Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 167
- Security measures 164
- Computer networks 125
- Historia 95
- Engineering & Applied Sciences 74
- Subirachs, Josep M. 67
- Data protection 59
- Història 56
- Management 52
- Derecho penal 50
- Biblia 47
- Computer Science 46
- History 43
- Exposicions 40
- Filosofía 39
- Computer crimes 32
- Derecho 31
- Information technology 31
- Ubach, Bonaventura 31
- Cloud computing 30
- Historia y crítica 28
- Materiales 28
- Crítica e interpretación 27
- Electrical & Computer Engineering 24
- Física 23
- Law and legislation 23
- Penetration testing (Computer security) 23
- Catequesi 22
- Internet 20
- Catequesis 19
-
2761Publicado 2018Tabla de Contenidos: “…Maciel -- Endless exhibition : housing displays and HGTV's brand touchpoints / Samuel Dodd -- Filthy media : affecting bad taste in beach culture / Robin Canniford and Dexter Zavalza Hough-Snee -- Performing disruptive tastes : toward an ontology of reflexive consumer agency / Craig J. …”
Libro electrónico -
2762Publicado 2022Tabla de Contenidos: “…Frontmatter -- Contents -- List of Figures and Tables -- Acknowledgements -- Preface: Transversality at Work -- Introduction: Under the Pixels, the Beach! -- 1 Figure, Discourse: To the Abstract Concretely -- 2 Architecture’s Awaking from Correlationist Slumber: On Transdisciplinarity and Disciplinary Specificity -- 3 Northern Line -- 4 Sensibility is Ground Zero: On Inclusive Disjunction and Politics of Defatalisation -- 5 Architecture of Immanence -- 6 The Impredicative City: or What Can a Boston Square Do? …”
Libro electrónico -
2763Publicado 2007Tabla de Contenidos: “…playing robot""; ""10 beach buggy chair: a ramblinâ€? robot""; ""11 3D PhotoBot: a 3D photo assistant robot""; ""12 CraneBot: a grabber robot""; ""13 slot machine: a one-armed robot""…”
Libro electrónico -
2764Publicado 2004Tabla de Contenidos: “…8 Surf Lifesavers and Surfers: Cultural and Spatial Conflict on the Australian Beach9 Playing with Gravity: Mountains and Mountaineering; 10 The Homoerotic Space of Sport in Pornography; 11 The Space that (In)Difference Makes: (Re)Producing Subjectivities in/through Abjection - A Locker Room Theoretical Study; 12 For Pleasure? …”
Libro electrónico -
2765Publicado 2015Tabla de Contenidos: “…s Riverside ; Between the Sea and the Venetian Lagoon ; Non-profit ; Azahar: A Sustainable Building ; Urban Interventions ; The Michelin Headquarters in Boulogne-Billancourt, Paris ; Corporate Buildings ; Roca Barcelona Gallery ; Benidorm's West Beach Promenade ; 108 Social housing Units ; Vila-real Public Library ; House and Home ; Cluster in Kaplankaya, Turkey ; In Progress ; The La Society in Lyon, France ; Hotel in Avinguda Francesc Cambó, Barcelona ; Canyon Ranch Hotel in Bodrum, Turkey ; Office Building in Guadalajara, Mexico ; Tangier Waterfront, Morocoo ; Mixed-Use Building in Miami, USA ; Nietói Waterfront, Brazil ; The Fish Market in Barcelona Port ; Horizonscrapers ; A Garden from the Sea to el Morrot: A Hinge between City and Port ; Carlos Ferrater 1970-2015…”
Libro -
2766por Steele, James, 1943-Tabla de Contenidos: “…Conté: Koenig House #1, p.20; Lamel House, p.24; Squire House, p.28; Scott House, p.29; Burwash House, p.30; Radio Station KYOR, p.34; Metcalf House, p.36; Bailey House, p.48; Stahl House, p.60; Beidelman House, p.72; Seidel House / Rollé Additions, p.74; Seidel Beach House, p.84; Johnson House / Riebe Addition, p.88; Iwata House, p.94; Mosque, p.100; Oberman House, p.102; Beagles House, p.110; Bethlehem Steel Exhibit Pavilion, p.114; EEI Factory & Sales, p.116; West House, p.118; Franklyn Dinner Club, p.119; Burton Pole House, p1.20; Gantert House, p1.22; Stuermer House, p.128; Koenig House #2, p.130; Laguna House, p.146…”
Publicado 1998
Libro -
2767Publicado 2008Tabla de Contenidos: “…I get around / int., The Beach Boys. The way you do the things you do / int., The Temptations. …”
DVD -
2768Publicado 2014Tabla de Contenidos: “…3.11 Mining Methods and the Selection of Offshore Oil and Gas Fields -- 3.12 Offshore Production Technology and Equipment of Flowing Wells -- 3.13 Tools and Equipment of Marine Mechanical Production -- 3.14 Offshore Gas Production Technology And Equipment -- 3.15 New Technology and New Techniques for China's Offshore Oil Production -- PART IV OFFSHORE WORKOVER OPERATIONS AND EQUIPMENT -- 3.16 Content and Features of Offshore Workover Operations -- 3.17 Offshore Workover Methods and Selection -- 3.18 Offshore Workover Rigs -- PART V COILED TUBING TECHNOLOGY AND EQUIPMENT -- 3.19 Overwater Equipment of Coiled Tubing Technology -- 3.20 The Coiled Tubing -- 3.21 Main Downhole Tools Used in Coiled Tubing Operations -- 3.22 Application of Coiled Tubing Technology in Workover Operations -- PART VI THE FLOATING MULTIFUNCTIONAL PLATFORM FOR LNG PRODUCTION FOR DEVELOPMENT OF OFFSHORE GAS FIELDS -- 3.23 Composition of the Multifunctional Floating Platform for LNG Production -- 3.24 Key Technologies of the Offshore Floating Multifunctional Platform for Liquefied Natural Gas (LNG) Production -- 3.25 The Main Applications of an Offshore Floating Multifunctional Platform for LNG Production -- Chapter 4 - Special Problems of Deep-Sea Oil and Gas Engineering -- 4.1 Summary -- 4.2 Equipment Combination Programs for Acquisition, Processing, Storage, and Transportation of Deep-Sea Oil and Gas -- 4.3 Deep-Water Offshore Floating Structures -- 4.4 Special Problems in the Deep-Water Drilling Process -- Chapter 5 - Special Problems in Sea Petroleum Engineering for Beaches and Shallow Sea Areas -- 5.1 Overview -- 5.2 Seawalls and Artificial Islands -- 5.3 Drilling Equipment and Its Movement in Beach/Shallow Seas -- 5.4 Special Vehicles in Beach/Shallow Seas -- 5.5 Problems in Beach Oil Field Development and Production…”
Libro electrónico -
2769Publicado 2022Tabla de Contenidos: “…Chapter 8: Understanding Common Security Threats to Cloud Services -- Technical requirements -- The MITRE ATT& -- CK framework -- Detecting and mitigating data breaches in cloud services -- Common consequences of data breaches -- Best practices for detecting and mitigating data breaches in cloud environments -- Common AWS services to assist in the detection and mitigation of data breaches -- Common Azure services to assist in the detection and mitigation of data breaches -- Common GCP services to assist in the detection and mitigation of data breaches -- Detecting and mitigating misconfigurations in cloud services -- Common AWS services to assist in the detection and mitigation of misconfigurations -- Common Azure services to assist in the detection and mitigation of misconfigurations -- Common GCP services to assist in the detection and mitigation of misconfigurations -- Detecting and mitigating insufficient IAM and key management in cloud services -- Common AWS services to assist in the detection and mitigation of insufficient IAM and key management -- Common Azure services to assist in the detection and mitigation of insufficient IAM and key management -- Common GCP services to assist in the detection and mitigation of insufficient IAM and key management -- Detecting and mitigating account hijacking in cloud services -- Common AWS services to assist in the detection and mitigation of account hijacking -- Common Azure services to assist in the detection and mitigation of account hijacking -- Common GCP services to assist in the detection and mitigation of account hijacking -- Detecting and mitigating insider threats in cloud services -- Common AWS services to assist in the detection and mitigation of insider threats -- Common Azure services to assist in the detection and mitigation of insider threats…”
Libro electrónico -
2770Publicado 2016Tabla de Contenidos: “…Delving into Language-Specific IssuesDefining the Key HTML Issues; Defining the Key CSS Issues; Defining the Key JavaScript Issues; Considering Endpoint Defense Essentials; Preventing Security Breaches; Detecting Security Breaches; Remediating Broken Software; Dealing with Cloud Storage; Using External Code and Resources; Defining the Use of Libraries; Defining the Use of APIs; Defining the Use of Microservices; Accessing External Data; Allowing Access by Others; Chapter 2. …”
Libro electrónico -
2771por Photopoulos, ConstantineTabla de Contenidos: “…; Personally Identifiable Information; Confidential Business Information; Data Categories; Data Security Breach; Data Loss Consequences; Impact; Identity Theft; Organizational Costs; Prevention and Safeguards; Response; Notification; Recovering from a Data Breach; Organization of the Book; Chapter 2: Data Classification; Chapter 3: Controls and Safeguards; Chapter 4: Data Security Policy; Chapter 5: Response Program…”
Publicado 2008
Libro electrónico -
2772Publicado 2014Tabla de Contenidos: “…; Introduction ; Policy Development ; Policy Enforcement ; Cost Savings ; Production Increases ; Management Buy-In ; Notes ; Chapter 2: Threat ; The Motivations of Online Attackers ; Money ; Industrial Espionage/Trade Secrets ; Hacktivism ; Cyber War ; Bragging Rights ; Notes ; Chapter 3: Cost of a Data Breach…”
Libro electrónico -
2773Publicado 2018Tabla de Contenidos: “…Compensatory Damages Principles in Civil and Common Law Jurisdictions : Requirements, Underlying Principles and Limits / Non-Compensatory Damages in Civil and Common Law Jurisdictions : Requirements and Underlying Principles / Damages Principles under the Convention on Contracts for the International Sale of Goods (CISC) / Contractual Limitations on Damages / Overview of Principles Reducing Damages / Damages Principles in Investment Arbitration / Full Compensation, Full Reparation and the But-For Premise / Procedural Issues / The Function and Role of Damages Experts / Strategic Issues in Employing and Deploying Damages Experts / Overview of Damages and Accounting Basics / Assessing Damages for Breach of Contract / Overview of Methodologies for Assessing Fair Market Value / The Applicable Valuation Approach / Income Approach and the Discounted Cash Flow Methodology / Best Practices and Issuses that Arise in DCF Models / Determining the Weighted Average Cost of Capital / Market Approach or Comparables / Asset Based Approach and Other Valuation Methodologies / Country Risk / Taxation and Currency Issues in Damages Awards / Interest / Costs / The Use of Econometric and Statistical Analysis in Damage Assessments / Damages in Energy and Natural Resources Arbitrations / Damages in Gas and Electricity Arbitrations / Damages in Construction Arbitrations / Damages in Financial Services Arbitrations / Damages in Life Sciences Arbitrations / M&A and Shareholder Arbitrations / Damages in Intellectual Property Arbitrations / Assessing Damages in Antitrust Actions…”
Libro -
2774Publicado 2010Tabla de Contenidos: “…Heinrich Manns Roman "Der Untertan" (1914) / Eine gläserne Welt unter dem Joch der Vernunft Jewgeni Samjatins utopischer Roman "Wir" (1920) / "Wolfszeit" Die Weimarer Republik im Spiegel von Hans Falladas Roman "Bauern, Bonzen und Bomben" (1931) / Einmal Bosnien, zweimal Jugoslawien und überall die Welt Ivo Andrić und sein Roman "Die Brücke über die Drina" (1945) / Ein unfreiwilliger Helfer der Entnazifizierung Deutschlands Ernst von Salomon und sein "Fragebogen" (1951) / Ein Zerrbild der jungen Bonner Demokratie Wolfgang Koeppens Roman "Das Treibhaus" (1953) / Die Juden von Ferrara in den "Erinnerungen des Herzens" Giorgio Bassanis Roman "Die Gärten der Finzi-Contini" (1962) / Vom schwierigen Erinnern an den historischen deutschen Osten Siegfried Lenz und sein Roman "Heimatmuseum" (1978) / Betäubung einer Vergangenheit Bernhard Schlinks Roman "Der Vorleser" (1995) / The Killer Artist - ein israelischer Thriller-Held in den Anfängen des 21. …”
Libro electrónico -
2775Publicado 2009Tabla de Contenidos: “…; "Monboddo's Monkeys" and the "Ghosts of their Forebears"; Green Boughs, Salt Water and Tumora, Towmarro; Pacifying Exchanges and "The Power of our Jus Canonicum"; On the Beach, Unsettled Colonies and "Dancing With Strangers"; References…”
Libro electrónico -
2776
-
2777Publicado 2017“…Chr.) wurde im Jahr 1965 in Didymoteicho, dem antiken Plotinopolis (Nordgriechenland) gefunden. Dieser überaus seltene Fund hochstehender Goldschmiedearbeit liegt erstmals ausführlich untersucht und bebildert vor. …”
Libro electrónico -
2778Publicado 2022“…Dieser langwierige und überaus schwierige Prozess machte aus Brandenburg in den Jahren von 1945 bis 1952 ein "Land zwischen den Zeiten". …”
Libro electrónico -
2779Publicado 2009Libro electrónico
-
2780Publicado 2001“…Programmieren mit Perl – überall liebevoll nur das „Kamel-Buch“ genannt – ist nicht einfach nur ein Buch über Perl. …”
Libro electrónico