Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 46
- Computer networks 39
- Computer security 36
- Historia 34
- Development 33
- Application software 30
- History 30
- Oracle (Computer file) 29
- Història 28
- Carles 26
- Engineering & Applied Sciences 25
- Cloud computing 24
- Mental illness 22
- Database management 20
- Management 20
- Delusions 18
- Diagnosis 18
- Examinations 18
- Paranoia 18
- Relational databases 16
- Certification 15
- United States 15
- Amazon Web Services (Firm) 14
- Armed Forces 14
- AngularJS (Software framework) 13
- Comercio 13
- Consulado de Bilbao 13
- Guerra de Successió, 1702-1714 13
- Programming 13
- Sermons castellans 13
-
661Publicado 2013Tabla de Contenidos: “…Selective FunctionalityHomegrown Technology; In-house Security Intelligence Unit: FortiGuard Labs; Single Licensing Cost; Included Virtualization; Other Vendors; Evolution and Future of UTM; 2 FortiGate Hardware Overview; FortiGate Hardware Overview; The Fortinet Way; Evolution of FortiGate; Current FortiGate Solutions; Virtualized Appliances; FortiGate Custom Hardware Accelerations Overview; Features of the Last Four Generations of Content Processor (CP) ASIC Functionalities; Features of the Network Processor (NP) ASIC Functionalities; FortiGate Hardware Accelerations Behaviors…”
Libro electrónico -
662por Freidenreich, David M., 1977-Tabla de Contenidos: “…"No distinction between Jew and Greek" : the roles of food in defining the Christ-believing community -- 7. "Be on your guard against food offered to idols" : "eidōlothuton" and early Christian identity -- 8. …”
Publicado 2011
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
663
-
664Publicado 2017“…You’ll also learn how to guard against shady scripts written by users who either make mistakes or purposefully attempt to break your system. …”
Libro electrónico -
665por OECDTabla de Contenidos: “…Intro -- Foreword -- Acknowledgements -- Executive Summary -- 1 Introduction -- The threat of illicit trade -- Illicit trade in the MENA region -- References -- 2 Yemen -- Background to current conflict -- Illicit trade dynamics during the current conflict -- Background -- Weapons -- Illicit trade in fuel and oil -- Human Trafficking -- Narcotics -- Unregulated Financial Networks, illicit trade and illicit capital flows -- Heritage and antiquities -- Wildlife in Socotra -- Counterfeits -- Existing governance structure -- Resolution 2216/UNVIM -- IRG policy to combat Iranian fuel imports -- IRG and Saudi Led Coalition prohibited items lists: -- Yemeni waters -- Saudi Arabia -- Saudi-led Coalition / UAE -- Combined Maritime Forces (CMF) and Joint Task Force CTF-151 -- Ministry of Transport and Yemen Coast Guard -- Management of Yemeni seaports and hydrocarbon export terminals -- References -- 3 Libya -- Background to current conflict -- Illicit trade in Libya -- Weapons -- Narcotics -- Human trafficking -- Illicit Trade in cultural artefacts -- Quantitative picture - illicit trade in counterfeits in Libya -- 4 Syria -- Background to current conflict -- Illicit trade in Syria -- Weapons -- Narcotics -- Illicit trade in water rights -- Human trafficking -- Illicit trade in cultural artefacts -- Abuse of on-line environment -- Quantitative picture - illicit trade in counterfeits in Syria -- 5 Iraq -- Background to current conflict -- Illicit trade in Iraq -- Weapons -- Narcotics -- Illicit trade in human organs -- Heritage and antiquities -- Quantitative picture - illicit trade in counterfeits in Iraq -- 6 Concluding remarks -- Annex A.…”
Publicado 2022
Libro electrónico -
666Publicado 2006“…This book teaches you how to: Configure basic parameters for Catalyst switches, including SSH, system host name, and IP address management in both Cisco IOS and Cisco CatOS Employ private VLANs, VTP, and 802.1Q trunking in Cisco multilayer switched networks Deploy 802.1D, 802.1D-2004, 802.1s, and 802.1w STP and utilize advanced spanning-tree features such as UplinkFast and root guard Enable Layer 2 features such as including aggressive-mode UDLD, CDP, and Jumbo Ethernet Frames Deploy Inter-VLAN routing Implement QoS on Catalyst switches at Layers 2 and 3 Enable Layer 2 and Layer 3 multicasting features such as IGMP snooping Employ VRRP, HSRP, and Supervisor Engine redundancy for high availability Describe the requirements for IP telephony in multilayer switched networks Implement control plane and data plane security features such as 802.1X and DHCP snooping Deploy Ethernet over long distances with Metro Ethernet solutions such as DWDM and CDWM CCNP Self-Study: Building Cisco Multilayer Switched Networks (BCMSN) , Third Edition, is a Cisco® authorized, self-paced learning tool for CCNP® switching foundation learning. …”
Libro electrónico -
667Publicado 2014“…But it's not about tearing down the old guard. It's about building, it's about creating, it's about breathing life into groundbreaking new ideas. …”
Libro electrónico -
668Publicado 2020“…Thousands of left-wing militants took up arms and fought the Spanish army in the streets of Oviedo while in the rear-guard committees proclaimed a revolutionary dawn. …”
Libro electrónico -
669por Azis, Iwan J.“…This open access book thoroughly investigates the domain of policy design tailored specifically for micro, small, and medium enterprises (MSMEs) with a central emphasis on harmonizing these policies with the preexisting social capital inherent to these enterprises, consistent with the mandate of Bank Indonesia to guard price stability and to promote financial stability, inclusive, and sustainable growth. …”
Publicado 2024
Libro electrónico -
670Publicado 2014“…Paul Crump, who robbed the Chicago stockyards on March 20, 1953, with four other black men, shot one guard to death. He was sentenced to die in the electric chair. …”
Recurso relacionado
DVD -
671Publicado 2013“…Second, our understanding of human behavior is rooted in this outdated model. Driven by the old guard, sustainability has become little more than a fashionable idea. …”
Libro electrónico -
672Publicado 2001Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca de la Universidad de Navarra, Biblioteca de la Universidad Pontificia de Salamanca)Libro
-
673por Marcus, Paul, 1953-Tabla de Contenidos: “…Chapter Four: On reading a sacred book:On reading a sacred book: the wisdom of Ecclesiastes and its significance for psychoanalysis the wisdom of Ecclesiastes and its significance for psychoanalysisChapter Five: "Guard your tongue": on the psychological meaning of gossip; Chapter Six: The life and soul of good parenting:The life and soul of good parenting: on wanting, having, and raising childrenon wanting, having, and raising children; Chapter Seven: On feeling altogether miserable:On feeling altogether miserable: getting help through psychotherapygetting help through psychotherapy…”
Publicado 2010
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
674Publicado 2015Tabla de Contenidos: “…Interface with other IPR Systems; 6.7. Guarding against Abuse; 6.8. Domestic IP Infrastructure (IP Office, Courts, Professionals); 6.9. …”
Libro electrónico -
675por Finnegan, Ruth H.Tabla de Contenidos: “…-- Controlling Quotation: The Regulation of Others' Words and Voices -- Who plants and guards the flowers? Imitation, authorship, and plagiarism -- Constraining and allowing quotation: flower or weed? …”
Publicado 2011
Libro electrónico -
676Publicado 2002Tabla de Contenidos: “…part Part I PSYCHOMETRIC APPROACH -- chapter 1 Tracing Psychology’s Invisible giant and Its Visible Guards / chapter 2 g: A Diminutive General / chapter 3 Psychometric g: Definition and Substantiation / chapter 4 Practical Implications of General Intelligence and PASS Cognitive Processes / part Part II GENETIC-EPISTEMOLOGICAL APPROACH -- chapter 5 General Intelligence: Measurement, Correlates, and Interpretations of the Cultural-Genetic Construct / chapter 6 Is There a General Factor of Cognitive Development? …”
Libro electrónico -
677por McFedries, PaulTabla de Contenidos: “…Make Your Internet Connection More SecureChapter 3: Browsing the World Wide Web; Introducing the World Wide Web; Understanding Web Browsing Basics; Learn About Internet Explorer; Discover Firefox; Browse with Safari; Browse Multiple Web Sites Using Tabs; Fill In a Web Form; Save Your Favorite Sites; Download Files to Your Computer; Save Web Data to Your Computer; Understanding Web Error Messages; Chapter 4: Surfing the Web Safely and Securely; Protect Yourself on the Web; Protect Your Children on the Web; Set the Web Security Level; Protect Yourself from Identity Theft; Guard Against Spyware…”
Publicado 2009
Libro electrónico -
678Publicado 2020“…The article presents the analysis of the specific socio-psychological characteristics of the people who confidentially assist the operational units of the State Border Guard Service of Ukraine, with the aim of knowing the typical socio-psychological profile of the confidential informant. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Artículo digital -
679
-
680por Arquilla, John“…In the case of a U.S. information strategy, this requires balancing the need to guard and secure access to many informational capabilities and resources, with the opportunity to achieve national aims by fostering as much openness as practicable. …”
Publicado 1999
Libro electrónico