Mostrando 1,741 - 1,760 Resultados de 1,768 Para Buscar '"The Police"', tiempo de consulta: 0.07s Limitar resultados
  1. 1741
    Publicado 2004
    “…Ils se redéploient également vers les missions de police, de douane et de renseignement, sur le terrain de la lutte antiterroriste et contre le narcotrafic. …”
    Libro electrónico
  2. 1742
    Publicado 2006
    “…Après le désarmement des faubourgs en prairial an III (mai 1795), la Garde nationale n'est pourtant plus que l'expression de l'ordre bourgeois défendant la propriété et un semblant de régime représentatif, comme dans les journées de juin 1848 (aux côtés de la police et de l'armée). À chaque révolution resurgit cependant l'image de la Nation en armes dans sa résistance à l'oppression. …”
    Electrónico
  3. 1743
    por Fourniel, Béatrice
    Publicado 2020
    “…On y retrouve, comme dans toutes les autres villes qui furent des sièges de présidiaux, les sempiternels conflits de préséance entre les membres du corps de ville, ici les consuls, et les officiers de judicature, mais on voit bien que ces sortes de “querelles du lutrin” masquent des affrontements plus concrets sur la répartition des tailles ou la police de la ville ainsi que la volonté d’ingérence des robins sur les affaires municipales. …”
    Electrónico
  4. 1744
    Publicado 2016
    “…Course Requirements Knowledge and understanding of BGP and its attributes Table of Contents Module 1: Troubleshooting BGP Peering Issues Lesson 1: Troubleshooting BGP Peering Down 1.1: Verifying Configurations 1.2: Verifying Reachability 1.3: BGP Authentication 1.4: Verifying ACLs 1.5: Verifying TCP Sessions 1.6: Decoding BGP Messages 1.7: Troubleshooting Blocked Processes in IOS XR Lesson 2: Troubleshooting Flapping BGP Peers 2.1: Understanding BGP Flapping States 2.2: Understanding BGP Notifications 2.3: Troubleshooting MTU Mismatch Issues 2.4: Troubleshooting High CPU Causing BGP Flaps 2.5: Troubleshooting Interface Queue Drops 2.6: Troubleshooting Control Plane Policing Lesson 3: Dynamic BGP Peering 3.1: Dynamic BGP Peering Overview 3.2: Dynamic BGP Peering Configuration 3.3: Verifying Dynamic BGP Peers 3.4: Challenges with Dynamic BGP Peering Module 2: Troubleshooting Platform Issues Caused by BGP Lesson 4: High CPU Caused by BGP 4.1: BGP Process in IOS 4.2: High CPU Caused by BGP Scann..…”
    Video
  5. 1745
    Publicado 2023
    “…What you will learn Understand the history of cybercrime, the dark web, and the use of Tor Discover the ecosystem of dark web drug markets Become familiar with the methods law enforcement use to stop child abusers Dive deep into real-life human trafficking cases and how they were tackled Explore sting operations, honeypots, and cybercrime prevention methodologies Gain expertise in Pipl Search, MEMEX, BITCRIME, and other anti-crime tools Investigate open-source intelligence and intelligence-led policing Set up a framework for disrupting organized crime on the dark web Who this book is for This book is for aspiring cybercrime investigators, cybersecurity enthusiasts, and anyone else who is interested in learning about this dark side of the internet. …”
    Libro electrónico
  6. 1746
    por Aubert-Monpeyssen, Thérèse
    Publicado 2017
    “…Elle concernait, au premier chef, les forces armées, la police, les tribunaux répressifs. Aujourd'hui, la sécurité n'est plus seulement l'affaire des pouvoirs publics, elle est devenue l'affaire de tous, individus ou entreprises. …”
    Electrónico
  7. 1747
    por Agut-Labordère, Damien
    Publicado 2022
    “…La problématique de la captation par les États des réseaux structurant ces espaces et des flux économiques qui leur sont propres va de pair avec les politiques de police des mers et des déserts, contre des populations présentées comme des pirates, mais qui n’en sont souvent que d’autres usagers. …”
    Electrónico
  8. 1748
    por Altar, Sylvie, 1965-
    Publicado 2020
    “…Ce foisonnement de réalisme est permis grâce au travail méticuleux des auteurs dans de très nombreuses archives dont celles de la Collaboration, de la police et de l'épuration. Dans une perspective volontairement socioanalytique, cet ouvrage déplace le curseur de lecture du côté des bourreaux". …”
    Libro
  9. 1749
    Publicado 2023
    Libro
  10. 1750
    Publicado 2016
    “…Later, it immerses itself within the leaked files of an enigmatic police cabal which detail the surveillance of conceptual photographers Bernd and Hilla Becher, an operation that even extends to the duo's dreams. …”
    Libro electrónico
  11. 1751
    Publicado 2019
    “…What you'll learn--and how you can apply it The fundamentals of VPNs, including configuration and the verification of clientless remote access and AnyConnect SSL using Cisco's ASDM Configuration and the verification of site-to-site IPSec VPNs Configuring role-based CLI privilege levels Protecting the control plane from attacks and from high levels of activity using Control Plane Policing and Control Plane Protection Recognizing STP attacks and how to mitigate them Recognizing ARP and MAC attacks how to mitigate them How to uses Access Control Lists (ACLs) on switches to control traffic flow How to defend against DHCP spoofing and snooping How to restrict access to switchports based on the source MAC address of incoming frames And more This video course is for you because... …”
    Video
  12. 1752
    Publicado 2015
    Libro electrónico
  13. 1753
    Libro electrónico
  14. 1754
    Publicado 2018
    Libro electrónico
  15. 1755
  16. 1756
    Publicado 2014
    “…Therefore, this biographical work attempts to reconstruct his track in the Spanish prison administration, by means of file documentation never searched before and edited sources barely used, taking into account: 1) The transformations and contradictions in his practice and thinking; 2) The ideas taken from the Italian criminal positivism; 3) His field trips and his attendance to international scientific meetings; 4) His proposals in matters such as the anarchism problem, police reforms, identification of offenders, etc.; 5) His commitment almost solitarily to the U.S. prison model; 6) Creation of institutions: the reformatory for adults in Ocaña, Alicante and Segovia, the progressive system, probation; and finally 7) His genuine contribution and his legacy to the Spanish prison system. …”
    Libro electrónico
  17. 1757
    Publicado 2001
    “…The losses included censorship and police records from the reign of Joseph 11 and records pertaining to the newspaper trade. …”
    Libro electrónico
  18. 1758
    por Edgar Allan Poe
    Publicado 2015
    “…Auguste Dupin some of his most celebrated cases when they are joined by the Prefect of the Police, a man known as G-. The Prefect has a case he would like to discuss with Dupin. …”
    Texto completo en Odilo
    Otros
  19. 1759
    Publicado 2009
    “…Since 1740 the apolitical lodges, bringing together different confessions, were associations legitimated by the Prussian state, which could freely develop without intervention by the police. The “Common Law of the Prussian States” defined them as closed societies. …”
    Libro electrónico
  20. 1760
    Publicado 2020
    Libro electrónico