-
Access Control – Physical and Virtual
After watching this video; you will be able to define local machine access controls; and deployment of secure KMV switches.
-
Access Control Lists
After watching this video; you will be able to configure an access control list in Azure.
-
Access and Monitor Storage – SQL Databases
After watching this video; you will be able to configure Azure storage access; monitor storage; and implement Azure SQL databases.
-
Access Control Lists (ACLs)
After watching this video; you will be able to describe ACLs with respect to VM access.
-
Access Control Operational Components
The Implementing Cisco Secure Access Solutions (SISAS) v1.0 300-208 certification is part of the curriculum leading to the Cisco Certified Network Professional Security (CCNP Security) certification. The Cisco Identity Services Engine (ISE) is used to control secure access for networks; users; and devices. In this video; Michael Shannon illustrates the components of Cisco ISE.
-
Access Business Standard with vRealize Automation
After watching this video; you will be able to access vRealize Business Standard with vRealize Automation.
-
Access FILESTREAM Data
FILESTREAM in Microsoft SQL Server 2012 integrates the SQL Server Database Engine with an NTFS file system and is completely transparent to Transact-SQL code; allowing you to access data in FILESTREAM columns just as you would any conventional columns. In this video; Jonathan Summers uses T-SQL statements to insert; update; and delete rows in a table that supports FILESTREAM data.
-
Access Secured
Microsoft SQL Server 2012 provides the capability to secure data in a database using encryption. In this video; Rafiq Wayani demonstrates how to access data in the unencrypted database; how to encrypt the data; and shows that; once it has been encrypted; the data cannot be accessed.
-
Access and SharePoint
Microsoft Access 2013 makes it easy to collaborate with users of SharePoint sites by allowing you to export a copy of a selected database object and storing the copy as a list in SharePoint. In this video; Gary Leenhouts uses the Export Wizard in Access to export a table to a SharePoint site as a list.
-
Access and SharePoint - Import
Microsoft Access 2013 allows you to take lists from SharePoint and either creates copies of the lists in Access by importing the data or connects to the data by linking to it. In this video; Gary Leenhouts uses the Import Wizard in Access 2013 to create a link between Access and a SharePoint list.
-
Access and SharePoint - Moving Data to SharePoint
Microsoft Access 2013 lets you move all your data to a SharePoint site to be displayed as lists in SharePoint that are linked back to the existing database. In this video; Gary Leenhouts uses the Export Tables in SharePoint Wizard to move the tables in an Access database to a SharePoint site.
-
Access Data Email and Outlook – Export
Microsoft Access 2013 interacts with your Outlook e-mail client to allow you to distribute Access data in multiple formats to your Contacts lists. In this video; Gary Leenhouts uses the E-mail feature to exploit Access 2013's integration with Microsoft Outlook and e-mail information; already attached as an Excel Workbook; to another user.
-
Access Data Email and Outlook – Import
Microsoft Access 2013's integration with Microsoft Outlook enables you to link to; append; or import information from your Contacts folder. In this video; Gary Leenhouts uses the Import Exchange/Outlook Wizard to create a live lookup by linking to and naming an Outlook Contacts folder; which presents as a table in Access.
-
Access Event Model
Microsoft Access 2013 enables you to construct user-friendly interfaces from forms containing controls incorporating configured events or user-triggered actions. In this video; Gary Leenhouts uses Access 2013's Builder tool to configure several form controls' user-triggered actions or events; before saving and demonstrating their use.
-
Access List
After watching this video; you will be able to configure a directory number for a call pickup group in Cisco Unified Communications Manager.
-
Access the CLI
After watching this video; you will be able to access the CLI on the Cisco UCM appliance.
-
Access and Site Codes in Centralized Call Processing
After watching this video; you will be able to describe access and site codes in centralized call processing.
-
Access Layer
After watching this video; you will be able to describe the access layer.
-
Access Layer Connectivity Designs (Part 1)
After watching this video; you will be able to implement access layer connectivity designs.
-
Access Layer Connectivity Designs (Part 2)
After watching this video; you will be able to implement access layer connectivity designs.
-
Access Layer Connectivity Designs (Part 3)
After watching this video; you will be able to implement access layer connectivity designs.
-
Access and Remote Access Devices
The CompTIA Network+ 2014 certification covers the use of network devices like wireless access points (APs) and virtual private network (VPN) concentrators to connect WiFi devices to a wired network. In this video; David Bigger demonstrates how access and remote access network devices provide a connection between WiFi devices and wired networks; like a local area network (LAN).
-
Access Lists
The CompTIA Network+ 2014 certification assesses your skills as a network technician; including your ability to configure an access control list (ACL). ACLs allow or deny traffic in a file system or a computer network. In this video; David Bigger demonstrates access control lists for computer networks.
-
Access and Security
Microsoft Internet Information Services (IIS) can be configured to require certificates or to use website authentication for security. In this video; Pierre Devereux demonstrates how you can add security to your websites by either using or setting up certificates; the self-signed certificate; or simple Windows Authentication.
-
Access Service App
Microsoft PowerShell provides cmdlets that allow you to easily manage Access Service applications that run in a SharePoint site collection. In this video; David Dye uses the Get-AccessServiceApplication cmdlet to return an Access Service application; before demonstrating how to specify the maximum duration to perform an operation; and how to create a new instance of an Access Service application.
-
Access Data Using a Custom WCF service
Microsoft SharePoint Server 2013 supports the creation of Windows Communication Foundation (WCF) custom web services that provide an interface between SharePoint and applications. In this video; Telmo Sampaio demonstrates hosing a WCF service in IIS and SharePoint and how to create and deploy a custom WCF service hosted in SharePoint.
-
Access Data Using REST API
Microsoft SharePoint Server 2013 provides the Representational State Transfer (REST) API that allows you to remotely interact with SharePoint sites using the REST and OData web protocol standards. In this video; Telmo Sampaio demonstrates how to make REST calls to SharePoint hosted data from a browser using HTTP requests and OData operators.
-
Access to Removable Media
After watching this video; you will be able to configure access to removable media on a Windows 10 device.
-
Access Windows Remotely
After watching this video; you will be able to describe how to access Windows remotely.
-
Access Control and Monitoring
After watching this video; you will be able to distinguish between access control and monitoring techniques.
-
Access Control Standards and Protocols
After watching this video; you will be able to describe access control standards and protocols.
-
Access Control
In Ruby; you can use Access Control to call methods and instance variables in a class. In this video; Mike McMillan demonstrates how to define a simple name class to show you how Access Control works.
-
Access Appointments
After watching this video; you will be able to access and modify appointments.
-
Access Modifiers
You can develop feature-rich applications in a variety of platforms if you master the fundamentals in any one programming language. In this video; Jamie Campbell explains the various access modifiers in C#.
-
Access Control
After watching this video; you will be able to describe how access control levels can be applied to Java classes.
-
Access Control
After watching this video; you will be able to work with Jenkins jobs and the background identity service.
-
Access Control Lists
When preparing for the CompTIA CASP CAS-002 examination; you're expected to know about Access Control Lists (ACLs); which form a part of network security. An ACL can exist within a file system and network devices such as routers; switches; and wireless access points. In this video; Glen Clarke discusses ACLs and how they determine what traffic passes through a router.