关于“Getting Started with Cloud IDS”的评价
8670 条评价
Thanks
Oluwafemi A. · 已于 about 1 year前审核
Peter S. · 已于 about 1 year前审核
Alec S. · 已于 about 1 year前审核
Nagakumar Raju P. · 已于 about 1 year前审核
so clear to me
Sergei O. · 已于 about 1 year前审核
Diego M. · 已于 about 1 year前审核
Pierre-Yves A. · 已于 about 1 year前审核
Nicolas L. · 已于 about 1 year前审核
Vasilii G. · 已于 about 1 year前审核
Adir B. · 已于 about 1 year前审核
Meir R. · 已于 about 1 year前审核
Natalio Q. · 已于 about 1 year前审核
Ben W. · 已于 about 1 year前审核
Ghita Razvan L. · 已于 about 1 year前审核
Diego A. · 已于 about 1 year前审核
Marco Francesco P. · 已于 about 1 year前审核
Jefferson D. · 已于 about 1 year前审核
Good lab, would have liked to understand a bit more in detail all the individual steps (in particular some command line arguments and how/why we triggered the different levels of severity with each command). Small suggestion: In task 8, item 2 should be renamed: 2. Click the Threats tab. -> Click the IDS Threats tab. There is Threats tab inside Network security (under NGFW), but not the one we wanted. The above suggestion clarifies the desired tab
Konstantinos S. · 已于 about 1 year前审核
Christian K. · 已于 about 1 year前审核
Vladimir L. · 已于 about 1 year前审核
Sandra B. · 已于 about 1 year前审核
Julia G. · 已于 about 1 year前审核
Volker H. · 已于 about 1 year前审核
Simon W. · 已于 about 1 year前审核
Javier O. · 已于 about 1 year前审核
我们无法确保发布的评价来自已购买或已使用产品的消费者。评价未经 Google 核实。