Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 46
- Computer networks 39
- Computer security 36
- Historia 34
- Development 33
- Application software 30
- History 30
- Oracle (Computer file) 29
- Història 28
- Carles 26
- Engineering & Applied Sciences 25
- Cloud computing 24
- Mental illness 22
- Database management 20
- Management 20
- Delusions 18
- Diagnosis 18
- Examinations 18
- Paranoia 18
- Relational databases 16
- Certification 15
- United States 15
- Amazon Web Services (Firm) 14
- Armed Forces 14
- AngularJS (Software framework) 13
- Comercio 13
- Consulado de Bilbao 13
- Guerra de Successió, 1702-1714 13
- Programming 13
- Sermons castellans 13
-
601Publicado 2024“…As you work through the challenges, you'll learn to think pragmatically, optimize your code for efficiency, and avoid hidden pitfalls that can catch you off guard. What's more - the puzzle format will help you remember what you've learned! …”
Libro electrónico -
602Publicado 2012“…Assess your global social media presence and identify vulnerabilities Establish solid security policies at every level of your organization Allocate resources for planning, administration, and corrective action Monitor usage by employees, clients, competitors, and the public Block cyberstalking. phishing, malware, and identity theft exploits Guard intellectual property rights, trademarks, copyrights, and logos Preserve your brand image using online reputation management tools Gary Bahadur is the founder and CEO of KRAA Security [www.kraasecurity.com/social-media-security], which protects organizations from threats through a combination of prevention services. …”
Libro electrónico -
603Publicado 2020“…You’ll direct a Coast Guard search-and-rescue effort, plot and execute a NASA flight to the moon, protect access to a secure lab using facial recognition, and more. …”
Libro electrónico -
604Publicado 2012“…In Programming Your Home , technology enthusiast Mike Riley walks you through a variety of custom home automation projects, ranging from a phone application that alerts you to package deliveries at your front door to an electronic guard dog that will prevent unwanted visitors. Open locked doors using your smartphone. …”
Libro electrónico -
605Publicado 2013“…But it's not about tearing down the old guard. It's about building, it's about creating, it's about breathing life into groundbreaking new ideas. …”
Grabación no musical -
606por Chávez Landeros, Daniel“…"A noncommissioned officer of the Nicaraguan National Guard travels to New York to meet the famous bodybuilder, Charles Atlas. …”
Publicado 2023
Libro electrónico -
607Publicado 2023“…We will explore programming basics, that is, variables, constants, arrays, loops, structs, conditionals, basic data types, guard, tuples, and enumerations. We will then advance to HStack, VStack, ZStack, gradients, colors, text, alignment, frames, rotations, grids, images, and AsyncImage. …”
Video -
608Publicado 2019“…So you should use much fewer of your scarce engineering cycles poring over staging and much more of them building guard rails for prod. Production--where your customers live--is the only environment that matters. …”
Vídeo online -
609por Cullmann, Oscar, 1902-1999
Publicado 1963Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca de la Universidad de Navarra, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Seminario Metropolitano de Oviedo, Universidad Loyola - Universidad Loyola Granada, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago)Libro -
610Publicado 2010Tabla de Contenidos: “…Kurt Piehler -- Semper paratus : the U.S. Coast Guard's Flotilla 10 at Omaha Beach / Mark A. Snell -- American pacifism, the "greatest generation," and World War II / Scott H. …”
Libro -
611por Herr, Richard
Publicado 1979Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Red de bibliotecas Iglesia Navarra, Red de Bibliotecas de la Diócesis de Córdoba, Biblioteca de la Universidad de Navarra, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago)Libro -
612Publicado 2020“…Important thinkers such as Losev and Bakhtin had to guard their words in0an environment of religious persecution, whilst some views were shaped by prison experiences. …”
Libro -
613
-
614
-
615Publicado 1997Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca Universidad Eclesiástica San Dámaso, Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universidad de Deusto)Libro
-
616Publicado 2024“…MOIS missions overlap with other parts of Iran's expansive security apparatus, especially the Islamic Revolutionary Guard Corps (IRGC), which often overshadows the Ministry of Intelligence. …”
Libro -
617por Sádaba, Javier, 1940-
Publicado 1978Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca Universidad de Deusto, Biblioteca de Pastoral Madrid, Red de Bibliotecas de la Archidiócesis de Granada, Universidad Loyola - Universidad Loyola Granada, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao, Biblioteca del Seminario Diocesano de Jaén, Biblioteca de la Universidad de Navarra)Libro -
618Publicado 1967Tabla de Contenidos: “…; La Mare de Déu, El cucut i l'ase; La Guineueta; El Porc d'en Martí; Déu vos guard; Riure, riure; Esporuguit, enrera...; El matí el gall ens desperta; La gata i el belitre; El nas d'en Magí; Les comares de Rubí; Cantem un cànon; Al llit!…”
Partitura -
619por Oaks, ScottTabla de Contenidos: “…-- The Java Sandbox -- Security Debugging -- The Default Sandbox -- Elements of the Java Sandbox -- Keystores -- Code Sources -- Policy Files -- The Default Sandbox -- The java.security File -- Comparison with Previous Releases -- Java Language Security -- Java Language Security Constructs -- Enforcement of the Java Language Rules -- Comparisons with Previous Releases -- The Security Manager -- Overview of the Security Manager -- Operating on the Security Manager -- Methods of the Security Manager -- Comparison with Previous Releases -- The Access Controller -- The CodeSource Class -- The Policy Class -- Protection Domains -- The AccessController Class -- Guarded Objects -- Comparison with Previous Releases -- Java Class Loaders -- The Class Loader and Namespaces -- Class Loading Architecture -- Implementing a Class Loader -- Miscellaneous Class Loading Topics -- Comparison with Previous Releases -- Introduction to Cryptography -- The Need for Authentication -- The Role of Authentication -- Cryptographic Engines -- Security Providers -- The Architecture of Security Providers -- The Provider Class -- The Security Class -- The Architecture of Engine Classes -- Comparison with Previous Releases -- Keys and Certificates -- Keys -- Generating Keys -- Key Factories -- Certificates -- Keys, Certificates, and Object Serialization -- Comparison with Previous Releases -- Key Management -- Key Management Terms -- The keytool -- The Key Management API -- A Key Management Example…”
Publicado 1998
Libro electrónico -
620por Hofmeister, UlrichTabla de Contenidos: “…Bound by Difference: The Merger of Rostov and Nakhichevan-on-Don into an Imperial Metropolis during the Nineteenth Century Michel AbesserPart 3: The City as a Palimpsest of Empires7. Guarding the Imperial Border: The Fortress City of Niš between the Habsburgs and the Ottomans, 1690-1740Florian Riedler8. …”
Publicado 2023
Libro electrónico