Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Isis 33
- Isidoro 17
- Religión 17
- Església Catòlica 16
- Història 13
- -Religión 10
- Bíblia 8
- Ciencias políticas 8
- Ciencias sociales 8
- Civilización y cultura medieval 8
- Historia 7
- History 7
- IS (Organization) 7
- Islam 7
- Terrorism 7
- -Religión egipcia 6
- Dret canònic 6
- Engineering & Applied Sciences 6
- Information technology 6
- Islamismo 6
- Management 6
- Obres anteriors al 1800 6
- Política 6
- Terrorismo 6
- Crítica bíblica 5
- Inscripciones egipcias 5
- Revistes 5
- Social aspects 5
- Technological innovations 5
- Aspectos religiosos 4
-
281
-
282
-
283Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Dedication Page -- Contents -- Section I Cyber Operations Introduction -- I.1 Phases of Cyber Operations -- I.1.1 1980s-2002 -- I.1.2 2003-2012 -- I.1.3 2013-present -- Chapter 1 Cyber Operations -- 1.1 Cyber Operations Introduction -- 1.1.1 Cyber - A 21st-Century Collection Channel -- 1.1.2 Hackers - Pre-Cyber Operations -- 1.1.3 Cyber and Counter-Terror/Insurgency -- 1.2 Early Internet and Cyber Operations -- 1.2.1 Maturing of Cyber Operations - ISIS and Russia -- 1.2.2 ISIS Cyber Operations -- 1.2.3 Russian Cyber Operations -- 1.3 Cyber Operations' Stage Descriptions -- 1.3.1 Stage I (late 1990s-~2010)(Community Development) -- 1.3.2 Stage II (~2010-~2015)(Tactical) -- 1.3.3 Stage III (~2015 to present)(Tactical and Strategic) -- 1.4 Cyber Operations Wrap-up -- Bibliography -- Chapter 2 ISIS and Web-Based Insurgency -- 2.1 Introduction -- 2.1.1 Terrorist Development of the Internet for Messaging -- 2.1.2 ISIS Adaptation of the Internet for Coordination, Command and Control (C2) -- 2.1.3 ISIS "Emergence" from Cyberspace to form a State -- 2.2 Cyber-Based Irregular Operations -- 2.2.1 Three-Phase Insurgency Model with Cyber - ISIS Example -- 2.2.2 ISIS Insurgency Phases -- 2.2.3 Counter-ISIS Operations in Cyber -- 2.3 ISIS and Web-Based Insurgency Wrap-up -- Bibliography -- Chapter 3 Cyber and Crime -- 3.1 Cyber and Crime -- 3.1.1 Cybercrime Definitions -- 3.1.2 Crimes Against Individuals -- 3.1.2.1 Cyber-Fraud Reporting -- 3.1.2.2 Spam -- 3.1.2.3 Phishing -- 3.1.3 Crimes Against Organizations -- 3.1.3.1 Telephony Phishing -- 3.1.3.2 Ransomware Introduction -- 3.1.3.3 Ransomware Tools Background -- 3.1.3.4 Ransomware as a Service -- 3.1.3.5 Cryptocurrency -- 3.1.4 Cyber Gangs - Membership Analogy to Organized Crime -- 3.1.5 Cybercrime Wrap-Up -- Bibliography -- Chapter 4 Nation-State Cyber Operations…”
Libro electrónico -
284
-
285
-
286
-
287
-
288por Ramírez López, Luís EmilioTabla de Contenidos: “…MANUAL DE OPERACIONES DEL SISTEMA CDS/ISIS -- CONCLUSIONES -- RECOMENDACIONES -- FUENTES BIBLIOGRÁFICAS -- FUENTES ELECTRÓNICAS -- ANEXOS -- CUESTIONARIO -- RELACIÓN DEL INVENTARIO DE LOS EXPEDIENTES SENTENCIADOS (...)…”
Publicado 2017
Libro electrónico -
289Publicado 2018Tabla de Contenidos: “…chapter 1 Standardising Minority Languages -- Reinventing Peripheral Languages in the 21st Century / chapter 2 Basque Standardization and the New Speaker -- Political Praxis and the Shifting Dynamics of Authority and Value / chapter 3 On the Pros and Cons of Standardizing Scots -- Notes From the North of a Small Island / chapter 4 Legitimating Limburgish -- The Reproduction of Heritage / chapter 5 Negotiating the Standard in Contemporary Galicia / chapter 6 Language Standardisation as Frozen Mediated Actions -- The Materiality of Language Standardisation / chapter 7 Language Standardization in the Aftermath of the Soviet Language Empire / chapter 8 Standardization of Inuit Languages in Canada / chapter 9 “That’s Too Much to Learn” -- Writing, Longevity, and Urgency in the Isthmus Zapotec Speech Community / chapter 10 Orthography, Standardization, and Register -- The Case of Manding / chapter 11 Beyond Colonial Linguistics -- The Dialectic of Control and Resistance in the Standardization of isiXhosa / chapter 12 Visions and Revisions of Minority Languages -- Standardization and Its Dilemmas…”
Libro electrónico -
290por Organisation for Economic Co-operation and Development.Tabla de Contenidos: “…An example of how the IPC classification can be built upon: the OST-INPI/FhG-ISI technology nomenclature -- Annex IV A. Concordance between IPC and SITC for 46 high technology product groups developed by ENEA, CESPRI and Politecnico di Milano -- Annex IV B. …”
Publicado 1994
Libro electrónico -
291
-
292
-
293
-
294
-
295
-
296
-
297Publicado 2016Tabla de Contenidos: “…Academic writing supported by digital technologies and the INcwadi-Mkhaphi (book-guide) in isiZulu folk-poetry education --Appendix 1.…”
Libro electrónico -
298por Voss, WaltraudTabla de Contenidos: “…Cover -- Inhalt -- Vorwort -- Einführung -- Einleitende Übersicht -- Die Wahl des ersten Rektors -- Höhere Lehrerbildung in Dresden -- Die Isis in Dresden und die Mathematiker darin -- Die Ära Krause - Helm (1888 - 1920) -- Zusammenfassende Bemerkungen -- Krause, Helm, Fuhrmann, Rohn vor ihrem gemeinsamen Wirken -- Zu den Berufungsvorgängen Rohn - Helm - Krause -- Zur Arbeit in der Ära Martin Krause - Georg Helm -- Die Ära Kowalewski - Lagally -- Einführende Zusammenfassung -- Die »neuen« Mathematiker vor dem Eintritt in die TH Dresden: Kowalewski, Lagally, Böhmer -- Zum Wirken der vier Dresdner Mathematikprofessoren -- Zu genannten Mathematikern der TH Dresden nach dem Krieg -- Einführende Zusammenfassung -- Politische Säuberung und Wiedereröffnung der TH Dresden -- Schilling, Ludwig, Böhmer, Willers nach dem 2. …”
Publicado 2021
Libro electrónico -
299Publicado 2022Tabla de Contenidos: “…Davies (1945-2018) / Challenging the canon of the ten attic orators: from kanôn to Canon / L'Arétalogie d'Isis : biographie d'un texte canonique / Coming home: Varro's Antiquitates rerum divinarum and the canonisation of Roman religion / What becomes of the uncanonical? …”
Libro electrónico -
300