Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 167
- Security measures 164
- Computer networks 125
- Historia 95
- Engineering & Applied Sciences 74
- Subirachs, Josep M. 67
- Data protection 59
- Història 56
- Management 52
- Derecho penal 50
- Biblia 47
- Computer Science 46
- History 43
- Exposicions 40
- Filosofía 39
- Computer crimes 32
- Derecho 31
- Information technology 31
- Ubach, Bonaventura 31
- Cloud computing 30
- Historia y crítica 28
- Materiales 28
- Crítica e interpretación 27
- Electrical & Computer Engineering 24
- Física 23
- Law and legislation 23
- Penetration testing (Computer security) 23
- Catequesi 22
- Internet 20
- Catequesis 19
-
2821por Kretschmer, Konrad, 1864-1945
Publicado 1991Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
2822
-
2823Publicado 2013“…Jahrhunderts hinüberstrahlen sollte. »Oswald Spengler als europäisches Phänomen« erweist sich dabei als überaus geeignetes Fallbeispiel zur Überprüfung und Weiterentwicklung neuerer Ansätze der Kulturtransferforschung."…”
Sumario
Libro -
2824Publicado 2024Tabla de Contenidos: “…-- The OSINT framework -- Let's break down an investigation into some real-world examples -- Getting started with OSINT and some best practices -- Tips and tricks for effective information gathering -- Some resources we'll be using -- Summary -- Chapter 2: Invisible and Untouchable - The Importance of Anonymity in OSINT Analysis -- Introduction to anonymity and privacy in OSINT -- Ways anonymity can be breached in OSINT -- Striking the balance - Privacy concerns in OSINT investigations -- Protecting your digital footprint -- Managing and limiting YOUR online presence -- Why protecting personal data is more important than ever -- Internet browsers - The frontline of data vulnerability -- How to protect yourself -- Creating and managing online personas - Sock puppets -- Staying ahead of cyber threats in OSINT -- Keeping up with privacy and security news -- Learning from past breaches and incidents -- Summary -- Chapter 3: The OSINT Toolbox - Methods and Techniques for Gathering and Analyzing Information -- Introduction to OSINT methods and techniques -- The variety of techniques used in OSINT -- Importance of selecting the right method for a specific task -- Searching and browsing the surface web -- Advanced search engine techniques -- Google hacking -- Utilizing specialized search engines and directories -- Academic search engines -- Code search engines -- Patent search engines -- Image search engines -- Exploring social media for OSINT (SOCMINT)…”
Libro electrónico -
2825Publicado 2010Tabla de Contenidos: “…. - Content of the obligation : obligations of means and obligations of result / Constantin P Economides. - Duration of the breach / Jean Salmon. - Relevance of the intertemporal law / Paul Tavernier. - International crimes of states / James Crawford. - The character of the violated obligation / Antonio Cassese. - The character of the breach / Paola Gaeta. - The notion of circumstances precluding wrongfulness / Sandra Szurek. - Circumstances precluding wrongfulness in the ILC articles on state responsibility / Affef Ben Mansour ... …”
Libro -
2826Publicado 2010Tabla de Contenidos: “…Smits -- The role of the conflict of laws in European private law / Horatia Muir-Watt -- Competence and European private law / Stephen Weatherill -- Language and terminology / Gerhard Dannemann, Silvia Ferreri and Michele Graziadei -- European private law by directives : approach and challenges / Angus Johnston and Hannes Unberath -- The European Court of Justice as a motor of private law / Jules Stuyck -- European contract law : the common frame of reference and beyond / Hugh Beale -- The way forward in European consumer contract law : optional instrument instead of further deconstruction of national private laws / Hans Schulte-Nölke -- Commercial contracts and European private law / Giuditta Cordero Moss -- European tort law : features of a diverse landscape / Cees van Dam -- European Union property law / Sjef van Erp and Bram Akkermans -- Information obligations and withdrawal rights / Peter Rott -- Travel law / Jens Karsten -- Unfair contract terms / Paolisa Nebbia -- Unfair commercial practices and European private Law / Hans-W. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad de Navarra, Biblioteca Universidad de Deusto)Libro -
2827Publicado 2004Tabla de Contenidos: “…Izola's Fishermen between Yacht Clubs, Beaches, and State Borders: Connections between Fishing and Tourism / Index -- List of Contributors…”
Libro electrónico -
2828por Fargnoli, PatriciaTabla de Contenidos: “…Contents; Foreword by Mary Oliver; Part One; How This Poet Thinks; Hopper's Paintings; Landscape in Blue and Bronze; From Eleven Years Later; Breaking Silence-For My Son; Naming My Daughter; Going; Miniature; Sea Watchers; From a Rented Cottage by Winnisquam in Rain; At the Mystic Aquarium; Gifts; Evensong; The Sleepers; The Decision; Nightwork; Sag Harbor Sundown; Crossing the Sound; Pemaquid Beach After a Week Alone; On Hearing of the Sudden Death of a Friend; At the Enosberg Falls Cemetery; Lamentation; Lightning Spreads Out Across the Water; Watching Light in the Field; Part Two…”
Publicado 1999
Libro electrónico -
2829Publicado 2010Tabla de Contenidos: “…Coast Guard's Flotilla 10 at Omaha Beach / Mark A. Snell -- American pacifism, the "greatest generation," and World War II / Scott H. …”
Libro -
2830Publicado 2008Tabla de Contenidos: “…Nilsen -- John Ford and the Feeney family of Galway and Portland / Matthew Jude Barker -- The John Ford tour / Margaret Feeney LaCombe -- John Ford's arrival in Hollywood / Dan Ford -- Ressections on the Battle of Midway : an interview with John Ford (August 17, 1943) -- We shot d-day on Omaha Beach / Peter Martin -- John Ford's use of Gaelic in The quiet man / Kenneth E. …”
Libro -
2831Publicado 2000Tabla de Contenidos: “…Jonah on the oncology ward and the beached-up whale carcass, or the strange secular afterlives of biblical texts -- -- 3. …”
Libro -
2832Publicado 2018“…Master Python scripting to build a network and perform security operations Key Features Learn to handle cyber attacks with modern Python scripting Discover various Python libraries for building and securing your network Understand Python packages and libraries to secure your network infrastructure Book Description It's becoming more and more apparent that security is a critical aspect of IT infrastructure. A data breach is a major security incident, usually carried out by just hacking a simple network line. …”
Libro electrónico -
2833Publicado 2020“…This new edition also includes an overview of the new bills introduced by lawmakers in Congress to set national standards for data breach notifications and data security. There is a new section on government agency guidance and rules for cybersecurity of connected devices, such as vehicles, medical devices, and webcams. …”
Libro electrónico -
2834Publicado 2009“…The authors survey the techniques hackers might use to try to breach your network, such as IPv6 network reconnaissance, address spoofing, traffic interception, denial of service, and tunnel injection. …”
Libro electrónico -
2835por Whitaker, Andrew“…The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. …”
Publicado 2005
Libro electrónico -
2836por Degoutte, Gérard“…Water that spills over a levee may create a breach that could potentially provoke flash flooding in the area it was supposed to protect, endangering human lives and infrastructure.It is therefore advisable to equip levee systems with spillways, which are common appurtenant structures on dams. …”
Publicado 2021
Libro electrónico -
2837Publicado 2017“…But ultimately, their profound differences would lead to a fundamental crisis, in their friendship and writ large in the nation, as they became the figureheads of two entirely new forces, the first American political parties. It was a bitter breach, lasting through the presidential administrations of both men, and beyond. …”
Libro -
2838Publicado 1995Tabla de Contenidos: “…(Ivan Pregelj: Der "fremde Geist" und die "katholische slowenische Seele") - Strahinja Kostić: Echo und Ausstrahlung der Uracher Reformationsdrucke und der Reformation bei den Serben vom 16. bis zum 18. …”
Libro electrónico -
2839Publicado 2013Tabla de Contenidos: “…/ Marianna Muravyeva and Raisa Maria Toivo -- Historiography and the politics of gender -- From women's oppression to male anxiety : the concept of "patriarchy" in the historiography of early modern Europe / Androniki Dialeti -- The metaphysics of gender in Christine de Pizan's thought / Ilse Paakkinen -- "That women are but men's shadows" : examining gender, violence and criminality in early modern Britain / Anne-Marie Kilday -- Female spirituality, religion and gender identities -- A good wife : demonic possession and discourses of gender in later medieval culture / Sari Katajala-Peltomaa -- Between martyrdom and everyday pragmatism : gender, family, and anabaptism in early modern Germany / Pivi Risnen -- Women's sexuality between legal prescription and ecclesiastical control in the Romanian principalities in the 18th century / Constanta Vintila-Gitulesku -- Gendered witches and Nordic patriarchal compromises -- Women, witches, and the town courts of Ribe : ideas of the gendered witch in early modern Denmark / Louise Nyholm Kallestrup -- Male witches and masculinity in early modern Finnish witchcraft trials / Raisa Maria Toivo -- Gendering moral crimes in early modern England and Europe : blasphemy the mirror image of witchcraft / David Nash -- Laws, genders and deviancies -- Gendered suicide in early modern Sweden and Finland / Riikka Miettinen -- The responsibility of a seducer : men and the breach of promise in early modern Swedish legislation / Mari Vimki -- Personalizing homosexuality and masculinity in early modern Russia / Marianna Muravyeva / Contributors -- Notes -- Index…”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
2840Publicado 2017Tabla de Contenidos: “…/ Robert Frau -- The limits of the international health regulations: Ebola governance, regulatory breach, and the non-negotiable necessity of national healthcare / Susan L. …”
Libro electrónico