Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 380
- Història 221
- History 146
- Ciceró, Marc Tul·li 128
- Películas cinematográficas 124
- Filosofía 102
- Crítica e interpretación 60
- Òperes 52
- Arte 49
- Computer security 48
- Llibrets 48
- Security measures 47
- En el cine 45
- Crítica, Interpretació, Etc 41
- Education 41
- Arqueología 40
- Taxation 40
- Biografia 39
- Computer networks 39
- Law and legislation 39
- Anglès 38
- Crítica i interpretació 38
- Materiales 38
- Research 37
- Economic conditions 36
- Universidad Pontificia de Salamanca (España) 36
- Política 33
- Antiquities 32
- Cine 32
- Descripcions i viatges 32
-
8061Publicado 2021Tabla de Contenidos: “…DESARROLLO DE COMPETENCIAS EMOCIONALES EN EDUCACIÓN SUPERIOR -- CAPÍTULO 6. EDUCACIÓN Y CINE: ANÁLISIS DE UN RECURSO FÍLMICO COMO HERRAMIENTA EDUCATIVA PARA ABORDAR EL (CIBER)BULLYING DENTRO DEL AULA -- CAPÍTULO 7. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
8062Publicado 2014Tabla de Contenidos: “…Mendelsohn and Why I Envy Him; Chapter 26: The Man in the Iron Mask: Encore et Enfin, Cryptologically; Chapter 27: Students Better than a Pro (Bazeries) and an Author (Candela); Chapter 28: The Old Master of Austrian Cryptology; Chapter 29: Enigma Uncracked: The Allies Fail to Break the German Cipher Machine; Chapter 30: The Future of the Past: Questions in Cryptologic History; Back Cover…”
Libro electrónico -
8063Publicado 2000Tabla de Contenidos: “…/ Fiction of Asian American literature / Ciphers…”
Libro -
8064Publicado 2009Tabla de Contenidos: “…Timing Attack -- Power Analysis -- Fault Analysis -- Backdoor Attacks -- Attacks on RSA -- An Attack on ElGamal Signatures -- An Attack on ElGamal Encryption -- Countermeasures -- Quantum Computation and Cryptography -- Introduction -- Quantum Computation -- System -- Entanglement -- Evolution -- Measurement -- The Deutsch Algorithm -- Quantum Cryptography -- Quantum Cryptanalysis -- Shor's Algorithm for Computing Period -- Breaking RSA -- Factoring Integers -- Computing Discrete Logarithms -- Symmetric Techniques -- Introduction -- Block Ciphers -- A Case Study: DES -- The Advanced Standard: AES -- Multiple Encryption -- Modes of Operation -- Stream Ciphers -- Linear Feedback Shift Registers -- Stream Ciphers Based on LFSRs -- Hash Functions -- Merkle's Meta Method -- The Secure Hash Algorithm -- Key Exchange in Sensor Networks -- Complexity Theory and Cryptography -- Introduction -- Provably Difficult Computational Problems Are not Suitable -- One-way Functions and the Complexity Class UP -- Introduction -- Security Issues in a Sensor Network -- The Basic Bootstrapping Framework -- The Basic Random Key Predistribution Scheme -- The q-composite Scheme -- Multi-path Key Reinforcement -- Random Pairwise Scheme -- Multi-hop Range Extension -- Polynomial-pool-based Key Predistribution -- Pairwise Key Predistribution -- Grid-based Key Predistribution -- Matrix-based Key Predistribution -- Location-aware Key Predistribution -- Closest Pairwise Keys Scheme -- Location-aware Polynomial-pool-based Scheme -- Complexity Theoryand Cryptography -- Hints to Selected Exercises -- References -- Index…”
Libro electrónico -
8065Publicado 2022Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Section 1: A Brief History and Outline of Cryptography -- Chapter 1: Deep Dive into Cryptography -- An introduction to cryptography -- Binary numbers, ASCII code, and notations -- Fermat's Last Theorem, prime numbers, and modular mathematics -- A brief history and a panoramic overview of cryptographic algorithms -- Rosetta Stone -- The Caesar cipher -- ROT13 -- The Beale ciphers -- The Vernam cipher -- Notes on security and computation -- Summary -- Section 2: Classical Cryptography (Symmetric and Asymmetric Encryption) -- Chapter 2: Symmetric Encryption Algorithms -- Notations and operations in Boolean logic -- DES algorithms -- Simple DES -- Bit initialization -- Bit expansion -- Key generation -- Bit encryption -- DES -- Key generation in DES -- Analysis of the DES algorithm -- Violation of DES -- Triple DES -- DESX -- AES Rijndael -- Description of AES -- Attacks and vulnerabilities in AES -- Summary -- Chapter 3: Asymmetric Encryption Algorithms -- Introduction to asymmetric encryption -- The pioneers -- The Diffie-Hellman algorithm -- The discrete logarithm -- Explaining the D-H algorithm -- Analyzing the algorithm -- Possible attacks and cryptanalysis on the D-H algorithm -- RSA -- Explaining RSA -- Analyzing RSA -- Conventional attacks on the algorithm -- The application of RSA to verify international treaties -- Unconventional attacks -- PGP -- The ElGamal algorithm -- Summary -- Chapter 4: Hash Functions and Digital Signatures -- A basic explanation of hash functions -- Overview of the main hash algorithms -- Logic and notations to implement hash functions -- Explanation of the SHA-1 algorithm -- Notes and example on SHA-1 -- Example of one block encoded with SHA- 1 -- Authentication and digital signatures -- RSA digital signatures -- Why do digital signatures work?…”
Libro electrónico -
8066por Ruz Ruz, LibardoTabla de Contenidos: “…Campos electromagnéticos en el vacío -- 1.1 Introducción -- 1.2 Carga eléctrica -- 1.3 Ley de Coulomb -- 1.4 El campo eléctrico -- 1.5 La Ley de Gauss -- 1.6 Corriente eléctrica -- 1.7 Ley de Ampère -- 1.8 Flujo magnético y la Ley de Gauss para el campo magnético -- 1.9 Ley de Faraday -- Ejercicios -- Capítulo 2. …”
Publicado 2012
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
8067Publicado 2018Tabla de Contenidos: “…Deploying smart contracts on a blockchain -- The DAO -- Summary -- Chapter 10: Ethereum 101 -- Introduction -- The yellow paper -- Useful mathematical symbols -- Ethereum blockchain -- Ethereum - bird's eye view -- The Ethereum network -- Mainnet -- Testnet -- Private net -- Components of the Ethereum ecosystem -- Keys and addresses -- Accounts -- Types of accounts -- Transactions and messages -- Contract creation transaction -- Message call transaction -- Messages -- Calls -- Transaction validation and execution -- The transaction substate -- State storage in the Ethereum blockchain -- The world state -- The account state -- Transaction receipts -- Ether cryptocurrency / tokens (ETC and ETH) -- The Ethereum Virtual Machine (EVM) -- Execution environment -- Machine state -- The iterator function -- Smart contracts -- Native contracts -- Summary -- Chapter 11: Further Ethereum -- Programming languages -- Runtime bytecode -- Opcodes and their meaning -- Arithmetic operations -- Logical operations -- Cryptographic operations -- Environmental information -- Block information -- Stack, memory, storage, and ow operations -- Push operations -- Duplication operations -- Exchange operations -- Logging operations -- System operations -- Blocks and blockchain -- The genesis block -- The block validation mechanism -- Block finalization -- Block difficulty -- Gas -- Fee schedule -- Forks in the blockchain -- Nodes and miners -- The consensus mechanism -- Ethash -- CPU mining -- GPU mining -- Benchmarking -- Mining rigs -- Mining pools -- Wallets and client software -- Geth -- Eth -- Pyethapp -- Parity -- Light clients -- Installation -- Eth installation -- Mist browser -- Geth -- The geth console -- Funding the account with bitcoin -- Parity installation -- Creating accounts using the parity command line -- APIs, tools, and DApps…”
Libro electrónico -
8068Publicado 2022Tabla de Contenidos: “…Cover -- About the Authors -- Title Page -- Copyright Page -- Acknowledgments -- About this Book -- Contents at a Glance -- Contents -- Foreword -- Preface -- Introduction -- Instructor Website -- Chapter 1 Introduction and Security Trends -- The Computer Security Problem -- Definition of Computer Security -- Historical Security Incidents -- The Current Threat Environment -- Infrastructure Attacks -- Ransomware -- Threats to Security -- Viruses and Worms -- Intruders -- Insiders -- Criminal Organizations -- Nation-States, Terrorists, and Information Warfare -- Brand-Name Attacks -- Attributes of Actors -- Internal/External -- Level of Sophistication -- Resources/Funding -- Intent/Motivation -- Security Trends -- Targets and Attacks -- Specific Target -- Opportunistic Target -- Minimizing Possible Avenues of Attack -- Approaches to Computer Security -- Cybersecurity Kill Chain -- Threat Intelligence -- Open Source Intelligence -- Ethics -- Additional References -- Chapter 1 Review -- Chapter 2 General Security Concepts -- Basic Security Terminology -- Security Basics -- Security Tenets -- Security Approaches -- Security Principles -- Formal Security Models -- Confidentiality Models -- Integrity Models -- Additional References -- Chapter 2 Review -- Chapter 3 Operational and Organizational Security -- Policies, Procedures, Standards, and Guidelines -- Organizational Policies -- Change Management Policy -- Change Control -- Asset Management -- Security Policies -- Data Policies -- Credential Policies -- Password and Account Policies -- Human Resources Policies -- Code of Ethics -- Job Rotation -- Separation of Duties -- Employee Hiring (Onboarding) and Promotions -- Retirement, Separation, or Termination (Offboarding) -- Exit Interviews -- Onboarding/Offboarding Business Partners -- Adverse Actions -- Mandatory Vacations -- Acceptable Use Policy…”
Libro electrónico -
8069Publicado 2023Tabla de Contenidos: “…Fail Securely -- Separation of Duties (SoD) -- Keep It Simple -- Trust, but Verify -- Zero Trust -- Security Models -- Reading Down and Writing Up -- State Machine Model -- Bell-LaPadula Model -- Simple Security Property -- *Security Property (Star Security Property) -- Strong and Weak Tranquility Property -- Lattice-Based Access Controls -- Integrity Models -- Biba Model -- Simple Integrity Axiom -- * Integrity Axiom -- Clark-Wilson -- Well Formed Transactions -- Certification, Enforcement, and Separation of Duties -- Information Flow Model -- Chinese Wall Model -- Non-interference -- Take-Grant -- Access Control Matrix -- Zachman Framework for Enterprise Architecture -- Graham-Denning Model -- Harrison-Ruzzo-Ullman Model -- Evaluation Methods, Certification, and Accreditation -- The International Common Criteria -- Common Criteria Terms -- Levels of Evaluation -- Secure System Design Concepts -- Layering -- Abstraction -- Security Domains -- The Ring Model -- Open and Closed Systems -- Secure Hardware Architecture -- The System Unit and Motherboard -- The Computer Bus -- Northbridge and Southbridge -- The CPU -- Arithmetic Logic Unit and Control Unit -- Fetch and Execute -- Pipelining -- Interrupts -- Processes and Threads -- Multitasking and Multiprocessing -- Watchdog Timers -- CISC and RISC -- Memory Addressing -- Memory Protection -- Process Isolation -- Hardware Segmentation -- Virtual Memory -- Swapping and Paging -- BIOS -- WORM Storage -- Trusted Platform Module -- Data Execution Prevention and Address Space Layout Randomization -- Secure Operating System and Software Architecture -- The Kernel -- Reference Monitor -- Users and File Permissions -- Linux and UNIX permissions -- Microsoft NTFS Permissions -- Privileged Programs -- Virtualization, Cloud, and Distributed Computing -- Virtualization -- Hypervisor -- Virtualization Benefits…”
Libro electrónico -
8070Publicado 2017Tabla de Contenidos: “…Generating Namecoin records -- Litecoin -- Primecoin -- Trading Primecoin -- Mining guide -- Zcash -- Trading Zcash -- Mining guide -- Address generation -- GPU mining -- Downloading and compiling nheqminer -- Summary -- Chapter 6: Smart Contracts -- History -- Definition -- Ricardian contracts -- Smart contract templates -- Oracles -- Smart Oracles -- Deploying smart contracts on a blockchain -- The DAO -- Summary -- Chapter 7: Ethereum 101 -- Introduction -- Ethereum clients and releases -- The Ethereum stack -- Ethereum blockchain -- Currency (ETH and ETC) -- Forks -- Gas -- The consensus mechanism -- The world state -- The account state -- Nonce -- Balance -- Storageroot -- Codehash -- Transactions -- Nonce -- gasPrice -- gasLimit -- To -- Value -- Signature -- Init -- Data -- Contract creation transaction -- Message call transaction -- Elements of the Ethereum blockchain -- Ethereum virtual machine (EVM) -- Execution environment -- Machine state -- The iterator function -- Runtime byte code -- Opcodes and their meaning -- Arithmetic operations -- Logical operations -- Cryptographic operations -- Environmental information -- Block Information -- Stack, memory, storage and flow operations -- Push operations -- Duplication operations -- Exchange operations -- Logging operations -- System operations -- Precompiled contracts -- The elliptic curve public key recovery function -- The SHA-256 bit hash function -- The RIPEMD-160 bit hash function -- The identity function -- Accounts -- Types of accounts -- Block -- Block header -- Parent hash -- Ommers hash -- Beneficiary -- State root -- Transactions root -- Receipts root -- Logs bloom -- Difficulty -- Number -- Gas limit -- Gas used -- Timestamp -- Extra data -- Mixhash -- Nonce -- The genesis block -- Transaction receipts -- The post-transaction state -- Gas used -- Set of logs -- The bloom filter…”
Libro electrónico -
8071
-
8072
-
8073Publicado 2020Tabla de Contenidos: “…Chapter 7: Science data products for AMPERE -- Chapter 8: ESA Field Aligned Currents - Methodology Inter-Comparison Exercise -- Chapter 9: Spherical Cap Harmonic Analysis techniques for mapping high-latitude ionospheric plasma flow - Application to the Swarm satellite mission -- Chapter 10: Recent Progress on Inverse and Data Assimilation Procedure for High-Latitude Ionospheric Electrodynamics -- Chapter 11: Estimating currents and electric fields at low-latitudes from satellite magnetic measurements -- Chapter 12. …”
Electrónico -
8074Publicado 2002Tabla de Contenidos: “…Vassallo -- Alano di Lilla e la fondazione del sapere teologico / A. Musco…”
Libro -
8075“…Las presiones del entorno, la era de la híper velocidad, la cada vez mayor complejidad e incertidumbre requieren mentes y organizaciones flexibles, para reinventarse e integrar la avalancha de cambios cotidianos, y dotar de herramientas para llegar a la Transfor-acción. …”
Texto completo en Odilo
Otros -
8076Publicado 2020“…Michigan papers on South and Southeast Asia…”
Libro electrónico -
8077Publicado 2018“…Through various topics including coffee, wine, craft cider and Japanese knotweed, this volume explores the normativities that shape the way taste is felt and categorised, within and beyond subjective, phenomenological and human dimensions. …”
Libro electrónico -
8078por Sanderson, Hamish“…Friendly enough for beginners, detailed enough for advanced AppleScripters Includes major contributions from expert AppleScripters: Emmanuel Levy, Harald Monihart, Ian Piper, Shane Stanley, Barry Wainwright, Craig Williams, and foreword by AppleScript inventor, William Cook…”
Publicado 2010
Libro electrónico -
8079por Montagnino, Marian, authorTabla de Contenidos: “…Intelligent suggestions -- Automatically generated help and man pages -- Powering your CLI -- Viper - easy configuration for CLIs -- Configuration types -- Watching for live config changes -- Basic calculator CLI using Cobra and Viper -- The Cobra CLI commands -- The Viper configuration -- Running the basic calculator -- Summary -- Questions -- Answers -- Further reading -- Part 2: The Ins and Outs of a CLI -- Chapter 5: Defining the Command-Line Process -- Technical requirements -- Receiving the input and user interaction -- Defining subcommands, arguments, and flags -- Piping -- Signals and control characters -- User interaction -- Processing data -- Returning the resulting output and defining best practices -- Summary -- Questions -- Answers -- Further reading -- Chapter 6: Calling External Processes and Handling Errors and Timeouts -- Technical requirements -- Calling external processes -- The os/exec package -- Creating commands using the Cmd struct -- Running the command -- Interacting with REST APIs -- Get request -- Pagination -- Rate limiting -- Handling the expected - timeouts and errors -- Timeouts with external command processes -- Errors or panics with external command processes -- Timeouts and other errors with HTTP requests -- Summary -- Questions -- Answers -- Further reading -- Chapter 7: Developing for Different Platforms -- Technical requirements -- Packages for platform-independent functionality -- The os package -- The time package -- The path package -- The runtime package -- Implementing independent or platform-specific code -- Platform-independent code -- Platform-specific code -- Build tags for targeted platforms -- The build package -- Build tags -- OS-level differences -- Summary -- Questions -- Answers -- Further reading -- Part 3: Interactivity and Empathic Driven Design…”
Publicado 2023
Libro electrónico -
8080por Clifford, John“…Cassandre, Alvin Lustig, Cipe Pineles, Paul Rand, Saul Bass, Milton Glaser, Wim Crouwel, Stefan Sagmeister, John Maeda, Paula Scher, and more. …”
Publicado 2014
Libro electrónico