Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Meditaciones 170
- Society & social sciences 161
- Biografa 132
- TomÆs de Aquino 132
- Comentarios 124
- Historia 105
- Educación pedagogía 93
- Església Catòlica 91
- Jesucristo- 90
- Obres anteriors al 1800 75
- Biblia 71
- Tratados y manuales 71
- Història 70
- Espiritualidad 58
- Ascetismo 57
- Teología dogmática 54
- Formaciðn 52
- Teologa dogmÆtica- 52
- Crtica e interpretaciðn 50
- Bíblia 43
- Historia / General 43
- Humanities 43
- Litúrgia 41
- Sermones 41
- Teologia 41
- Teologa dogmÆtica 40
- Vida Cristiana 39
- Mara 38
- Teologia moral 35
- Catequesis- 34
-
4181
-
4182
-
4183
-
4184
-
4185
-
4186
-
4187Publicado 2005“…Se estimaron proporciones de muestras positivas de Ae. albopictus, por municipio, por año, utilizando Excel. …”
Enlace del recurso
Artículo digital -
4188Publicado 1769Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago (Otras Fuentes: Biblioteca Diocesana Bilbao)Enlace del recurso
<img src="http://bks9.books.google.es/books?id=vZE7b5P_NZYC&printsec=frontcover&img=1&zoom=5&edge=curl&imgtk=AFLRE71jOGEpeaMQa6_nxb7YXUXWTywaJjDJObO-4iafv4L5alVYl06fHujXX5HFIJjCK6sD4vHZDLPPz-Gbom6REF2 vB_r2aVaRd-gQPamNtnYSuo4tRtU"style="border:1px solid#000;width:64px">
Libro -
4189
-
4190
-
4191
-
4192por Wanton, Enrico, 1708-1784
Publicado 1778Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca Diocesana Bilbao)Libro -
4193por Sicari, Antonio, 1943-Tabla de Contenidos: “…Contiene: Francisco de Ass, TomÆs Moro, Camilo de Lellis, Juan Mara Vianney, cura de Ars, JosØ B. …”
Publicado 1998
Red de Bibliotecas de la Diócesis de Córdoba (Otras Fuentes: Biblioteca Universidad Eclesiástica San Dámaso, Red de bibliotecas Iglesia Navarra, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Universidad Loyola - Universidad Loyola Granada, Biblioteca Diocesana Bilbao)Libro -
4194Publicado 2020Tabla de Contenidos: “…Henry -- Unruly subjects under colonial and postcolonial modernity -- Ritual specialists in colonial drag: shamanic interventions in 1920s Korea / Merose Hwang -- Telling queer time in a straight empire: Yi Sang's 'Wings' (1936) / John Whittier Treat -- Problematizing love: the intimate event and same-sex love in colonial Korea / Pei Jean Chen -- Femininity under the wartime system and the symptomacity of female same-sex love / Shin-ae Ha (Translated by Kyunghee Eo) -- A female-dressed man sings a national epic: the film Male Kisaeng and the politics of gender and sexuality in 1960s South Korea / Chung-kang Kim -- Queer lives as cautionary tales: female homoeroticism and the heteropatriarchal imagination of authoritarian South Korea / Todd A. …”
Libro electrónico -
4195Publicado 2018Tabla de Contenidos: “…-- Windows password hashes -- Getting hashes with Cain -- MD4 and Unicode -- Cracking hashes with Google -- Cracking hashes with wordlists -- Linux password hashes -- Challenge 1 - cracking Windows hashes -- Challenge 2 - cracking many-round hashes -- Challenge 3 - cracking Linux hashes -- Summary -- Chapter 3: Strong Encryption -- Strong encryption with AES -- ECB and CBC modes -- ECB -- CBC -- Padding oracle attack -- Strong encryption with RSA -- Public key encryption -- RSA algorithm -- Implementation in Python -- Challenge - cracking RSA with similar factors -- Large integers in Python -- What's next? …”
Libro electrónico -
4196por Burns, Robert, 1759-1796Tabla de Contenidos: “…O lay thy loof ; Altho' my back ; Gude ale (3:21) -- Robin shure in hairst (2:19) -- My Harry ; A' the lads ' The white cockade (3:45) -- O my luve's like a red, red rose (2:30) -- Louis what reck I by thee ; In Mauchline (2:49) -- Hey, how my Johnie lad (1:57) -- O, when she come ben, she bobbed ; O Mally's meek (2:35) -- The Ploughman (2:17) -- Thou gloomy December (4:25) -- The Shepherd's wife (2:47) -- O, whar gat ye that hauver-meal bannock (2:49) -- Sir John Cope (2:39) -- Dost ast me, why I send thee here ; O can ye labour lea (3:15) -- Tibbie Fowler o' the glen (2:45) -- The Small birds rejoice (3:08) -- I hae been at Crookie-Den (1:46) -- O May, thy morn (2:58) -- As I went out ae May morning (1:49) -- I maun hae a wife ; Young and souple was I (2:48) -- Awa' wi' your witchcraft (1:58) -- One night as I did wander ; Out over the Forth (2:10) -- O, luve will venture in (1:55)…”
Publicado 1998
CDROM -
4197Publicado 2017Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
Libro electrónico -
4198Publicado 2021Tabla de Contenidos: “…Implementing Hash Functions -- Implementing SHA-1/256/368/512, MD2, and MD5 -- Conclusion -- References -- Chapter 9: Block Ciphers: DES and AES -- Preliminaries -- Networks Based on Substitution and Permutation -- Attacks Based on Linear Cryptanalysis -- Attacks Based on Differential Cryptanalysis -- The Data Encryption Standard (DES) -- DES Description -- Implementation of DES -- The Advanced Encryption System (AES) -- SubBytes Operations -- The ShiftRows Operation -- The MixColumn Operation -- The AddRoundKey Operation -- Key Expansion -- InvSubBytes Operation -- InvShiftRows Operation -- InvMixColumns Operation -- Conclusion -- References -- Chapter 10: Asymmetric Encryption Schemes -- RSA -- ElGamal -- Merkle-Hellman -- Knapsack Approach -- The Algorithms -- Conclusion -- References -- Chapter 11: Formal Techniques for Cryptography -- Probability Theory -- Random Variables -- Birthday Problem -- Entropy -- Randomness in Cryptography -- Conclusion -- References -- Chapter 12: Visual Cryptography -- Conclusion -- References -- Chapter 13: Chaos-Based Cryptography -- Chaos Maps and Functions -- Logistic Map -- Chaos Theory in Cryptography -- Sensitivity to Initial Conditions -- Conclusion -- References -- Chapter 14: Steganography -- Algorithms and Methods for Different Steganography Types -- Steganography for Image Files -- Steganography for Audio Files -- Steganography for Video Files -- Practical Implementation -- Implementing the Least Significant Bit (LSB) Method -- Implementing the Histogram Analysis Method -- Conclusion -- References -- Index…”
Libro electrónico -
4199
-
4200Publicado 1977Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca S.M. e Instituto Teológico «San Xosé» de Vigo, Biblioteca de la Universidad Pontificia de Salamanca, Bibliotecas de la Diócesis de Teruel y Albarracín, Biblioteca Diocesana Bilbao, Biblioteca Universidad de Deusto)Libro