Showing 1 - 20 results of 125 for search 'Die Hard 2', query time: 0.14s Refine Results
  1. 1
    Published 2002
    Video
  2. 2
    by Freude, Heinz
    Published 1976
    Book
  3. 3
    by Freude, Heinz
    Published 1971
    Book
  4. 4
    by Freude, Heinz
    Published 1974
    Book
  5. 5
    by Singh, Binti
    Published 2023
    Table of Contents: “…List of figures -- List of contributors -- Foreword: Adapt or Die -- Acknowledgements -- 1 Negotiating Resilience with Hard and Soft City PART I: City and Its Vulnerabilities -- 2 Ethnically Diverse Neighborhoods and the New Meaning of "Community" in the Global North -- 3 Resilient Tactics and Everyday Lives in the Textile Mill Areas of Mumbai -- 4 Informal Housing of Migrants in Italy -- 5 Cities, Housing Exclusion, and Homelessness from a European Perspective -- 6 Just and Healthy Cities in Times of Global Threats: Perspectives from the Global North The Case of Settling Deonar Dump Yard Site, Mumbai Environmental Injustice: Air Pollution and Data Inequity in Kibera, Nairobi PART II: Relocation, Resettlement, and Resilience -- 7 Resilience at the City Margins-Roma Settlements in Bulgaria -- 8 Tolerance to Heat as a Coping Strategy of Low-Income Households in India and Austria -- 9 Home-Based Income Generation in Addis Ababa, Ethiopia -- 10 "Nothing Is to Be Gained by Involving Them": Exploring Residents' Lived Experiences of Resettlement in a Medium-Sized City in India -- 11 The Vertical versus Horizontal City: Why Vertical Resettlement (Mostly) Does Not Work for the Urban Poor -- 12 Conclusion: Towards Just Resilience…”
    eBook
  6. 6
    Published 2023
    Table of Contents: “…List of figuresList of contributorsForeword: Adapt or Die -- Acknowledgements -- 1 Negotiating Resilience with Hard and Soft City PART I: City and Its Vulnerabilities -- 2 Ethnically Diverse Neighborhoods and the New Meaning of "Community" in the Global North -- 3 Resilient Tactics and Everyday Lives in the Textile Mill Areas of Mumbai -- 4 Informal Housing of Migrants in Italy -- 5 Cities, Housing Exclusion, and Homelessness from a European Perspective -- 6 Just and Healthy Cities in Times of Global Threats: Perspectives from the Global North The Case of Settling Deonar Dump Yard Site, Mumbai Environmental Injustice: Air Pollution and Data Inequity in Kibera, Nairobi PART II: Relocation, Resettlement, and Resilience -- 7 Resilience at the City Margins-Roma Settlements in Bulgaria -- 8 Tolerance to Heat as a Coping Strategy of Low-Income Households in India and Austria -- 9 Home-Based Income Generation in Addis Ababa, Ethiopia -- 10 "Nothing Is to Be Gained by Involving Them": Exploring Residents' Lived Experiences of Resettlement in a Medium-Sized City in India -- 11 The Vertical versus Horizontal City: Why Vertical Resettlement (Mostly) Does Not Work for the Urban Poor -- 12 Conclusion: Towards Just Resilience…”
    eBook
  7. 7
  8. 8
    Published 2021
    “…Given optimal solutions to these subproblems, the dynamic program then combines them into an optimal solution for the original problem. 2-SAT programming refers to the procedure of reducing a problem to a set of 2-SAT formulas, that is, boolean formulas in conjunctive normal form in which each clause contains at most two literals. …”
    eBook
  9. 9
    Published 2022
    Table of Contents: “…Physical Access Control -- The Data Center -- Service Level Agreements -- Summary -- Chapter 2 Access Controls -- Access Control Concepts -- Subjects and Objects -- Privileges: What Subjects Can Do with Objects -- Data Classification, Categorization, and Access Control -- Access Control via Formal Security Models -- Implement and Maintain Authentication Methods -- Single-Factor/Multifactor Authentication -- Accountability -- Single Sign-On -- Device Authentication -- Federated Access -- Support Internetwork Trust Architectures -- Trust Relationships (One-Way, Two-Way, Transitive) -- Extranet -- Third-Party Connections -- Zero Trust Architectures -- Participate in the Identity Management Lifecycle -- Authorization -- Proofing -- Provisioning/Deprovisioning -- Identity and Access Maintenance -- Entitlement -- Identity and Access Management Systems -- Implement Access Controls -- Mandatory vs. …”
    eBook
  10. 10
    by Porter, Edgar A.
    Published 2018
    Book
  11. 11
    Published 2017
    Table of Contents: “…A Hard Price to Pay -- 10. Donate Everything -- 11. …”
    eBook
  12. 12
  13. 13
    by Antonopoulos, Andreas M.
    Published 2024
    eBook
  14. 14
    Published 2017
    eBook
  15. 15
    Published 2017
    eBook
  16. 16
    Published 2021
    Subjects:
    eBook
  17. 17
    Published 2020
    eBook
  18. 18
    by Cattini, Roland
    Published 2022
    Table of Contents: “…Intro -- CompTIA Server+ -- Impressum -- Kapitel 1: Einführung -- 1.1 Das Ziel dieses Buchs -- 1.2 Die CompTIA-Server+-Zertifizierung -- 1.3 Voraussetzungen für CompTIA Server+ -- 1.4 Die Autoren -- 1.5 Sind Sie bereit für CompTIA Server+? …”
    eBook
  19. 19
  20. 20
    Published 2018
    Table of Contents: “…Schlüssel und Adressen in Python implementieren -- Fortgeschrittene Schlüssel und Adressen -- Verschlüsselte private Adressen (Encrypted Private Keys, BIP-38) -- Pay-to-Script-Hash-(P2SH-)Adressen und Multisig-Adressen -- Vanity-Adressen -- Paper-Wallets -- Kapitel 5: Wallets -- Wallet-Technologie in der Übersicht -- Nichtdeterministische (zufallsbasierte) Wallets -- Deterministische (Seed-basierte) Wallets -- HD-Wallets (BIP-32/BIP-44) -- Seeds und mnemonische Codes (BIP-39) -- Die Wallet-Best-Practices -- Eine Bitcoin-Wallet verwenden -- Details der Wallet-Technologie -- Mnemonische Codewörter (BIP-39) -- Eine HD-Wallet aus dem Seed-Wert erzeugen -- Einen erweiterten öffentlichen Schlüssel in einem Webshop nutzen -- Kapitel 6: Transaktionen -- Einführung -- Transaktionen im Detail -- Transaktionen - hinter den Kulissen -- Transaktions-Outputs und -Inputs -- Transaktions-Outputs -- Transaktions-Inputs -- Transaktionsgebühren (Fees) -- Gebühren in Transaktionen einfügen -- Transaktionsskripte und Skriptsprache -- Turing-Unvollständigkeit -- Zustandslose Verifikation -- Konstruktion von Skripten (Lock + Unlock) -- Pay-to-Public-Key-Hash (P2PKH) -- Digitale Signaturen (ECDSA) -- Wie digitale Signaturen funktionieren -- Die Signatur verifizieren -- Arten von Signatur-Hashes (SIGHASH) -- Die Mathematik hinter ECDSA -- Die Bedeutung der Zufälligkeit für Signaturen -- Bitcoin-Adressen, Guthaben und andere Abstraktionen -- Kapitel 7: Transaktionen und Skripting für Fortgeschrittene -- Einführung -- Multisignatur -- Pay-to-Script-Hash (P2SH) -- P2SH-Adressen -- Vorteile von P2SH -- Redeem-Skript und Validierung -- Data Recording Output (RETURN) -- Timelocks -- Transaktions-Locktime (nLocktime) -- Check Lock Time Verify (CLTV) -- Relative Timelocks -- Relative Timelocks mit nSequence -- Relative Timelocks mit CSV -- Median-Time-Past…”
    eBook