Gordon, John
core +1 more source
SECURITY TOKEN SERVICE SYSTEM ADMINISTRATOR GUIDE [PDF]
The Security Token Service (STS) is a partial implementation of the OASIS WS-Trust specification.It is a service that can be used for transforming an existing security token into another security token ...
White, John
core +1 more source
APLIKASI TRAFFIC MONITORING SERVER MENGGUNAKAN SMS [PDF]
Penelitian ini bertujuan membuat aplikasi traffic monitoring yang dapat membantu network administrator dalam memonitor server kapan dan dimana saja, yaitu dengan menggunakan SMS. Hal – hal yang akan dimonitor adalah lalu lintas data (traffic) dan koneksi
Clarissa, Ilona
core +2 more sources
APEL SSM SYSTEM ADMINISTRATOR GUIDE [PDF]
The SSM (Secure STOMP Messenger) is used to send messages between computers using the STOMP protocol.
Gordon, John
core +1 more source
The administrator, teachers and parents involvement in preschool during Movement Control Order [PDF]
The Covid-19 pandemic is affecting the whole education system including the preschoolers in Malaysia in receiving a proper teaching and learning lesson especially in the classroom. Movement Control Order (MCO) implemented by the government has restricted
Halim, Harliana, Senin, Muhammad Adam
core +1 more source
Infection Spreading and Source Identification: A Hide and Seek Game
The goal of an infection source node (e.g., a rumor or computer virus source) in a network is to spread its infection to as many nodes as possible, while remaining hidden from the network administrator.
Leng, Mei, Luo, Wuqiong, Tay, Wee Peng
core +1 more source
Treatment Decision‐Making Roles and Preferences Among Adolescents and Young Adults With Cancer
ABSTRACT Background Decision‐making (DM) dynamics between adolescents and young adults (AYAs) with cancer, parents, and oncologists remain underexplored in diverse populations. We examined cancer treatment DM preferences among an ethnically and socioeconomically diverse group of AYAs and their parents.
Amanda M. Gutierrez +14 more
wiley +1 more source

