Mostrando 23,761 - 23,780 Resultados de 26,976 Para Buscar 'RSHA~', tiempo de consulta: 0.83s Limitar resultados
  1. 23761
    por Taehan Soakwa Hakhoe
    Publicado 2020
    Tabla de Contenidos: “…Perspective -- Other -- The long journey toward improving children's health: from 'Korean Journal of Pediatrics' to 'Clinical and Experimental Pediatrics' -- Man Yong Han, Yeong Ho Rha, Chong-Woo Bae, Baik-Lin Eun, Clinical and Experimental Pediatrics Editorial Team -- Review Article -- Pulmonology -- High-flow nasal cannula oxygen therapy in children: a clinical review -- Ji-Won Kwon -- Systematic review and meta-analysis -- Psychiatric/Psychology -- Association between neonatal jaundice and autism spectrum disorders among children: a meta-analysis -- Ensiyeh Jenabi, Saeid Bashirian, Salman Khazaei -- Editorials -- Genetics and Metabolism -- Considerations for evaluating the effectiveness and long-term outcome of enzyme replacement therapy in Pompe disease -- Chong Kun Cheon -- Neonatology (Perinatology) -- Prevention and management of pain in the neonatal intensive care unit -- Sung Shin Kim -- Allergy -- Hereditary angioedema in childhood -- Young Min Ahn -- Original Articles -- Critical Care Medicine -- Comparative validity of microalbuminuria versus clinical mortality scores to predict pediatric intensive care unit outcomes -- Shifa Nismath, Suchetha S. …”
    Revista digital
  2. 23762
    por Roland, John F.
    Publicado 2004
    “…Cisco authorized self-study book for CCSP 642-501 foundation learning Identify the lineup of Cisco Systems network security products and enumerate the components of a complete security policy Use Cisco Secure ACS for Windows and Cisco Secure ACS for UNIX to implement TACACS+ and RADIUS AAA support in Cisco router networks Configure AAA support on perimeter Cisco routers and Cisco IOS Firewalls Implement standard practices to secure administrative access and disable unused router protocols, services, and interfaces Use AutoSecure to configure security parameters on Cisco routers Configure Cisco IOS Firewalls for CBAC, Authentication Proxy, and AAA support Configure and manage Cisco IOS IDS router signatures and audit rules Monitor Cisco IOS IDS routers using Security Monitor or Syslog servers Configure IPSec VPN tunnels on Cisco routers using preshared keys or RSA signatures Configure Cisco routers to use IPSec with Network Address Translation Use Security Device Manager and Router Management Center to configure and manage Cisco IOS VPN and Cisco IOS Firewall policies Mitigate common router security threats with access control lists (ACLs) CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is a complete reference for security practices, protocols, software, and equipment that work on or in conjunction with Cisco IOS equipment to provide layers of security to networks. …”
    Libro electrónico
  3. 23763
    por Venturella, Mariella
    Publicado 2016
    “…Des dels resultats obtinguts, s'ha pogut discutir el desenvolupament comunicatiu del grup, dels seus participants i de les dues terapeutes. …”
    Accés lliure
    Tesis
  4. 23764
    Publicado 2019
    “…Problems that were considered too difficult for computers to solve—such as simulations of protein folding in biological systems and cracking RSA encryption—are now possible through quantum computers. …”
    Video
  5. 23765
  6. 23766
    Publicado 2011
    Libro
  7. 23767
  8. 23768
    por Bellwood, Peter S.
    Publicado 1997
    Tabla de Contenidos: “…II The -- Beginnings of Austronesian -- PrehistoryIII The Neolithic Phase in -- Island Southeast Asia and Western -- Oceania; IV An Integrated View of -- Early Austronesian Expansion; V The -- Stages of Austronesian Agricultural -- Prehistory; 8 The Archaeological -- Record of Early Agricultural -- Communities in Peninsular Malaysia; I -- The Significance of the Ban Kao -- Culture and the Malay Peninsular -- Neolithic; 9 The Early Metal Phase: A -- Protohistoric Transition toward Supra- -- Tribal Societies; I The Dong Son -- Culture of Northern Vietnam; II The Sa -- Huynh Culture of Southern Vietnam; -- III The Role of India. …”
    Libro electrónico
  9. 23769
    por Roncayolo, Marcel
    Publicado 1972
    Tabla de Contenidos: “…La lucha por el desarrollo y la independencia: Asia, África y América Latina…”
    Libro
  10. 23770
    Publicado 2023
    Tabla de Contenidos: “…-- 4.5.2 Der AEAD-Modus AES-GCM -- 4.5.3 ChaCha20-Poly1305 -- 4.6 Andere Arten der symmetrischen Verschlüsselung -- 4.6.1 Key-Wrapping -- 4.6.2 Authentifizierte Verschlüsselung, die gegen Nonce-Missbrauch resistent ist -- 4.6.3 Datenträgerverschlüsselung -- 4.6.4 Datenbankverschlüsselung -- 5 Schlüsselaustausch -- 5.1 Was sind Schlüsselvereinbarungen? …”
    Libro electrónico
  11. 23771
    por Rubin, Barry M.
    Publicado 2008
    Tabla de Contenidos: “…The early history of terrorism as ideology and strategy -- Social revolutionary terrorism in Europe and North America -- Nationalist terrorism in Europe and North America -- Social revolutionary terrorism in Latin America -- Revolutionaries of Asia and Africa -- Terrorism in the Middle East -- Radical Islamist terrorism -- Global jihad, September 11 and afterwards…”
    Enlace del recurso
    Libro electrónico
  12. 23772
    Publicado 1967
    Tabla de Contenidos: “…v. V : Asia, Unión India, Península Indochina, Insulindia, el mundo chino, Japón, Africa, Africa mediterránea, Sudán…”
    Libro
  13. 23773
    Publicado 2018
    Tabla de Contenidos: “…Front Matter -- Copyright page -- Introduction / Structure of References -- Periodicals -- Abbreviations -- Become a contributor to the Linguistic Bibliography -- General works -- General linguistics and related disciplines -- Indo-European languages -- Languages of Mainland Southeast Asia -- Languages of Sub-Saharan Africa -- Pidgins and Creoles -- Sign languages…”
    Libro electrónico
  14. 23774
    Publicado 2022
    Tabla de Contenidos: “…Is Academic Knowledge Production on Transboundary Water Studies in South Asia Gender Neutral?, -- 4. A Gendered…”
    Libro electrónico
  15. 23775
    Publicado 2014
    Tabla de Contenidos: “…Cover; Title Page; Copyright; Contents; Foreword; Introduction; Assessment Test; Chapter 1 Cryptographic Tools and Techniques; The History of Cryptography; Cryptographic Services; Cryptographic Goals; Cryptographic Terms; Cipher Types and Methods; Symmetric Encryption; Data Encryption Standard; Triple DES; Advanced Encryption Standard; International Data Encryption Algorithm; Rivest Cipher Algorithms; Asymmetric Encryption; Diffie-Hellman; RSA; Elliptic Curve Cryptography; ElGamal; Hybrid Encryption; Hashing; Hashing and Message Digests; MD Series; SHA; HAVAL; Message Authentication Code…”
    Libro electrónico
  16. 23776
    Publicado 2014
    Tabla de Contenidos: “…Early Community Politics and the Marginalization of Women in Islamic Intellectual HistoryMuslim Women as Religious Scholars: A Historical Survey; Introduction; The importance of women's engagement with the foundational sources; Women and the tradition of Qur'anic exegesis; Women and the Transmission of Hadith; Women and the legacy of fiqh; 'Ā'isha: Reclaiming a tradition of women's engagement; Conclusion; Feminist Readings of the Qur'an: Social, Political, and Religious Implications; QUESTIONS OF TERMINOLOGY; FOUNDING MYTHS, PATRIARCHAL READINGS; The use of historical myths in classical texts…”
    Libro electrónico
  17. 23777
    Publicado 1932
    Tabla de Contenidos: “…Una noia amiga dels pobres ; L'histèric d'una gormanta ; La pageseta que va ésser reina ; Qui s'ha menjat els ronyons del cabrit ; El príncep que era ric a desdir / il·lustrat per Jaume Busquets -- Vol. 15. …”
    991005823249706719
  18. 23778
    por Cherry, Mark J.
    Publicado 2005
    Tabla de Contenidos: “…Book Cover; Title; Copyright; Contents; Acknowledgements; Preface to a new series; Introduction:Bioethics as a Global Phenomenon; Part I: North America; Part II: South America; Part III: Europe; Part IV: Asia; Part V: New Zealand; Notes on Contributors; Index…”
    Libro electrónico
  19. 23779
    por Grice, Helena
    Publicado 2009
    Tabla de Contenidos: “…Reading Asian American fiction, history and life writing: international encounters -- The escape from Asia tradition: cultural revolution expatriate memoirs -- Contemporary transracial adoption narratives: prospects and perspectives -- A secret history: American representations of geisha society -- Korean expatriate writing and the history of the Korean peninsula…”
    Libro
  20. 23780
    por Kawashima, Yutaka, 1942-
    Publicado 2005
    Tabla de Contenidos: “…Historical parameters of Japanese foreign policy -- Security ties between Japan and the United States -- The economic relationship between Japan and the United States -- Endgame on the Korean Peninsula -- Relations between Japan and China -- Japan's Southeast Asia policy -- Japan's relations with Europe -- Striving for peace and saving failed states…”
    Libro