Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 380
- Història 221
- History 146
- Ciceró, Marc Tul·li 128
- Películas cinematográficas 124
- Filosofía 102
- Crítica e interpretación 60
- Òperes 52
- Arte 49
- Computer security 48
- Llibrets 48
- Security measures 47
- En el cine 45
- Crítica, Interpretació, Etc 41
- Education 41
- Arqueología 40
- Taxation 40
- Biografia 39
- Computer networks 39
- Law and legislation 39
- Anglès 38
- Crítica i interpretació 38
- Materiales 38
- Research 37
- Economic conditions 36
- Universidad Pontificia de Salamanca (España) 36
- Política 33
- Antiquities 32
- Cine 32
- Descripcions i viatges 32
-
7901por Dowland, John, 1563-1626Tabla de Contenidos: “…Thomas Collier his galiard (1:26) -- Lachrimae verae (5:11) -- Captaine Digorie Piper his galiard (1:48) -- Semper Dowland semper dolens (5:56) -- The King of Denmarks galiard (1:58) -- Sir Henry Umptons funerall (6:03) -- M. …”
Publicado 2013
CDROM -
7902Publicado 2005Tabla de Contenidos: “…The one, the four and the many Ronald A. Piper; 15. The making of gospel commentaries Markus Bockmuehl…”
Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Libro -
7903por Viega, JohnTabla de Contenidos: “…Step 3: SSL Options and Cipher Suites5.1.4.2. Ephemeral keying; 5.1.4.3. Cipher suite selection; 5.1.4.4. …”
Publicado 2002
Libro electrónico -
7904
-
7905
-
7906
-
7907por Development, Organisation for Economic Co-operation andTabla de Contenidos: “…Définition utilisée pour les aciers alliés - Appendix II. Definition used for alloy steels…”
Publicado 2003
Libro electrónico -
7908por Development, Organisation for Economic Co-operation andTabla de Contenidos: “…Définition utilisée pour les aciers alliés/Definition used for alloy steels…”
Publicado 2004
Libro electrónico -
7909
-
7910
-
7911Publicado 2022Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1. …”
Libro electrónico -
7912Publicado 2010“…The Journal is a fully refereed Journal that supports scholarly research and commentary around issues related to the core business of ACHPER. Published three times a year, the Journal disseminates high quality manuscripts from researchers, policy makers and innovators in the fields of health, physical education, sport and recreation…”
Revista digital -
7913
-
7914Publicado 2023Tabla de Contenidos: “…Cover -- Part 1: Getting Started -- Title Page -- Copyright and Credits -- Contributors -- Table of Contents -- Preface -- Chapter 1: The Role of Cryptography in the Connected World -- Evolution of cryptography -- The advent of TLS and the internet -- Increasing connectivity -- Connectivity versus security - larger attack surface -- Connectivity versus marginal attack cost -- Connectivity versus scaling attacks -- Increasing complexity -- Complexity versus security - features -- Complexity versus security - emergent behavior -- Complexity versus security - bugs -- Example attacks -- The Mirai botnet -- Operation Aurora -- The Jeep hack -- Commonalities -- Summary -- Chapter 2: Secure Channel and the CIA Triad -- Technical requirements -- Preliminaries -- Confidentiality -- Integrity -- Authentication -- Message authentication -- Entity authentication -- Secure channels and the CIA triad -- Summary -- Chapter 3: A Secret to Share -- Secret keys and Kerckhoffs's principle -- Cryptographic keys -- One key for each task -- Key change and session keys -- Key space -- Key length -- Crypto-agility and information half-life -- Key establishment -- Key transport -- Key agreement -- Randomness and entropy -- Information-theoretic definition of entropy -- Entropy in cryptography -- True randomness and pseudo-randomness -- Summary -- Chapter 4: Encryption and Decryption -- Preliminaries -- Symmetric cryptosystems -- Information-theoretical security (perfect secrecy) -- A first example -- The one-time pad -- Computational security -- Asymptotic approach and efficient computation -- Negligible probabilities -- Pseudorandomness -- Stream ciphers -- RC4 -- Pseudorandom functions and chosen-plaintext attacks -- Summary -- Chapter 5: Entity Authentication -- The identity concept -- Basic principles of identification protocols -- Basic factors for identification…”
Libro electrónico -
7915por Cormenin, Louis Marie de La Haye, Vicomte de, 1788-1868
Publicado 1844Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
7916
-
7917
-
7918
-
7919
-
7920por Des Prés, Josquin, c. 1440-1521Tabla de Contenidos: “…Douleur me bat -- Plusiers regretz -- Fortune destrange plummaige -- IIe fantazies de Joskin -- O virgo prudentissima -- Domine ne in furore -- Si j'avoye Marion -- Je ne me puis tenir d'aimer -- Allegez moy -- Entré je suis en grant pensée -- Faulte d'argent -- Adieu mes amours : luit -- Adieu mes amours : koor -- Cueurs desolez par toute nation -- A l'eure -- Absolve quaesumus -- Mirabilia testimonia tua…”
Publicado 1995
CDROM