Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
81Publicado 1905Tabla de Contenidos: “…Involvement of the United States in forging and forming the Alliance until the end of the Cold War 29 -- 3. Historical explanations for US engagement in and with (NATO) Europe: Oscillating between unilateralism and multilateralism 36 -- 4. …”
Libro electrónico -
82por Liebs, Detlef, 1936-Tabla de Contenidos: “…Killing a sister for mourning a fallen enemy -- Temporary end to trials involving black magic -- A dowry hunter loses out -- A naive buyer -- The party's intention vs. the pedantry of jurists? …”
Publicado 2012
Libro -
83Publicado 2016Libro electrónico
-
84por Dobbins, JamesTabla de Contenidos: “…Cover -- Title Page -- Copyright -- Preface -- Foreword -- Contents -- Figures and Tables -- Executive Summary -- Acknowledgments -- Chapter One: Introduction -- Alternative Models -- Assessing and Accepting Risk -- Values and Interests -- Keeping Pace with Change -- Choices for America -- Chapter Two: The Global Economy -- Trends and Challenges -- Including or Excluding China -- Global Versus Regional Rule-Setting -- Chapter Three: National Defense -- Europe -- East Asia -- Counterterrorist Operations -- Nuclear Forces -- Counterinsurgency and Stability Operations -- Readiness -- Enhancing Allied Defenses -- Choices for Sizing the Defense Budget -- Chapter Four: Counterterrorism -- Tactical Versus Strategic Counterterrorism -- What Will Be Needed to Defeat ISIS? …”
Publicado 2015
Libro electrónico -
85Publicado 2022“…Before concluding the course, you will understand how to exploit race conditions in web applications and how serious the consequences of this attack can be. At the end of this course, you would have gained knowledge about other powerful, full-stack attacks on modern web applications such as HTTP parameter pollution, subdomain takeover, and clickjacking. …”
Video -
86
-
87Publicado 2013“…However, changing economic realities and the ongoing reductions in overall defense spending related to the end of more than a decade of war will affect the funding available for these initiatives. …”
Libro electrónico -
88Publicado 2002Tabla de Contenidos: “…-- Time-relative interests and adaptation -- Potential -- The sanctity of human life -- Infanticide -- Abortion as the denial of life support -- Abortion and self-defense -- 5. ENDINGS: When do we die, or cease to exist? …”
Libro -
89por Powell, Colin L., 1937-Tabla de Contenidos: “…Chairman, we've got a problem" - When you've lost your best enemy - A line in the sand - Every war must end - Change of command - Mustering out - A farewell to arms - Afterword - Colin Powell's rules…”
Publicado 1996
Libro -
90por O'Leary, Mike. author“…You will continue with more advanced network services, web servers, and database servers and you will end by building your own web applications servers, including WordPress and Joomla!. …”
Publicado 2019
Libro electrónico -
91Publicado 2014Tabla de Contenidos: “…. -- Igniting an evangelical conversation / Introduction to evangelical conditionalism / Influential defenses of conditionalism. -- The final end of the wicked / The nature of final destiny / Judgment and hell / The destruction of the finally impenitent / The case for conditional immortality / Biblical support for conditionalism. -- The doom of the lost / New Testament teaching on hell / Does Revelation 14:11 teach eternal torment? …”
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
92Publicado 2012Tabla de Contenidos: “…Smith -- Degenerate regimes in Plato's Republic / Zena Hitz -- Virtue, luck and choice at the end of the Republic / Mark L. McPherran -- Plato's divided soul / Christopher Shields -- The meaning of "saphēneia" in Plato's divided line / J.H. …”
Libro -
93Publicado 2023Tabla de Contenidos: “…La Lucha sin Fin (The Never-Ending Struggle) -- 13. Latin America's Representative in the U.S. …”
Libro -
94
-
95Publicado 2023“…About 15 years after the end of the war, a second wave of trials against Nazi criminals occurred in many Eastern Bloc states, which followed a different logic than the ones immediately after the war. …”
Libro -
96Publicado 2020“…You will learn how to build automation tools for information security, and will hopefully find that these examples will help inspire you to design and build your own! By the end of this course, you will have the skills and confidence you need to automate both offensive and defensive security techniques using Python; and have developed several small security tools and one large comprehensive penetration testing tool, all of which can be used in the real world…”
-
97Publicado 2010Tabla de Contenidos: “…Agency for International Development; Department of Defense; Stability Operations Roles and Missions; Department of State; U.S. …”
Libro electrónico -
98Publicado 2016Tabla de Contenidos: “…Reagan and the Cold War -- The historiography of the end of the Cold War / Francis H. Marlo -- Ronald Reagan: the spirit behind the strategy / Francis H. …”
Libro -
99por Ostovar, AfshonTabla de Contenidos: “…-- Rebranding the Basij -- Springtime -- A Cornered Lion -- Knives Out -- 11. In Defense of the Family of the Prophet -- In Defense of Sayyida Zaynab -- A Return to Karbala -- 12. …”
Publicado 2016
Libro -
100Publicado 2011Libro electrónico