Mostrando 3,421 - 3,440 Resultados de 3,562 Para Buscar 'Uberach~', tiempo de consulta: 1.41s Limitar resultados
  1. 3421
    Publicado 2020
    “…The eastern, largely subtropical KwaZulu-Natal province of South Africa has a varied geology, climate and topography that ranges from high mountain peaks to beaches lapped by the Indian Ocean, so presenting a vast diversity of habitats that support a rich and diverse flora. …”
    Libro electrónico
  2. 3422
    Publicado 2015
    “…The book illustrates how advanced technologies from deep-sea research, microbiology and mathematic modelling as well as classic beach litter counts by volunteers contributed to the broad awareness of marine litter as a problem of global significance. …”
    Libro electrónico
  3. 3423
    Publicado 2014
    “…Every year, the archipelago’s beaches attract millions of tourists. Mark Van Strydonck found more than sand-castles: he encountered an extraordinarily rich prehistoric culture. …”
    Libro electrónico
  4. 3424
    por Bouverie, Tim, 1987-
    Publicado 2019
    “…Beginning with the advent of Hitler in 1933, Appeasing Hitler sweeps from the early days of the Third Reich to the beaches of Dunkirk. We enter the 10 Downing Street of Stanley Baldwin and Chamberlain, and the backrooms of Parliament where an unusual coalition of MPs including the indomitable Winston Churchill were among the few to realise that the only real choice was between 'war now or war later.' …”
    Libro
  5. 3425
    por Hogge, Alice
    Publicado 2006
    “…As darkness fell on the evening of Friday, 28 October 1588, just weeks after the defeat of the Spanish Armada, two young Englishmen landed in secret on a Norfolk beach. They were Jesuit priests. Their aim was to achieve by force of argument what the Armada had failed to do by force of arms: return England to the Catholic Church. …”
    Libro
  6. 3426
    por Wittlin, Józef, 1896-1976
    Publicado 2016
    “…Reflexiones lúcidas sobre la guerra y la literatura pacifista, sobre el exilio, sobre la propia creación literaria y el papel del poeta tras el espanto de la guerra y los campos de exterminio, vívidas semblanzas literarias como la de su amigo Joseph Roth, recuerdos de la Viena de sus años estudiantiles llenos de nostalgia mitteleuropea, la Varsovia de antes de la guerra, del París literario, de sus puentes, sus buquinistas y sus librerías míticas como las de Adrienne Monnier y Sylvia Beach, meditaciones amenas e irónicas de espectador en el sentido orteguiano, sobre el paisaje y el paisanaje, evocadoras de un mundo de ayer, trastocado en sus vidas y en sus lindes, que un Orfeo desconcertado no logrará apaciguar con su lira…”
    Libro
  7. 3427
    Publicado 2024
    “…The course focuses on key areas including the principles of GDPR, special topics such as consent, data breaches, and transfers of personal data, along with a detailed examination of individual rights under GDPR. …”
    Video
  8. 3428
    por Grimal, Francis
    Publicado 2013
    “…Finally, the book explores the point at which a state pursuing nuclear capabilities may breach Article 2(4) with particular reference to both North Korean and Iranian efforts to pursue nuclear technology.This topical book will be of great interest not only to scholars and postgraduates in international law but also to academics and students across several fields due to its interdisciplinary approach including strategic studies and international relations theories…”
    Enlace del recurso
    Libro electrónico
  9. 3429
    Publicado 2021
    “…Writing by Lauren Berlant, Jane Gallop, Katy Hawkins, Scott Herring, Lana Lin, and Philomina Tsoukala are among those considered as he explores questions of queer temporality and the breaching of ontological divides. Main concerns include the relationship of Sedgwick's later work in Proust, fiber, and Buddhism to her fundamental contribution to queer theory, and the axes of identification across difference that motivated her work and attachment to it. …”
    Libro electrónico
  10. 3430
    Publicado 2016
    “…The third section deals with security breaches and defects that may occur. It discusses documentation and classification of incidences as well as how to handle an occurrence. …”
    Libro electrónico
  11. 3431
    Publicado 2019
    “…Written in easy-to-read language, this book targets directors and executives who want to protect themselves from risks ranging from massive cyber security breaches to digital infrastructure investment mistakes. …”
    Libro electrónico
  12. 3432
    por Carter, Peter A. author
    Publicado 2019
    “…You will: Install and configure SQL Server on Windows through the GUI and with PowerShell Install and configure SQL Server on Linux and in Containers Optimize tables through in-memory OLTP, table partitioning, and the creation of indexes Secure and encrypt data to protect against embarrassing data breaches Ensure 24x7x365 access through high-availability and disaster recovery features Back up your data to ensure against loss, and recover data when needed Perform routine maintenance tasks such as database consistency checks Troubleshoot and solve performance problems in SQL queries and in the database engine…”
    Libro electrónico
  13. 3433
    Publicado 2019
    “…By demystifying cybersecurity and applying the central concepts to real-world business scenarios, this book will help you: Deploy cybersecurity measures using easy-to-follow methods and proven techniques Develop a practical security plan tailor-made for your specific needs Incorporate vital security practices into your everyday workflow quickly and efficiently The ever-increasing connectivity of modern organizations, and their heavy use of cloud-based solutions present unique challenges: data breaches, malicious software infections, and cyberattacks have become commonplace and costly to organizations worldwide. …”
    Libro electrónico
  14. 3434
    Publicado 2020
    “…Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businessesand governments down, so security leadership is a high-stakes game. …”
    Libro electrónico
  15. 3435
    Publicado 2020
    “…By the end of the course, you will get well versed with Metasploit modules, exploiting systems, carrying out breaches, as well as building and porting exploits of various kinds in Metasploit. …”
    Video
  16. 3436
    Publicado 2022
    “…Other advanced topics include: The machine ethics aspects in the IoT system;t he Intrusion detection of WSN; and the methods of securing the user from privacy breaches due to the overprivileged IoT apps. This book will be beneficial toany readers interested in security of IoT systems and how to develop a layer-wise security scheme for such a system…”
    Libro electrónico
  17. 3437
    Publicado 2020
    “…Twelfth Night is used to approach The Transformation of Political Community as a comedy, and A Modest Proposal paves the way for the examination of Bananas, Beaches and Bases as irony/satire. Rather than assess the absolute merits and shortcomings of the competing theories, the book discusses the relative strengths and weaknesses of stories that adhere to different plots in giving meaning to actors and events in the international arena. …”
    Libro electrónico
  18. 3438
    Publicado 2014
    “…The main part of the book consists of a discussion of the main coastal environments (beaches, dunes, barriers, salt marshes, tidal flats, estuaries, coral reefs, deltas, rocky and glaciated coasts and coastal groundwater), and how these are affected by global change. …”
    Libro electrónico
  19. 3439
    por Aspin, Adam. author
    Publicado 2015
    “…Business users want access to key performance indicators in the office, at the beach, and while riding the subway home after a day's work. …”
    Libro electrónico
  20. 3440
    por Hirsch, Joshua Francis, 1962-
    Publicado 2004
    “…Author note: Joshua Hirsch is visiting lecturer in Film and Electronic Arts at the California State University, Long Beach…”
    Libro