Mostrando 25,361 - 25,380 Resultados de 26,976 Para Buscar 'RSHA~', tiempo de consulta: 1.51s Limitar resultados
  1. 25361
    por Zając, Barbara
    Publicado 2023
    Tabla de Contenidos: “…The coinage of Thrace -- X.2. The coinage of Asia -- X.3. The coinage of Galatia and Cappadocia -- Summary -- Plates -- References -- Historical Sources -- Abbreviations -- References -- Legends on the coins of Bithynia and Pontus during the reign of Trajan. -- APAMEA MYRLEA -- NICAEA -- PRUSA AD OLYMPUM -- BYZANTIUM -- CALCHEDON -- NICOMEDIA -- HERACLEA PONTICA -- IULIOPOLIS -- PRUSIAS AD HYPIUM -- TIUM -- ABONOTEICHOS -- AMASTRIS -- SINOPE -- AMISUS -- Coins without an ethnic with uncertain attribution…”
    Libro electrónico
  2. 25362
    Publicado 2020
    “…Coverage includes * Network security protocol and cryptography basics * Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) * First-generation public key algorithms (RSA, Diffie-Hellman, ECC) * How quantum computers work, and why they threaten the first-generation public key algorithms * Quantum computers: how they work, and why they threaten the first-generation public key algorithms * Multi-factor authentication of people * Real-time communication (SSL/TLS, SSH, IPsec) * New applications (electronic money, blockchains) * New cryptographic techniques (homomorphic encryption, secure multiparty computation)…”
    Libro electrónico
  3. 25363
    Publicado 2016
    Tabla de Contenidos: “…-- Summary -- Chapter 10: Attacks on Android Devices -- MitM attacks -- Dangers with apps that provide network level access -- Using existing exploits -- Malware -- Bypassing screen locks -- Bypassing pattern lock using adb -- Removing the gesture.key file -- Cracking SHA1 hashes from the gesture.key file -- Bypassing password/PIN using adb…”
    Libro electrónico
  4. 25364
    por Chapple, Mike
    Publicado 2024
    Tabla de Contenidos: “…Chapter 15 Threat Identification and Prevention: Objective 4.2 Understand Network Threats and Attacks -- Antivirus Software -- Intrusion Detection and Prevention -- Intrusion Detection -- Intrusion Prevention -- Environments Monitored -- Classification Errors -- Detection Techniques -- Firewalls -- Vulnerability Scanning -- Network Vulnerability Scanning -- Application Scanning -- Web Application Scanning -- Chapter 16 Network Security Infrastructure: Objective 4.3 Understand Network Security Infrastructure -- Data Center Protection -- Air Temperature -- Humidity -- Fire -- Network Security Zones -- Switches, WAPs, and Routers -- Switches -- WAPs -- Routers -- Network Segmentation -- Virtual Private Networks -- Network Access Control -- Role-Based Access Control -- Posture Checking -- Internet of Things -- IoT Security -- Chapter 17 Cloud Computing: Objective 4.3 Understand Network Security Infrastructure -- Cloud Computing -- Drivers for Cloud Computing -- Cloud Deployment Models -- Private Cloud -- Public Cloud -- Hybrid Cloud -- Community Cloud -- Cloud Service Categories -- Software as a Service (SaaS) -- Infrastructure as a Service (IaaS) -- Platform as a Service (PaaS) -- Desktop as a Service (DaaS) -- Security and the Shared Responsibility Model -- Automation and Orchestration -- Vendor Relationships -- Managed Service Providers -- Vendor Agreements -- Part V Domain 5: Security Operations -- Chapter 18 Encryption: Objective 5.1 Understand Data Security -- Cryptography -- Encrypting Data -- Decrypting Data -- Encryption Algorithms -- Symmetric Encryption -- Asymmetric Encryption -- Uses of Encryption -- Data at Rest -- Data in Transit -- Hash Functions -- MD5 -- SHA -- Chapter 19 Data Handling: Objective 5.1 Understand Data Security -- Data Life Cycle -- Create -- Store -- Use -- Share -- Archive -- Destroy -- Data Classification…”
    Libro electrónico
  5. 25365
    Publicado 2023
    Tabla de Contenidos: “…Google Cloud Memorystore -- Google Cloud's big data services -- Google Cloud Pub/Sub -- Google Cloud BigQuery -- Google Cloud Dataflow -- Google Cloud Dataproc -- Google Cloud Looker -- Summary -- Practice questions -- Answers to the practice questions -- Further reading -- Chapter 10: Google Cloud AI Services -- Google Cloud Vertex AI -- Vertex AI datasets -- Dataset labeling -- Vertex AI Feature Store -- Workbench and notebooks -- Vertex AI custom models -- Vertex Explainable AI -- Vertex AI prediction -- Vertex AI Model Monitoring -- Vertex AI Pipelines -- Vertex AI TensorBoard and Metadata -- Vertex AI AutoML -- Google Cloud ML APIs -- Sight API -- Conversational API -- Google Cloud generative AI services -- Summary -- Practice questions -- Answers to the practice questions -- Further reading -- Chapter 11: Google Cloud Security Services -- Google Cloud IAM -- Google Cloud users and groups -- Google Cloud service accounts -- Google Cloud IAM roles -- Google Cloud endpoint security -- GCE VM security -- GCS security -- Google Cloud network security -- Google Cloud data security -- Data classification and data lineage -- Data encryption -- GCP DLP -- Google Cloud Monitoring and Logging -- Google Cloud Security Command Center (SCC) -- SCC asset discovery -- SCC scan findings -- SCC integration with Cloud DLP -- SHA -- The latest SCC features -- Summary -- Practice questions -- Answers to the practice questions -- Further reading -- Part 3: Mastering Azure Cloud Services -- Chapter 12: Microsoft Azure Cloud Foundation Services -- Azure cloud resource hierarchy -- Azure cloud compute -- Azure cloud VMs -- Azure cloud container services -- Azure serverless computing -- Azure cloud storage -- Object storage -- File storage -- Block storage -- Archive storage -- Azure cloud networking -- Azure Cloud Foundation service implementation -- Summary…”
    Libro electrónico
  6. 25366
    Publicado 2022
    “…What you will learn Write JavaScript code that uses cryptography running within a Node.js environment for the server-side or in frontend applications for web browsers Use modern, safe hashing functions for calculating digests and key derivation, including SHA-2 and Argon2 Practice encrypting messages and files with a symmetric key using AES and ChaCha20-Poly1305 Use asymmetric and hybrid encryption, leveraging RSA and Elliptic Curve Cryptography with ECDH and ECIES Calculate and verify digital signatures using RSA and ECDSA/EdDSA Manage passwords and encryption keys safely Who this book is for This cryptography book is an introductory guide for software developers who don't necessarily have a background in cryptography but are interested in learning how to integrate it in their solutions, correctly and safely. …”
    Libro electrónico
  7. 25367
    Publicado 2022
    Tabla de Contenidos: “…UN FACTOR CLAVE PARA COMPRENDER SU DIMENSIÓN COMO PATRIMONIO CULTURAL EN EL AULA -- CAPÍTULO 44 RETOS PARA LA ENSEÑANZA DE LA HISTORIA DE LAS RELACIONES ENTRE EL MUNDO HISPANO Y ASIA ORIENTAL A ESTUDIANTES UNIVERSITARIOS ESPAÑOLES, LATINOAMERICANOS Y ASIÁTICOS -- CAPÍTULO 45 INSTANDO UN APRENDIZAJE BASADO EN LAS ARTES -- CAPÍTULO 46 LA ENSEÑANZA DEL INTERIORISMO A TRAVÉS DEL CINE Y LA TELEVISIÓN: EJEMPLOS PRÁCTICOS -- CAPÍTULO 47 RAZÓN POÉTICA Y EDUCACIÓN SOCIAL: REFLEXIONES SOBRE EL PROYECTO PEDAGÓGICO DE MARÍA ZAMBRANO -- CAPÍTULO 48 PROPUESTA DIDÁCTICA EN EL AULA DE TRADUCCIÓN: APRENDIZAJE A TRAVÉS DE LA TRANSFERENCIA DE VIDEOJUEGOS, SUS HISTORIAS Y SUS UNIVERSOS IMAGINARIOS -- CAPÍTULO 49 PODCASTING: PROYECTO METODOLÓGICO INTERACTIVO PARA PRÁCTICAS PROFESIONALES ANTICIPADAS EN ALEMÁN E INGLÉS COMO LENGUAS EXTRANJERAS PARA LA TRADUCCIÓN, INTERPRETACIÓN Y EL TURISMO -- CAPÍTULO 50 USO DE CANCIONES EN LA ENSEÑANZA DEL CHINO MANDARÍN COMO LENGUA EXTRANJERA -- CAPÍTULO 51 EL SISTEMA DE LOS OBJETOS DE JEAN BAUDRILLARD COMO OBRA PARA REFLEXIONAR SOBRE EL HOGAR Y EL DISEÑO DESDE EL PUNTO DE VISTA PATRIMONIAL…”
    Libro electrónico
  8. 25368
  9. 25369
    Publicado 2016
    Tabla de Contenidos: “…4.7.2 - Decongestants -- 4.7.3 - Weight loss pills -- 4.7.4 - Nicotine -- 4.7.5 - Alcohol -- 4.8 - Sleeping environment -- 4.9 - Pain -- 4.10 - Diet -- 4.11 - Naps -- 4.12 - Body posture -- 4.13 - Exercise -- 4.14 - Age -- References -- Chapter 5 - Sleep disorders -- 5.1 - Sleep apnea -- 5.2 - Insomnia -- 5.3 - Narcolepsy -- 5.4 - Restless leg syndrome (RLS)/Willis-Ekbom disease (WED) -- 5.5 - Shift work disorder -- 5.6 - Sleep-wake phase disorders -- 5.6.1 - Advanced sleep-wake phase disorder (ASWPD) -- 5.6.2 - Delayed sleep-wake phase disorder (DSWPD) -- 5.7 - Parasomnias -- 5.7.1 - Non-REM parasomnias: sleepwalking, sleep-related eating, sleep violence, sleep sex, night terrors -- 5.7.2 - REM behavior disorder -- 5.8 - Fatal familial insomnia -- 5.9 - Hypersomnias -- References -- Chapter 6 - Fatigue and human performance -- 6.1 - Fatigue and human error -- 6.2 - Fatigue and hand-eye coordination -- 6.3 - Fatigue and mood -- 6.4 - Fatigue and memory -- 6.5 - Fatigue and reaction time -- 6.6 - Fatigue and attention -- 6.7 - Fatigue and cognitive tunneling -- 6.8 - Fatigue and decision making -- 6.9 - Fatigue and working with others -- 6.10 - Fatigue and marital life -- References -- Chapter 7 - Fatigue and accidents -- 7.1 - Bhopal-fatigue and poor abnormal situation response -- 7.2 - American Airlines 1420-fatigue and decline in situation awareness -- 7.3 - NASA space shuttle-fatigue and decision making -- 7.4 - Exxon Valdez-fatigue and work schedules -- 7.5 - Three Mile Island and cognitive tunneling -- 7.6 - Metro-North train derailment fatigue caused by circadian rhythms and sleep apnea -- 7.7 - Fatigue's role in accidents -- References -- Chapter 8 - Fatigue-related regulations and guidelines -- 8.1 - OSHA and fatigue risk -- 8.2 - NIOSH sleep-related publications -- 8.3 - UK and EU regulations -- 8.4 - Transportation fatigue regulations…”
    Libro electrónico
  10. 25370
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Keep It Real - Firebase Realtime Database -- Firebase Realtime Database -- Setting up a development environment -- Prerequisites -- Configuring Firebase in Android projects -- Reading and writing to Realtime Database -- Database reference -- Writing into Realtime Database -- Reading from Realtime Database -- Structuring the data with objects -- Reading the objects from Firebase -- Reading value changes -- Parsing the DataSnapshot object -- Updating data -- Writing HashMaps to Realtime Database -- Realtime Database and lists -- Deleting data -- Offline capabilities -- Realtime Database rules -- Default security rules -- Database rules and types -- Customizing database rules -- Data security -- Custom variables -- Default variables -- RuleDataSnapshot and its methods -- Creating an Android application using Realtime Database -- User interface design -- Logic -- Summary -- Chapter 2: Safe and Sound - Firebase Authentication -- Firebase Authentication -- Setting up Firebase Authentication -- FirebaseUI Auth authentication -- Firebase SDK Authentication -- FirebaseUI Email Authentication -- Configuring for Email Authentication -- Enabling Email/Password Authentication in Console -- Initializing Firebase Authentication -- Finalizing the project -- Firebase SDK Email Authentication -- Sign up new users -- Sign in existing users -- Managing users -- Provider-specific user profile details -- Profile updating -- Sending a verification Email -- Forgot password -- Deleting a user -- Managing users through console -- Smart Lock -- FirebaseUI social networking site authentication -- Google Sign-in -- SHA-1 fingerprint -- Code for Google provider -- Facebook Login -- Facebook App ID and App secret -- Project configuration…”
    Libro electrónico
  11. 25371
    por Sobell, Mark G.
    Publicado 2005
    Tabla de Contenidos: “…grep: Searches for a pattern in files -- gzip: Compresses or decompresses files -- head: Displays the beginning of a file -- kill: Terminates a process by PID -- killall: Terminates a process by name -- less: Displays text files, one screen at a time -- ln: Makes a link to a file -- lpr: Sends files to printers -- ls: Displays information about one or more files -- make: Keeps a set of programs current -- man: Displays documentation for commands -- mkdir: Creates a directory -- mkfs: Creates a filesystem on a device -- Mtools: Uses DOS-style commands on files and directories -- mv: Renames or moves a file -- nice: Changes the priority of a command -- nohup: Runs a command that keeps running after you log out -- od: Dumps the contents of a file -- paste: Joins corresponding lines from files -- pr: Paginates files for printing -- ps: Displays process status -- rcp: Copies one or more files to or from a remote system -- rlogin: Logs in on a remote system -- rm: Removes a file (deletes a link) -- rmdir: Removes a directory -- rsh: Executes commands on a remote system -- scp: Securely copies one or more files to or from a remote system -- sleep: Creates a process that sleeps for a specified interval -- sort: Sorts and/or merges files -- split: Divides a file in into sections -- ssh: Securely executes commands on a remote system -- strings: Displays strings of printable characters -- stty: Displays or sets terminal parameters -- tail: Displays the last part (tail) of a file -- tar: Stores or retrieves files to/from an archive file -- tee: Copies standard input to standard output and one or more files -- telnet: Connects to a remote system over a network -- test: Evaluates an expression -- top: Dynamically displays process status -- touch: Changes a file's access and/or modification time -- tr: Replaces specified characters…”
    Libro electrónico
  12. 25372
    por Forum, International Transport
    Publicado 2021
    Tabla de Contenidos: “…Mastering the pandemic: Challenges and opportunities for non-urban mobility after Covid-19 -- How Covid-19 has changed travel behaviour -- The impact of Covid-19 on the decarbonisation of non-urban passenger transport -- Recover, Reshape, Reshape+: Three possible futures for non-urban passenger transport -- Non-urban passenger transport in the Recover scenario -- Paradigm change: Non-urban transport in the Reshape scenario -- Reshape+: Reinforcing Reshape -- Demand for non-urban passenger transport: Quick recovery and continued growth -- Air travel will dominate intercity trips -- Global transport activity is shifting to Asia -- CO2 emissions from non-urban passenger transport: Decoupling emissions from demand -- Well-to-tank emissions become more important -- OECD countries have the greatest potential to decarbonise -- Fair decarbonisation: Reducing non-urban passenger emissions in equitable ways -- Environmental equity of transport decisions -- Carbon taxes must not harm the less well-off -- Quantifying the equitability of non-urban transport -- Policy recommendations -- Increase the price of high-carbon non-urban transport to encourage clean alternatives -- Create Covid-19 recovery packages that boost sustainable non-urban transport -- Align decarbonisation policies across the transport and energy sectors to reflect the reliance of zero-carbon transport on clean energy -- Mandate the use of alternative fuels in aviation to encourage long-term innovation -- Incentivise the transition to low-emission non-urban road transport by making it more affordable and through measures that increase consumer confidence in cleaner options -- Invest proactively in technological developments beyond the transport sector to ensure wide-scale availability of new technologies for a comprehensive decarbonisation roll out -- References -- Note…”
    Libro electrónico
  13. 25373
    por Elsevier B.V.
    Publicado 2021
    Tabla de Contenidos: “…Canine and feline vector-borne diseases of zoonotic concern in Southeast Asia -- Helminth lipidomics: Technical aspects and future prospects -- Perspectives on intestinal tapeworm infections: An evaluation of direct and indirect life-cycles with a special emphasis on species of Hymenolepis -- Leishmania infection in cats and feline leishmaniosis: An updated review with a proposal of a diagnosis algorithm and prevention guidelines -- Current debates and advances in tick microbiome research -- Comparative studies on faecal egg counting techniques used for the detection of gastrointestinal parasites of equines: A systematic review -- Systematic review of the entomological impact of insecticide-treated nets evaluated using experimental hut trials in Africa -- Ecological and evolutionary perspectives on tick-borne pathogen co-infections -- Protecting dogs and cats against the Australian paralysis tick, Ixodes holocyclus (Acari: Ixodidae): A review of the Australian acaricide registration process -- The controversies surrounding Giardia intestinalis assemblages A and B -- Variability in human attractiveness to mosquitoes -- Cystic echinococcosis in humans and animals in Egypt: An epidemiological overview -- Seroprevalence of Neospora caninum in dogs from greater Sydney, Australia unchanged from 1997 to 2019 and worldwide review of adult-onset of canine neosporosis -- Whole-genome reference of Dirofilaria immitis from Australia to determine single nucleotide polymorphisms associated with macrocyclic lactone resistance in the USA -- Not gone but forgotten: Tritrichomonas foetus in extensively-managed bulls from Australia's Northern Territory -- Recent trends in the use of social media in parasitology and the application of alternative metrics -- Modeling the association between Aedes aegypti ovitrap egg counts, multi-scale remotely sensed environmental data and arboviral cases at Puntarenas, Costa Rica (2017-2018) -- Bulinus truncatus transcriptome - a resource to enable molecular studies of snail and schistosome biology -- Mitochondrial genome of Bulinus truncatus (Gastropoda: Lymnaeoidea): Implications for snail systematics and schistosome epidemiology -- Molecular characterization of novel Ehrlichia genotypes in Ixodes auritulus from Uruguay -- Four polyopisthocotyleans (Platyhelminthes: Monogenea) from carangid fishes in the Mediterranean, off the Algerian coasts -- Genetic diversity and shedding profiles for Cryptosporidium parvum in adult cattle and their calves -- What the fox? …”
    Revista digital
  14. 25374
    Publicado 2016
    Tabla de Contenidos: “…-- Speech at PFI Best Asia Infrastructure Citation Awards -- If You are Not Committed, Don't Do It! …”
    Libro electrónico
  15. 25375
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Foreword -- What the experts say -- Contributors -- Table of Contents -- Preface -- Part 1- Introduction -- Chapter 1: Malware Science Life Cycle Overview -- Combining malware -- Worms and Trojans combination -- Ransomware and spyware combination -- Macro malware and ransomware -- Managing malware -- Collection -- Analysis -- Detection -- Prevention -- Mitigation -- Reporting -- Summary -- Chapter 2: An Overview of the International History of Cyber Malware Impacts -- The evolution of cyber threats and malware -- Impacts on international relations and security -- Impacts on the economy and cybercrime -- The future of malware -- Expanded viewpoint on the impacts on international relations and security -- Expansion on cybercrime impacts on the general economy -- Direct financial impacts of malware - a global overview -- Ransomware's global economic impact - a continental overview -- Ransomware's economic impact in North America - a deeper look -- Ransomware's economic impact in Asia - a detailed examination -- Ransomware's economic impact in Africa - an in-depth analysis -- Ransomware's economic impact in South America - an extensive exploration -- Economic impacts versus socio-economic impacts -- Ransomware attacks and their impact on employment - an in-depth perspective -- Ransomware attacks and their impact on public services - an elaborate examination -- Ransomware and inequality - a closer look at the impact on small businesses -- Policy, regulations, and their downstream impact on smaller businesses and public services -- Regulatory changes due to malware impacts on small and mid-scale businesses -- A deeper dive into the operational challenges -- Translating operational challenges into increased cost -- Expansion of economic and socio-economic impacts on key industries globally…”
    Libro electrónico
  16. 25376
    Publicado 2023
    Tabla de Contenidos: “…Una aproximación al Tercer Evangelio a través de siete palabras / Ricard Lázaro Barceló -- Pablo y la isla en el episodio de Malta (Hch 28, 1-10). Algunos tópicos helenísticos / Enrique Mena Salas -- Sentido cristológico de los tres ritos de la fiesta judía de las Tiendas en el signo de la curación del ciego de nacimiento (Jn 9, 1-41) / Jesús Girón Izquierdo -- De la muerte a la confesión de fe en el Resucitado. …”
    Libro
  17. 25377
  18. 25378
    por Torres Fumero, Constantino O.
    Publicado 2020
    Tabla de Contenidos: “…LAS CIVILIZACIONES DEL SUR Y EL ESTE DE ASIA EN LA ANTIGÜEDAD -- ORIENTACIONES DE LA UNIDAD IV -- COMPETENCIAS DE LA UNIDAD -- ESQUEMA DE CONTENIDO DE LA UNIDAD IV -- DESARROLLO DE LOS CONTENIDOS DE LA UNIDAD -- LA INDIA ANTIGUA -- EL ESPACIO GEOGRÁFICO -- PERIODIZACIÓN Y PRIMERAS SOCIEDADES -- LA CIVILIZACIÓN DEL VALLE DEL INDO (C. 3300-1700 A.N.E.) -- PRINCIPALES ACTIVIDADES ECONÓMICAS -- ORGANIZACIÓN POLÍTICA Y SOCIAL -- CAUSAS DEL DECLIVE Y FIN DE LA CIVILIZACIÓN -- LAS INVASIONES ARIAS (C. 1700-1200 A.N.E.) …”
    Libro electrónico
  19. 25379
    Publicado 2016
    Tabla de Contenidos: “…PIB per cápita para una selección de economías de América Latina, Asía y países de la OCDE…”
    Libro electrónico
  20. 25380
    Publicado 2014
    Tabla de Contenidos: “…Proporción de la mano de obra agrícola y agricultores en la población india -- Tierra -- Agua -- Formación del capital -- El crecimiento de la productividad ha sido clave para una mayor producción -- Figura 2.6. …”
    Libro electrónico