Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Ayuda humanitaria 5
- Cooperación internacional 5
- Iglesia Católica 4
- Història 3
- Alquímia 2
- Calendari 2
- Computer networks 2
- Culture 2
- Cyber intelligence (Computer security) 2
- Data processing 2
- Desarrollo económico 2
- Education 2
- Fonts 2
- Física 2
- Historia 2
- History 2
- Interculturalism 2
- MEDICAL 2
- Medicine 2
- Obres anteriors al 1800 2
- Peregrinaciones 2
- Sales management 2
- Security measures 2
- Selling 2
- Sociología urbana 2
- - Historia 1
- 2a Guerra Mundial, 1939-1945 1
- Actos ilícitos 1
- Aeronáutica 1
- Ajuste Diádico 1
-
61
-
62
-
63
-
64
-
65Publicado 1982Tabla de Contenidos: “…Aalto to Duthoit -- 2. Eads to Lewis -- 3. Lhôte to Schlüter -- 4. Schmidt to Zwirner. …”
Libro -
66por Erro Gasca, Carmen
Publicado 2012Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca Universidad de Deusto)Libro -
67Publicado 2022Tabla de Contenidos: “…Chapter 1: Introducing Enterprise Architecture -- Chapter 2: Strategic Enterprise Architecture -- Chapter 3: Developing an Enterprise Architecture -- Chapter 4: Enterprise Architecture & SAP -- Chapter 5: Developing Business Architecture using SAP Enterprise Architecture Designer -- Chapter 6: Developing Information Architecture using SAP EAD -- Chapter 7: Developing Infrastructure architecture using SAP EAD -- Chapter 8: Enterprise Architecture Best Practices -- Chapter 9: Enterprise Architecture & Best Practices…”
Libro electrónico -
68Publicado 2014Tabla de Contenidos: “…Holmes -- Pastoral leadership / Robert Stagg -- A six-month game plan / Jim Lundholm-Eades -- Getting started: the parish business office / Maria Mendoza -- Developing a comprehensive human resources program / David Boettner -- Risk management / John McGovern -- Best practices in parish internal financial controls / Charles E. …”
Libro -
69por Ernst, MarcelTabla de Contenidos: “…Quelle 1: Informationsschreiben zum "Stand des Europäisch-Arabischen Dialogs (EAD)" (1977) 261 2. Quelle 2: Schreiben des Auswärtigen Amts zum Thema "Investitionsbedingungen" im EAD (1978) 267 3. …”
Publicado 2014
Tesis -
70Publicado 2003Tabla de Contenidos: “…. -- T.IV ; Com-Dyn. -- T.V ; Ead-Fre. -- T.VI ; Fri-Hoh. -- T.VII ; Hol-Jub. -- T.VIII ; Jud-Lyo. -- T.IX ; Mab-Mor. -- T.X ; Mos-Pat. -- T.XI ; Pau-Red. -- T.XII ; Ref-Sep. -- T.XIII ; Seq-The. -- T.XIV ; Thi-Zwi. -- T.XV ; Index…”
Red de bibliotecas Iglesia Navarra (Otras Fuentes: Biblioteca Universidad Eclesiástica San Dámaso, Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca Universidad de Deusto, Biblioteca de la Universidad de Navarra)Libro -
71por Lubas, Rebecca L.Tabla de Contenidos: “…Using Encoded Archival Description (EAD); Introduction; Development; Elements; Example EAD record (abbreviated); Exercise; Answer key; 5. …”
Publicado 2013
Libro electrónico -
72por Curso corto 14: La formación a distancia. Una importante opción para la superación de docentes: experiencias y primeros resultadosTabla de Contenidos: “….); Ventajas que se reconocen a la EAD; Algunas desventajas de la EAD; 3. ALCANCE DE LAS TIC PARA ENFRENTAR (...); Algunas tendencias en la Web social; 4. …”
Publicado 2012
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
73Publicado 1981Tabla de Contenidos: “…V. 1: A-AZT -- v. 2: BAA-CAM -- v. 3: CAN-GOL -- v. 4: GOM-DYS -- v. 5: EAD-FOY -- v. 6: FRA-HIR -- v. 7: HIS-JUB -- v. 8: JUD-LYT -- v. 9: MA-MOR -- v. 10: MOS-PAT -- v. 11: PAU-PYR -- v. 12: QAT-SCR -- v. 13: SCU-TEX -- v. 14: THA-ZWI -- v. 15: Index -- v. 16: Supplement 1967-1974 -- v. 17: Supplement Change in the Church…”
Libro -
74por Catholic University of AmericaTabla de Contenidos: “…CAN-COL -- v. 4. COM-DYS -- v. 5. EAD-FOY -- v. 6. FRA-HIR -- v. 7. HIS-JUB -- v. 8. …”
Publicado 1967
Libro -
75por Van Bremen, JanTabla de Contenidos: “…Pieke -- Anthropologists of Asia, anthropologists in Asia : the academic mode of production in the semi-periphery / Jerry S. Eades -- Native discourse in the 'academic world system' : Kunio Yanagita's project of global folkloristics reconsidered / Takami Kuwayama -- Korean anthropology : a search for new paradigms / Okpyo Moon -- 'Indigenizing' anthropology in India : problematics of negotiating an identity / Vineeta Sinha -- An Indian anthropology? …”
Publicado 2004
Libro electrónico -
76Practical cyber intelligence how action-based intelligence can be an effective response to incidentsPublicado 2018Tabla de Contenidos: “…Developing a strategic cyber intelligence capability -- Understanding our priorities -- The business architecture -- The data/application architecture -- Technology architecture -- Application of the architectures and cyber intelligence -- A look at strategic cyber intelligence - level 1 -- Introduction to operational security -- OPSEC step 1 - identify critical information -- OPSEC step 2 - analysis of threats -- OPSEC step 3 - analysis of vulnerabilities -- OPSEC step 4 - assessment of risk -- OPSEC step 5 - application of appropriate countermeasures -- OPSEC applicability in a business environment -- Cyber intel program roles -- Strategic level - IT leadership -- Strategic level - cyber intelligence program officer -- Tactical level - IT leadership -- Tactical level - cyber intelligence program manager -- Operational level - IT leadership -- Operational level - cyber intelligence analysts -- Summary -- Chapter 4: Using Cyber Intelligence to Enable Active Defense -- An introduction to Active Defense -- Understanding the Cyber Kill Chain -- General principles of Active Defense -- Active Defense - principle 1: annoyance -- Active Defense - principle 2: attribution -- Enticement and entrapment in Active Defense -- Scenario A -- Scenario B -- Types of Active Defense -- Types of Active Defense - manual -- Types of Active Defense - automatic -- An application of tactical level Active Defense -- Summary -- Chapter 5: F3EAD for You and for Me -- Understanding targeting -- The F3EAD process -- F3EAD in practice -- F3EAD and the Cyber Kill Chain -- Cyber Kill Chain and OODA loop -- Cyber Kill Chain and OPSEC -- Cyber Kill Chain and the intelligence cycle -- Cyber Kill Chain and F3EAD -- Application of F3EAD in the commercial space -- Limitations of F3EAD -- Summary -- Chapter 6: Integrating Threat Intelligence and Operations…”
Libro electrónico -
77Publicado 2019Tabla de Contenidos: “…Front Matter Elementos Pré-textuais Páginas Iniciales -- Apresentação -- Capítulo 1 - Revisitando o conceito de autonomia: (im)possíveis diálogos no ensino-aprendizagem de línguas estrangeiras -- Capítulo 2 - Prática de oralidade em língua inglesa como língua estrangeira num curso de Letras a distância -- Capítulo 3 - Constituição identitária e pós-modernidade: ressonâncias de um debate com professores em formação -- Capítulo 4 - Letramento crítico no ensino de inglês: em busca de uma ética contemporânea -- Capítulo 5 - Contribuições da gramática do design visual para o ensino de gêneros multimodais -- Capítulo 6 - Mediação pedagógica: o papel dos professores tutores no fornecimento de feedback em um curso de Letras-Inglês EaD -- Capítulo 7 - Orientalism everywhere: postcolonial thought in representations of real and imagined voyages -- Capítulo 8 - Gênero, raça e poder na literatura -- Sobre os autores…”
Libro electrónico -
78Publicado 2006Tabla de Contenidos: “…Johnston -- The valley of despair -- Prosaic grace : Doris Betts's souls raised from the dead / Martha Greene Eads -- Narrative bones : Amy Tan's Bonesetter's daughter and Hugh Cook's homecoming man / Elaine Lux -- Hope from a radio : Jurek Becker's Jakob the liar / Eric Sterling -- Friendship and hope : Elie Wiesel's the town beyond the wall / Carole J. …”
Sumario
Libro -
79Publicado 2023Tabla de Contenidos: “…Incident-Response Cycle -- Preparation -- Identification -- Containment -- Eradication -- Recovery -- Lessons Learned -- The Kill Chain -- Targeting -- Reconnaissance -- Weaponization -- Delivery -- Exploitation -- Installation -- Command and Control -- Actions on Objective -- Example Kill Chain -- The Diamond Model -- Basic Model -- Extending the Model -- ATT&CK and D3FEND -- ATT&CK -- D3FEND -- Active Defense -- Deny -- Disrupt -- Degrade -- Deceive -- Destroy -- F3EAD -- Find -- Fix -- Finish -- Exploit -- Analyze -- Disseminate -- Using F3EAD -- Picking the Right Model…”
Libro electrónico -
80Publicado 2012Tabla de Contenidos: “…: anglicization, transnationalism and religion in the global city / John Eade -- Small town transnationalism : socio-spatial dynamics of immigration to the heartland / Faranak Miraftab -- Challenging heteronomous power in a globalized world : insurgent spatial practices, "militant particularism", and multiscalarity / Marcelo Lopes de Souza -- Move from and not on the occult zone (where the people dwell) : -- An argument for the political priority of solidarity with popular (and largely situated) mobilization by the poor over transnational organization by civil society / Richard Pithouse -- Contributors -- Index…”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico