Mostrando 3,401 - 3,420 Resultados de 3,562 Para Buscar 'Uberach~', tiempo de consulta: 1.42s Limitar resultados
  1. 3401
    Publicado 2017
    “…We are pleased to welcome you to the Seventh ACM International Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications (DIVANet'17), held in conjunction with the 20th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM'17), in Miami Beach, USA on November 21 to 26, 2017. The Seventh ACM DIVANet'17 International Symposium aims to provide researchers and practitioners with a venue to disseminate and share state-of-the-art research on vehicular networks, intelligent transportation systems and wireless mobile ad hoc networking. …”
    Libro electrónico
  2. 3402
    Publicado 2020
    “…In recent years, spectacular images of ruined boats, makeshift border camps, and beaches littered with life vests have done much to consolidate the politics of movement in Europe. …”
    Libro electrónico
  3. 3403
    Publicado 2023
    “…What's Inside Building productive relationships with other C-level executives Negotiating salaries and managing promotions Architecting future-proof systems Handling security breaches and ransomware attacks About the Reader For technology leaders working in or aspiring towards a CTO role. …”
    Video
  4. 3404
    Publicado 2023
    “…What's Inside Building productive relationships with other C-level executives Negotiating salaries and managing promotions Architecting future-proof systems Handling security breaches and ransomware attacks About the Reader For technology leaders working in or aspiring towards a CTO role. …”
    Grabación no musical
  5. 3405
    Publicado 2017
    “…They waste resources and provide a wide attack surface with a target-rich environment, as demonstrated by massive data breaches in the past few years. Unikernels use only the OS resources necessary make their applications work. …”
    Libro electrónico
  6. 3406
    Publicado 2014
    “…Discover memory forensics techniques: How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. …”
    Libro electrónico
  7. 3407
    Publicado 2015
    “…Best practices for protecting critical data and systems Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. …”
    Libro electrónico
  8. 3408
    Publicado 2022
    “…By the end of this book, you'll be able to investigate and report unwanted security breaches and incidents in your organization…”
    Libro electrónico
  9. 3409
    Publicado 2023
    “…So it's no surprise that an estimated 84% of security breaches happen at the application layer. Join experts in the field to learn the latest developments in application security. …”
    Video
  10. 3410
    por Sabahi, Borzu
    Publicado 2011
    “…Monetary compensation as the prevalent form of remedy sought and awarded in investor-State disputes is discussed in more detail, including topics such as the amount of compensation for damage resulting from breach of investment treaties or for lawful expropriation of foreign investor's property, a brief overview of valuation methods, supplementary compensation for moral damages, interest, costs, and currency fluctuations as well as various principles that may limit the amount of recoverable compensation, such as causation. …”
    Libro
  11. 3411
    por Ali, Tariq, 1943-
    Publicado 2002
    “…Presentación del editor: "The inviolability of the American mainland, breached on 9/11/2001 for the first time since 1812, led to extravagant proclamations by the pundits. …”
    Libro
  12. 3412
    por Kaslow, Florence W.
    Publicado 2013
    “…Carolyn Susman, health columnist, Palm Beach Daily News, Palm Beach, Florida "This unique book by noted psychologist Florence Kaslow provides a cornucopia of information, ranging from historical factors in child custody decisions, to stages of the divorce process and tips on parenting coordination. …”
    Libro electrónico
  13. 3413
    por Kontopodis, Michalis
    Publicado 2012
    “…Through case studies of Turkish and Arabic students in Berlin (Germany), Asian, Hispanic and Black students in Long Beach (USA), and children of landless rural workers in Espirito Santo (Brazil), this book investigates emerging educational practices and takes a critical stance towards what can be seen as "mainstream" or "dominant" educational politics. …”
    Enlace del recurso
    Libro electrónico
  14. 3414
    Publicado 2015
    “…Indispensable for the CEO as well as the small business owner, Passing the Torch presents stories from the boardroom to the family-owned bakery, and from the car dealership to the beach resort hotel. This is a book for all with a stake in maintaining the livelihood of a business and contains templates to guide you through the seven steps of the succession planning life cycle. …”
    Libro electrónico
  15. 3415
    Publicado 2023
    “…He owns and operates more than fifty restaurants, including Arby's, Nothing Bundt Cakes, and multiple outlets of Smoothie King, Dunkin' Donuts-and coming soon, Kaia Tapas and Beach Life. A tale of entrepreneurship focusing on the roadblocks aspirational business owners most commonly encounter, this how-to, self-help guide provides personal stories and feet-on-the-street advice. …”
    Grabación no musical
  16. 3416
    Publicado 2013
    “…What began in 1984 as a conference bringing together the thought leaders and luminaries from the worlds of technology, entertainment, and design in Long Beach, California, TED exploded in popularity and led to a second conference held in Edinburgh, Scotland, TEDGlobal. …”
    Libro electrónico
  17. 3417
    por Milstein, Jeff
    Publicado 2017
    “…In addition to the urban topography, events and activities have also been captured, such as the Macy’s Thanksgiving Day Parade and outings at the beach…”
    Libro
  18. 3418
    Publicado 2018
    “…Dabei wird im Dialog mit der überaus reichen Interpretationsgeschichte die Vielfalt der Auslegungen sichtbar und gleichzeitig auch deutlich, welches Verständnis in Einzelfragen und insgesamt zutreffender ist. …”
    Otros
  19. 3419
    por Cané, Miguel, 1851-1905
    Publicado 2019
    “…Perseguido en Cuba, fue al menos libre en los Estados Unidos, pero libre como sólo lo son los hombres sin tierra, su libro y su vida son el retrato de un Miami incómodo que no aparece en las guías turísticas de Miami, en algún lugar entre South Beach y Coral Gables…”
    Enlace del recurso
    Libro electrónico
  20. 3420
    por Cané, Miguel, 1851-1905
    Publicado 2019
    “…Perseguido en Cuba, fue al menos libre en los Estados Unidos, pero libre como sólo lo son los hombres sin tierra, su libro y su vida son el retrato de un Miami incómodo que no aparece en las guías turísticas de Miami, en algún lugar entre South Beach y Coral Gables…”
    Libro electrónico