0
  1. Trang chủ >
  2. Công Nghệ Thông Tin >
  3. Quản trị mạng >

It confines network instability to one area of network

CCNA 1 AND 2 COMPANION GUIDE  REVISED  CISCO NETWORKING ACADEMY PROGRAM  PART 106 POTX

CCNA 1 AND 2 COMPANION GUIDE REVISED CISCO NETWORKING ACADEMY PROGRAM PART 106 POTX

14. Which of the following is not one of the STP port states? D. Transmitting 15. Which of the following is true concerning a bridge and its forwarding decisions? C. Bridges operate at OSI Layer 2 and use MAC addresses to make decisions. 16. Which of the following is not a feature of bridges?
  • 10
ELECTRONIC BUSINESS: CONCEPTS, METHODOLOGIES, TOOLS, AND APPLICATIONS (4-VOLUMES) P120 POT

ELECTRONIC BUSINESS: CONCEPTS, METHODOLOGIES, TOOLS, AND APPLICATIONS (4-VOLUMES) P120 POT

LWVRSHUDWLRQVVLQFH³>)RRG&R@KDVDOZD\V been at the front of deploying that kind of tech- nology to the market … We tend to pick up the new technologies quickly if we can see there’s a clear business input” (Systems Administrator). The small IT department within FoodCo actively looks for ways to utilize new and innovative IT in the company’s operations. However, the decision to explore new technological options in sales automation was a strategic one taken by FoodCo’s senior management. According to the
  • 10
BÁO CÁO HÓA HỌC:

BÁO CÁO HÓA HỌC: "RESEARCH ARTICLE PERFORMANCE AND RELIABILITY OF DSRC VEHICULAR SAFETY COMMUNICATION: A FORMAL ANALYSIS" DOC

In this paper, we investigate reliability and performance of DSRC ad hoc V2V communication networks with two levels of safety-related services analytically and by simulation. Several important performance indices for broadcast such as channel throughput, packet reception rates, and packet deliv- ery delay are derived from the proposed analytical model taking IEEE 802.11 backo ff counter process, fading channel, hidden terminal, nonsaturation tra ffi c, mobility, and so forth, into account. Numerical results reveal characteristics of the DSRC communication system for safety application. From the analysis of DSRC safety services on highway, we observe that (1) under typical DSRC environment, IEEE 802.11a is able to meet the safety message delay requirement, but is not able to guarantee high reliability because of possible transmission collision and harsh channel fading; (2) hidden terminal problem in broadcast is more severe than that in unicast; (3) high mobility of vehicles has minor impact on the reliability and performance of the direct single hop broadcast network with high data rate; (4) with direct broadcast and preemptive emergent message transmission, it is possible to meet both performance requirement and relia- bility requirement simultaneously through adjusting backo ff
  • 13
Network Fundamentals–Chapter 6 pdf

Network Fundamentals–Chapter 6 pdf

ANDing – What is in our network? ƒ Reasons to Use AND –As a packet arrives at a router, the router performs ANDing on the destination address. This yields a network address that is compared to the route from the routing table whose subnet mask was used.
  • 75
PRACTICING ORGANIZATION DEVELOPMENT  A GUIDE FOR CONSULTANTS    PART 53 POT

PRACTICING ORGANIZATION DEVELOPMENT A GUIDE FOR CONSULTANTS PART 53 POT

After the laughter subsided, Bob then said, “There is something I have been trying to tell our profession—and I’m going to try one more time. OD is not about our kit of tools. OD is about the way we lead our lives!!! ” In our view that is an extraordinarily important way of thinking about the nature of OD, since, on reflection, it contrasts with many of the prevailing views of what “organization development” means. For us the words, “the way we live our lives” focus on the way people within organizations live their lives—and it also extends to the way “we” (human beings throughout the world) live our lives. The first way of thinking is consistent with the focus on developing orga- nizations and the second way is consistent with the emerging, expanded view of our “field of practice,” namely the field of “Human Systems Development.” 1
  • 10
ACCESSING THE WAN – CHAPTER 1 PPT

ACCESSING THE WAN – CHAPTER 1 PPT

WAN Switching Concepts: Circuit Switching ƒ A circuit-switched network establishes a dedicated circuit between nodes before the users may communicate. –For example, when a subscriber makes a phone call, there is a continuous circuit from the caller to the called party. – PSTN and ISDN are two types of circuit-switching
  • 45
LOCAL AREA NETWORK PPS

LOCAL AREA NETWORK PPS

TRANG 1 TỔNG QUAN VỀ MẠNG LAN • ĐẶC ĐIỂM CỦA LAN  TỐC ĐỘ CAO: Tốc độ truyền dẫn có thể lên tới vài chục Mbps  GIỚI HẠN VỀ KHOẢNG CÁCH: Không quá vài km  MẠNG RIÊNG CỤC BỘ  XÂY DỰNG T[r]
  • 38
WIRELESS LOCAL AREA NETWORK

WIRELESS LOCAL AREA NETWORK

không t ươ ng thích s ẽ làm cho m ạ ng không dây tr ở nên vô d ụ ng, và s ự thi ế u thao tác gi ữ a các ph ầ n s ẽ gây c ả n tr ở trong vi ệ c n ố i k ế t gi ữ a m ạ ng công ty v ớ i các m ạ ng khác. N ă m 1997, the Institute of Electrical and Electronic Engineers (IEEE) phác th ả o chu ẩ n 802.11 cho WLANs (Wireless Local Area Networking).
  • 34
Production planning   master data

Production planning master data

Bill of Materials (BOM) The BOM is a complete formally structured list of components that make up a product or assembly. The list contains the item number of each component together with the quantity and unit of measure. It creates the relationships between an assembly and all of its direct components
  • 21
Reliability theory application of bipolar network in monitoring and detecting network intrusion

Reliability theory application of bipolar network in monitoring and detecting network intrusion

Today the rapid and widespread development of computer networks and computer network environments brings many risks and threats to network security that cause loss or change data of information systems. Security attacks that change the state and components of the system will leave traces, so tracing for network security attacks is of interest. Depending on the monitoring environment and the protocols used to transmit information between network nodes, tracking of network security attacks is done in different ways. Network security attacks affect the communication of information between network nodes, changing the dynamic relationship between network nodes and their reliability. The problem of evaluating internal network reliability to trace network intrusion detection is given and resolved in this article.
  • 6
A study of blackhole and wormhole attacks in mobile adhoc networks

A study of blackhole and wormhole attacks in mobile adhoc networks

In the Mobile Ad-hoc Network (MANET), there are several ways of attacking network operation bypassing fault routing information between malicious and normal nodes. It will degrade efficiency of the network so we cannot archive the purposes of the designed MANET. Since it is deployed in an open network environment with characteristics of high mobility, lack of physical security and independent management, the network is vulnerable to attacks. In related works, we have seen a lot of works focusing on single type of attacks but in our paper, we study how routing attacks work and study how we can simulate combination of blackhole and wormhole attacks. Our code will be open to community so others can use to test with its security mechanism or secure routing protocols.
  • 5
Lecture Modern project management: Chapter 6 - Norman R. Howes

Lecture Modern project management: Chapter 6 - Norman R. Howes

The main contents of the chapter consist of the following: Developing the project network, from work package to network, constructing a project network, activity-on-node (AON) fundamentals, network computation process, using the forward and backward pass information, level of detail for activities,...
  • 38
BÁO CÁO HÓA HỌC:

BÁO CÁO HÓA HỌC: "RESEARCH ARTICLE MULTIRESOLUTION WITH HIERARCHICAL MODULATIONS FOR LONG TERM EVOLUTION OF UMTS" POT

Figure 7 . As expected, QPSK has a better coverage than any of the H1 blocks but obviously its bit rate is half of the set H1+H2 for each k / = 0. Comparison between these two figures indicates that considering any BLER and in particular the reference BLER of 1%, higher channel bit rates require higher SNR) to o ff er any given BLER, resulting in less coverage. However, higher channel bit rates can provide higher maximum throughputs. For k = 0 . 1 the coverage of the strong blocks is the maximum, however the coverage of the corresponding weak blocks is the minimum. As a result the resulting total throughput of both types of blocks is the smallest. Notice that k = 0 . 5 corresponds to the 16QAM uniform constellation, where the strong bits are the standard bits of QPSK modulation, however their coverage is less than the QPSK. The coverage of the corresponding weak blocks ( k =
  • 11
COMPTIA NETWORK+ CERTIFICATION STUDY GUIDE PART 38 PPT

COMPTIA NETWORK+ CERTIFICATION STUDY GUIDE PART 38 PPT

Frame Relay Frame Relay is a packet-switching protocol for connecting devices on a WAN. Frame Relay networks in the United States support data transfer rates at T1 (1.544 Mbps) and T3 (45 Mbps) speeds and can be purchased as DS0s. This allows you flexibility, so you could have a Frame Relay link from one site to another and need 128 Kbps of available circuit bandwidth. You could then purchase two channels at 64 Kbps each and that would be your circuit speed for your Frame Relay link. Frame Relay, when used in the WAN, is often used between a company’s core and remote sites and sized very perfectly to whatever bandwidth is needed between the sites.
  • 10
Introduction of Trusted Network Connect pptx

Introduction of Trusted Network Connect pptx

NETWORK INTEGRITY ARCHITECTURES  SEVERAL INITIATIVES ARE PURSUING NETWORK INTEGRITY ARCHITECTURES  ALL PROVIDE THE ABILITY TO CHECK INTEGRITY OF OBJECTS ACCESSING THE NETWORK  [CISCO][r]
  • 37
A study of blackhole and wormhole attacks in mobile adhoc networks

A study of blackhole and wormhole attacks in mobile adhoc networks

In the Mobile Ad-hoc Network (MANET), there are several ways of attacking network operation bypassing fault routing information between malicious and normal nodes. It will degrade efficiency of the network so we cannot archive the purposes of the designed MANET. Since it is deployed in an open network environment with characteristics of high mobility, lack of physical security and independent management, the network is vulnerable to attacks. In related works, we have seen a lot of works focusing on single type of attacks but in our paper, we study how routing attacks work and study how we can simulate combination of blackhole and wormhole attacks. Our code will be open to community so others can use to test with its security mechanism or secure routing protocols.
  • 5
REDUCE RISK NETWORK APPLICATION PERFORMANCE ISSUES

REDUCE RISK NETWORK APPLICATION PERFORMANCE ISSUES

To get to the root cause more quickly it is best to take a top down approach to the analysis, beginning at the application level. For example, if the path is good but the response time is poor, the problem could be a virtualised server, an application running on multiple tiers or a bug in the application. One option is to use a packet analyser that can easily show the application level and packet ladder diagrams. Span or mirrored tap connections are easy to configure but can lose packets with heavy traffic loads and will not show Layer 1 errors as these are blocked by the Layer 2 switch providing the span. Passive taps are best but connecting them breaks the connection, which will disrupt users of the services this link provides. If performance is suffering, this usually does not cause a problem, but it may affect those using this link to connect to other services.
  • 6
COMPTIA NETWORK+ CERTIFICATION STUDY GUIDE PART 69 PPTX

COMPTIA NETWORK+ CERTIFICATION STUDY GUIDE PART 69 PPTX

barrel connector is round or barrel-shaped. You have been hired by a small company to cable its network. The 8. company has offices in two buildings that are 300 m apart. Both of the offices have about 15 computers and the numbers are expected to grow in near future. All of the computers are within 90 m of one another. You need to decide on the cabling that will be used both in the individual buildings, and which will be used to connect the buildings LANs together. Which of the following will you do? A. Use UTP cabling in each of the buildings, and connect the two
  • 10
CCNA 1 AND 2 COMPANION GUIDE  REVISED  CISCO NETWORKING ACADEMY PROGRAM  PART 104 POTX

CCNA 1 AND 2 COMPANION GUIDE REVISED CISCO NETWORKING ACADEMY PROGRAM PART 104 POTX

STP (shielded twisted-pair) STP is a two-pair wiring medium used in a variety of network implementations. STP cabling has a layer of shielded insulation to reduce EMI. STP (Spanning Tree Protocol) Bridge protocol that uses the spanning tree algorithm, enabling a learning bridge dynamically to work around loops in a network topology by creating a spanning tree. Bridge exchange BPDU messages with other bridges to detect loops and then remove the loops by shutting down selected bridge interfaces.
  • 10
WINDOWS 7 RESOURCE KIT- P33

WINDOWS 7 RESOURCE KIT- P33

If, however, the link is your Internet connection or another network that is part of your in- tranet, your performance problems may be caused by overutilized network infrastructure . For example, if several computers are backing up their disk content to a folder on the network, a link can become overutilized, which can cause performance problems . Similarly, if several users are transferring large files across your Internet connection, other applications (especially real-time video or audio streaming, such as Voice over IP [VoIP]), may suffer . Contact network support for assistance . You might also be able to use Quality of Service (QoS) to prioritize time-sensitive traffic over file transfers . For more information about QoS, see Chapter 25 .
  • 50
CCNP ROUTING STUDY GUIDE- P8 PPT

CCNP ROUTING STUDY GUIDE- P8 PPT

Since external routes are injected by autonomous system boundary routers, do not make any area containing an ASBR a stub area. Since routers within a stub area use a default route to get out of the stub area, typically there is only one route out of the stub area. There- fore, a stub area should usually only contain a single area border router. Keep in mind that since a default route is being used, if a stub area contains more than one ABR, a non-optimal path may be used. If you decide to make a particular area a stub area, be sure to configure
  • 30
BÁO CÁO HÓA HỌC:

BÁO CÁO HÓA HỌC: " RESEARCH ARTICLE A UTILITY-BASED DOWNLINK RADIO RESOURCE ALLOCATION FOR MULTISERVICE CELLULAR DS-CDMA NETWORKS" POT

In this paper, we define a novel utility function for each user that is a function of its channel status, its required ser- vice as well as the load condition of the corresponding serv- ing base station. This new definition of the utility function incorporates the information of both the network side (chan- nel) and the user side (rate and delay) in a unified way for ra- dio resource allocation. We focus our attention on the down- link resources (i.e., power and bandwidth), which is consid- ered to be the bottleneck in multiservice systems [ 6 ]. To de- sign such a scheme, we take into account the system varia- tions in the physical layer as well as the tra ffi c load of the base stations.
  • 11
BÁO CÁO HÓA HỌC:

BÁO CÁO HÓA HỌC: " RESEARCH ARTICLE A UTILITY-BASED DOWNLINK RADIO RESOURCE ALLOCATION FOR MULTISERVICE CELLULAR DS-CDMA NETWORKS" DOCX

In this paper, we define a novel utility function for each user that is a function of its channel status, its required ser- vice as well as the load condition of the corresponding serv- ing base station. This new definition of the utility function incorporates the information of both the network side (chan- nel) and the user side (rate and delay) in a unified way for ra- dio resource allocation. We focus our attention on the down- link resources (i.e., power and bandwidth), which is consid- ered to be the bottleneck in multiservice systems [ 6 ]. To de- sign such a scheme, we take into account the system varia- tions in the physical layer as well as the tra ffi c load of the base stations.
  • 11
Chapter 1: LAN Design ppt

Chapter 1: LAN Design ppt

Considerations for Hierarchical Network Switches • User Communities Analysis: – The process of identifying various groupings of users and their impact on network performance. The way users are grouped affects issues related to port density and traffic flow, which, in turn, influences the selection of network switches.
  • 36
CHAPTER 7  CÁC KHÁI NIỆM CƠ BẢN VỀ WIRELESS POTX

CHAPTER 7 CÁC KHÁI NIỆM CƠ BẢN VỀ WIRELESS POTX

Site Survey • Two categories: Manual and utility assisted. • Manual site surveys can include a site evaluation to be y followed by a more thorough utility-assisted site survey. A site evaluation involves inspecting the area with the goal of identifying potential issues that could impact the network identifying potential issues that could impact the network. Specifically, look for the presence of multiple WLANs,
  • 75
IMPROVE AND RENOVATE THE NETWORK SYSTEM LAN WAN OF THIEN LONG STATIONERY GROUP

IMPROVE AND RENOVATE THE NETWORK SYSTEM LAN WAN OF THIEN LONG STATIONERY GROUP

DETAIL AMOUNT USD 1 Local area network LAN 25.000 2 Wide area network WAN 10.000 3 Server purchasing 30.000 4 Email 15.000 5 Other costs 10.000 LOCAL AREA NETWORK LAN WIDE AREA NETWORK W[r]
  • 9
SETTING UP LAMP GETTING LINUX  APACHE  MYSQL  AND PHP WORKING TOGETHER PHẦN 4 PPSX

SETTING UP LAMP GETTING LINUX APACHE MYSQL AND PHP WORKING TOGETHER PHẦN 4 PPSX

142 Chapter 6 • Linux Security A connection will be made to a remote server, and the RPM file headers will be compared, downloaded, and updated if your versions are out-of-date. If you would like to learn more about Yum, visit the linux.duke.edu/projects/yum website. Regardless of which update utility you use, you should always make a conscious effort to log in to your system periodically and run the respective update commands. Some people prefer to run these update utilities on a cron job, but we feel that is a bad idea because if something goes wrong or your system stops working, you might not have any idea of what updates were installed. If you manually update your system, you at least have a chance to monitor the output and take corrective action on the spot.
  • 42
Lecture Security+ Certification: Chapter 8 - Trung tâm Athena

Lecture Security+ Certification: Chapter 8 - Trung tâm Athena

Chapter 8 - Network security topologies. Objectives in this chapter: Explain network perimeter’s importance to an organization’s security policies, identify place and role of the demilitarized zone in the network, explain how network address translation is used to help secure networks, spell out the role of tunneling in network security, describe security features of virtual local area networks.
  • 40
NETWORK FUNDAMENTALS – CHAPTER 5 PDF

NETWORK FUNDAMENTALS – CHAPTER 5 PDF

Cisco Public 2 OBJECTIVES  Identify the role of the Network Layer, as it describes communication from one end device to another end device  Examine the most common Network Layer protoc[r]
  • 27
DOS attacks on TCP/IP layers in WSN

DOS attacks on TCP/IP layers in WSN

In contrast to this crucial objective of sensor network management, a Denial of Service (DoS) attack targets to degrade the efficient use of network resources and disrupts the essential services in the network. DoS attack could be considered as one of the major threats against WSN security. Further, various DoS attacks on different layers of OSI are proposed.
  • 6
MIGRATION FROM CISCO TO HP SWITCHES DOCX

MIGRATION FROM CISCO TO HP SWITCHES DOCX

 GVRP protocol supported VLAN ID range of 1-4094. 2.3.4. Switch replacement procedure Compared with other hardware, switch is not really particularly stable and reliable equipment. So there will be a variety of problems occur, we need to replace the switch. If there is no manual, we can change it down, and thereafter on demand, re-configure and use it. However, if based on reasonable steps that can save administrators a lot of time to achieve the multiplier effect. Now we're going to explore a set of replacement switches reasonable steps to.
  • 58
2001 Fundamentals Part 5 docx

2001 Fundamentals Part 5 docx

LIQUID-IN-GLASS THERMOMETERS Any device that changes monotonically with temperature is a thermometer; however, the term usually signifies an ordinary liquid-in-glass temperature-indicating device. Mercury-filled ther- mometers have a useful range from − 38.8°C, the freezing point of mercury, to about 550°C, near which the glass usually softens. Lower temperatures can be measured with organic-liquid-filled thermometers (e.g., alcohol-filled), with ranges of − 200 to 200°C. During manufacture, thermometers are roughly calibrated for at least two temperatures, often the freezing and boiling points of water; space between the calibration points is divided into desired scale divisions. Thermometers that are intended for precise mea- surement applications have scales etched into the glass that forms their stems. The probable error for as-manufactured, etched-stem thermometers is ±1 scale division. The highest quality mercury thermometers may have uncertainties of ±0.03 to ±2 K if they have been calibrated by comparison against primary reference stan- dards.
  • 25
SMART HOME AUTOMATION WITH LINUX  P29 PDF

SMART HOME AUTOMATION WITH LINUX P29 PDF

266 Figure 7-11. Placing all the AV in Node0 In this environment, all the AV equipment is placed physically within Node0, making for short cable runs and easy-to-install IR transmitters. And there is still only a single AV cable to lay into each room wanting media. This is both a benefit, because the installation is much cheaper, and a hindrance,
  • 10
BÁO CÁO THỰC TẬP CÔNG TY CỔ PHẦN CÔNG NGHỆ DPL - THIẾT KẾ VÀ TRIỂN KHAI VPN CLIENT TO SITE TRÊN WINDOW SERVER 2008

BÁO CÁO THỰC TẬP CÔNG TY CỔ PHẦN CÔNG NGHỆ DPL - THIẾT KẾ VÀ TRIỂN KHAI VPN CLIENT TO SITE TRÊN WINDOW SERVER 2008

TP.Hồ Chí Minh, Ngày tháng năm 2013 TRANG 4 MỤC LỤC DANH MỤC CÁC TỪ VIẾT TẮT SỐ TT CỤM TỪ VIẾT TẮT 01 LOCAL AREA NETWORK LAN 02 METROPOLITAN AREA NETWORK MAN 03 WIDE AREA NETWORK WAN 04 [r]
  • 50
APRESS - SMART HOME AUTOMATION WITH LINUX (2010)- P57 PPSX

APRESS - SMART HOME AUTOMATION WITH LINUX (2010)- P57 PPSX

A simple network configuration _ This allows you to reuse the router as a network switch and employ servers with only one network port, such as the majority of small low-power mini PCs o[r]
  • 5
Network Adapter Failover

Network Adapter Failover

IP=`grep $ME /etc/hosts | grep -v '^#' | awk '{print $1}'` NETMASK=255.255.255.0 BROADCAST="`echo $IP | cut -d\. -f1-3`.255" The networking information will be specific to your implementation. You will need to determine your IP address appropriately. The address could be located in the local hosts file (as shown here) or the NIS or DNS information locations. The IP address could also have been set manually. The subnet mask and broadcast address are also system-specific.
  • 25
Load balancing Anti attack DDoS

Load balancing Anti attack DDoS

network load balancing server load balancing connectcontrol server load balancing local area connection properties network load balancing nghiên cứu network load balancing kỹ thuật network load balancing giai phap can bang tai network load balancing vơi a10 network và f5 network load balancing windows 2008 r2 network load balancing software network load balancing windows 7 network load balancing server load balancing connectcontrol server load balancing local area connection properties network load balancing nghiên cứu network load balancing kỹ thuật network load balancing giai phap can bang tai network load balancing vơi a10 network và f5 network load balancing windows 2008 r2 network load balancing software network load balancing windows 7
  • 11

Xem thêm

Từ khóa: giám đốcnghe nói đọc viếtban giám đốckiểm toán độc lậpđộc tốgiám đốc bán hàngphó giám đốcđộc quyềnthống đốc ngân hàngtrên đất dốcđất dốcgiám đốc chi nhánhgiám đốc điều hànhchất độcđộc hạiBáo cáo quy trình mua hàng CT CP Công Nghệ NPVNghiên cứu tổ chức pha chế, đánh giá chất lượng thuốc tiêm truyền trong điều kiện dã ngoạiMột số giải pháp nâng cao chất lượng streaming thích ứng video trên nền giao thức HTTPBiện pháp quản lý hoạt động dạy hát xoan trong trường trung học cơ sở huyện lâm thao, phú thọGiáo án Sinh học 11 bài 13: Thực hành phát hiện diệp lục và carôtenôitĐỒ ÁN NGHIÊN CỨU CÔNG NGHỆ KẾT NỐI VÔ TUYẾN CỰ LY XA, CÔNG SUẤT THẤP LPWANPhát triển mạng lưới kinh doanh nước sạch tại công ty TNHH một thành viên kinh doanh nước sạch quảng ninhNghiên cứu, xây dựng phần mềm smartscan và ứng dụng trong bảo vệ mạng máy tính chuyên dùngNghiên cứu về mô hình thống kê học sâu và ứng dụng trong nhận dạng chữ viết tay hạn chếNghiên cứu tổng hợp các oxit hỗn hợp kích thƣớc nanomet ce 0 75 zr0 25o2 , ce 0 5 zr0 5o2 và khảo sát hoạt tính quang xúc tác của chúngNghiên cứu khả năng đo năng lượng điện bằng hệ thu thập dữ liệu 16 kênh DEWE 5000Sở hữu ruộng đất và kinh tế nông nghiệp châu ôn (lạng sơn) nửa đầu thế kỷ XIXChuong 2 nhận dạng rui roKiểm sát việc giải quyết tố giác, tin báo về tội phạm và kiến nghị khởi tố theo pháp luật tố tụng hình sự Việt Nam từ thực tiễn tỉnh Bình Định (Luận văn thạc sĩ)chuong 1 tong quan quan tri rui roGiáo án Sinh học 11 bài 14: Thực hành phát hiện hô hấp ở thực vậtGiáo án Sinh học 11 bài 14: Thực hành phát hiện hô hấp ở thực vậtTrách nhiệm của người sử dụng lao động đối với lao động nữ theo pháp luật lao động Việt Nam từ thực tiễn các khu công nghiệp tại thành phố Hồ Chí Minh (Luận văn thạc sĩ)Chiến lược marketing tại ngân hàng Agribank chi nhánh Sài Gòn từ 2013-2015QUẢN LÝ VÀ TÁI CHẾ NHỰA Ở HOA KỲ