Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 167
- Security measures 164
- Computer networks 125
- Historia 95
- Engineering & Applied Sciences 74
- Subirachs, Josep M. 67
- Data protection 59
- Història 56
- Management 52
- Derecho penal 50
- Biblia 47
- Computer Science 46
- History 43
- Exposicions 40
- Filosofía 39
- Computer crimes 32
- Derecho 31
- Information technology 31
- Ubach, Bonaventura 31
- Cloud computing 30
- Historia y crítica 28
- Materiales 28
- Crítica e interpretación 27
- Electrical & Computer Engineering 24
- Física 23
- Law and legislation 23
- Penetration testing (Computer security) 23
- Catequesi 22
- Internet 20
- Catequesis 19
-
2461por Bridge, M. G.Tabla de Contenidos: “…Introduction and conclusion of the contract -- Definition and subject matter of the sale of goods contract -- The passing of property -- Risk, mistake, and frustration -- The seller's duty and power to transfer title -- Delivery, acceptance, and payment -- The implied terms of description, fitness, and quality -- Other liabilities of the seller and liabilities of third parties -- Unfair contract terms -- Termination of the contract for breach -- The remedies of the seller and the buyer I -- The remedies of the seller and the buyer II…”
Publicado 2009
Libro -
2462Publicado 2015Tabla de Contenidos: “…Intro -- Foreword -- Preface -- About the Author -- Acknowledgements -- Contents -- Introduction -- Part 1 - General -- Chapter 1: Why Risk does Not Depend on Company Size -- Risk effect -- Propagation of damage (downstream effects) -- Culture -- Information security staff -- Cash reserves / cash at hand -- Ability to improvise / make quick decisions -- Preparedness -- Contacts with authority -- Chapter 2: Getting your Risk Profile Right -- Intuitive risk analysis -- Formal risk analysis -- Step 1 - Identifying threats -- Step 2 - Assigning damage and likelihood -- Step 3 - Defining acceptable loss -- Step 4 - Defining mitigation priorities (business priorities) -- Residual risks -- Chapter 3: What is a Breach? -- Confidentiality breach -- Availability breach -- Integrity breach -- Impact -- Source -- External vs. internal -- Unintentional vs. intentional -- Manual vs. automatic -- Human vs. nature -- General treatment options -- Chapter 4: General Avoidance and Mitigation Strategies -- Introduction - general aspects, avoidance and related ISO27001 controls -- People -- A.7.1.1 - Screening -- Methods of screening -- A.7.1.2 - Terms and conditions of employment -- A.7.2.1 - Management responsibilities -- A.7.2.2 - Information security awareness, education and training -- A.7.2.3 - Disciplinary process -- A.7.3.1 - Termination or change of employment -- A.8.1.4 - Return of assets -- A.9.2.6 - Removal or adjustment of access rights -- Processes -- Technology -- ISO27001 Controls helpful for treatment of breaches -- A.6.1.3 - Contact with authorities -- A.7.2.2 - Information security awareness, education and training -- A.7.2.3 - Disciplinary process A.8.1.4 - Return of assets A.9.2.6 - Removal or adjustment of access rights -- A.12.2.1 - Controls against malware -- A.12.4.1 - Event logging and -- A.12.4.2 - Protection of log information…”
Libro electrónico -
2463Publicado 2008Tabla de Contenidos: “…-- Domestication : reaching a glass ceiling -- Transgenic tools for regaining biodiversity : breaching the ceiling -- Biosafety considerations with further domesticated crops -- Introduction to case studies : where the ceiling needs to be breached -- Evil weevils or us : who gets to eat the grain? …”
Libro electrónico -
2464por Kliczkowski, GuillermoTabla de Contenidos: “…CASAS INTERNACIONAL 181- SAN MARTÍN, LONNE, SAN MARTÍN / ARQUITECTOS -- PÁGINA LEGAL -- INTRODUCCION / INTRODUCTION -- BEACH HOUSE LAS GARZAS / LAS GARZAS BEACH HOUSE -- CASA AMAMBAY / AMAMBAY HOUSE -- CASA BLANCA / WHITE HOUSE -- CASA EN BARRIO LOS CASTORES / HOUSE IN LOS CASTORES -- CASA EN EL EMIR / HOUSE IN EL EMIR -- CENTRO DE CONVENCIONES LE DOME / LE DOME CONVENTION CENTER -- COMPLEJO JUAN FELIPE IBARRA / JUAN FELIPE IBARRA COMPLEX -- CASA EN TORTUGAS / HOUSE IN TORTUGAS -- HOTEL SOFITEL CARDALES / SOFITEL CARDALES HOTEL -- AMPLIACIÓN MNBA / MNBA EXTENSION -- OFICINAS PARQUE DEL BUEN AYRE / PARQUE DEL BUEN AYRE OFFICES -- CASA SAN JORGE / SAN JORGE HOUSE…”
Publicado 2020
Libro electrónico -
2465Publicado 1956Tabla de Contenidos: “…Va hondo y sigiloso / por Edward L. Beach. En torno al viejo ídolo / por Augusta Walker. …”
Red de Bibliotecas de la Diócesis de Córdoba (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
2466por Eley, Geoff, 1949-Tabla de Contenidos: “…Origins, post-conservatism, and 1933 : Nazism as a breach -- Driving for rule, extracting consent : bases of political order under fascism -- The return of ideology : everyday life, the Volksgemeinschaft, and the Nazi appeal -- Missionaries of the Volksgemeinschaft : ordinary women, Nazification, and the social -- Empire, ideology, and the east : thoughts on Nazism's spatial imaginary -- Putting the holocaust into history : genocide, imperial hubris, and the racial state -- Where are we now with theories of fascism?…”
Publicado 2013
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
2467por Haunts, Stephen. authorTabla de Contenidos: “…1. What are Data Breaches? -- 2. Brief History of Cryptography -- 3. …”
Publicado 2019
Libro electrónico -
2468Publicado 2021Tabla de Contenidos: “…The Challenge to Sovereignty, Democracy and Citizenship 5. Breaching the Public-Private Boundary 6. Politics Goes Personal 7. …”
Libro -
2469Publicado 1974Tabla de Contenidos: “…Regimiento de fusileros -- Cara B: Washington Post. Mannhattan Beach. La campaña de la libertad. El picador. Hands acroos the sea…”
Disco musical -
2470
-
2471
-
2472
-
2473
-
2474
-
2475
-
2476por Köhler, Ludwig, 1880-1956
Publicado 1966Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca Universidad de Deusto, Biblioteca Universitat Ramon Llull)Libro -
2477
-
2478
-
2479
-
2480