Mostrando 2,981 - 3,000 Resultados de 3,562 Para Buscar 'Uberach~', tiempo de consulta: 1.56s Limitar resultados
  1. 2981
    por Whitfield, Bryan J.
    Publicado 2013
    Tabla de Contenidos: “…Descamps; Albert Vanhoye; Wolfgang Nauck; Rhetorical Analyses; Hermann Frhr. von Soden; Keijo Nissilä; Walter G. Übelacker; Craig R. Koester; Linguistic Analyses; Observations; Appeals to Conceptual Worlds; Gnosticism; Philo and Middle Platonism; Qumran; The Samaritans; Merkabah Mysticism; Observations; Appeals to Reading Practices…”
    Click para texto completo desde fuera UPSA
    Click para texto completo desde UPSA
    Libro electrónico
  2. 2982
    Publicado 2018
    Tabla de Contenidos: “…-- Modelle und Trainingseinheiten -- Mehrschichtsysteme -- Backpropagation-Algorithmus -- GPUs und Parallelisierung -- Lernmethoden des Deep Learning -- Überwachtes Lernen -- Unüberwachtes Lernen -- Bestärktes Lernen -- Teilüberwachtes Lernen -- Aktives Lernen -- Kapitel 3: Wozu wird Deep Learning verwendet? …”
    Libro electrónico
  3. 2983
    por Niemeyer, Patrick
    Publicado 2005
    Tabla de Contenidos: “…A Word About StringsStatements and Expressions; Statements; if/else conditionals; do/while loops; The for loop; The enhanced for loop; switch statements; break/continue; Unreachable statements; Expressions; Operators; Assignment; The null value; Variable access; Method invocation; Object creation; The instanceof operator; Exceptions; Exceptions and Error Classes; Exception Handling; Bubbling Up; Stack Traces; Checked and Unchecked Exceptions; Throwing Exceptions; Chaining exceptions; try Creep; The finally Clause; Performance Issues; Assertions; Enabling and Disabling Assertions…”
    Libro electrónico
  4. 2984
    por Ritchie, Stephen D.
    Publicado 2011
    Tabla de Contenidos: “…CHAPTER 6 .NET Rules and RegulationsCoding Standards and Guidelines; Sources; Exceptions; Disposable Pattern; Miscellaneous; Calling Virtual Methods in Constructors; Defining a Zero-Value enum Element; Returning an Empty Instance; Publicly Visible static readonly Fields; Code Smells; Comments; Way Too Complicated; Unused, Unreachable, and Dead Code; Summary; CHAPTER 7 Powerful C# Constructs; Extension Methods; Implicitly Typed Local Variables; Nullable Types; The Null-Coalescing Operator; Optional Parameters; Generics; LINQ; Summary; CHAPTER 8 Automated Testing; Case Study…”
    Libro electrónico
  5. 2985
    Tabla de Contenidos: “…AN UNFORGETTABLE HOLIDAY -- PRESENTE SIMPLE -- PASADO SIMPLE -- VERBOS REGULARES -- PRESENTE PERFECTO -- THE WEATHER -- THE BEACH -- THE UNIVERSE -- GEOGRAPHY -- LO QUE HEMOS APRENDIDO -- TEST -- ACTIVIDADES -- TEMA 2. …”
    Libro electrónico
  6. 2986
    Publicado 1962
    Tabla de Contenidos: “…Clopas Batlle ; De Montserrat a Compostela / por Alvaro Cunqueiro ; Las publicaciones bíblicas y el padre Ubach / por Dom Romualdo María Diaz Carbonell ; Montserrat, tema literario universal / por Guillermo Díaz-Plaja ; El Montserrat de hoy / por José María Espinás ; La pinacoteca de Montserrat / por Joaquim Folch y Torres ; La Virgen / Lorenzo Gomis ; Los pájaros de la montaña / por Néstor Luján ; El culto a la virgen morena en todo el mundo / por Dom Aldalberto M. …”
    Capítulo
  7. 2987
    Publicado 2009
    Tabla de Contenidos: “…-- PART IV: Lotsa Lights -- How to Give Birth to a Speedlight -- A Great Wall of Light -- Northern Light -- The Tree of Woe -- How to Build a Backyard Studio -- Don't Light It, Light Around It -- Goin' Glam and Throwin' Sparks -- And Now for Something Completely Different -- Beach Light -- Plane, But Not Simple -- Rollin' with Pride of Midtown -- Appendix: What's This Button Do? …”
    Libro electrónico
  8. 2988
    Publicado 2021
    Tabla de Contenidos: “…Michael Curtis -- 2002 John Blair: "Bacon on the Beach" | from American Standard, selected by Elizabeth Hardwick -- 2003 Suzanne Greenberg: "Speed-Walk" | from Speed-Walk and Other Stories, selected by Rick Moody -- 2004 Darrell Spencer: "Bring Your Legs with You" | from Bring Your Legs with You, selected by Michael Chabon -- 2005 David Harris Ebenbach: "Misdirections" | from Between Camelots, selected by Stewart O'Nan -- 2006 Todd James Pierce: "Columbine: The Musical" | from Newsworld, selected by Joan Didion -- 2008 Anthony Varallo: "In the Age of Automobiles" | from Out Loud, selected by Scott Turow -- 2009 Anne Sanow: "Pioneer" | from Triple Time, selected by Ann Patchett -- 2010 Tina May Hall: "Visitations" | from The Physics of Imaginary Objects, selected by Renata Adler -- 2011 Shannon Cain: "This Is How It Starts" | from The Necessity of Certain Behaviors, selected by Alice Mattison -- 2012 Beth Bosworth: "The Source of Life" | from The Source of Life and Other Stories, selected by Sven Birkerts -- 2013 Anthony Wallace: "The Old Priest" | from The Old Priest, selected by Amy Hempel -- 2014 Kent Nelson: "Alba" | from The Spirit Bird, selected by David Guterson -- 2015 Leslie Pietrzyk: "Ten Things" | from This Angel on My Chest, selected by Jill McCorkle -- 2016 Melissa Yancy: "Dog Years"| from Dog Years, selected by Richard Russo -- 2017 William Wall: "The Mountain Road" | from The Islands, selected by David Gates -- 2018 Brad Felver: "Dogs of Detroit" | from The Dogs of Detroit, selected by Lynne Sharon Schwartz -- 2019 Kate Wisel: "Mick's Street" | from Driving in Cars with Homeless Men, selected by Min Jin Lee…”
    Libro electrónico
  9. 2989
    Publicado 2024
    Tabla de Contenidos: “…-- Essential Cloud Computing Characteristics -- Cloud Stakeholders -- ISO/IEC 17789 CCRA Roles and Sub-Roles -- Cloud Service Customer -- CSP -- Cloud Service Partner -- Cloud Auditor -- NIST Cloud Computing Key Actors -- Cloud Consumer -- Cloud Provider -- Cloud Broker -- Cloud Auditor (CA) -- Cloud Carrier (CC) -- Key Cloud Computing Technologies and Building Blocks -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 2: Cloud Reference Architecture -- Cloud Service Models -- Software as a Service (SaaS) -- Platform as a Service (PaaS) -- Infrastructure as a Service (IaaS) -- Cloud Service Models and Categories -- Cloud Deployment Models -- Shared Responsibility Model -- Shared Considerations for Cloud Deployments -- Emerging Technologies in Cloud Computing -- Data Science -- Artificial Intelligence and Machine Learning (AI/ML) -- Blockchain -- Internet of Things (IoT) -- Containers -- Quantum Computing -- Quantum as a Service (QaaS) -- Quantum-Enhanced Optimization and ML -- Quantum Simulation and Modeling -- Quantum Cloud-Based Software Development -- Edge Computing -- Confidential Computing -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 3: Top Threats and Essential Cloud Security Concepts and Controls -- The CIA Triad-Confidentiality, Integrity, and Availability -- Common Threats to Cloud Deployments -- Data Breaches -- Misconfiguration -- Insecure APIs -- Insider Threats -- Account Hijacking -- Security Control Categories and Types -- Security Control Categories/Classes -- Security Control Types and Functionality -- Summary -- Exam Readiness Drill - Chapter Review Questions…”
    Libro electrónico
  10. 2990
    por Poczka, Irene
    Publicado 2017
    “…Jahrhunderts lassen sich überall diskursive Fragmente einer Genealogie liberalen Regierens von Gesundheit ausmachen Besprochen in: H-Soz-u-Kult, 07.12.2017, Andrea Wiegeshoff…”
    Libro electrónico
  11. 2991
    Publicado 2020
    “…Die Studien wurden vom Bundesministerium für Bildung und Forschung gefördert Eine Stärke des Buchs ist die überaus umfassende Beschreibung der Forschungsdesigns und -methoden, welche unter anderem in Kapitel fünf zur method(olog)ischen Fundierung behandelt wird. …”
    Libro electrónico
  12. 2992
    Publicado 2017
    Tabla de Contenidos: “…Auflage -- Kapitel 1: Einleitung -- Herzlich willkommen in der Welt des Storytellings -- Geschichten überall -- Warum Storytelling? -- Mehrwert durch Geschichten -- Storytelling - Warum jetzt? …”
    Libro electrónico
  13. 2993
    Publicado 2025
    “…Stutzig machen anschließend überaus bereitwillig erklärte Zugeständnisse von Straflosigkeit. …”
    Cover
    Tesis
  14. 2994
    Publicado 2018
    Tabla de Contenidos: “…VoIP exploitation -- VoIP attacks -- Denial-of-Service -- Eavesdropping -- SIP attacks -- SIP registration hijacking -- Spam over Internet Telephony -- Embedding malware -- Viproy - VoIP penetration testing kit -- VoLTE Exploitation -- VoLTE attacks -- SiGploit - Telecom Signaling Exploitation Framework -- Summary -- Chapter 10: Insecure VPN Exploitation -- Cryptography -- Cryptosystems -- Ciphers -- Classical ciphers -- Modern ciphers -- Kerckhoffs' principle for cryptosystems -- Cryptosystem types -- Symmetric cryptosystem -- Asymmetric cryptosystem -- Hash functions and message integrity -- Digital signatures -- Steganography -- Key management -- Cryptographic attacks -- VPN fundamentals -- Tunneling protocols -- IPSec -- Secure Sockets Layer/Transport Layer Security -- SSL attacks -- DROWN attack (CVE-2016-0800) -- POODLE attack (CVE-2014-3566) -- BEAST attack (CVE-2011-3389) -- CRIME attack (CVE-2012-4929) -- BREACH attack (CVE-2013-3587) -- Heartbleed attack -- Qualys SSL Labs -- Summary -- Chapter 11: Routing and Router Vulnerabilities -- Routing fundamentals -- Exploiting routing protocols -- Routing Information Protocol -- RIPv1 reflection DDoS -- Open Shortest Path First -- OSPF attacks -- Disguised LSA -- MaxAge LSAs -- Remote false adjacency -- Seq++ attack -- Persistent poisoning -- Defenses -- Interior Gateway Routing Protocol -- Enhanced Interior Gateway Routing Protocol -- Border Gateway Protocol -- BGP attacks -- Exploiting routers -- Router components -- Router bootup process -- Router attacks -- The router exploitation framework -- Summary -- Chapter 12: Internet of Things Exploitation -- The IoT ecosystem -- IoT project architecture -- IoT protocols -- The IoT communication stack -- IP Smart Objects protocols suite -- Standards organizations -- IoT attack surfaces -- Devices and appliances -- Firmware -- Web interfaces…”
    Libro electrónico
  15. 2995
    Publicado 2018
    Tabla de Contenidos: “…-- Security information and event management -- SIEM-Event versus incident and data breach -- What is an event? -- What is a security incident? …”
    Libro electrónico
  16. 2996
    Publicado 2023
    Tabla de Contenidos: “…-- SCA tools and their functionalities -- The importance of SCA -- The benefits of SCA -- SAST versus SCA -- The SCA process -- SCA metrics -- Integrating SCA with other security tools -- Resolving the issues without breaking the build -- Detection of security flaws -- Open source SCA tools -- Discussing past breaches -- Summary -- Chapter 9: Static Application Security Testing -- Introduction -- What is SAST? …”
    Libro electrónico
  17. 2997
    Publicado 2014
    Tabla de Contenidos: “…Parallelen und Differenzen in der MethodologieSchlussfolgerungen; Carol Bakhos (University of California): Reading Against the Grain: Humor and Subversion in Midrashic Literature; Joshua Levinson (Jerusalem): Post-Classical Narratology and the Rabbinic Subject; Introduction; Historical Context; The Subject in Legal Discourse; Intention and Subjectivity in Midrash Aggadah; Biblical Characters in the Midrash; Exegetical Narrative; Canonicity, Breach and the Disnarrated; History of the Sage as Subject; The Beginnings of Rabbi Eliezer (Genesis Rabbah 41:1); Pirkei de-Rabbi Eliezer; Conclusion…”
    Libro electrónico
  18. 2998
    Publicado 2016
    Tabla de Contenidos: “…Front Cover; Threat Forecasting: Leveraging Big Data for Predictive Analysis; Copyright; Contents; About the Authors; Foreword; Why Threat Forecasting is Relevant; What You Will Learn and How You Will Benefit; Preface; Book Organization and Structure; Closing Thoughts; Acknowledgments; Chapter 1: Navigating Todays Threat Landscape; Introduction; Why Threat Forecasting; The Effects of a Data Breach; Barriers to Adopting Threat Forecasting Practices; Going Beyond Historical Threat Reporting; Timing; Generalization; The State of Regulatory Compliance; Industry Specific Guidelines…”
    Libro electrónico
  19. 2999
    Publicado 2016
    Tabla de Contenidos: “…Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Becoming Network 007s; 007 characteristics in the network world; Bond characteristics for getting to satisfactory completion of the case; The TAARA methodology for network forensics; Identifying threats to the enterprise; Internal threats; External threats; Data breach surveys; Locard's exchange principle; Defining network forensics; Differentiating between computer forensics and network forensics; Strengthening our technical fundamentals; The seven-layer model…”
    Libro electrónico
  20. 3000
    por Hoffmann, Torsten Andreas
    Publicado 2024
    Tabla de Contenidos: “…-- Ein Geschehen zu einer Komposition verdichten -- Bildkomposition bei der Streetfotografie -- Landschaft ist geduldig -- Überall wachsam sein -- Einfache und komplexe Komposition -- Die Bildmitte kann eine Falle sein -- Symmetrie und Fluchtperspektive -- Bildspannung erzeugen -- Bildrhythmik -- Wohin soll der Horizont? …”
    Libro electrónico