Mostrando 6,261 - 6,280 Resultados de 6,992 Para Buscar '"Æ"', tiempo de consulta: 0.07s Limitar resultados
  1. 6261
  2. 6262
  3. 6263
  4. 6264
  5. 6265
  6. 6266
  7. 6267
  8. 6268
  9. 6269
  10. 6270
    Publicado 2018
    “…Por otro lado, el Estado de Derecho y la separación de poderes exigen que el juez resuelva con sujeción a las normas que le proporcionan los órganos legislativos, pero Aes posible conocer el Derecho? Pues bien, para una adecuada comprensión del deber constitucional de sujeción del juez a la ley, parece conveniente distinguir entre el conocimiento de las disposiciones normativas (los textos promulgados por las autoridades normativas) y el de las normas jurídicas (los significados atribuidos a esos textos), único modo de identificar los supuestos de creatividad judicial y de abordar desde una nueva perspectiva la certeza jurídica y las consecuencias de la ignorancia del Derecho…”
    Enlace del recurso
    Libro electrónico
  11. 6271
    por Nielson, Seth James
    Publicado 2023
    “…What You Will Learn Authentication technologies, including secure password storage and how hackers “crack” password lists Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC Core cryptography technology, including AES encryption and public key signatures Classical host security technologies that protect against malware (viruses, trojans, ransomware) Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them Email and social media security threats such as spam, phishing, social media, and other email threats…”
    Libro electrónico
  12. 6272
    por Pfleeger, Charles P., 1948-
    Publicado 2003
    “…Updated to cover wireless security, intrusion detection, AES, DRM, biometrics, honeypots, online privacy, and more Security in Internet-based, distributed, desktop and traditional centralized applications New attacks, including scripted vulnerability probing, denial of service, and buffer overflows—with symptoms and cures Clear, accessible introduction to cryptography—without sophisticated math Up-to-the-minute explanations of digital signatures, certificates, and leading-edge quantum cryptography Thoroughly revamped coverage of software engineering practices designed to enhance program security Expanded coverage of risk management, contingency planning, and security policies Detailed presentation of protection in general-purpose and trusted operating systems Extensive pedagogical resources: end-of-chapter reviews and exercises, lists of key terms, and authoritative references Exceptionally clear and easy to understand, the book covers not only technical issues, but also law, privacy, ethics, and the physical and administrative aspects of security. …”
    Libro electrónico
  13. 6273
    por Bailey, Andy, 1965-
    Publicado 2001
    “…Looking at commercial and ratified standards both current and developing, this book covers digital architectural solutions such as IEEE 1394 (Firewire), USB, Fibre Channel and ATM alongside their counterparts within the audio industry: *S/P DIF, ADAT, AES/EBU and MADI are discussed from the audio industry standpoint and solutions contrasted *Explanations of packet switching and internetworking are also included. …”
    Libro electrónico
  14. 6274
    por Iglesia catðlica.
    Publicado 1956
    Libro
  15. 6275
  16. 6276
  17. 6277
  18. 6278
  19. 6279
    Libro
  20. 6280