Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Forensic psychology 210
- Psicología 186
- Psychology 181
- Psicología legal 180
- Computer security 165
- Security measures 154
- Medicina legal 136
- Computer networks 121
- Computer crimes 107
- Derecho 96
- Investigation 88
- Psiquiatría forense 81
- Psicología forense 80
- Forensic sciences 79
- Derecho procesal 72
- Anuarios 70
- Oratoria forense 58
- Derecho Civil 41
- Examinations 38
- Medical jurisprudence 38
- Law 34
- Criminología 33
- Derecho civil 33
- Práctica forense 33
- Psicología criminal 32
- Historia 30
- Forensic Medicine 29
- Psychological aspects 29
- Criminal investigation 28
- Abogados 27
-
3001por Crespo Allué, Fernando“…Por otro lado, la conflictividad y litigiosidad de la división de la herencia, como la realidad de nuestros juzgados y tribunales demuestra a diario, ha justificado el tratamiento separado de las cuestiones más delicadas del juicio divisorio, desde la intervención y administración del caudal hereditario, hasta la conclusión del procedimiento con la adjudicación de los bienes a los interesados, ofreciendo un análisis exhaustivo de las cuestiones (y posibles soluciones) que presenta la realidad forense, con estudio de la jurisprudencia del Tribunal Supremo y de las Audiencias Provinciales…”
Publicado 2015
Acceso al texto completo en Aranzadi
Libro -
3002Publicado 2017“…. •100% complete coverage of all official objectives for exam SY0-501 •Exam Watch notes call attention to information about, and potential pitfalls in, the exam •Inside the Exam sections in every chapter highlight key exam topics covered •Two-Minute Drills for quick review at the end of every chapter •Simulated exam questions—including performance-based questions—match the format, topics, and difficulty of the real exam Covers all exam topics, including: Networking Basics and Terminology • Security Terminology • Security Policies and Standards • Types of Attacks • System Security Threats • Mitigating Security Threats • Implementing System Security • Securing the Network Infrastructure • Wireless Networking and Security • Authentication • Access Control • Cryptography • Managing a Public Key Infrastructure • Physical Security • Risk Analysis • Disaster Recovery and Business Continuity • Computer Forensics • Security Assessments and Audits • Monitoring and Auditing Electronic Content Includes: • 50+ lab exercises and solutions •Complete practice exams •3+ hours of video training from the author •Secured book PDF…”
Libro electrónico -
3003Publicado 2019“…A technique-focused book that bridges the gap between an introductory text and a book on advanced research methods Provides the necessary background and skills needed to advance the research methods Features a structured approach within each chapter Demonstrates an interdisciplinary approach that serves to develop independent thinking Written for students in chemistry, biological, medical, pharmaceutical, forensic and biophysical sciences, Biomolecular and Bioanalytical Techniques is an in-depth review of the most current biomolecular and bioanalytical techniques in the field…”
Libro electrónico -
3004Publicado 2017“…Enforce effective physical security throughout your organization Apply reliable authentication, authorization, and accountability Design security architectures that can be verified, certified, and accredited Understand the newest attacks and countermeasures Use encryption to safeguard data, systems, and networks Systematically plan and test business continuity/disaster recovery programs Protect today’s cloud, web, and database applications Address global compliance issues, from privacy to computer forensics Develop software that is secure throughout its entire lifecycle Implement effective security governance and risk management Use best-practice policies, procedures, guidelines, and controls Ensure strong operational controls, from background checks to security audits…”
Libro electrónico -
3005Publicado 2012“…· Enforce effective physical security throughout your organization · Apply reliable authentication, authorization, and accountability · Design security architectures that can be verified, certified, and accredited · Understand the newest attacks and countermeasures · Use encryption to safeguard data, systems, and networks · Systematically plan and test business continuity/disaster recovery programs · Protect today’s cloud, web, and database applications · Address global compliance issues, from privacy to computer forensics · Develop software that is secure throughout its entire lifecycle · Implement effective security governance and risk management · Use best-practice policies, procedures, guidelines, and controls · Ensure strong operational controls, from background checks to security audits…”
Libro electrónico -
3006Publicado 2015“…Get up to date on the latest research and practice findings Integrate positive psychology into assessments, life coaching, and other therapies Learn how positive psychology is being used in schools Explore possible directions for new research to push the field forward Positive psychology is being used in areas as diverse as clinical, counseling, forensic, health, educational, and industrial/organizational settings, in a wide variety of interventions and applications. …”
Libro electrónico -
3007Publicado 2014“…Featuring a quantitative, computational, and mathematical approach, the book includes: Examples of real-world applications, such as population dynamics, genetics, drug administration, interacting species, and the spread of contagious diseases, to showcase the relevancy and wide applicability of abstract mathematical techniques Discussion of various mathematical concepts, such as Markov chains, matrix algebra, eigenvalues, eigenvectors, first-order linear difference equations, and nonlinear first-order difference equations Coverage of difference equations to model a wide range of real-life discrete time situations in diverse areas as well as discussions on matrices to model linear problems Solutions to selected exercises and additional MATLAB codes Explorations of Mathematical Models in Biology with MATLAB is an ideal textbook for upper-undergraduate courses in mathematical models in biology, theoretical ecology, bioeconomics, forensic science, applied mathematics, and environmental science. …”
Libro electrónico -
3008Publicado 2024“…In doing this, he argues, there is an opportunity to re-think the kind of society we want to create, and to ensure it is achievable and sustainable. This forensic defence of the core principles of the Open Society is an essential read for anyone wishing to understand some of the powerful social currents that have engulfed public debates in recent years, and what to do about them…”
Libro electrónico -
3009por Sullivan, Kevin“…He traces the dynamic interplay among employees, regulatory examiners, compliance officers, fraud and forensic accountants and technologists, criminal investigators, and prosecutors in following up on reports, catching launderers, and protecting the integrity and reputations of financial institutions and businesses. …”
Publicado 2024
Libro electrónico -
3010Publicado 2016“…They also offer in-depth coverage of a wide range of topics, including DDL optimization, VLDB tuning, database forensics, adaptive cursor sharing, data pumps, data migration, SSDs, indexes, and how to go about fixing Oracle RAC problems. …”
Libro electrónico -
3011Publicado 2014“…Covers all exam topics, including: Networking Basics and Terminology * Security Terminology * Security Policies and Standards * Types of Attacks * System Security Threats * Mitigating Security Threats * Implementing System Security * Securing the Network Infrastructure * Wireless Networking and Security * Authentication * Access Control * Cryptography * Managing a Public Key Infrastructure * Physical Security * Risk Analysis * Disaster Recovery and Business Continuity * Computer Forensics * Security Assessments and Audits * Monitoring and Auditing Electronic content includes: Test engine that provides full-length practice exams and customized quizzes by chapter or by exam domain PDF copy of the book for studying on the go…”
Libro electrónico -
3012por Schaathun, Hans Georg“…Part 1of the book is an introduction to steganalysis as part of the wider trend of multimedia forensics, as well as a practical tutorial on machine learning in this context. …”
Publicado 2012
Libro electrónico -
3013Publicado 2022“…Get your dream job and set off on the right path to achieving success in the cybersecurity field with expert tips on preparing for interviews, understanding cybersecurity roles, and more About This Audiobook Get well-versed with the interview process for cybersecurity job roles Prepare for SOC analyst, penetration tester, malware analyst, digital forensics analyst, CISO, and more roles Understand different key areas in each role and prepare for them In Detail This audiobook is a comprehensive guide that helps both entry-level and experienced cybersecurity professionals prepare for interviews in a wide variety of career areas. …”
Grabación no musical -
3014Publicado 2023“…Bioanalysis of endogenous substances, metabolites, and contaminants poisons is important in analyses of biological functions, metabolomics, forensic toxicology, patient diagnosis and biomonitoring of human exposure to hazardous chemicals. …”
Libro electrónico -
3015Publicado 2016“…Andersson ; Evolution and microbial forensics / Paul Keim and Talima Pearson -- Part III. …”
Libro -
3016
-
3017
-
3018
-
3019Publicado 2018“…Siguen los capítulos sobre el Análisis Forense, los Routers, y los fallos Hardware y el Blackmarket. …”
Acceso con credenciales UPSA.
Libro electrónico -
3020Publicado 2014“…Desde la epistemología: mostrar que además de los elementos clínicos y forenses, el conflicto jurídico se entiende mejor al reconocer las dinámicas sociales en los que aquellos surgen, se desarrollan y resuelven…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico