SlideShare a Scribd company logo
Using an Intranet Within a
              Company
●   About Intranet
●   How to use Intranet
●   About Firewall
●   About Subcontractors(Secure Link)
About Intranet
        ●   An intranet is a
            private computer
            network that uses
            Internet protocols and
            network connectivity
            to securely share part
            of an organization's
            information or
            operations with its
            employees.
            Sometimes the term
            refers only to the
            most visible service,
            the internal website.
How to use Intranet
Intranet is used in many kind of company.
The clerical work's Intranet have been introduced
the Internet application technologies of World
Wide Web and E-mail.
And, the Industry system, circulation system, and
finance system's Intranet have been introduced
using the way of communication.
About Firewall
       ●   A firewall is a device
           or set of devices
           configured to permit,
           deny, encrypt, or
           proxy all computer
           traffic between
           different security
           domains based upon
           a set of rules and
           other criteria.
About Subcontractors
     (Secure Link)
            ●   A subcontractor is an
                individual or in many
                cases a business that
                signs a contract to
                perform part or all of
                the obligations of
                another's contract.
References
●   http://en.wikipedia.org/wiki/Subcontract
●   http://en.wikipedia.org/wiki/Firewall
●   http://en.wikipedia.org/wiki/Intranet
●   http://e-
    words.jp/w/E382A4E383B3E38388E383A9
    E3838DE38383E38388.html

More Related Content

What's hot

Network security
Network securityNetwork security
Network security
Estiak Khan
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
cegonsoft1999
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
ShafeeqaFarsana
 
Firewall
FirewallFirewall
Firewall
FirewallFirewall
Network Security
Network Security Network Security
Network Security
Abdul Qadir Pattal
 
Network security
Network securityNetwork security
Network security
Eshrak Rahman
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
TayabaZahid
 
Network Security
Network  SecurityNetwork  Security
Network Security
Jitin Kollamkudy
 
E firewalls
E firewallsE firewalls
E firewalls
Abhiroop Ghatak
 
Firewall
FirewallFirewall
Firewall
Garmian
 
Firewall architectures
Firewall architecturesFirewall architectures
Firewall architectures
Arun Mahajan
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
Souvik Santra
 
firewalls
firewallsfirewalls
firewalls
ahmedOday
 
Presen15
Presen15Presen15
Presen15
guest83c90cf6
 
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking Overview
Sam Bowne
 
CNIT 140: Perimeter Security
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter Security
Sam Bowne
 
Network security
Network securityNetwork security
Network security
Pooja Dewangan
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
Nisarg Amin
 

What's hot (19)

Network security
Network securityNetwork security
Network security
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Network Security
Network Security Network Security
Network Security
 
Network security
Network securityNetwork security
Network security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Network Security
Network  SecurityNetwork  Security
Network Security
 
E firewalls
E firewallsE firewalls
E firewalls
 
Firewall
FirewallFirewall
Firewall
 
Firewall architectures
Firewall architecturesFirewall architectures
Firewall architectures
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
 
firewalls
firewallsfirewalls
firewalls
 
Presen15
Presen15Presen15
Presen15
 
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking Overview
 
CNIT 140: Perimeter Security
CNIT 140: Perimeter SecurityCNIT 140: Perimeter Security
CNIT 140: Perimeter Security
 
Network security
Network securityNetwork security
Network security
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 

Viewers also liked

Daniel kaufmann
Daniel kaufmannDaniel kaufmann
Daniel kaufmann
thriddas
 
Prof jagdeep chhokar
Prof jagdeep chhokarProf jagdeep chhokar
Prof jagdeep chhokar
thriddas
 
Dr Sameer Sharma
Dr Sameer SharmaDr Sameer Sharma
Dr Sameer Sharma
thriddas
 
Nord Software
Nord SoftwareNord Software
Nord Software
antonmolander
 
English Week12
English Week12English Week12
English Week12
s1160202
 
Fiesta verde (1)
Fiesta verde (1)Fiesta verde (1)
Fiesta verde (1)
RBearSAT
 
English Week14
English Week14English Week14
English Week14
s1160202
 
Jeremiah sam pen plus bytes
Jeremiah sam   pen plus bytesJeremiah sam   pen plus bytes
Jeremiah sam pen plus bytes
thriddas
 
Robert hunja
Robert hunjaRobert hunja
Robert hunjathriddas
 
Dr. Shalini Rajneesh at CoCo 2014 - Sakala
Dr. Shalini Rajneesh at CoCo 2014 - SakalaDr. Shalini Rajneesh at CoCo 2014 - Sakala
Dr. Shalini Rajneesh at CoCo 2014 - Sakala
thriddas
 
Ellen miller
Ellen millerEllen miller
Ellen miller
thriddas
 
Using Social Network Tools for Your Business
Using Social Network Tools for Your BusinessUsing Social Network Tools for Your Business
Using Social Network Tools for Your Business
RBearSAT
 
C. Concept Mapping (Week # 3 - 7)
C. Concept Mapping (Week # 3 - 7) C. Concept Mapping (Week # 3 - 7)
C. Concept Mapping (Week # 3 - 7)
s1160202
 
Wordcamp Copenhagen 2014
Wordcamp Copenhagen 2014 Wordcamp Copenhagen 2014
Wordcamp Copenhagen 2014 renefred
 
Where s the_party_
Where s the_party_Where s the_party_
Where s the_party_
RBearSAT
 
Anil kona
Anil konaAnil kona
Anil kona
thriddas
 
SPPM Clinical 7 Best Practices In Forecasting & Planning
SPPM Clinical   7 Best Practices In Forecasting & PlanningSPPM Clinical   7 Best Practices In Forecasting & Planning
SPPM Clinical 7 Best Practices In Forecasting & Planning
guest1fe658d
 
Asanga abeyagoonasekara
Asanga abeyagoonasekaraAsanga abeyagoonasekara
Asanga abeyagoonasekara
thriddas
 

Viewers also liked (18)

Daniel kaufmann
Daniel kaufmannDaniel kaufmann
Daniel kaufmann
 
Prof jagdeep chhokar
Prof jagdeep chhokarProf jagdeep chhokar
Prof jagdeep chhokar
 
Dr Sameer Sharma
Dr Sameer SharmaDr Sameer Sharma
Dr Sameer Sharma
 
Nord Software
Nord SoftwareNord Software
Nord Software
 
English Week12
English Week12English Week12
English Week12
 
Fiesta verde (1)
Fiesta verde (1)Fiesta verde (1)
Fiesta verde (1)
 
English Week14
English Week14English Week14
English Week14
 
Jeremiah sam pen plus bytes
Jeremiah sam   pen plus bytesJeremiah sam   pen plus bytes
Jeremiah sam pen plus bytes
 
Robert hunja
Robert hunjaRobert hunja
Robert hunja
 
Dr. Shalini Rajneesh at CoCo 2014 - Sakala
Dr. Shalini Rajneesh at CoCo 2014 - SakalaDr. Shalini Rajneesh at CoCo 2014 - Sakala
Dr. Shalini Rajneesh at CoCo 2014 - Sakala
 
Ellen miller
Ellen millerEllen miller
Ellen miller
 
Using Social Network Tools for Your Business
Using Social Network Tools for Your BusinessUsing Social Network Tools for Your Business
Using Social Network Tools for Your Business
 
C. Concept Mapping (Week # 3 - 7)
C. Concept Mapping (Week # 3 - 7) C. Concept Mapping (Week # 3 - 7)
C. Concept Mapping (Week # 3 - 7)
 
Wordcamp Copenhagen 2014
Wordcamp Copenhagen 2014 Wordcamp Copenhagen 2014
Wordcamp Copenhagen 2014
 
Where s the_party_
Where s the_party_Where s the_party_
Where s the_party_
 
Anil kona
Anil konaAnil kona
Anil kona
 
SPPM Clinical 7 Best Practices In Forecasting & Planning
SPPM Clinical   7 Best Practices In Forecasting & PlanningSPPM Clinical   7 Best Practices In Forecasting & Planning
SPPM Clinical 7 Best Practices In Forecasting & Planning
 
Asanga abeyagoonasekara
Asanga abeyagoonasekaraAsanga abeyagoonasekara
Asanga abeyagoonasekara
 

Similar to English Week13

Week13
Week13Week13
Week13
yasuhiroki
 
week13-EP3
week13-EP3week13-EP3
week13-EP3
GroupH
 
Group G
Group GGroup G
Group G
s1160113
 
Week13
Week13Week13
Week13
GroupB
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
karthikvcyber
 
Presentation 13all
Presentation 13allPresentation 13all
Presentation 13all
guestaa4c059
 
Week13 F
Week13 FWeek13 F
Week13 F
guruupuF
 
Week13_Web_Presentation
Week13_Web_PresentationWeek13_Web_Presentation
Week13_Web_Presentation
guestb64a7e
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranet
Nadeem Khazi
 
Internet_Interanet_Extranet
Internet_Interanet_ExtranetInternet_Interanet_Extranet
Internet_Interanet_Extranet
vikashchauhan908
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
Arti Parab Academics
 
IRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized UsersIRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET Journal
 
Chapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and TechnologyChapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and Technology
Dr. Ahmed Al Zaidy
 
Week13pre
Week13preWeek13pre
Week13pre
kasufalcon
 
Presentation Week13
Presentation Week13Presentation Week13
Presentation Week13
guest052692
 
WT INTERNET OVERVIEW
WT INTERNET OVERVIEWWT INTERNET OVERVIEW
WT INTERNET OVERVIEW
Mohan186867
 
W13poster
W13posterW13poster
W13poster
s1150250
 
W13poster
W13posterW13poster
W13poster
s1150250
 
Week14
Week14Week14
Week14
yucky
 
Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.
Muhammad Farooq Hussain
 

Similar to English Week13 (20)

Week13
Week13Week13
Week13
 
week13-EP3
week13-EP3week13-EP3
week13-EP3
 
Group G
Group GGroup G
Group G
 
Week13
Week13Week13
Week13
 
Firewall & DMZ.pptx
Firewall & DMZ.pptxFirewall & DMZ.pptx
Firewall & DMZ.pptx
 
Presentation 13all
Presentation 13allPresentation 13all
Presentation 13all
 
Week13 F
Week13 FWeek13 F
Week13 F
 
Week13_Web_Presentation
Week13_Web_PresentationWeek13_Web_Presentation
Week13_Web_Presentation
 
Diff intranet and extranet
Diff intranet and extranetDiff intranet and extranet
Diff intranet and extranet
 
Internet_Interanet_Extranet
Internet_Interanet_ExtranetInternet_Interanet_Extranet
Internet_Interanet_Extranet
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
IRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized UsersIRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized Users
 
Chapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and TechnologyChapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and Technology
 
Week13pre
Week13preWeek13pre
Week13pre
 
Presentation Week13
Presentation Week13Presentation Week13
Presentation Week13
 
WT INTERNET OVERVIEW
WT INTERNET OVERVIEWWT INTERNET OVERVIEW
WT INTERNET OVERVIEW
 
W13poster
W13posterW13poster
W13poster
 
W13poster
W13posterW13poster
W13poster
 
Week14
Week14Week14
Week14
 
Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.Site to Site VPN Using TMG Firewall. University Final Presentation.
Site to Site VPN Using TMG Firewall. University Final Presentation.
 

Recently uploaded

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 

Recently uploaded (20)

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 

English Week13

  • 1. Using an Intranet Within a Company ● About Intranet ● How to use Intranet ● About Firewall ● About Subcontractors(Secure Link)
  • 2. About Intranet ● An intranet is a private computer network that uses Internet protocols and network connectivity to securely share part of an organization's information or operations with its employees. Sometimes the term refers only to the most visible service, the internal website.
  • 3. How to use Intranet Intranet is used in many kind of company. The clerical work's Intranet have been introduced the Internet application technologies of World Wide Web and E-mail. And, the Industry system, circulation system, and finance system's Intranet have been introduced using the way of communication.
  • 4. About Firewall ● A firewall is a device or set of devices configured to permit, deny, encrypt, or proxy all computer traffic between different security domains based upon a set of rules and other criteria.
  • 5. About Subcontractors (Secure Link) ● A subcontractor is an individual or in many cases a business that signs a contract to perform part or all of the obligations of another's contract.
  • 6. References ● http://en.wikipedia.org/wiki/Subcontract ● http://en.wikipedia.org/wiki/Firewall ● http://en.wikipedia.org/wiki/Intranet ● http://e- words.jp/w/E382A4E383B3E38388E383A9 E3838DE38383E38388.html