Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 167
- Security measures 164
- Computer networks 125
- Historia 95
- Engineering & Applied Sciences 74
- Subirachs, Josep M. 67
- Data protection 59
- Història 56
- Management 52
- Derecho penal 50
- Biblia 47
- Computer Science 46
- History 43
- Exposicions 40
- Filosofía 39
- Computer crimes 32
- Derecho 31
- Information technology 31
- Ubach, Bonaventura 31
- Cloud computing 30
- Historia y crítica 28
- Materiales 28
- Crítica e interpretación 27
- Electrical & Computer Engineering 24
- Física 23
- Law and legislation 23
- Penetration testing (Computer security) 23
- Catequesi 22
- Internet 20
- Catequesis 19
-
3001Publicado 2014Tabla de Contenidos: “…; Common Attacks; Impact of Security Breaches; 2. Protecting Mission-Critical Systems; Information Assurance; Information Risk Management; Administrative, Technical, and Physical Controls; Risk Analysis; Defense in Depth…”
Libro electrónico -
3002por Cascarino, RichardTabla de Contenidos: “…CONFLICTS OF INTERESTInternal Controls to Prevent Conflicts of Interest; BREACH OF FIDUCIARY DUTY; THEFT OF TRADE SECRETS; Internal Controls to Prevent Theft of Trade Secrets or to Seek Redress for such Theft; FALSE CLAIMS; Health Care Fraud; Pharmaceutical-Related Fraud; Construction and Procurement Frauds; Defense Fraud; Disaster Relief Fraud; Overseas Reconstruction Fraud; Research Fraud; Internal Controls to Prevent Claims Fraud; FALSE CONVEYANCING; TUNNELING; CONSPIRACY; LAPPING; KITING; Internal Controls to Prevent and Detect Lapping and Kiting; FRAUDULENT AFFILIATIONS…”
Publicado 2013
Libro electrónico -
3003por Wilson, Patrick G.Tabla de Contenidos: “…Medical TerminologyColor Codes; Healthcare Terminology; Terms to Know; Review Questions; Chapter 4: HIPAA Regulations; HIPAA Overview; HIPAA Elements; Title II: Administrative Simplification and Fraud Prevention; Electronic Data Interchange; Terms to Know; Review Questions; Chapter 5: HITECH Regulations; HITECH Background; Business Associates; Breach Notification; Penalties; Accounting of Disclosures; Minimum Necessary; Marketing and Sale of PHI; How HITECH Affects Different CE Scenarios; National Health Information Network; Personal Health Records; Terms to Know; Review Questions…”
Publicado 2011
Libro electrónico -
3004Publicado 2015Tabla de Contenidos: “…Chapter 3 - Regulatory EnvironmentThis chapter will help candidates:; Legal issues that pertain to information security and privacy for healthcare organizations; Health Insurance Portability and Accountability Act of 1996 (HIPAA); Select elements and definitions; The american recovery and reinvestment act (ARRA) of 2009; International standards; A culture of privacy and security; Organizational-level privacy and security requirements; Data breach regulations; Penalties and fees; 45 CFR 164.514: HIPAA Privacy Rule (the de-identification standard and its two implementation specifications)…”
Libro electrónico -
3005Publicado 2022Tabla de Contenidos: “…Chapter 9: Security Testing and Attack Simulation Tools -- Penetration Testing Tools -- Information Gathering and Intelligence -- Sniffers -- Vulnerability Scanning -- Web Application Vulnerability Scanning -- SQL Injection -- Network Tools -- Breach and Attack Simulation -- System Information Tools -- Password Cracking -- Session Hijacking -- Steganography -- Windows Log Tools -- Wireless Network Tools -- Bluetooth Attacks -- Website Mirroring -- Intrusion Detection -- Mobile Devices -- Social Engineering -- IoT (Internet of Things) -- User Awareness: eLearning -- Forensics and Incident Response -- HoneyPots -- Summary -- Appendix 1: IT Security Technical Controls, Processes, and Services Matrix -- Appendix 2: Information Security Certifications -- Appendix 3: Knowledge, Skills and Abilities (KSAs) -- Appendix 4: Resource Library -- Index…”
Libro electrónico -
3006Publicado 2018“…About This Book Learn protocol analysis, optimization and troubleshooting using Wireshark, an open source tool Learn the usage of filtering and statistical tools to ease your troubleshooting job Quickly perform root-cause analysis over your network in an event of network failure or a security breach Who This Book Is For If you are a security professional or a network enthusiast who is interested in understanding the internal working of networks and packets, then this book is for you. …”
Libro electrónico -
3007
-
3008por Papilloud, Christian“…Sie sieht im Begriff des »Unterschieds« das Grundprinzip seiner Erkenntnistheorie, in der »Unterschied« als Machtbeziehung konzipiert wird »Überaus voraussetzungsreich und eher als weiterführende Lektüre zu empfehlen.« Christian Morgner und Thomas Ritter, Soziologische Revue, 28 (2005) »Längst überfällig war [...] der Versuch, das Oevre eines der vielseitigsten und zur Zeit wohl einflussreichsten und meistdiskutierten Gesellschaftstheoretiker unter dem Blickwinkel besagten Grundprinzips zu betrachten und damit auf seine epistemologischen Grundlagen hin zu befragen.« Per Röcken, literaturkritik.de, 9 (2005)…”
Publicado 2015
Electrónico -
3009por Bachmann, Cordula“…Der konsequent empirische Blick auf das doing gender als dressing gender - also auf das Zusammenspiel von Kleidungs- und Geschlechterpraxen - zahlt sich insofern aus, als gewissen feuilletonistischen Hypes und kulturwissenschaftlichen Prognosen widersprochen werden kann, die regelmäßig das Verschwinden der Geschlechterdifferenz verkünden »Cordula Bachmanns Studie ist überaus lesenswert, denn es gelingt ihr, [...] in scharf konturierten Momentaufnahmen neuralgische Punkte im Verhältnis von Gender-Theorie und empirischer Gender-Forschung aufzuzeigen sowie die strukturellen Gegensätze des männlichen und weiblichen Handelns [...] im Kontext gesellschaftlicher Geschlechterdiskurse, die in erster Linie immer Weiblichkeitsdiskurse sind, überzeugend zu verorten.« Prof. …”
Publicado 2015
Electrónico -
3010Publicado 2012“…Die Frage nach dem Wesen der Wahrheit muss neu gestellt, die Dialektik von Autorität und Wahrheit neu überdacht werden. Mit Beiträgen von: David Burr, Duane Henderson, Isabel Iribarren, Deeana Klepper, Robert E. …”
Libro electrónico -
3011por Byassee, JasonTabla de Contenidos: “…John Kerry and Communion -- Going Catholic: six journeys to Rome -- Fathers and sons at the beach -- pt. 5. Searching for Jesus in popular culture. …”
Publicado 2013
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
3012Publicado 2009Tabla de Contenidos: “…EL LIBRO BLANCO DEL ROCK; PÁGINA LEGAL; ÍNDICE; ROCK AND ROLL BABILONIA; GRANDES BANDAS; AC/DC; AEROSMITH; ALICE IN CHAINS; ANTHRAX; BEACH BOYS, THE; BEATLES, THE; BERRY, CHUCK; BLACK SABBATH; BLUR; BON JOVI; BOWIE, DAVID; BUNKERS, LOS; CAFÉ TACUBA; CHANCHO EN PIEDRA; CLAPTON, ERIC; CLASH, THE; COLDPLAY; CONGRESO; COOPER, ALICE; CRIMINAL; CRUCE, EL; CURE, THE; DEEP PURPLE; DE SALOON; DEF LEPPARD; DEFTONES; DEPECHE MODE; DIVIDIDOS; DOORS, THE; DORSO; DREAM THEATER; DYLAN, BOB; EAGLES; ELECTRODOMÉSTICOS; FAITH NO MORE; FISKALES AD HOK; FOO FIGHTERS; FUGAZI; FULANO; GARCÍA, CHARLY; GENESIS…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
3013por Tolic, InesTabla de Contenidos: “…. ; Primary School Mzamomtsha / Stefan Antoni Olmesdahl Truen Architects (SAOTA) ; Bopitikelo community and cultural center / Peter Rich Architects ; Constitutional Court / Designworkshop:sa (ex OMM Design Workshop) ; Mpumalanga Provincial Government Complex / Co-Arc International Architects Inc. in collaboration with Aziz Tayob and Herman Schnepel Architects ; Red Location Museum of Struggle / Noero Wolff Architects in collaboration with John Blair Architects ; Apartheid Museum / GAPP Architects & Urban Designers in collaboration with Mashabane Rose Architects, BritzRoodt Partnership and Linda Mvusi Architecture and Design ; Johannesburg Ecocity / ERA architects (Environment Response Architecture) ; Law Faculty, University of Pretoria / Martin Kruger Associates ; The Northern Cape Provincial Legislature Building / Louis Ferreira da Silva Architects + Johnston Architects ; Drill Hall / Michael Hart Architects in collaboration with Johannesburg Development Agency ; Faraday Market and Transport Interchange / Albonico + Sack Achitects and Urban Designers in collaboration with MMA architects ; Beau Constance / Metropolis ; Maropeng Visitors Interpretation Centre Sterkfontein Caves Visitors Centre / GAPP Architects & Urban Designers in joint venture with MMA Architects ; Sci-Bono Discovery Center / ASM Architects and Urban Designers ; Sans Souci Cinema / 26'10 South Architects with Lindsay Bremner Architect ; Yzerfontein House / Stefan Antoni Olmesdahl Truen Architects (SAOTA) ; British Petroleum Head Offices / Martin Kruger Associates ; The Chapel of Light / Comrie + Wilkinson Architects and Urban Designers ; Courtyards on Oxford / Studio MAS Architects and Urban Designers ; Freedom Park / GAPP Architects & Urban Designers, MMA Architects, Mashabane Rose Associates ; Proud Heritage Clothing Campus (Warehouse 1 and 2) / Don Albert & Partners ; Red House / Slee and Co Architects ; Singita Lebombo Lodge and Sweni Lodge / Designerworkshop:sa (ex OMM Design Workshop) ; House Steenkamp / Elmo Swart Architects ; Inkwenkwezi Secondary School / Noero Wolff Architects in collaboration with Sonja Spamer Architects ; The Lourierpark Community Center / The Roodt Partnership, Architects and Town Planners; Gabriel's Garden Pavilion / Kate Otten Architects ; Beach House / Designworkshop:sa (ex OMM Design Workshop) ; Highveld Pavilion / Studio MAS Architects and Urban Designers ; Soccer City Stadium "The Melting Pot" / Boogertman Urban Edge and Partners Architects in collaboration with Populous ; House Wright Addition / Elmo Swart Architects…”
Publicado 2010
Libro -
3014por Gili Galfetti, GustauTabla de Contenidos: “…Torres Clavé : Casas de fin de semana en Garraf, Barcelona ; Gio Ponti : una pequeña casa ideal ; Philip Johnson : Casa Philip Johnson, Cambridge, Massachusetts ; Pino Pizzigoni : Casa unifamiliar mínima, Bergamo ; Edward Cullinan : Casa Marvin, Stinson Beach, California ; Peter Willmott : Casa para un artista, Hobart…”
Publicado 2002
Libro -
3015por Kelly, Kevin, 1952-Tabla de Contenidos: “…Liquids; CocoTap; Joyoung Soy Milk Maker; Spout Ladle; Waring Pro YM350 Yogurt Maker; Hamilton Beach Commercial Juicer; OXO Salad Spinner; Quick Snap Ice Tray; Peanut Butter Mixer; Sodastream Home Soda Maker; Citrus Squeezers; OXO Splatter Screen; Cuisinart Smart Stick Hand Blender; Omega Juicer; Zojirushi Electric Dispensing Pot; VitaMix 5200 Countertop Blender; 4. …”
Publicado 2011
Libro electrónico -
3016Publicado 2005Tabla de Contenidos: “…; Stage 3; Correcting over-exposures; Stage 4; Superimposing two pictures; Stage 5; The assembly; Retouching; Studio 03: Frenzy at Almanarre Beach; Stage 1; Imagining the panorama; Stage 2; Scouting…”
Libro electrónico -
3017por Naimpally, AshokTabla de Contenidos: “…Guidelines for Field Experience/Teaching Practicum/Internship Learning Contract, University of Northern ColoradoAppendix 6; Career Center Internship Program, CSU, Long Beach; References; 10 Evaluation of Internships; References; 11 Information Literacy and Career Skills; Introduction; Collaboration Between Career Counselors and Librarians; Locating Internships; Finding Background Information on Companies; Internet Versus Library Databases; The CSULB Model: Job Seeking in Economically Hard Times; Assignment Combining Career and Library Skills; Sustaining the Collaboration; References…”
Publicado 2012
Libro electrónico -
3018Publicado 2017Tabla de Contenidos: “…Robie house ; Schindler house ; National Congress, Brazil ; Bauhaus Dessau ; Hongkong and Shanghai Bank headquarters ; Glasgow School of Art ; Villa Mairea ; The Assembly, Chandigarh ; Stockholm Public Library ; National Olympic Gymnasium ; Sendai Mediatheque ; Einstein Tower ; Lever house ; Diamond Ranch High School ; Glass house ; Ford Foundation headquarters ; Olympic Stadium, Munich ; Gehry house ; Igualada Cemetery ; Crown Hall ; Vanna Venturi house ; Lovell Health House ; Tugendhat house ; Baker house ; Barragán house and studio ; The Beinecke Rare Book & Manuscript Library ; Museu de Arte de São Paulo ; Brion Family tomb ; National Assembly Building, Bangladesh -- Neue Staatsgalerie ; National Museum of Roman Art ; Maison à Bordeaux ; Casa Milà ; Säynätsalo Town Hall ; Lloyd's of London ; Institut du Monde Arabe ; Parc de la Villette ; Jewish Museum Berlin ; Hillside Terrace Complex I-VI ; Smith house ; New National Gallery ; Castelvecchio Museum ; Piscina de Marés ; Michaelerplatz house (Looshaus) ; Rusakov Workers' Club ; Mill Owners' Association building ; Stahl house (Case Study House no.22) ; The Breuer Building (Whitney Museum of American Art) ; Rooftop remodeling Falkestrasse ; Larkin Company administration building ; Fiat Works ; Villa Müller ; Van Nelle Factory ; Dymaxion house ; Querini Stampalia renovation ; House VI ; Beurs van Berlage ; Gamble house ; Lovell beach house ; Turin Exhibition Hall ; Municipal Orphanage, Amsterdam ; Carpenter Center for the Visual Arts ; Free University of Berlin ; Bagsværd Church ; Sesc Pompéia ; Centre le Corbusier (Heidi Weber house) ; Gallaratese II apartments ; Centraal Beheer Building ; Vitra Fire Station ; Yokohama International port terminal…”
Libro -
3019Publicado 2022Tabla de Contenidos: “…-- Summary -- 2 Cybersecurity: Everyone's problem -- 2.1 Keeping it simple -- 2.2 Impacts of a security breach -- 2.3 Objectives of a cybersecurity strategy -- 2.3.1 Applying what we've learned so far -- 2.4 Supporting our strategy: Building a patching policy -- 2.4.1 CVEs are used to coordinate all information around a specific bug, and a CVSS score is used to rate how serious it is -- 2.4.2 Building a patching policy -- 2.5 A culture of security -- 2.6 How ready are you? …”
Libro electrónico -
3020Publicado 2024Tabla de Contenidos: “…5.5 Security Standards and Protocols -- 5.5.1 ISO/IEC 27001 -- 5.5.2 NIST SP 800-53 -- 5.5.3 SOC 2 -- 5.5.4 PCI DSS -- 5.5.5 IEC 62443 -- 5.5.6 OWASP -- 5.5.7 Control Objectives for Information and Related Technologies (COBIT) -- 5.6 Network Security -- 5.7 Access Control -- 5.7.1 Role-based Access Control (RBAC) -- 5.7.2 Discretionary Access Control (DAC) -- 5.7.3 Mandatory Access Control (MAC) -- 5.8 Authentication and Authorization -- 5.9 Privacy Concerns -- 5.10 Case Studies -- 5.10.1 Equifax Data Breach -- 5.10.2 Target Data Breach -- 5.10.3 WannaCry Ransomware Attack -- 5.11 Conclusion -- 5.12 Future Scope -- References -- 6 Efficient-driven Approaches Related to Meta-Heuristic Algorithms using Machine Learning Techniques -- 6.1 Introduction -- 6.2 Stochastic Optimization -- 6.2.1 Genetic Algorithm -- 6.2.2 Particle Swarm Optimization -- 6.3 Heuristic Search -- 6.3.1 Heuristic Search Techniques -- 6.4 Meta-Heuristic -- 6.4.1 Structures of Meta-Heuristic -- 6.5 Machine Learning -- 6.5.1 Applications of Meta-Heuristic -- References -- 7 Security and Privacy Issues in Distributed Healthcare Systems - A Survey -- 7.1 Introduction -- 7.1.1 Traditional Systems -- 7.1.2 Distributed Systems -- 7.2 Previous Study -- 7.2.1 Background and Definitions -- 7.3 Security and Privacy Needs -- 7.4 Security and Privacy Goals -- 7.5 Type of Attacks in Distributed Systems -- 7.5.1 Malicious Hardware -- 7.5.2 Malicious Programs -- 7.6 Recommendations and Future Approaches -- 7.7 Conclusion -- References -- 8 Implementation and Analysis of the Proposed Model in a Distributed e-Healthcare System -- 8.1 Introduction -- 8.2 Outmoded Systems -- 8.3 Distributed Systems -- 8.3.1 Peer-to-Peer Architecture -- 8.4 Previous Work -- 8.5 Service-Oriented Architecture of e-Healthcare -- 8.6 Implementation of the Proposed Model -- 8.6.1 Speech Software…”
Libro electrónico