This document provides instructions for building an intranet using Linux Ubuntu. It discusses configuring Ubuntu for use as an intranet server, including setting up networking, DHCP, DNS, Apache web server, PHP, SSL certificates, FTP, Squid proxy server, Postfix email server, and user accounts. It also shows commands for testing the intranet configuration. The goal is to have a fully functioning intranet with network services like website, email, file sharing, and caching proxy.
This document contains configuration files for setting up a site-to-site VPN between 4 routers to connect two private networks. The VPN uses pre-shared keys and IKE policy to establish encrypted tunnels between routers using IPsec. Verification shows the private networks can now communicate securely through the VPN tunnels, while remaining isolated from public networks and invisible to each other without the VPN.
High Availability Server Clustering without ILB(Internal Load Balancer) (MEMO)Naoto MATSUMOTO
High Availability Server Clustering without ILB(Internal Load Balancer) (MEMO)
20-Feb-2015
SAKURA Internet Research Center.
Senior Researcher / Naoto MATSUMOTO
An Easy way to build a server cluster without top of rack switches (MEMO)Naoto MATSUMOTO
An Easy way to build a server cluster without top of rack switches (MEMO)
12-Feb-2015
SAKURA Internet Research Center.
Senior Researcher / Naoto MATSUMOTO
This document discusses setting up an OpenVPN network between two sites. It includes generating certificates using OpenSSL, configuring a bridge and TAP interfaces using bridging-utils, and configuring the OpenVPN server and client. The OpenVPN server is configured to use the TAP interface and bridge, and authentication is set up using the certificates. Instructions are provided on starting the OpenVPN service and ensuring it starts at system boot.
20141102 VyOS 1.1.0 and NIFTY Cloud New Features雄也 日下部
The document discusses new features of VyOS 1.1.0 including unmanaged L2TPv3, dummy interfaces, and QinQ. It also describes running VyOS on various IaaS platforms and NIFTY Cloud's new network features such as private networks, routers, and VPN gateways. Enhanced software for managed L2TPv3 will be released as open source to allow VPN connectivity between routers and NIFTY Cloud via L2TPv3/IPsec tunnels.
This document contains configuration files for setting up a site-to-site VPN between 4 routers to connect two private networks. The VPN uses pre-shared keys and IKE policy to establish encrypted tunnels between routers using IPsec. Verification shows the private networks can now communicate securely through the VPN tunnels, while remaining isolated from public networks and invisible to each other without the VPN.
High Availability Server Clustering without ILB(Internal Load Balancer) (MEMO)Naoto MATSUMOTO
High Availability Server Clustering without ILB(Internal Load Balancer) (MEMO)
20-Feb-2015
SAKURA Internet Research Center.
Senior Researcher / Naoto MATSUMOTO
An Easy way to build a server cluster without top of rack switches (MEMO)Naoto MATSUMOTO
An Easy way to build a server cluster without top of rack switches (MEMO)
12-Feb-2015
SAKURA Internet Research Center.
Senior Researcher / Naoto MATSUMOTO
This document discusses setting up an OpenVPN network between two sites. It includes generating certificates using OpenSSL, configuring a bridge and TAP interfaces using bridging-utils, and configuring the OpenVPN server and client. The OpenVPN server is configured to use the TAP interface and bridge, and authentication is set up using the certificates. Instructions are provided on starting the OpenVPN service and ensuring it starts at system boot.
20141102 VyOS 1.1.0 and NIFTY Cloud New Features雄也 日下部
The document discusses new features of VyOS 1.1.0 including unmanaged L2TPv3, dummy interfaces, and QinQ. It also describes running VyOS on various IaaS platforms and NIFTY Cloud's new network features such as private networks, routers, and VPN gateways. Enhanced software for managed L2TPv3 will be released as open source to allow VPN connectivity between routers and NIFTY Cloud via L2TPv3/IPsec tunnels.
The document appears to be a case study describing a Cisco CCNA configuration involving an ISP router connecting to other routers that make up a WAN. It includes configurations for the ISP router, Sidney router, Tokyo router, and Auckland router, with each connecting to the others to allow connectivity between LANs. The goal seems to be providing WAN access and connectivity between the different networks.
UNDOCUMENTED Vyatta vRouter: Unbreakable VPN Tunneling (MEMO)
18 Mar, 2014
SAKURA Internet Research Center
Senior Researcher / Naoto MATSUMOTO
Japan Vyatta Users Meeting 2014 Spring on Tokyo.
The document discusses using Ixia's IxVM virtual machine for network testing in Cisco's Modeling Lab (CML) virtual environment. Specifically:
- IxVM is a virtual machine version of Ixia's network testing hardware that runs on Linux. Its OVA file can be added to CML.
- The OVA file contains disk files that are extracted and registered with CML's OpenStack environment to launch the IxVM VM.
- Example shows configuring a router and IxVM VMs in CML, and using IxNetwork software to generate OSPF traffic between the VMs and router ports for testing.
This document outlines 7 steps to configure a site-to-site VPN between Cisco ASA firewalls: 1) disable NAT for encrypted traffic, 2) create access lists to permit traffic between networks, 3) add routes between networks, 4) create IKE policies for phase 1 authentication and encryption, 5) define tunnel groups for each peer IP, 6) set up transform sets for phase 2 encryption, and 7) configure crypto maps to match addresses, set PFS, peers, transform sets, and lifetimes.
How to install OpenStack MITAKA --allinone - cheat sheet -Naoto MATSUMOTO
How to install OpenStack MITAKA --allinone - cheat sheet -
27-Jun, 2016
SAKURA Internet, Inc. / SAKURA Internet Research Center
Senior Researcher / Naoto MATSUMOTO
This document provides instructions for hardening the security of an Ubuntu 16.04 server. It outlines 27 steps to secure the server, including updating packages, restricting root access, removing unnecessary services like FTP, configuring a firewall and SSH, enforcing password policies, and logging and monitoring the system. References are provided for additional information on implementing each security measure.
The document provides instructions for setting up web blocking on an OpenWRT router using DNS redirection or host files. It involves:
1) Connecting via SSH and editing the /etc/persistent/rc.poststart file to add redirection commands
2) Editing the firewall and DNSmasq configuration files to redirect DNS requests to the local router for blocking at the DNS level
3) Rebooting the router to apply the changes and then testing blocked domains.
Marek discusses how his company Faelix uses MikroTik hardware and RouterOS at their network edges to route over 600k IPv4 and 30k IPv6 routes. While there were some initial issues, MikroTik has proven reliable and cost-effective. Marek then explains how Faelix implements firewalling with zero filter rules through a multi-step process. They use fail2ban to block brute force attacks, AMQP to share block lists across routers, and destination NAT misbehaving traffic. Most importantly, they leverage the "/ip route rule" feature to route blocked traffic to a separate routing table for easy isolation without complex firewall rules.
pfSense 2.0 is a free and open-source firewall and routing software based on FreeBSD. The latest stable version, 2.0, was released in September 2011 and features improvements such as layer 7 filtering, VPN support, user management, and configuration history. It can be used for firewalls, routers, wireless access points, and more. System requirements are modest with support for throughput up to 500Mbps on server-class hardware. Future releases will focus on adding IPv6 support and improving advanced routing capabilities.
Our presentation to UKNOF in September 2020
In two very long nights of maintenance we acheived:
- Full table BGP on VyOS converge time in seconds
- Routing on MikroTiks converges near-instantly
- BCP38 (customers cannot spoof source address)
- IRR filtering* (only accept where route/route6 object)
- RPKI (will not accept invalid routes from P/T)
- Templated configuration (repeatable, automated) Single source of truth (the docs become the config)
This document provides instructions for building an intranet using Linux Ubuntu. It discusses configuring Ubuntu for networking and services like DHCP, DNS, Apache, SSL, FTP, Squid proxy, and email. Specific configurations are provided for network interfaces, masquerading, DHCP settings, Bind DNS, Apache virtual hosts, SSL certificates, vsFTPd, Squid caching and acceleration settings. The document aims to guide setting up a full-fledged intranet system with network services on a Ubuntu server.
Foreman-and-Puppet-for-Openstack-Audo-Deploymentyating yang
The document discusses Foreman and Puppet for deploying OpenStack. It provides an introduction to Foreman and Puppet, and describes how they can be used together to automatically deploy and configure OpenStack on bare metal servers. The Foreman server acts as a Puppet master and PXE server, installing Ubuntu 14.04 on the bare metal nodes and configuring them using Puppet modules for OpenStack components. It outlines the network requirements and provides an example Puppet manifest for configuring OpenStack networks, services, and nodes.
This document provides an overview and instructions for setting up the pfSense firewall software on Hacom hardware. It includes sections on introduction, setup and configuration, web administration, backup and restore, firmware updates, and maximum firewall states. The setup and configuration section describes connecting the firewall to the local network and internet, accessing the web-based administration interface, and going through an initial setup wizard to configure basic network and system settings.
Design and Operation of OpenStack Cloud on 100 Physical Servers - OpenStack S...VirtualTech Japan Inc.
Title: Design and Operation of OpenStack Cloud on 100 Physical Servers - OpenStack Summit 2014 Paris Presentation
Date: Tuesday, November 4 • 14:00 - 14:40
Speakers: Hiromichi Itou,Ken Igarashi,Akihiro Motoki
Agenda:
http://openstacksummitnovember2014paris.sched.org/event/142815bb3b425e4d6374e34bc81d871e
Video:
https://www.openstack.org/summit/openstack-paris-summit-2014/session-videos/presentation/design-and-operation-of-openstack-cloud-on-100-physical-servers-ntt-docomo
You will face many problems when you start designing your OpenStack Cloud because of a lack of full design architecture information. For example, there are many Neutron plugins, but it is difficult to choose the best plugin and its configuration to get a high throughput of a Virtual Machine (VM) and achieve a High Availability (HA) of L3 Agent. Also, we couldn't find information for how much computing resource (CPU, Memory and HDD) is required for management and operation servers (e.g. API, RabbitMQ, MySQL and Monitoring etc.).
We built OpenStack Icehouse Cloud on 100 physical servers (1600 physical cores) without using commecial software, and did several performance and long-run tests to address these problems.
In this talk, we will present performance comparison of Neutron ML2 plugin implementations (Open vSwitch and Linux Bridge), tunnelling protocols (GRE and VXLAN) and physical network configurations (Network Interface Bonding and Server Side Equal Cost Multi Path) to achieve 10Gbps at a VM, and the L3 Agent HA we implemented. Also, we will present how much computing resource we used and each server loads to operate the cloud. Finaly, we will share our Ansible Based OpenStack deployment and management tool.
Key topics include:
- Performance comparison of OSS Neutron ML2 plugins (Open vSwitch and Linux Bridge) and tunneling protocols (GRE and VXLAN)
- Performance comparision of redundant network configurations (Network Interface Bonding and Server Side Equal Cost Multi Path)
- HA of L3 Agent (ACT/STBY) we implemented
- Ansible based deployment/operation tools
- Items we must watch for OpenStack operation
- Hardware specifications and resources we used to operate the Cloud
We will share a full design architecture and hardware sizing information for a large scale cloud and prove OSS based Neutron can handle a hundred servers.
This document summarizes the design and operation of an OpenStack cloud on 100 physical servers. Key aspects discussed include the network configuration using MLAG with Open vSwitch, using VXLAN for network virtualization and the performance benefits of using NICs with VXLAN offload support. The document also covers the high availability design using MySQL Galera cluster for the database and load balancing across the nodes.
This document provides an overview of securing network devices by configuring router hardening, secure administrative access, and network monitoring techniques. It discusses topics like configuring a secure network perimeter, securing router administration access, enhancing security for virtual logins, and configuring an SSH daemon for secure remote management. The document also covers securing the Cisco IOS image and configuration files using the resilient configuration feature.
The document appears to be a case study describing a Cisco CCNA configuration involving an ISP router connecting to other routers that make up a WAN. It includes configurations for the ISP router, Sidney router, Tokyo router, and Auckland router, with each connecting to the others to allow connectivity between LANs. The goal seems to be providing WAN access and connectivity between the different networks.
UNDOCUMENTED Vyatta vRouter: Unbreakable VPN Tunneling (MEMO)
18 Mar, 2014
SAKURA Internet Research Center
Senior Researcher / Naoto MATSUMOTO
Japan Vyatta Users Meeting 2014 Spring on Tokyo.
The document discusses using Ixia's IxVM virtual machine for network testing in Cisco's Modeling Lab (CML) virtual environment. Specifically:
- IxVM is a virtual machine version of Ixia's network testing hardware that runs on Linux. Its OVA file can be added to CML.
- The OVA file contains disk files that are extracted and registered with CML's OpenStack environment to launch the IxVM VM.
- Example shows configuring a router and IxVM VMs in CML, and using IxNetwork software to generate OSPF traffic between the VMs and router ports for testing.
This document outlines 7 steps to configure a site-to-site VPN between Cisco ASA firewalls: 1) disable NAT for encrypted traffic, 2) create access lists to permit traffic between networks, 3) add routes between networks, 4) create IKE policies for phase 1 authentication and encryption, 5) define tunnel groups for each peer IP, 6) set up transform sets for phase 2 encryption, and 7) configure crypto maps to match addresses, set PFS, peers, transform sets, and lifetimes.
How to install OpenStack MITAKA --allinone - cheat sheet -Naoto MATSUMOTO
How to install OpenStack MITAKA --allinone - cheat sheet -
27-Jun, 2016
SAKURA Internet, Inc. / SAKURA Internet Research Center
Senior Researcher / Naoto MATSUMOTO
This document provides instructions for hardening the security of an Ubuntu 16.04 server. It outlines 27 steps to secure the server, including updating packages, restricting root access, removing unnecessary services like FTP, configuring a firewall and SSH, enforcing password policies, and logging and monitoring the system. References are provided for additional information on implementing each security measure.
The document provides instructions for setting up web blocking on an OpenWRT router using DNS redirection or host files. It involves:
1) Connecting via SSH and editing the /etc/persistent/rc.poststart file to add redirection commands
2) Editing the firewall and DNSmasq configuration files to redirect DNS requests to the local router for blocking at the DNS level
3) Rebooting the router to apply the changes and then testing blocked domains.
Marek discusses how his company Faelix uses MikroTik hardware and RouterOS at their network edges to route over 600k IPv4 and 30k IPv6 routes. While there were some initial issues, MikroTik has proven reliable and cost-effective. Marek then explains how Faelix implements firewalling with zero filter rules through a multi-step process. They use fail2ban to block brute force attacks, AMQP to share block lists across routers, and destination NAT misbehaving traffic. Most importantly, they leverage the "/ip route rule" feature to route blocked traffic to a separate routing table for easy isolation without complex firewall rules.
pfSense 2.0 is a free and open-source firewall and routing software based on FreeBSD. The latest stable version, 2.0, was released in September 2011 and features improvements such as layer 7 filtering, VPN support, user management, and configuration history. It can be used for firewalls, routers, wireless access points, and more. System requirements are modest with support for throughput up to 500Mbps on server-class hardware. Future releases will focus on adding IPv6 support and improving advanced routing capabilities.
Our presentation to UKNOF in September 2020
In two very long nights of maintenance we acheived:
- Full table BGP on VyOS converge time in seconds
- Routing on MikroTiks converges near-instantly
- BCP38 (customers cannot spoof source address)
- IRR filtering* (only accept where route/route6 object)
- RPKI (will not accept invalid routes from P/T)
- Templated configuration (repeatable, automated) Single source of truth (the docs become the config)
This document provides instructions for building an intranet using Linux Ubuntu. It discusses configuring Ubuntu for networking and services like DHCP, DNS, Apache, SSL, FTP, Squid proxy, and email. Specific configurations are provided for network interfaces, masquerading, DHCP settings, Bind DNS, Apache virtual hosts, SSL certificates, vsFTPd, Squid caching and acceleration settings. The document aims to guide setting up a full-fledged intranet system with network services on a Ubuntu server.
Foreman-and-Puppet-for-Openstack-Audo-Deploymentyating yang
The document discusses Foreman and Puppet for deploying OpenStack. It provides an introduction to Foreman and Puppet, and describes how they can be used together to automatically deploy and configure OpenStack on bare metal servers. The Foreman server acts as a Puppet master and PXE server, installing Ubuntu 14.04 on the bare metal nodes and configuring them using Puppet modules for OpenStack components. It outlines the network requirements and provides an example Puppet manifest for configuring OpenStack networks, services, and nodes.
This document provides an overview and instructions for setting up the pfSense firewall software on Hacom hardware. It includes sections on introduction, setup and configuration, web administration, backup and restore, firmware updates, and maximum firewall states. The setup and configuration section describes connecting the firewall to the local network and internet, accessing the web-based administration interface, and going through an initial setup wizard to configure basic network and system settings.
Design and Operation of OpenStack Cloud on 100 Physical Servers - OpenStack S...VirtualTech Japan Inc.
Title: Design and Operation of OpenStack Cloud on 100 Physical Servers - OpenStack Summit 2014 Paris Presentation
Date: Tuesday, November 4 • 14:00 - 14:40
Speakers: Hiromichi Itou,Ken Igarashi,Akihiro Motoki
Agenda:
http://openstacksummitnovember2014paris.sched.org/event/142815bb3b425e4d6374e34bc81d871e
Video:
https://www.openstack.org/summit/openstack-paris-summit-2014/session-videos/presentation/design-and-operation-of-openstack-cloud-on-100-physical-servers-ntt-docomo
You will face many problems when you start designing your OpenStack Cloud because of a lack of full design architecture information. For example, there are many Neutron plugins, but it is difficult to choose the best plugin and its configuration to get a high throughput of a Virtual Machine (VM) and achieve a High Availability (HA) of L3 Agent. Also, we couldn't find information for how much computing resource (CPU, Memory and HDD) is required for management and operation servers (e.g. API, RabbitMQ, MySQL and Monitoring etc.).
We built OpenStack Icehouse Cloud on 100 physical servers (1600 physical cores) without using commecial software, and did several performance and long-run tests to address these problems.
In this talk, we will present performance comparison of Neutron ML2 plugin implementations (Open vSwitch and Linux Bridge), tunnelling protocols (GRE and VXLAN) and physical network configurations (Network Interface Bonding and Server Side Equal Cost Multi Path) to achieve 10Gbps at a VM, and the L3 Agent HA we implemented. Also, we will present how much computing resource we used and each server loads to operate the cloud. Finaly, we will share our Ansible Based OpenStack deployment and management tool.
Key topics include:
- Performance comparison of OSS Neutron ML2 plugins (Open vSwitch and Linux Bridge) and tunneling protocols (GRE and VXLAN)
- Performance comparision of redundant network configurations (Network Interface Bonding and Server Side Equal Cost Multi Path)
- HA of L3 Agent (ACT/STBY) we implemented
- Ansible based deployment/operation tools
- Items we must watch for OpenStack operation
- Hardware specifications and resources we used to operate the Cloud
We will share a full design architecture and hardware sizing information for a large scale cloud and prove OSS based Neutron can handle a hundred servers.
This document summarizes the design and operation of an OpenStack cloud on 100 physical servers. Key aspects discussed include the network configuration using MLAG with Open vSwitch, using VXLAN for network virtualization and the performance benefits of using NICs with VXLAN offload support. The document also covers the high availability design using MySQL Galera cluster for the database and load balancing across the nodes.
This document provides an overview of securing network devices by configuring router hardening, secure administrative access, and network monitoring techniques. It discusses topics like configuring a secure network perimeter, securing router administration access, enhancing security for virtual logins, and configuring an SSH daemon for secure remote management. The document also covers securing the Cisco IOS image and configuration files using the resilient configuration feature.
This document provides a guide to configure an Linux computer to share an internet connection with multiple other devices on a local network. It discusses planning the network topology, setting up DHCP and IP forwarding on the Linux box, and configuring firewall rules to masquerade traffic and allow sharing of a single public IP address among private devices.
Configuring Ip Sec Between A Router And A Pixangelitoh11
IPSec is being configured between a router and a PIX firewall to encrypt traffic between the internal networks while allowing public internet access without encryption. Access lists and NAT are used to exempt the internal traffic from NAT and encrypt it, while applying NAT to other traffic. Debug commands show the IKE and IPSec security associations being successfully negotiated.
The document discusses accessing the virtual router in a CloudStack KVM environment. It explains that the virtual router can be accessed by SSHing into its link local IP address from the compute node it is running on. When logging in, it is shown that the link local IP address may change if the virtual router is restarted. The internal interfaces, routing tables, and network configuration of the running virtual router are then displayed and examined.
The document discusses accessing the virtual router in a CloudStack KVM environment. It explains that the virtual router can be accessed by SSHing into its link local IP address from the compute node it is running on. When logging in, it is shown that the link local IP address may change if the virtual router is restarted. The internal interfaces, routing tables, and network configuration of the running virtual router are then displayed and examined.
This document discusses switch security configuration and common security attacks. It covers topics such as configuring passwords, console access, virtual terminal access, banners, telnet/SSH, and port security. Various security attacks are also described like MAC address flooding, spoofing attacks, CDP attacks, and telnet attacks. The document provides configuration examples for securing switch access and interfaces using passwords, banners, telnet/SSH, and port security features.
Automating Networking! Do I Have to Start at Ground Zero?Puppet
This document discusses automating networking tasks using Cumulus Linux and Puppet. It recommends starting with installing Cumulus Linux using ONIE and ZTP provisioning to boot the OS and apply an initial configuration. Then install the Puppet agent and use Puppet modules to automate additional configuration of interfaces, routing protocols, and other network settings without touching the switch. Demo environments like Cumulus VX allow learning and testing automation approaches.
Hack.lu 2006 - All your Bluetooth is belong to usThierry Zoller
During the research on Bluetooth Security we uncovered multiple implementation vulnerabilities in Drivers, Software and Stacks. This presentation will explain the reasons and the consequences of these findings. More importingly however protocol weaknesses were discovered and shown live on stage.
http://events.ccc.de/congress/2006/Fahrplan/speakers/1290.en.html
All your Bluetooth is belong to us - the rest too.Thierry Zoller
This document summarizes a talk about Bluetooth security. The talk covers extending the range of Bluetooth devices, wardriving to discover Bluetooth devices, and various attacks against Bluetooth including Bluebug, Bluesnarf, attacking cars and headsets, and cracking Bluetooth pins and link keys. It also discusses vulnerabilities in Bluetooth implementations on Apple and Windows devices that can allow compromising internal networks. Throughout it emphasizes the risks of Bluetooth and gives recommendations to improve security like disabling Bluetooth when not in use and pairing devices securely.
The document discusses securing Cisco routers by hardening configurations based on the NSA Router Security Configuration Guide. It covers topics such as physical security of routers, defining loopback interfaces, banner configuration, blocking SYN flooding attacks using TCP intercept, tuning IP stack parameters like limiting embryonic connections and enabling TCP selective acknowledgment. It also discusses access control measures like basic authentication, AAA authentication using RADIUS/TACACS+, privilege levels, and disabling unused ports and protocols like CDP.
This document provides instructions on configuring a router on a stick topology. It describes configuring a switch port as a trunk, and then creating subinterfaces on the router's physical interface that correspond to each VLAN. It shows assigning IP addresses to the subinterfaces to act as the default gateway for each VLAN subnet. Finally, it describes configuring PCs with IP addresses in the correct subnets and default gateways, and confirms connectivity between the VLANs via ping tests through the router.
This document provides instructions for configuring basic network security on a Cisco ASA 5506-x firewall. It outlines requirements for separating networks into an Internet, user, and DMZ segment. It then provides steps to update the ASA software, configure interfaces and security levels, enable internet access via NAT and routing, allow web access to servers on the DMZ, optionally configure DHCP, and optionally redirect traffic to the FirePOWER module. It also includes steps for hardening the device by shutting down unused interfaces, enabling SSH access, and configuring time and logging.
NAT (network address translation) & PAT (port address translation)Netwax Lab
NAT (Network Address Translation) allows private IP networks to connect to the Internet by translating private IP addresses to public IP addresses. It operates on a router, connecting internal and external networks. NAT provides security by hiding internal network addresses and conserving IP addresses. There are various NAT types, including static NAT for one-to-one address mapping, dynamic NAT for mapping private addresses to public addresses from a pool, and NAT overload/PAT for mapping multiple private addresses to a single public address using ports.
Similar to Membangun server intranet dengan linux (20)
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥