Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 167
- Security measures 164
- Computer networks 125
- Historia 95
- Engineering & Applied Sciences 74
- Subirachs, Josep M. 67
- Data protection 59
- Història 56
- Management 52
- Derecho penal 50
- Biblia 47
- Computer Science 46
- History 43
- Exposicions 40
- Filosofía 39
- Computer crimes 32
- Derecho 31
- Information technology 31
- Ubach, Bonaventura 31
- Cloud computing 30
- Historia y crítica 28
- Materiales 28
- Crítica e interpretación 27
- Electrical & Computer Engineering 24
- Física 23
- Law and legislation 23
- Penetration testing (Computer security) 23
- Catequesi 22
- Internet 20
- Catequesis 19
-
2601
-
2602
-
2603
-
2604
-
2605
-
2606Publicado 2014“…Kaum ein Entwickler kann hier überall gleichermaßen gut informiert sein.Um nicht den Anschluss zu verlieren, gibt Peter Gasston in seinem Buch einen praxisorientierten Überblick über die neuesten und wichtigsten Werkzeuge der geräteunabhängigen Webentwicklung mit HTML5, CSS3, JavaScript und Co.Seine leicht verständlichen Erklärungen und praktischen Beispiele versetzen Sie in die Lage, Websites zu entwickeln, die auf allen Geräten funktionieren…”
Libro electrónico -
2607
-
2608
-
2609Publicado 1982Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro
-
2610
-
2611Publicado 1953Libro
-
2612por Searcy, TomTabla de Contenidos: “…Whale Hunting; Contents; Foreword; Preface; Acknowledgments; Author Biographies; Chapter 1: The Whale Hunters' Story; Chapter 2: Signs of the Times; Chapter 3: Know the Whale; Chapter 4: Send Out the Scouts; Chapter 5: Set the Harpoon; Chapter 6: Ride the Whale; Chapter 7: Capture the Whale; Chapter 8: Sew the Mouth Shut; Chapter 9: Beach the Whale; Chapter 10: Honor the Whale; Chapter 11: Celebrate the Whale; Epilogue: Let the Hunt Begin; Glossary; Index…”
Publicado 2008
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
2613Publicado 2021Tabla de Contenidos: “…Freed Indirect Discourse Biopolitics, Population, and the Nineteenth- Century Novel -- Part II: Romanticism and the Operations of Biopolitics -- 4. Building Beaches Global Flows, Romantic- Era Terraforming, and the Anthropocene -- 5. …”
Libro electrónico -
2614por Greenfield, RobertTabla de Contenidos: “…Prologue. The Muir Beach acid test -- Bluegrass roots -- Growing up absurd -- Shape-shifting -- Berkeley, 1964 -- Making acid -- Pranksters and Angels -- Trips Festival -- LA fadeaway -- Olompali -- Print the legend -- Monterey Pop, and beyond -- Getting busted -- Two festivals -- Set up like a bowling pin -- Wall of sound -- Growing weed -- Bear's dream -- The land down under -- Real love -- Old and in the way -- A visit from Bear -- On the way home -- Epilogue. …”
Publicado 2016
Libro -
2615por Hench, John B.Tabla de Contenidos: “…Introduction : Books on the Normandy beaches -- Modernizing U.S. book publishing -- War changes everything, even books -- Publishers organize for war and plan for peace -- "Books are the most enduring propaganda of all" -- Seeking "an inside track to the world's bookshelves" -- "Everyone but the janitor" selected the books -- Books to pacify and reeducate the enemy -- Making the "nice little books" -- Liberating Europe with books -- The rise and fall of the United States International Book Association -- The empire strikes back -- Books for occupied Germany and Japan -- Epilogue : American books abroad after 1948.…”
Publicado 2010
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
2616Publicado 2013Tabla de Contenidos: “…Variation of trusts -- 14. Remedies for breach of trust -- 15. Offshore trust derivatives and affiliates -- 16. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
2617Publicado 2013Tabla de Contenidos: “…Saracens and Ifranj : rivalries, emulation, and convergences / The geographers' world : from Arabia Felix to the Balad al-Ifranj (land of the Franks) ; Conquest and its justifications : jihad, crusade, Reconquista ; The social inferiority of religious minorities : Dhimmis and Mudejars ; In search of Egyptian gold : traders in the Mediterranean ; On the shoulders of giants : transmission and exchange of knowledge -- The great Turk and Europe / continuity and change in geopolitics ; The Ottoman conquest in Europe ; Ottoman Europe : an ancient fracture ; Antagonistic figures ; The Islamic-Christian border in Europe ; Breaches in the Conflict -- Europe and the Muslim world in the contemporary period / The eighteenth century as turning point ; Civilization or conquest? …”
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
2618Publicado 2002Tabla de Contenidos: “…1931836574.pdf; 1931836574.pdf; Cover; Table of Contents; Foreword; Chapter 1 Introduction to Sniffer Pro; Chapter 2 Installing Sniffer Pro; Chapter 3 Exploring the Sniffer Pro Interface; Chapter 4 Configuring Sniffer Pro to Monitor Network Applications; Chapter 5 Using Sniffer Pro to Monitor the Performance of a Network; Chapter 6 Capturing Network Data for Analysis; Chapter 7 Analyzing Network Issues; Chapter 8 Using Filters; Chapter 9 Understanding and Using Triggers and Alarms; Chapter 10 Reporting; Chapter 11 Detecting and Performing Security Breaches with Sniffer Pro…”
Libro electrónico -
2619por Wyler, Neil R.Tabla de Contenidos: “…Cover; Contents; Foreword; Fictionalized Cases of Network Strike-Back, Self-Defense, and Revenge; PDA Perils: Revenge from the Palm of Your Hand; The Case of a WLAN Attacker: In the Booth; MD5: Exploiting the Generous; A VPN Victim's Story: Jack's Smirking Revenge; Network Protection: Cyber-Attacks Meet Physical Response; Network Insecurity: Taking Patch Management to the Masses; The Fight for the Primulus Network: Yaseen vs Nathan; Undermining the Network: A Breach of Trust; ADAM: Active Defense Algorithm and Model; Defending Your Right to Defend; MD5 to Be Considered Harmful Someday…”
Publicado 2005
Libro electrónico -
2620por Hergenröther, Joseph 1824-1890Tabla de Contenidos: “…Die Kirche gegenüber der staatlichen Übermacht und der Revolution; ihr Kampf gegen die ungläubige Weltrichtung (X, 798 p.)…”
Publicado 1911
Libro