Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 167
- Security measures 164
- Computer networks 125
- Historia 95
- Engineering & Applied Sciences 74
- Subirachs, Josep M. 67
- Data protection 59
- Història 56
- Management 52
- Derecho penal 50
- Biblia 47
- Computer Science 46
- History 43
- Exposicions 40
- Filosofía 39
- Computer crimes 32
- Derecho 31
- Information technology 31
- Ubach, Bonaventura 31
- Cloud computing 30
- Historia y crítica 28
- Materiales 28
- Crítica e interpretación 27
- Electrical & Computer Engineering 24
- Física 23
- Law and legislation 23
- Penetration testing (Computer security) 23
- Catequesi 22
- Internet 20
- Catequesis 19
-
3401Publicado 2017“…We are pleased to welcome you to the Seventh ACM International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications (DIVANet'17), held in conjunction with the 20th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM'17), in Miami Beach, USA on November 21 to 26, 2017. The Seventh ACM DIVANet'17 International Symposium aims to provide researchers and practitioners with a venue to disseminate and share state-of-the-art research on vehicular networks, intelligent transportation systems and wireless mobile ad hoc networking. …”
Libro electrónico -
3402Publicado 2020“…In recent years, spectacular images of ruined boats, makeshift border camps, and beaches littered with life vests have done much to consolidate the politics of movement in Europe. …”
Libro electrónico -
3403Publicado 2023“…What's Inside Building productive relationships with other C-level executives Negotiating salaries and managing promotions Architecting future-proof systems Handling security breaches and ransomware attacks About the Reader For technology leaders working in or aspiring towards a CTO role. …”
Video -
3404Publicado 2023“…What's Inside Building productive relationships with other C-level executives Negotiating salaries and managing promotions Architecting future-proof systems Handling security breaches and ransomware attacks About the Reader For technology leaders working in or aspiring towards a CTO role. …”
Grabación no musical -
3405Publicado 2017“…They waste resources and provide a wide attack surface with a target-rich environment, as demonstrated by massive data breaches in the past few years. Unikernels use only the OS resources necessary make their applications work. …”
Libro electrónico -
3406Publicado 2014“…Discover memory forensics techniques: How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. …”
Libro electrónico -
3407Publicado 2015“…Best practices for protecting critical data and systems Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. …”
Libro electrónico -
3408Publicado 2022“…By the end of this book, you'll be able to investigate and report unwanted security breaches and incidents in your organization…”
Libro electrónico -
3409Publicado 2023“…So it's no surprise that an estimated 84% of security breaches happen at the application layer. Join experts in the field to learn the latest developments in application security. …”
Video -
3410por Sabahi, Borzu“…Monetary compensation as the prevalent form of remedy sought and awarded in investor-State disputes is discussed in more detail, including topics such as the amount of compensation for damage resulting from breach of investment treaties or for lawful expropriation of foreign investor's property, a brief overview of valuation methods, supplementary compensation for moral damages, interest, costs, and currency fluctuations as well as various principles that may limit the amount of recoverable compensation, such as causation. …”
Publicado 2011
Libro -
3411por Ali, Tariq, 1943-“…Presentación del editor: "The inviolability of the American mainland, breached on 9/11/2001 for the first time since 1812, led to extravagant proclamations by the pundits. …”
Publicado 2002
Libro -
3412por Kaslow, Florence W.“…Carolyn Susman, health columnist, Palm Beach Daily News, Palm Beach, Florida "This unique book by noted psychologist Florence Kaslow provides a cornucopia of information, ranging from historical factors in child custody decisions, to stages of the divorce process and tips on parenting coordination. …”
Publicado 2013
Libro electrónico -
3413por Kontopodis, Michalis“…Through case studies of Turkish and Arabic students in Berlin (Germany), Asian, Hispanic and Black students in Long Beach (USA), and children of landless rural workers in Espirito Santo (Brazil), this book investigates emerging educational practices and takes a critical stance towards what can be seen as "mainstream" or "dominant" educational politics. …”
Publicado 2012
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
3414Publicado 2015“…Indispensable for the CEO as well as the small business owner, Passing the Torch presents stories from the boardroom to the family-owned bakery, and from the car dealership to the beach resort hotel. This is a book for all with a stake in maintaining the livelihood of a business and contains templates to guide you through the seven steps of the succession planning life cycle. …”
Libro electrónico -
3415Publicado 2023“…He owns and operates more than fifty restaurants, including Arby's, Nothing Bundt Cakes, and multiple outlets of Smoothie King, Dunkin' Donuts-and coming soon, Kaia Tapas and Beach Life. A tale of entrepreneurship focusing on the roadblocks aspirational business owners most commonly encounter, this how-to, self-help guide provides personal stories and feet-on-the-street advice. …”
Grabación no musical -
3416Publicado 2013“…What began in 1984 as a conference bringing together the thought leaders and luminaries from the worlds of technology, entertainment, and design in Long Beach, California, TED exploded in popularity and led to a second conference held in Edinburgh, Scotland, TEDGlobal. …”
Libro electrónico -
3417por Milstein, Jeff“…In addition to the urban topography, events and activities have also been captured, such as the Macy’s Thanksgiving Day Parade and outings at the beach…”
Publicado 2017
Libro -
3418Publicado 2018“…Dabei wird im Dialog mit der überaus reichen Interpretationsgeschichte die Vielfalt der Auslegungen sichtbar und gleichzeitig auch deutlich, welches Verständnis in Einzelfragen und insgesamt zutreffender ist. …”
Otros -
3419por Cané, Miguel, 1851-1905“…Perseguido en Cuba, fue al menos libre en los Estados Unidos, pero libre como sólo lo son los hombres sin tierra, su libro y su vida son el retrato de un Miami incómodo que no aparece en las guías turísticas de Miami, en algún lugar entre South Beach y Coral Gables…”
Publicado 2019
Enlace del recurso
Libro electrónico -
3420por Cané, Miguel, 1851-1905“…Perseguido en Cuba, fue al menos libre en los Estados Unidos, pero libre como sólo lo son los hombres sin tierra, su libro y su vida son el retrato de un Miami incómodo que no aparece en las guías turísticas de Miami, en algún lugar entre South Beach y Coral Gables…”
Publicado 2019
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico