关于“Getting Started with Cloud IDS”的评价
正在加载…
未找到任何结果。

关于“Getting Started with Cloud IDS”的评价

8670 条评价

Thanks

Oluwafemi A. · 已于 about 1 year前审核

Peter S. · 已于 about 1 year前审核

Alec S. · 已于 about 1 year前审核

Nagakumar Raju P. · 已于 about 1 year前审核

so clear to me

Sergei O. · 已于 about 1 year前审核

Diego M. · 已于 about 1 year前审核

Pierre-Yves A. · 已于 about 1 year前审核

Nicolas L. · 已于 about 1 year前审核

Vasilii G. · 已于 about 1 year前审核

Adir B. · 已于 about 1 year前审核

Meir R. · 已于 about 1 year前审核

Natalio Q. · 已于 about 1 year前审核

Ben W. · 已于 about 1 year前审核

Ghita Razvan L. · 已于 about 1 year前审核

Diego A. · 已于 about 1 year前审核

Marco Francesco P. · 已于 about 1 year前审核

Jefferson D. · 已于 about 1 year前审核

Good lab, would have liked to understand a bit more in detail all the individual steps (in particular some command line arguments and how/why we triggered the different levels of severity with each command). Small suggestion: In task 8, item 2 should be renamed: 2. Click the Threats tab. -> Click the IDS Threats tab. There is Threats tab inside Network security (under NGFW), but not the one we wanted. The above suggestion clarifies the desired tab

Konstantinos S. · 已于 about 1 year前审核

Christian K. · 已于 about 1 year前审核

Vladimir L. · 已于 about 1 year前审核

Sandra B. · 已于 about 1 year前审核

Julia G. · 已于 about 1 year前审核

Volker H. · 已于 about 1 year前审核

Simon W. · 已于 about 1 year前审核

Javier O. · 已于 about 1 year前审核

我们无法确保发布的评价来自已购买或已使用产品的消费者。评价未经 Google 核实。