Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 1,216
- Historia 640
- Management 562
- Development 453
- Economics 371
- Engineering & Applied Sciences 355
- Social aspects 344
- Business & Economics 322
- Education 293
- Economic conditions 268
- Computer networks 266
- Politics and government 259
- Filosofía 254
- Leadership 254
- Application software 243
- Computer Science 236
- Crítica e interpretación 232
- Economic policy 220
- History and criticism 218
- Philosophy 218
- Data processing 209
- Economic aspects 208
- Technological innovations 208
- Computer security 206
- Security measures 206
- Information technology 204
- Cloud computing 196
- Artificial intelligence 194
- Rilke, Rainer Maria 192
- Atles 188
-
23221por Yudofsky, Stuart C.“…También es especialmente valioso para pacientes en tratamiento psico-terapéutico que mantienen rela-ciones destructiva…”
Publicado 2007
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca Universidad de Deusto)Libro -
23222por McKechnie, Paul, 1957-“…How were women regarded and what roles did they play? And how was it that a Roman emperor, Constantine, was converted--and what were the implications for the Christian movement? …”
Publicado 2001
Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Libro -
23223Publicado 2019“…Finally, they discuss the role governments should play in rethinking data privacy laws, antitrust, and other regulations that could reign in abuses from these powerful businesses. …”
Libro -
23224Publicado 2012“…Requiring no previous networking or programming experience, the book delivers a practical approach to asset protection. It specifies the roles of managers and employees in creating a company-wide culture of security awareness and provides step-by-step instruction on how to build an effective security awareness team. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
23225Publicado 2014“…Written in a user-friendly style that relies on a tips and tricks approach, the book details how to perform everyday Excel tasks with confidence. 101 Ready-to-Use Excel Formulas is sure to become your well-thumbed reference to solve your workplace problems. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Biblioteca Universitat Ramon Llull)Enlace del recurso
Libro electrónico -
23226Publicado 2018Tabla de Contenidos: “…The fiscal context and the role of the budget manager -- Primary elements of the budget: revenue and expenses -- Understanding budgets -- Management of the budget cycle -- Understanding auxiliary and capital budgets -- Problems and pitfalls in budget management -- Managing budget fluctuations…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
23227Publicado 2019“…Your plain-English guide to administering an estate and/or trust As more and more of the population reach senior ages—including baby boomers, many of whom do not have wills—an increasing number of people are being thrust into the role of executor, administrator, personal representative of an estate, or trustee of a trust after the death of a loved one. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
23228Publicado 2008“…The interventions described by the contributors, all established and respected consultants, elegantly reflect a number of facets of the value of systemic work in organizations - namely, the distinctive ways systemic practitioners pay attention to and use feedback, examine and seek to understand beliefs that sustain repetitive patterns of behaviour, explore the development over time of cultural values in an organization, seek to increase possible explanations for the above, and clarify roles and tasks in relation to specific contexts, to mention only a few.- David Campbell and Ros Draper, from the Series Editors' Foreword"--Provided by publisher…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
23229Publicado 2004“…Chapters explore, for example, the role of attachment experience in brain development, the cultural and institutional contexts in which attachment systems operate, the political consequences of personal suffering and the uses of Attachment theory in psychotherapy. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
23230Publicado 2011“…The reader will find not only scholarship, but also he will find himself trapped in a thriller where the analyst is continually asked to leave his role as analyst to enter a game that fascinates and rejects. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
23231Publicado 2017Tabla de Contenidos: “…3 Handling Evidence 4 Cryptographic Hashes 5 Chain of Custody 8 Incident Response 8 The Need for Network Forensic Practitioners 10 Summary 11 References 12 2 Networking Basics 13 Protocols 14 Open Systems Interconnection (OSI) Model 16 TCP/IP Protocol Suite 18 Protocol Data Units 19 Request for Comments 20 Internet Registries 23 Internet Protocol and Addressing 25 Internet Protocol Addresses 28 Internet Control Message Protocol (ICMP) 31 Internet Protocol Version 6 (IPv6) 31 Transmission Control Protocol (TCP) 33 Connection-Oriented Transport 36 User Datagram Protocol (UDP) 38 Connectionless Transport 39 Ports 40 Domain Name System 42 Support Protocols (DHCP) 46 Support Protocols (ARP) 48 Summary 49 References 51 3 Host-Side Artifacts 53 Services 54 Connections 60 Tools 62 netstat 63 nbstat 66 ifconfi g/ipconfi g 68 Sysinternals 69 ntop 73 Task Manager/Resource Monitor 75 ARP 77 /proc Filesystem 78 Summary 79 4 Packet Capture and Analysis 81 Capturing Packets 82 Tcpdump/Tshark 84 Wireshark 89 Taps 91 Port Spanning 93 ARP Spoofi ng 94 Passive Scanning 96 Packet Analysis with Wireshark 98 Packet Decoding 98 Filtering 101 Statistics 102 Following Streams 105 Gathering Files 106 Network Miner 108 Summary 110 5 Attack Types 113 Denial of Service Attacks 114 SYN Floods 115 Malformed Packets 118 UDP Floods 122 Amplifi cation Attacks 124 Distributed Attacks 126 Backscatter 128 Vulnerability Exploits 130 Insider Threats 132 Evasion 134 Application Attacks 136 Summary 140 6 Location Awareness 143 Time Zones 144 Using whois 147 Traceroute 150 Geolocation 153 Location-Based Services 156 WiFi Positioning 157 Summary 158 7 Preparing for Attacks 159 NetFlow 160 Logging 165 Syslog 166 Windows Event Logs 171 Firewall Logs 173 Router and Switch Logs 177 Log Servers and Monitors 178 Antivirus 180 Incident Response Preparation 181 Google Rapid Response 182 Commercial Offerings 182 Security Information and Event Management 183 Summary 185 8 Intrusion Detection Systems 187 Detection Styles 188 Signature-Based 188 Heuristic 189 Host-Based versus Network-Based 190 Snort 191 Suricata and Sagan 201 Bro 203 Tripwire 205 OSSEC 206 Architecture 206 Alerting 207 Summary 208 9 Using Firewall and Application Logs 211 Syslog 212 Centralized Logging 216 Reading Log Messages 220 LogWatch 222 Event Viewer 224 Querying Event Logs 227 Clearing Event Logs 231 Firewall Logs 233 Proxy Logs 236 Web Application Firewall Logs 238 Common Log Format 240 Summary 243 10 Correlating Attacks 245 Time Synchronization 246 Time Zones 246 Network Time Protocol 247 Packet Capture Times 249 Log Aggregation and Management 251 Windows Event Forwarding 251 Syslog 252 Log Management Offerings 254 Timelines 257 Plaso 258 PacketTotal 259 Wireshark 261 Security Information and Event Management 262 Summary 263 11 Network Scanning 265 Port Scanning 266 Operating System Analysis 271 Scripts 273 Banner Grabbing 275 Ping Sweeps 278 Vulnerability Scanning 280 Port Knocking 285 Tunneling 286 Passive Data Gathering 287 Summary 289 12 Final Considerations 291 Encryption 292 Keys 293 Symmetric 294 Asymmetric 295 Hybrid 296 SSL/TLS 297 Cloud Computing 306 Infrastructure as a Service 306 Storage as a Service 309 Software as a Service 310 Other Factors 311 The Onion Router (TOR) 314 Summary 317 Index 319.…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
23232Publicado 2014“…Les indépendances américaines, la création de régimes parlementaires et - nouveauté plus radicale encore - l’expulsion de l’Église du rôle d’arbitre du politique qu’elle assumait traditionnellement, en sont quelques-unes des conséquences. …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universitat Ramon Llull)Lectura limitada a 1 usuario concurrente.
Libro electrónico -
23233por Huot, Sylvia“…Her readings reveal how medieval poets and book-makers conceived their common project, and how they distinguished their respective roles…”
Publicado 1987
Libro electrónico -
23234Publicado 2012“…The massively multiplayer online role-playing game World of Warcraft has become one of the most popular computer games of the past decade, introducing millions around the world to community-based play. …”
Libro electrónico -
23235Publicado 2008“…The book will be read with profit by all those interested in the rise of Western colonial rule in Indonesia, the fate of indigenous cultures in an age of imperialism and the role of Javanese Islam in modern Indonesian history. …”
Libro electrónico -
23236Publicado 2017“…The Research Topic is complemented by three review articles about the consumption of methane and monoterpenes, as well as the role of the phyllosphere as a particular habitat for trace gas-consuming microorganisms, and point out future research directions in the field. …”
Libro electrónico -
23237Publicado 2017“…Increasing evidence supports the claim that stress changes play a fundamental role in triggering volcanic eruptions. Stress changes may vary in origin to include earthquakes, erosion and landslide processes, deglaciation, or tidal effects. …”
Libro electrónico -
23238Publicado 2017“…Importantly, mounting evidence suggests that these interactions play essential roles in virus replication/assembly and hence may be key to understanding pathophysiology of viral diseases. …”
Libro electrónico -
23239Publicado 2014“…Part I looks at the potential options for politicized readings of the Bible at the end of the the1960s, focussing on the examples of Christopher Hill and Enoch Powell. Part II analyses the role of Thatcher's specific contribution to political interpretation of the Bible and assumptions about 'religion'. …”
Libro electrónico -
23240Publicado 2020“…The degree to which alterations can affect aquatic ecosystem structure and functioning also requires functional diversity to be addressed at the molecular level, to reconstruct the role different species play in the transfer of material and energy through the food web. …”
Libro electrónico