Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 380
- Història 221
- History 146
- Ciceró, Marc Tul·li 128
- Películas cinematográficas 124
- Filosofía 102
- Crítica e interpretación 60
- Òperes 52
- Arte 49
- Computer security 48
- Llibrets 48
- Security measures 47
- En el cine 45
- Crítica, Interpretació, Etc 41
- Education 41
- Arqueología 40
- Taxation 40
- Biografia 39
- Computer networks 39
- Law and legislation 39
- Anglès 38
- Crítica i interpretació 38
- Materiales 38
- Research 37
- Economic conditions 36
- Universidad Pontificia de Salamanca (España) 36
- Política 33
- Antiquities 32
- Cine 32
- Descripcions i viatges 32
-
7781
-
7782
-
7783
-
7784
-
7785por Hugo de San Víctor 1096?-1141Tabla de Contenidos: “…La réalité de l'Amour. Ce qu'il faut aimer vraiment. Les cinq Septénaires. Les sept Dons de l'Esprit-Saint…”
Publicado 1969
Libro -
7786por Tavares, OrlandaTabla de Contenidos: “…The Northern European case – Per Olaf Aamodt -- Chapter 10. Conclusions – Orlanda Tavares, Cristina Sin, Carla Sá…”
Publicado 2022
Libro electrónico -
7787Publicado 2017Tabla de Contenidos: “…Planning Your Sensor Array -- Planning the Sensor Array -- Make a Disk -- Sizing Your Hardware -- Switched Port Analyzer or Tap -- Horizontal Movement -- Virtual Machine Planner Virtual Disks -- Installing the Fiber Cards -- Installing the Operating System -- Configuring Ethernet Adapters -- Security Onion Sensor Setup -- Setting PF_RING min_num_slots -- Setting Intrusion Detection System Engine Processes -- Management of Storage -- Sudo -i -- 5. …”
Libro electrónico -
7788Publicado 2025Tabla de Contenidos: “…9780443132247v1_WEB -- Front Cover -- Computer and Information Security Handbook -- Computer and Information Security Handbook -- Copyright -- Dedication -- Contents to Volume I -- Contributors to Volume I -- About the editor -- Foreword -- Preface -- ORGANIZATION OF THIS BOOK -- Part I: Overview of system and network security: A comprehensive introduction -- Part II: Managing information security -- Part III: Disaster recovery security -- Part IV: Security standards and policies -- Part V: Cyber, network, and systems forensics security and assurance -- Part VI: Encryption technology -- Part VII: Privacy and access management -- Part VIII: Storage security -- Part IX: Cloud security -- Part X: Virtual security -- Part XI: Cyber physical security -- Part XII: Practical security -- Part XIII: Critical infrastructure security -- Part XIV: Cyber security for the smart city and smart homes -- Part XV: Cyber security of connected and automated vehicles -- Part XVI: Advanced security -- Part XVII: Future Cyber Security Trends And Directions -- Part XVIII: Appendices -- Acknowledgments -- I - Overview of System and Network Security: A Comprehensive Introduction -- 1 - Information Security in the Modern Enterprise -- 1. …”
Libro electrónico -
7789
-
7790Publicado 2024Tabla de Contenidos: “…Evolution and impact of classic malware -- Lessons learned from classic malware -- Practical example -- Summary -- Chapter 14: APT and Cybercrime -- Introduction to APTs -- The birth of APTs - early 2000s -- Operation Aurora (2009) -- Stuxnet and the dawn of cyber-physical attacks (2010) -- The rise of nation-state APTs - mid-2010s onward -- What about the current landscape and future challenges? …”
Libro electrónico -
7791
-
7792
-
7793
-
7794
-
7795
-
7796
-
7797
-
7798
-
7799
-
7800