Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 167
- Security measures 164
- Computer networks 125
- Historia 95
- Engineering & Applied Sciences 74
- Subirachs, Josep M. 67
- Data protection 59
- Història 56
- Management 52
- Derecho penal 50
- Biblia 47
- Computer Science 46
- History 43
- Exposicions 40
- Filosofía 39
- Computer crimes 32
- Derecho 31
- Information technology 31
- Ubach, Bonaventura 31
- Cloud computing 30
- Historia y crítica 28
- Materiales 28
- Crítica e interpretación 27
- Electrical & Computer Engineering 24
- Física 23
- Law and legislation 23
- Penetration testing (Computer security) 23
- Catequesi 22
- Internet 20
- Catequesis 19
-
2701
-
2702Publicado 2023“…In this focused guide, you’ll explore relevant, real-world examples like protecting secrets in a code repository, securing keys with HashiCorp Vault, and adding layers to maintain protection after a breach. Along the way, you’ll pick up secrets management techniques you can use outside Kubernetes, as well…”
Vídeo online -
2703Publicado 2010“…Chapters 9 through 17 present the theory of steady unidimensional flows and breach surfaces such as shock waves and flow lines. …”
Libro electrónico -
2704Publicado 2024“…The course begins by laying the groundwork with breach scanning and enumeration, guiding learners through identifying vulnerabilities in network systems and web applications. …”
Video -
2705Publicado 2021“…Dams are critical structures in the sense that damage or breach of even a small dam may cause an unacceptable loss of life and property. …”
Libro electrónico -
2706por Gledhill, Kris“…There are now a number of statutes in different parts of the world that offer non-constitutional protection for human rights through mechanisms such as strong interpretive obligations, quasi-tort actions and obligations on legislatures to consider whether statutes are felt to breach human rights obligations. They exist in New Zealand, the United Kingdom, Ireland, the Australian Capital Territory and Victoria. …”
Publicado 2015
Libro -
2707
-
2708por Kurian, Alka, 1963-Tabla de Contenidos: “…Gender, identity, and the diaspora in Gurinder Chadha's Bhaji on the beach and Sarah Gavron's Brick lane -- Conclusion…”
Publicado 2012
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
2709Publicado 2022Tabla de Contenidos: “…Alfred Morel-Fatio i les Illes Balears -- 2.Carles del pare Miquel d'Esplugues a Lluís Nicolau d'Olwer -- 3. Bonaventura Ubach al país dels cedres -- 4. El pare Ubahc i Francesc Cambó -- 5. …”
Biblioteca Pública Episcopal del Seminario de Barcelona (Otras Fuentes: Biblioteca Universitat Ramon Llull)Libro -
2710por Fornero, EdgardoTabla de Contenidos: “…Intro -- Primera parte -- Café gratis -- Tres italianos en América -- La señorita Gloriay el señor Mizrahi -- La enigmáticaseñorita Bishop -- La cupé negracon estribos blancos -- La noche de los alcatraces -- Dolor e hipocresía -- Un crimendemasiado puntual -- Regreso a Tiburón -- La Diablilla -- La Biblia -- John Mathis, "el Sabueso" -- Rosie -- Stinson Beach -- ¿"Sugar"? -- Una propuesta inoportuna -- La trattoríade la calle Broadway -- Sausalito -- El toro de Osborne -- La chica con el medallónde Bob Marley -- El folleto del oficial nazi -- La paz del Santo -- La otra hija deDonald Warren -- "Achalay, my brother" -- Un irlandés en Mar del Plata -- La vida misma…”
Publicado 2021
Libro electrónico -
2711por Pompon, Raymond. authorTabla de Contenidos: “…Part I: Getting a Handle on Things -- Chapter 1: Why Audit. Chapter 2: Assume Breach. Chapter 3: Risk Analysis: Assets and Impacts. …”
Publicado 2016
Libro electrónico -
2712Publicado 2017Tabla de Contenidos: “…-- What happens if I breach my duty of care? -- 2. AVOIDANCE: MINIMISING THE RISKS -- Minimising risks with the client -- Minimising risks with contractors and subcontractors -- Minimising risks with subconsultants -- 3. …”
Libro electrónico -
2713por Room, StewartTabla de Contenidos: “…INTRODUCTION TO EPRIVACY -- Regulating the electronic communications sector -- The relationship between data protection and ePrivacy -- The actors and protected parties -- Confidentiality of communications -- Exceptions to confidentiality -- Consent for storing or accessing information in terminal equipment -- Consent, transparency and the use of cookie notices and consent tools -- Types of cookies -- Cookies, behavioural advertising and real-time bidding -- Cookies and legal risk -- Direct marketing -- The position under PECR -- Postal direct marketing -- Opt-out, as a matter of law -- Financial penalties for direct marketing contraventions -- Processing of traffic data, location data and value added services -- Security and personal data breach notification -- Personal data breaches -- Expanded rules for breach notifications -- Interplay with the breach notification rules in the GDPR…”
Publicado 2021
Libro electrónico -
2714
-
2715por Farah, Nadia Ramsis
Publicado 2013Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
2716por Uffelen, Chris vanTabla de Contenidos: “…Villa Langenkamp / Langenkamp.dk architects. Bersch Passive House / Kark Miller. Maison Passive, 95 / Karawitz Architecture. …”
Publicado 2012
Libro -
2717por Pearce, Robert A.“…Revised diagrams and flow charts help to explain difficult topics such as the operation of the pari passu, first in, first out, and rolling charge methods of allocating funds between contributors and the circumstances in which strangers can be held personally liable as dishonest accessories to or knowing recipients of trust property in breach of trust. The authors take a modern and conceptual approach to the wide array of topics covered in undergraduate equity and trusts modules, helping students explore the many ways trusts impact on everyday life and in the world of finance and commerce. …”
Publicado 2015
Libro -
2718por Gillette, Clayton P.“…Adopted by more than eighty nations and governing a significant portion of international sales, the CISG regulates contract formation, performance, risk of loss, conformity to contractual requirements and remedies for breach. This volume explains the CISG doctrines and their ambiguities, and appraises the extent to which the doctrines reduce transaction costs for commercial actors. …”
Publicado 2016
Libro -
2719Publicado 2006Tabla de Contenidos: “…CROSS REFERENCESREFERENCES; FURTHER READING; Digital Economy; INTRODUCTION; INFORMATION TECHNOLOGY, THE DIGITAL ECONOMY, AND E-COMMERCE; SIZE AND GROWTH OF THE DIGITAL ECONOMY; IMPLICATIONS FOR MARKETS AND ORGANIZATIONS; SECURITY; GOVERNMENT POLICIES; WORK, PLAY, AND COMMUNITIES; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; FURTHER READING; Online Retail Banking: Security Concerns, Breaches, and Controls; INTRODUCTION; TYPES OF ONLINE RETAIL BANKING SERVICES; ONLINE BANKING SECURITY CONCERNS; DEFINITION OF SECURITY; SOURCES AND CONTROLS OF EXTERNAL INFORMATION SECURITY BREACHES…”
Libro electrónico -
2720por Orton, AndrewTabla de Contenidos: “…""Dune Houses, Atlantic Beach, Florida, USA""""West Beach Bathhouse, Chesterton, Indiana, USA""; ""Chapter Six Office Buildings ""; ""TRADA Offices, High Wycombe, England""; ""1111 Nineteenth Street NW, Washington DC, USA""; ""Chloride Technical Offices and Workshop, Swinton, Manchester, England""; ""Havas Conseil Offices, Neuilly, France""; ""Banque Beige Offices, London, England""; ""Slough Estates House, Slough, England""; ""Scottish Mutual House, Leeds, England""…”
Publicado 2011
Libro electrónico