Mostrando 281 - 300 Resultados de 546 Para Buscar '"Isis"', tiempo de consulta: 0.06s Limitar resultados
  1. 281
    Libro
  2. 282
    Libro
  3. 283
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Dedication Page -- Contents -- Section I Cyber Operations Introduction -- I.1 Phases of Cyber Operations -- I.1.1 1980s-2002 -- I.1.2 2003-2012 -- I.1.3 2013-present -- Chapter 1 Cyber Operations -- 1.1 Cyber Operations Introduction -- 1.1.1 Cyber - A 21st-Century Collection Channel -- 1.1.2 Hackers - Pre-Cyber Operations -- 1.1.3 Cyber and Counter-Terror/Insurgency -- 1.2 Early Internet and Cyber Operations -- 1.2.1 Maturing of Cyber Operations - ISIS and Russia -- 1.2.2 ISIS Cyber Operations -- 1.2.3 Russian Cyber Operations -- 1.3 Cyber Operations' Stage Descriptions -- 1.3.1 Stage I (late 1990s-~2010)(Community Development) -- 1.3.2 Stage II (~2010-~2015)(Tactical) -- 1.3.3 Stage III (~2015 to present)(Tactical and Strategic) -- 1.4 Cyber Operations Wrap-up -- Bibliography -- Chapter 2 ISIS and Web-Based Insurgency -- 2.1 Introduction -- 2.1.1 Terrorist Development of the Internet for Messaging -- 2.1.2 ISIS Adaptation of the Internet for Coordination, Command and Control (C2) -- 2.1.3 ISIS "Emergence" from Cyberspace to form a State -- 2.2 Cyber-Based Irregular Operations -- 2.2.1 Three-Phase Insurgency Model with Cyber - ISIS Example -- 2.2.2 ISIS Insurgency Phases -- 2.2.3 Counter-ISIS Operations in Cyber -- 2.3 ISIS and Web-Based Insurgency Wrap-up -- Bibliography -- Chapter 3 Cyber and Crime -- 3.1 Cyber and Crime -- 3.1.1 Cybercrime Definitions -- 3.1.2 Crimes Against Individuals -- 3.1.2.1 Cyber-Fraud Reporting -- 3.1.2.2 Spam -- 3.1.2.3 Phishing -- 3.1.3 Crimes Against Organizations -- 3.1.3.1 Telephony Phishing -- 3.1.3.2 Ransomware Introduction -- 3.1.3.3 Ransomware Tools Background -- 3.1.3.4 Ransomware as a Service -- 3.1.3.5 Cryptocurrency -- 3.1.4 Cyber Gangs - Membership Analogy to Organized Crime -- 3.1.5 Cybercrime Wrap-Up -- Bibliography -- Chapter 4 Nation-State Cyber Operations…”
    Libro electrónico
  4. 284
  5. 285
    Libro
  6. 286
    Libro
  7. 287
    Libro
  8. 288
    por Ramírez López, Luís Emilio
    Publicado 2017
    Tabla de Contenidos: “…MANUAL DE OPERACIONES DEL SISTEMA CDS/ISIS -- CONCLUSIONES -- RECOMENDACIONES -- FUENTES BIBLIOGRÁFICAS -- FUENTES ELECTRÓNICAS -- ANEXOS -- CUESTIONARIO -- RELACIÓN DEL INVENTARIO DE LOS EXPEDIENTES SENTENCIADOS (...)…”
    Libro electrónico
  9. 289
    Publicado 2018
    Tabla de Contenidos: “…chapter 1 Standardising Minority Languages -- Reinventing Peripheral Languages in the 21st Century / chapter 2 Basque Standardization and the New Speaker -- Political Praxis and the Shifting Dynamics of Authority and Value / chapter 3 On the Pros and Cons of Standardizing Scots -- Notes From the North of a Small Island / chapter 4 Legitimating Limburgish -- The Reproduction of Heritage / chapter 5 Negotiating the Standard in Contemporary Galicia / chapter 6 Language Standardisation as Frozen Mediated Actions -- The Materiality of Language Standardisation / chapter 7 Language Standardization in the Aftermath of the Soviet Language Empire / chapter 8 Standardization of Inuit Languages in Canada / chapter 9 “That’s Too Much to Learn” -- Writing, Longevity, and Urgency in the Isthmus Zapotec Speech Community / chapter 10 Orthography, Standardization, and Register -- The Case of Manding / chapter 11 Beyond Colonial Linguistics -- The Dialectic of Control and Resistance in the Standardization of isiXhosa / chapter 12 Visions and Revisions of Minority Languages -- Standardization and Its Dilemmas…”
    Libro electrónico
  10. 290
    Tabla de Contenidos: “…An example of how the IPC classification can be built upon: the OST-INPI/FhG-ISI technology nomenclature -- Annex IV A. Concordance between IPC and SITC for 46 high technology product groups developed by ENEA, CESPRI and Politecnico di Milano -- Annex IV B. …”
    Libro electrónico
  11. 291
    Publicado 1999
    Revista digital
  12. 292
  13. 293
  14. 294
    Libro
  15. 295
    Libro
  16. 296
    por Merino Martín, Serafín
    Publicado 1988
    Libro
  17. 297
    Publicado 2016
    Tabla de Contenidos: “…Academic writing supported by digital technologies and the INcwadi-Mkhaphi (book-guide) in isiZulu folk-poetry education --Appendix 1.…”
    Libro electrónico
  18. 298
    por Voss, Waltraud
    Publicado 2021
    Tabla de Contenidos: “…Cover -- Inhalt -- Vorwort -- Einführung -- Einleitende Übersicht -- Die Wahl des ersten Rektors -- Höhere Lehrerbildung in Dresden -- Die Isis in Dresden und die Mathematiker darin -- Die Ära Krause - Helm (1888 - 1920) -- Zusammenfassende Bemerkungen -- Krause, Helm, Fuhrmann, Rohn vor ihrem gemeinsamen Wirken -- Zu den Berufungsvorgängen Rohn - Helm - Krause -- Zur Arbeit in der Ära Martin Krause - Georg Helm -- Die Ära Kowalewski - Lagally -- Einführende Zusammenfassung -- Die »neuen« Mathematiker vor dem Eintritt in die TH Dresden: Kowalewski, Lagally, Böhmer -- Zum Wirken der vier Dresdner Mathematikprofessoren -- Zu genannten Mathematikern der TH Dresden nach dem Krieg -- Einführende Zusammenfassung -- Politische Säuberung und Wiedereröffnung der TH Dresden -- Schilling, Ludwig, Böhmer, Willers nach dem 2. …”
    Libro electrónico
  19. 299
    Publicado 2022
    Tabla de Contenidos: “…Davies (1945-2018) / Challenging the canon of the ten attic orators: from kanôn to Canon / L'Arétalogie d'Isis : biographie d'un texte canonique / Coming home: Varro's Antiquitates rerum divinarum and the canonisation of Roman religion / What becomes of the uncanonical? …”
    Libro electrónico
  20. 300