Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 167
- Security measures 164
- Computer networks 125
- Historia 95
- Engineering & Applied Sciences 74
- Subirachs, Josep M. 67
- Data protection 59
- Història 56
- Management 52
- Derecho penal 50
- Biblia 47
- Computer Science 46
- History 43
- Exposicions 40
- Filosofía 39
- Computer crimes 32
- Derecho 31
- Information technology 31
- Ubach, Bonaventura 31
- Cloud computing 30
- Historia y crítica 28
- Materiales 28
- Crítica e interpretación 27
- Electrical & Computer Engineering 24
- Física 23
- Law and legislation 23
- Penetration testing (Computer security) 23
- Catequesi 22
- Internet 20
- Catequesis 19
-
3421Publicado 2020“…The eastern, largely subtropical KwaZulu-Natal province of South Africa has a varied geology, climate and topography that ranges from high mountain peaks to beaches lapped by the Indian Ocean, so presenting a vast diversity of habitats that support a rich and diverse flora. …”
Libro electrónico -
3422Publicado 2015“…The book illustrates how advanced technologies from deep-sea research, microbiology and mathematic modelling as well as classic beach litter counts by volunteers contributed to the broad awareness of marine litter as a problem of global significance. …”
Libro electrónico -
3423Publicado 2014“…Every year, the archipelago’s beaches attract millions of tourists. Mark Van Strydonck found more than sand-castles: he encountered an extraordinarily rich prehistoric culture. …”
Libro electrónico -
3424por Bouverie, Tim, 1987-“…Beginning with the advent of Hitler in 1933, Appeasing Hitler sweeps from the early days of the Third Reich to the beaches of Dunkirk. We enter the 10 Downing Street of Stanley Baldwin and Chamberlain, and the backrooms of Parliament where an unusual coalition of MPs including the indomitable Winston Churchill were among the few to realise that the only real choice was between 'war now or war later.' …”
Publicado 2019
Libro -
3425por Hogge, Alice“…As darkness fell on the evening of Friday, 28 October 1588, just weeks after the defeat of the Spanish Armada, two young Englishmen landed in secret on a Norfolk beach. They were Jesuit priests. Their aim was to achieve by force of argument what the Armada had failed to do by force of arms: return England to the Catholic Church. …”
Publicado 2006
Libro -
3426por Wittlin, Józef, 1896-1976“…Reflexiones lúcidas sobre la guerra y la literatura pacifista, sobre el exilio, sobre la propia creación literaria y el papel del poeta tras el espanto de la guerra y los campos de exterminio, vívidas semblanzas literarias como la de su amigo Joseph Roth, recuerdos de la Viena de sus años estudiantiles llenos de nostalgia mitteleuropea, la Varsovia de antes de la guerra, del París literario, de sus puentes, sus buquinistas y sus librerías míticas como las de Adrienne Monnier y Sylvia Beach, meditaciones amenas e irónicas de espectador en el sentido orteguiano, sobre el paisaje y el paisanaje, evocadoras de un mundo de ayer, trastocado en sus vidas y en sus lindes, que un Orfeo desconcertado no logrará apaciguar con su lira…”
Publicado 2016
Libro -
3427Publicado 2024“…The course focuses on key areas including the principles of GDPR, special topics such as consent, data breaches, and transfers of personal data, along with a detailed examination of individual rights under GDPR. …”
Video -
3428por Grimal, Francis“…Finally, the book explores the point at which a state pursuing nuclear capabilities may breach Article 2(4) with particular reference to both North Korean and Iranian efforts to pursue nuclear technology.This topical book will be of great interest not only to scholars and postgraduates in international law but also to academics and students across several fields due to its interdisciplinary approach including strategic studies and international relations theories…”
Publicado 2013
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
3429Publicado 2021“…Writing by Lauren Berlant, Jane Gallop, Katy Hawkins, Scott Herring, Lana Lin, and Philomina Tsoukala are among those considered as he explores questions of queer temporality and the breaching of ontological divides. Main concerns include the relationship of Sedgwick's later work in Proust, fiber, and Buddhism to her fundamental contribution to queer theory, and the axes of identification across difference that motivated her work and attachment to it. …”
Libro electrónico -
3430Publicado 2016“…The third section deals with security breaches and defects that may occur. It discusses documentation and classification of incidences as well as how to handle an occurrence. …”
Libro electrónico -
3431Publicado 2019“…Written in easy-to-read language, this book targets directors and executives who want to protect themselves from risks ranging from massive cyber security breaches to digital infrastructure investment mistakes. …”
Libro electrónico -
3432por Carter, Peter A. author“…You will: Install and configure SQL Server on Windows through the GUI and with PowerShell Install and configure SQL Server on Linux and in Containers Optimize tables through in-memory OLTP, table partitioning, and the creation of indexes Secure and encrypt data to protect against embarrassing data breaches Ensure 24x7x365 access through high-availability and disaster recovery features Back up your data to ensure against loss, and recover data when needed Perform routine maintenance tasks such as database consistency checks Troubleshoot and solve performance problems in SQL queries and in the database engine…”
Publicado 2019
Libro electrónico -
3433Publicado 2019“…By demystifying cybersecurity and applying the central concepts to real-world business scenarios, this book will help you: Deploy cybersecurity measures using easy-to-follow methods and proven techniques Develop a practical security plan tailor-made for your specific needs Incorporate vital security practices into your everyday workflow quickly and efficiently The ever-increasing connectivity of modern organizations, and their heavy use of cloud-based solutions present unique challenges: data breaches, malicious software infections, and cyberattacks have become commonplace and costly to organizations worldwide. …”
Libro electrónico -
3434Publicado 2020“…Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businessesand governments down, so security leadership is a high-stakes game. …”
Libro electrónico -
3435Publicado 2020“…By the end of the course, you will get well versed with Metasploit modules, exploiting systems, carrying out breaches, as well as building and porting exploits of various kinds in Metasploit. …”
-
3436Publicado 2022“…Other advanced topics include: The machine ethics aspects in the IoT system;t he Intrusion detection of WSN; and the methods of securing the user from privacy breaches due to the overprivileged IoT apps. This book will be beneficial toany readers interested in security of IoT systems and how to develop a layer-wise security scheme for such a system…”
Libro electrónico -
3437Publicado 2020“…Twelfth Night is used to approach The Transformation of Political Community as a comedy, and A Modest Proposal paves the way for the examination of Bananas, Beaches and Bases as irony/satire. Rather than assess the absolute merits and shortcomings of the competing theories, the book discusses the relative strengths and weaknesses of stories that adhere to different plots in giving meaning to actors and events in the international arena. …”
Libro electrónico -
3438Publicado 2014“…The main part of the book consists of a discussion of the main coastal environments (beaches, dunes, barriers, salt marshes, tidal flats, estuaries, coral reefs, deltas, rocky and glaciated coasts and coastal groundwater), and how these are affected by global change. …”
Libro electrónico -
3439por Aspin, Adam. author“…Business users want access to key performance indicators in the office, at the beach, and while riding the subway home after a day's work. …”
Publicado 2015
Libro electrónico -
3440por Hirsch, Joshua Francis, 1962-“…Author note: Joshua Hirsch is visiting lecturer in Film and Electronic Arts at the California State University, Long Beach…”
Publicado 2004
Libro