Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Història 764
- History 455
- Política i govern 392
- Law and legislation 325
- Historia 304
- Unió Europea 299
- Politics and government 279
- Relacions exteriors 278
- Droit 273
- Law 254
- Economic conditions 210
- Foreign relations 199
- Engineering & Applied Sciences 194
- United States 193
- Education 186
- Comunisme 166
- Condicions econòmiques 161
- Política 152
- Computer Science 147
- UNIX (Computer file) 145
- Condicions socials 141
- Armed Forces 139
- Economic policy 136
- Biografia 132
- Law reviews 131
- Política econòmica 114
- Església Catòlica 112
- Operating systems (Computers) 108
- Study and teaching 105
- Economics 101
-
81
-
82
-
83
-
84por Humboldt, Wilhelm, Freiherr von, 1767-1835Tabla de Contenidos: “…V : Kleine Schriften, Autobiographisches, Dichtungen, Briefe, Kommentare und Anmerkungen zu Band I-V, Anhang…”
Publicado 1981
Libro -
85Publicado 2019“…Join award-winning data storyteller RJ Andrews as he pushes beyond the usual how-to, and takes you on an adventure into the rich art of informing. Creating Info We Trust is a craft that puts the world into forms that are strong and true. …”
Libro -
86
-
87
-
88
-
89
-
90Publicado 1975Libro
-
91
-
92
-
93
-
94
-
95Tabla de Contenidos: “…Business Continuity Plan Validation & Training -- Up-to-date Maintenance of the BCP -- Chapter Summary -- Part III: Application Security -- Chapter 6: Application and Web Security -- Introduction -- Software Applications -- Completeness of the Inputs -- Correctness of the Inputs -- Completeness of Processing -- Correctness of Processing -- Completeness of the Updates -- Correctness of the Updates -- Preservation of the Integrity of the Data in Storage -- Preservation of the Integrity of the Data while in Transmission -- Importance of an Effective Application Design and Development Life Cycle -- Important Guidelines for Secure Design and Development -- Web Browsers, Web Servers, and Web Applications -- Vulnerabilities in Web Browsers -- Inappropriate Configuration -- Unnecessary or Untrusted Add-ons -- Malware or Executables run on the Web Browser -- No Patching up or Carrying out the Security Updates -- How to Overcome the Vulnerabilities of Web Browsers -- Vulnerabilities of Web Servers -- Default Users and Default Permissions are not changed -- Sample files and scripts are not removed -- Default Configuration is Not Changed -- File and Directory Permissions are not Set Properly -- Security Loop-Holes or Defects in the Web Server Software or Underlying Operating System -- How to Overcome the Web Server Vulnerabilities -- Web Applications -- SQL Injection Attacks -- Command Injection Attacks -- Buffer Overflow Attacks -- Cro ss-Site Scripting -- Cookie Poisoning -- Session Hijacking Attacks -- How to Overcome Web Application Vulnerabilities -- Secure Socket Layer (SSL) Security and Digital Certificate -- Chapter Summary -- Chapter 7: Malicious Software and Anti-Virus Software -- Introduction -- Malware Software -- Introduction to Malware -- Covert channels -- Types of Malware in Detail -- Spyware -- Adware -- Trojans -- Viruses -- Worms -- Backdoors…”
Libro electrónico -
96
-
97
-
98Publicado 2016Tabla de Contenidos: “…; Conventions Used in This Book; Safari® Books Online; How to Contact Us; Chapter 1. Juniper MX Architecture; Junos OS; One Junos; Software Releases; Junos Continuity-JAM; Software Architecture; Routing Sockets; Junos OS Modernization; Juniper MX Chassis; vMX; MX80; Midrange; MX104; MX240; MX480; MX960; MX2010 and MX2020; Trio; Trio Architecture; Trio Generations; Buffering Block; Lookup Block…”
Libro electrónico -
99Publicado 2019Tabla de Contenidos: “…Preface : Ancient roots: spirits of information and trust -- Origin : The goal of our craft: data, story, and the adventure ahead -- Data shadows: numbers and the past they come from -- Information murmurs: arranging data in forms we can read -- Metaphorical : Embodied encoding: the power of metaphor -- Counting time: how we experience numbers and time -- World building: grids and other homes for data -- Infuse meaning: up, down, and other spatial meaning -- True colors: the eye's seductive potential -- Mathemagical : Explore to create: seek comparisons and patterns -- Create to explore: translate and transform to learn more -- Uncertain honesty: the challenge of qualifying truthfulness -- Sensational : Encounter: experience design with museums -- Listen: story design with natural selection -- Freeze: graphic design with propaganda -- Connect: emotional design with roughness -- Make: explanation design with diagrams -- Informational : Inspire trust: design for believing minds -- Imagination to image: explore visual story possibilities -- Focus attention: workshop to the audience -- Onward : Creative routines: daily practices for making new views -- Finale : Beautiful tomorrow: push forward together…”
Libro electrónico -
100