Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 380
- Història 221
- History 146
- Ciceró, Marc Tul·li 128
- Películas cinematográficas 124
- Filosofía 102
- Crítica e interpretación 60
- Òperes 52
- Arte 49
- Computer security 48
- Llibrets 48
- Security measures 47
- En el cine 45
- Crítica, Interpretació, Etc 41
- Education 41
- Arqueología 40
- Taxation 40
- Biografia 39
- Computer networks 39
- Law and legislation 39
- Anglès 38
- Crítica i interpretació 38
- Materiales 38
- Research 37
- Economic conditions 36
- Universidad Pontificia de Salamanca (España) 36
- Política 33
- Antiquities 32
- Cine 32
- Descripcions i viatges 32
-
8021Publicado 2018Tabla de Contenidos: “…Making rights in times of crisis: civil society and the Migrant Workers Convention / Lisa Simeone and Nicola Piper. Part II. The ICRMW in international human rights law. 3. …”
Libro electrónico -
8022Publicado 2009Tabla de Contenidos: “…Memory Along Life’s Genesis -- Memory and The Myth of Prometheus -- A History of The Idea of Organic Memory -- Memory and Action: The Conscience of Time in Personal Becoming in Bergson and Blondel -- Phenomenology of Life on Memory: Revealing The Creative Human Condition in The Music Art Universe -- Humanizing Nature -- The Anthropocentric Versus Biocentric Outlook on Nature -- Ecological Design And Retrieving The Environmental Meaning -- Philosophical-Historical Aspects Of Land Relations (On Example Of Russian North Nations) -- The Phenomenon of The Gaze -- Ciphering Human Existence -- Kierkegaard And The Phenomenology Of Repetition In The Nouveau Roman -- Notion Of Forgetting And Remembering In Piranesi: Fireplace As The Setting Of A Dionysian Play -- The Category Of The “NOW” In Husserlian Phenomenology Of Time—Polemic Against Derridean Anti-Presentialism -- “Smritir Bhumika” (The Role of Memory): Some Memory-Related Poems and Songs of Rabindranath -- Memory As a Challenge to Human Existence – Aspects Of Temporality And The Role Of Memory In Reference To Guitton’S Concept Of Time -- Time, Memory And The Musical Perception -- Play Of Memory In Self-Identity Otherness -- Memory, Personal Identity, and Moral Responsibility -- Memory As a Positive and Negative Motivation Component In a Person’s Activity -- “Interpreting” The Modern Times – Possibilities, Limitations, Social And Vital Functions -- The Activity Of The Self-Realization Within The Context Of The Fabricated Identity Of The Consumer Self And Its Transformation -- Utilitarian-Aesthetic Dynamics of Nature -- Memory In The Creative Ontopoiesis Of Life -- Memory and Creativity in The Context of Ontopoiesis of Beingness: A-T. …”
Libro electrónico -
8023Publicado 2007Tabla de Contenidos: “…Mobility -- A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks -- A New Resilient Key Management Protocol for Wireless Sensor Networks -- Hardware and Cryptography I -- Efficient Use of Random Delays in Embedded Software -- Enhanced Doubling Attacks on Signed-All-Bits Set Recoding -- Privacy -- Securing the Distribution and Storage of Secrets with Trusted Platform Modules -- Distributed Certified Information Access for Mobile Devices -- Cryptography Scheme -- Linkability of Some Blind Signature Schemes -- Optimistic Non-repudiation Protocol Analysis -- Secure Remote User Authentication Scheme Using Bilinear Pairings -- Cryptanalysis of Some Proxy Signature Schemes Without Certificates -- Smart Card -- Performance Evaluation of Java Card Bytecodes -- Reverse Engineering Java Card Applets Using Power Analysis -- An Embedded System for Practical Security Analysis of Contactless Smartcards -- A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies -- Small Devices -- Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication -- An Information Flow Verifier for Small Embedded Systems -- Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks -- Hardware and Cryptography II -- Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures -- CRT RSA Algorithm Protected Against Fault Attacks -- Combinatorial Logic Circuitry as Means to Protect Low Cost Devices Against Side Channel Attacks…”
Libro electrónico -
8024Papers presented at the Eighteenth International Conference on Patristic Studies held in Oxford 2019Publicado 2021Tabla de Contenidos: “…Augustine the theologian and polemicist 17. Cineres extinsti dogmatis refouendo ? : "Pelagianism" in the christian sources from 431 to the carolingian period 18. …”
Libro -
8025
-
8026
-
8027Publicado 2017Tabla de Contenidos: “…Review QuestionsChapter 3 Encryption Ciphers and Methods; Encryption Basics; Symmetric and Asymmetric Algorithms; Stream and Block Ciphers; RC4/ARC4; RC5; DES; 3DES; AES; WLAN Encryption Methods; WEP; WEP MPDU; TKIP; TKIP MPDU; CCMP; CCMP MPDU; WPA/WPA2; Future Encryption Methods; Proprietary Layer 2 Implementations; Summary; Exam Essentials; Review Questions; Chapter 4 802.1X/EAP Authentication; WLAN Authentication Overview; AAA; Authentication; Authorization; Accounting; 802.1X; Supplicant; Authenticator; Authentication Server; Supplicant Credentials; Usernames and Passwords…”
Libro electrónico -
8028
-
8029Publicado 2024“….), former Commander of the Joint Special Operations Command; and John Cipher, former member of the CIA's Senior Intelligence Service. …”
Grabación no musical -
8030
-
8031por Trevor-Roper, H. R., 1914-2003Materias: “…Trevor-Roper, H. R. 1914-2003 Diarios personales…”
Publicado 2014
Libro -
8032Publicado 2022“…Subtil, mutig und mit feinem Gefühl für die Sprache erzählt Lin Hierse in „Wovon wir träumen“ von einer Beziehung zwischen Mutter und Tochter und den Fragen nach Identität, Nähe und Abgrenzung. …”
Libro -
8033Publicado 2005Tabla de Contenidos: “…Garriere Cedro del AtlasChamaecyparis lawsoniana (A. Murr.) Parl. Ciprés de Lawson; Cupressus arizonica Greene Ciprés de Arizona; Larix decidua Mill. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
8034Publicado 1995Tabla de Contenidos: “…The continuum of translation as seen in three Middle French treatises on comets / Lys Ann Shore -- Vernacular translation in the fourteenth-century crown of Aragon : Brunetto Latini's Li livres dou tresor / Dawn Ellen Prince -- Patronage and the translator : Raoul de Presles's La cité de Dieu and Calvin's Institution de la religion chrestienne and Institutio religionis Christianae / Jeanette Beer -- Marot's Le roman de la rose and evangelical poetics / Hope H. …”
Libro -
8035por Baratella, AntonioTabla de Contenidos: “…Anthonius Baratella Ad musas lugubres super obitu Francisci Buschi poete mantuani hic in Baratella (h . 1 v.) . …”
Publicado 1401
Manuscrito -
8036Publicado 2023Tabla de Contenidos: “…8.1.1 Different Types of Cryptography -- 8.1.1.1 Symmetric Key Cryptography -- 8.1.1.2 Asymmetric Key Cryptography -- 8.1.1.3 Hash Functions -- 8.1.2 Cryptographic Schemes -- 8.1.2.1 Simple Substitution Cipher -- 8.1.2.2 Caesar Cipher -- 8.1.2.3 Vigenère Cipher -- 8.1.2.4 Transposition Cipher -- 8.2 Playfair Cipher -- 8.2.1 Encryption Algorithm -- 8.2.1.1 Step 1 - Generate Squares (5 * 5) -- 8.2.1.2 Step 2 - Algorithm to Encrypt Plaintext -- 8.2.2 Decryption Algorithm -- 8.2.2.1 Step 1 - Generate Squares (5 * 5) -- 8.2.2.2 Step 2 - Algorithm to Decrypt the Ciphertext -- 8.2.3 Advantages and Disadvantages -- 8.2.3.1 Advantages -- 8.2.3.2 Disadvantages -- 8.3 Hill Cipher -- 8.3.1 Substitution Scheme -- 8.3.1.1 Encryption -- 8.3.1.2 Decryption -- 8.4 RSA Algorithm in Cryptography -- 8.4.1 Working Mechanism -- 8.4.1.1 Generating the Public Key -- 8.4.1.2 Generating a Private Key -- 8.5 Multiple Precision Arithmetic Library -- 8.5.1 GNU Multiple Precision Arithmetic Library -- 8.5.2 RSA Algorithm Implementation Using GMP Library -- 8.5.3 Weak RSA Decryption with Chinese Remainder Theorem -- 8.6 SHA-512 Hash in Java -- 8.7 Cybersecurity -- 8.7.1 Common Cyberattacks -- 8.7.1.1 Denial-of-Service Attacks -- 8.7.1.2 Malware -- 8.7.1.3 Man-in-the-Middle Attack -- 8.7.1.4 Phishing -- 8.7.1.5 Structured Language Query Injection -- 8.7.1.6 Latest Cyberthreats -- 8.7.2 Key Cybersecurity Features -- 8.7.3 Blockchain for Cybersecurity -- 8.7.4 Pros and Cons of Blockchain in Cybersecurity -- 8.7.4.1 Pros -- 8.7.4.2 Cons -- 8.7.5 Real-world Examples -- 8.7.5.1 Australian Government -- 8.7.5.2 Barclays -- 8.7.5.3 Chinese Military -- 8.7.5.4 Cisco -- 8.7.5.5 Coinbase -- 8.7.5.6 Colorado State -- 8.7.5.7 Founders Bank -- 8.7.5.8 Health Linkage -- 8.7.5.9 JP Morgan -- 8.7.5.10 Mobile Coin -- 8.7.5.11 Philips Healthcare -- 8.7.5.12 Santander Bank -- 8.7.5.13 Wall Street…”
Libro electrónico -
8037por Caputo, John D.Tabla de Contenidos: “…LA POÉTICA DE LO IMPO -- 6. HIPER-REALISMO Y LA HERMENÉUTICA DE LA EXHORTACI -- SEGUNDA PARTE: EL REINO DE DIOS ESBOZOS DE UNA SAGRADA ANARQUÍA -- 7. …”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
8038Publicado 2020Tabla de Contenidos: “…Terroir and farm workers in North American craft cider / Anelyse Weiler -- The potential role of geographical indication in supporting indigenous communities in Canada / Donna Appavoo and Monika Korzun -- Conclusions : comprehensive change and the limits and power of sectorial measures / Alessandro Bonanno, Kae Sekine and Hart N. …”
Libro electrónico -
8039Publicado 2013Tabla de Contenidos: “…Chapter 23 - Secure Socket Layer/Transport Layer Security (SSL/TLS) Protocols for Transport Layer SecurityChapter 24 - Virtual Private Networks for Network Layer Security; Chapter 25 - Network Access Control and Wireless Network Security; Chapter 26 - Cyber Threats and Their Defense; Chapter 27 - Network and Information Infrastructure Virtualization; Chapter 28 - Unified Communications and Multimedia Protocols; Glossary of Acronyms; Back Cover…”
Libro electrónico -
8040Publicado 2017Tabla de Contenidos: “…From subsistence to nutrition : the Canadian state's involvement in food and diet in the north, 1900-1970 / Liza Piper -- 7. Hope in the barrenlands : northern development and sustainability's Canadian history / Tina Loo -- 8. …”
Libro electrónico