Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Novela norteamericana 2
- Certification 1
- Computer networks 1
- Computer software 1
- Conducta 1
- Crítica e interpretación 1
- Documentales 1
- Electronic data processing personnel 1
- Examinations 1
- Informática 1
- JavaScript (Computer program language) 1
- Object-oriented programming (Computer science) 1
- Oceano 1
- Peces 1
- Pinter, Harold 1
- Reusability 1
- Security measures 1
- Software patterns 1
- Teatro inglés 1
-
1
-
2
-
3por Clark, Grahame, 1907-1995
Publicado 1994Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
4
-
5
-
6por Pinter, Harold, 1930-2008Tabla de Contenidos: “…The homecoming -- Tea party -- The basement -- Landscape -- Silence -- Night -- That's your trouble -- That's all -- Applicant -- Interview -- Dialogue for three -- Tea party (short story) -- Old times -- No man's land…”
Publicado 1997
Libro -
7Publicado 2003“…At a time when man looks into the cosmos for new life forms, how much do we truly know about marine life? …”
DVD -
8Publicado 1993Tabla de Contenidos: “…The Homecoming. Old Times. No Man's Land. Betrayal. b. Shorter Plays. The Room. …”
Libro -
9Publicado 2021Tabla de Contenidos: “…Domain 3 Security Architecture and Engineering -- Research, Implement, and Manage Engineering Processes Using Secure Design Principles -- ISO/IEC 19249 -- Threat Modeling -- Secure Defaults -- Fail Securely -- Separation of Duties -- Keep It Simple -- Trust, but Verify -- Zero Trust -- Privacy by Design -- Shared Responsibility -- Defense in Depth -- Understand the Fundamental Concepts of Security Models -- Primer on Common Model Components -- Information Flow Model -- Noninterference Model -- Bell-LaPadula Model -- Biba Integrity Model -- Clark-Wilson Model -- Brewer-Nash Model -- Take-Grant Model -- Select Controls Based Upon Systems Security Requirements -- Understand Security Capabilities of Information Systems -- Memory Protection -- Secure Cryptoprocessor -- Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements -- Client-Based Systems -- Server-Based Systems -- Database Systems -- Cryptographic Systems -- Industrial Control Systems -- Cloud-Based Systems -- Distributed Systems -- Internet of Things -- Microservices -- Containerization -- Serverless -- Embedded Systems -- High-Performance Computing Systems -- Edge Computing Systems -- Virtualized Systems -- Select and Determine Cryptographic Solutions -- Cryptography Basics -- Cryptographic Lifecycle -- Cryptographic Methods -- Public Key Infrastructure -- Key Management Practices -- Digital Signatures and Digital Certificates -- Nonrepudiation -- Integrity -- Understand Methods of Cryptanalytic Attacks -- Brute Force -- Ciphertext Only -- Known Plaintext -- Chosen Plaintext Attack -- Frequency Analysis -- Chosen Ciphertext -- Implementation Attacks -- Side-Channel Attacks -- Fault Injection -- Timing Attacks -- Man-in-the-Middle -- Pass the Hash -- Kerberos Exploitation -- Ransomware -- Apply Security Principles to Site and Facility Design…”
Libro electrónico -
10por Stefanov, Stoyan“…While there's one chapter specifically dedicated to the web browser environment including DOM, Events and AJAX tutorials, the rest is applicable to the other environments Many web developers have tried coding or adopting some bits of JavaScript, but it is time to ""man up"" and learn the language properly because it is the language of the browser and is, virtually, everywhere. …”
Publicado 2013
Libro electrónico