Mostrando 1 - 10 Resultados de 10 Para Buscar '"The Time of Man"', tiempo de consulta: 0.07s Limitar resultados
  1. 1
    Libro
  2. 2
    Libro
  3. 3
    por Clark, Grahame, 1907-1995
    Publicado 1994
    Libro
  4. 4
    Publicado 1967
    Libro
  5. 5
    Libro
  6. 6
    por Pinter, Harold, 1930-2008
    Publicado 1997
    Tabla de Contenidos: “…The homecoming -- Tea party -- The basement -- Landscape -- Silence -- Night -- That's your trouble -- That's all -- Applicant -- Interview -- Dialogue for three -- Tea party (short story) -- Old times -- No man's land…”
    Libro
  7. 7
    Publicado 2003
    “…At a time when man looks into the cosmos for new life forms, how much do we truly know about marine life? …”
    DVD
  8. 8
    Publicado 1993
    Tabla de Contenidos: “…The Homecoming. Old Times. No Man's Land. Betrayal. b. Shorter Plays. The Room. …”
    Libro
  9. 9
    Publicado 2021
    Tabla de Contenidos: “…Domain 3 Security Architecture and Engineering -- Research, Implement, and Manage Engineering Processes Using Secure Design Principles -- ISO/IEC 19249 -- Threat Modeling -- Secure Defaults -- Fail Securely -- Separation of Duties -- Keep It Simple -- Trust, but Verify -- Zero Trust -- Privacy by Design -- Shared Responsibility -- Defense in Depth -- Understand the Fundamental Concepts of Security Models -- Primer on Common Model Components -- Information Flow Model -- Noninterference Model -- Bell-LaPadula Model -- Biba Integrity Model -- Clark-Wilson Model -- Brewer-Nash Model -- Take-Grant Model -- Select Controls Based Upon Systems Security Requirements -- Understand Security Capabilities of Information Systems -- Memory Protection -- Secure Cryptoprocessor -- Assess and Mitigate the Vulnerabilities of Security Architectures, Designs, and Solution Elements -- Client-Based Systems -- Server-Based Systems -- Database Systems -- Cryptographic Systems -- Industrial Control Systems -- Cloud-Based Systems -- Distributed Systems -- Internet of Things -- Microservices -- Containerization -- Serverless -- Embedded Systems -- High-Performance Computing Systems -- Edge Computing Systems -- Virtualized Systems -- Select and Determine Cryptographic Solutions -- Cryptography Basics -- Cryptographic Lifecycle -- Cryptographic Methods -- Public Key Infrastructure -- Key Management Practices -- Digital Signatures and Digital Certificates -- Nonrepudiation -- Integrity -- Understand Methods of Cryptanalytic Attacks -- Brute Force -- Ciphertext Only -- Known Plaintext -- Chosen Plaintext Attack -- Frequency Analysis -- Chosen Ciphertext -- Implementation Attacks -- Side-Channel Attacks -- Fault Injection -- Timing Attacks -- Man-in-the-Middle -- Pass the Hash -- Kerberos Exploitation -- Ransomware -- Apply Security Principles to Site and Facility Design…”
    Libro electrónico
  10. 10
    por Stefanov, Stoyan
    Publicado 2013
    “…While there's one chapter specifically dedicated to the web browser environment including DOM, Events and AJAX tutorials, the rest is applicable to the other environments Many web developers have tried coding or adopting some bits of JavaScript, but it is time to ""man up"" and learn the language properly because it is the language of the browser and is, virtually, everywhere. …”
    Libro electrónico