Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 4,217
- Història 1,082
- Política y gobierno 820
- History 507
- Asia 353
- Descripción y viajes 273
- Asma 258
- -Historia 248
- Relaciones 223
- Crítica e interpretación 221
- Politics and government 217
- Usos y costumbres 203
- Economic conditions 179
- Descripción 176
- Civilización romana 173
- Historia y crítica 169
- Política exterior 167
- Civilización 151
- Situación social 146
- Geografía 135
- Religión 132
- Emperadores 129
- Política 128
- Obras anteriores a 1800 127
- Descripcions i viatges 124
- Relaciones exteriores 122
- Foreign relations 121
- Història antiga 113
- Comunismo 108
- Restos arqueológicos 108
-
24001Publicado 1945Tabla de Contenidos: “…La cultura de los pueblos salvajes. Las razas humanas. Los pueblos de Asia. Los pueblos de Oceanía / por D. …”
991004658779706719 -
24002Publicado 1945Tabla de Contenidos: “…La cultura de los pueblos salvajes. Las razas humanas. Los pueblos de Asia. Los pueblos de Oceanía / por D. …”
991004658819706719 -
24003Publicado 1962Tabla de Contenidos: “…La cultura de los pueblos primitivos actuales. Las razas humanas : Los pueblos de Asia. Los pueblos de Oceanía / Pedro Bosch Gimpera ... …”
Libro -
24004por Acuff, Frank L.Tabla de Contenidos: “…-- Ten powerful strategies for negotiating around the world -- The four most difficult challenges faced by global negotiators (and how to deal with them) -- Negotiating in Western Europe -- Negotiating in Eastern Europe -- Negotiating in Latin America -- Negotiating in North America -- Negotiating in the Middle East and North Africa -- Negotiating in Asia and the Pacific Rim -- Negotiating in Sub-Saharan Africa…”
Publicado 2008
Libro electrónico -
24005Publicado 1968Tabla de Contenidos: “…., [24] h. de lam. -- v.3: Europa (II). Asia.-- 544 p., [41] h. de lam. -- v.4: África. Oceanía.-- 487 p., [27] h. de lam. -- v.5: América.-- 506 p., [38] h. de lam…”
Libro -
24006por Kissinger, Henry, 1923-2023Tabla de Contenidos: “…Introduction: The question of world order -- Europe : the pluralistic international order -- The European balance-of-power system and its end -- Islamism and the Middle East : a world in disorder -- The United States and Iran : approaches to order -- The multiplicity of Asia -- Toward an Asian order : confrontation or partnership? …”
Publicado 2014
Libro -
24007por Longfellow, Brenda, 1973-Tabla de Contenidos: “…Variation and innovation: Hadrian and local elites in Asia Minor -- 6. Severan emperors and the return of imperial nymphaea to Rome -- 7. …”
Publicado 2011
Libro -
24008Publicado 2003Tabla de Contenidos: “…Military mobilisation in China / Hans Van de Ven -- South Asia / Douglas Peers -- Japan / Edward Drea -- The United States military, 1815-2000 / Spencer Tucker -- War in modern Latin America / Miguel Angel Centeno -- Sub-Saharan African warfare / John Lamphear -- European warfare 1815-2000 / Peter Wilson -- Naval power and warfare, 1815-2000 / Jan Glete -- Air power and the modern world / John Buckley…”
Libro -
24009por Wey Gómez, NicolásTabla de Contenidos: “…Introduction : why Columbus sailed south to the Indies -- Machina mundi : the moral authority of place in the early transatlantic encounter -- Columbus and the open geography of the ancients -- The meaning of India in pre-Columbian Europe -- From place to colonialism in the Aristotelian tradition -- En la parte del sol : Iberia's invention of the Afro-Indian tropics, 1434-1494 -- Between Cathay and a hot place : reorienting the Asia-America debate -- The tropics of empire in Columbus's Diario…”
Publicado 2008
Libro -
24010por Curtis IV, Edward E.Tabla de Contenidos: “…The heirs of Bilal in North Africa and the Middle East: healing, spirit possession, and Islam in the village -- African Muslims in Europe: Mandinga, Murids, and British Black Muslims -- Siddis and habshis in South Asia: shrines of the African saints and life-cycle rituals in the village -- Islamic jihad or just revolt? …”
Publicado 2014
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
24011Publicado 2013Tabla de Contenidos: “…Asian Program for Incubation of Environmental Leaders -- Concepts of EL -- How to teach EL in a class room - Environmental Challenges and Leadership in Asia -- APIEL resonance -- Leadership Education tackling Water Environmental Issues in Arid Regions -- IPoS: Intensive Program on Sustainability -- Cambodia Considering their sustainable future -- BKK: Sustainable solid waste management in Asian developing countries -- Sustainable urban development toward Green City of the Greater Pearl River Delta, China…”
Libro electrónico -
24012Publicado 2020Tabla de Contenidos: “…Preliminary Material -- Introduction -- Roots -- How Not to Be Seen: The Hidden Statuary of Emperor Meiji -- Beginnings: Statues of Imperial Figures -- Patterns of Social Behavior and Participation -- A Quantitative Analysis of Public Statuary in Modern Japan -- A Typology of Public Statuary in Modern Japan -- Mobilizing Japan's "Men in Metal" in the Asia-Pacifi c War -- Colonial Statues and Their Legacy -- The Resurgence of Public Statuary in Postwar Japan -- Public Statuary since the 1960s -- Conclusion -- Notes -- Bibliography -- Index…”
Libro electrónico -
24013Publicado 2009Tabla de Contenidos: “…IX Oceanía ; T. X Europa ; DVD 1 Asia ; DVD 2 África ; DVD 3 América ; DVD 4 Europa ; DVD 5 Oceanía ; DVD 6 Contenidos extras…”
Libro -
24014por Neiberg, Michael S.Tabla de Contenidos: “…Groves' son and the fate of East Asia -- Conclusion…”
Publicado 2015
Libro -
24015por Fazio, Michael W.Tabla de Contenidos: “…Introduction -- The beginnings of architecture -- The Greek world -- The architecture of ancient India and southeast Asia -- Traditional architecture of China and Japan -- The Roman world -- Early Christian and Byzantine architecture -- Islamic architecture -- Early Medieval and Romanesque architecture -- Gothic architecture -- Indigenous architecture in the Americas and Africa -- Renaissance architecture -- Baroque architecture -- The eighteenth century -- Nineteenth-century developments -- The twentieth century and modernism -- Modernisms in the mid- and late-twenty-first [i.e. twentieth] century and beyond…”
Publicado 2008
Sumario
Libro -
24016por Donsbach, WolfgangTabla de Contenidos: “…Communication Freedom in AsiaMedia Markets in Asia; References and Suggested Readings; Attending to the Mass Media; References and Suggested Readings; Attitude-Behavior Consistency; References and Suggested Readings; Attitudes; References and Suggested Readings; Audience Research; References and Suggested Readings; Audience Segmentation; References and Suggested Readings; Audiences, Female; References and Suggested Readings; Australia: Media System; References and Suggested Readings; B; Bad News in Medicine, Communicating; References and Suggested Readings; BBC…”
Publicado 2015
Libro electrónico -
24017Publicado 2017Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
Libro electrónico -
24018Publicado 2013Tabla de Contenidos: “…Lewis -- Climate change of the trans-Himalayan region and its impact on China-South Asia water security / David Kerr -- Environmental security and its implications for China's foreign relations / Junko Mochizuki and ZhongXiang Zhang -- Multilateral environmental engagement with Chinese characteristics / Timothy Scolnick -- The exploding balloon: environmental costs of China's participation in global capitalism / Dai Qing, Helen Lansdowne and Patricia Adams -- Human security implications of China's foreign energy relations / Gaye Christoffersen -- Fuelling insecurity: energy and human security in Sino-Myanmar relations / Gabriel Botel -- Food security and food safety in China's foreign policy / by Elizabeth Wishnick -- Pandemic responses in the Asia-Pacific: risk and opportunity in PRC's international relations / Jonathan Schwartz -- China's brain drain woes: elite emigration and national security / Willy Lam -- Corporate social responsibility in China's new economic diplomacy / Robert J. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
24019Publicado 2012Tabla de Contenidos: “…Security Interests in East Asia, Europe, and the Middle East; Perspectives Lead to Global Postures; Global Posture 1: Long Range and Responsive; Global Posture 2: Forward in Asia; Global Posture 3: Forward in the Middle East…”
Libro electrónico -
24020por Organisation for Economic Co-operation and Development.Tabla de Contenidos: “…Micro-Finance, poverty alleviation and financial reform in China Attempt to implement mico-finance in rural China; Rural finance and micro-finance development in transition countries in South-East and East Asia; Annex…”
Publicado 2004
Libro electrónico