Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,483
- Application software 1,354
- Management 1,274
- Engineering & Applied Sciences 1,242
- Cloud computing 1,131
- Computer networks 932
- Computer Science 772
- Historia 695
- Social service 609
- Security measures 594
- History 565
- Information technology 527
- Examinations 517
- Business & Economics 511
- Electrical & Computer Engineering 472
- Data processing 458
- Computer programs 452
- Operating systems (Computers) 452
- Telecommunications 449
- Computer security 439
- Psychology 426
- Filosofía 410
- Certification 409
- Web services 409
- Database management 393
- Microsoft .NET Framework 384
- Java (Computer program language) 379
- Economics 378
- Psicología 377
- Economic conditions 357
-
40141por Bouton, Christophe“…Il n’y a rien d’étonnant, par conséquent, au fait que les querelles d’interprétation les plus violentes aient eu lieu à son propos et que la pensée hégélienne du droit ait, tour à tour, servi de caution ou de repoussoir aux prises de position politiques les plus diverses. …”
Publicado 2016
Electrónico -
40142Publicado 2016“…Die restlichen seiner Werke sind in polnischer Sprache verfasst und damit für viele Leser nur schwer zugänglich. …”
Libro electrónico -
40143Publicado 2015“…Gibson, Marianne Gronemeyer, Helmut Leitner, Étienne Le Roy, Andreas Weber, Rosa Luxemburg, Anne Salmond und David Sloan Wilson »Ein hoch inspirierendes Werk. Es bleibt zu hoffen, dass viele aktive Commoners die Zeit finden, um dieses Buch zu lesen, und sich durch ein bewussteres Commoning in Zukunft neue Vernetzungen und Innovationsmöglichkeiten innerhalb des Commons Experimentierfelds herausbilden.« Niels Jobstvogt, www.postwachstum.de, 26.02.2016 »Eine spannende Forschungsreise!…”
Libro electrónico -
40144por Schmidt, Barbara. author“…Um jedoch die Probleme der Zukunft meistern zu können, ist ein gemeinschaftlich ausgerichtetes Handeln für Unternehmen von großer Bedeutung. Dieses Werk zeigt Ansatzpunkte und Strategien im Umgang mit Macht und Machtspielen auf. …”
Publicado 2015
Libro electrónico -
40145Publicado 2020“…Der Schwerpunkt des Buches liegt auf der Gestaltung von Druckpublikationen, wie sie bei vielen kleinen und mittleren Unternehmen, Vereinen, Behörden oder auch Privatleuten, die ihre Werke professionell gestalten möchten, anfallen. …”
Libro electrónico -
40146Publicado 2019“…Der Schwerpunkt des Buches liegt auf der Gestaltung von Druckpublikationen, wie sie bei vielen kleinen und mittleren Unternehmen, Vereinen, Behörden oder auch Privatleuten, die ihre Werke professionell gestalten möchten, anfallen. …”
Libro electrónico -
40147Publicado 2020“…Eine Liebeserklärung an Deutschland der jüdischen Autorin Lena Gorelik in ihrem semi-autobiografischen Text »Lieber Mischa« wirft die Frage auf, ob der Holocaust noch immer Ausgangspunkt und zentrales Merkmal des Selbstverständnisses der gegenwärtigen bzw. dritten jüdischen Schriftsteller*innengeneration in Deutschland ist. Neben Goreliks Werk werden auch »Vielleicht Esther« von Katja Petrowskaja und »Der Russe ist einer, der Birken liebt« von Olga Grjasnowa auf diese Frage hin untersucht. …”
Libro electrónico -
40148por Maddison, Angus“…Es schließt an die beiden anderen Werke des Autors an: Monitoring the World Economy: 1820-1992 aus dem Jahr 1995 und Chinese Economic Performance in the Long Run von 1998, die beide vom OECD-Entwicklungszentrum veröffentlicht wurden…”
Publicado 2003
Libro electrónico -
40149Publicado 2016“…Und wenn Sie als Filmer und Cutter Ihr Werk für die Nachwelt speichern und veröffentlichen wollen, bringen Sie es ganz einfach auf Smartphones & Co., auf DVD oder ins Netz. …”
Libro electrónico -
40150por Liebel, Manfred Prof. Dr“…On the basis of numerous studies from different continents, it sharpens the awareness of the diversity of forms and meanings that work for children can have, and explains why previous measures against child labour must be questioned Die nach 19 Jahren endlich aktualisierte Neuauflage seines Werkes berücksichtigt höchst erkenntnisreich neueste Tendenzen und Meinungsbilder.neue caritas 7/2020Das Titelbild liefert eine vortreffliche Zusammenfassung des Anliegens des Bandes: Ein möglicherweise sieben bis achtjähriges Mädchen verkauft an einem Stand Melonen. …”
Publicado 2020
Libro electrónico -
40151Publicado 2003“…“To anyone looking to augment their existing MFC code base and knowledge with the powerful .NET classes—which provide such capabilities as disconnected data, in-memory database (IMDB), regular expressions, and data encryption—Tom Archer’s book has it all.” — Erik Westermann, Lead Architect, Eidenai Innovations Extending MFC Applications with the .NET Framework is the first book to show MFC developers how to boost productivity by incorporating .NET functionality into existing MFC applications. …”
Libro electrónico -
40152Publicado 2021“…Der Autor verfolgt die Frage in philosophischer und theologischer Perspektive erstmals im ganzen Werk Edith Steins und zeigt dabei die Entwicklung ihres Verständnisses der wesentlichen Individualität jeder Person auf. …”
Libro electrónico -
40153Publicado 2018“…The first part opens with an introduction on Nooteboom's poetry by Susanne Schaber, editor of the Gesammelte Werke at Suhrkamp Verlag in Germany. In the second contribution of this section Ton Naaijkens gives a plea for intuition and creativity in scholarly work on translation. …”
Libro electrónico -
40154Publicado 2019“…Ein besonderes Augenmerk richtet das Werk auf die Rechtsprechung des Europäischen Gerichtshofs für Menschenrechte (EGMR). …”
Libro electrónico -
40155Publicado 2013“…In this friendly, thorough introduction, Erik M. Buck shows how to make the most of Open GL ES in Apple’s iOS environment. …”
Libro electrónico -
40156por Danto, Elizabeth Ann“…Joining with the social democratic and artistic movements that were sweeping across Central and Western Europe, analysts such as Freud, Wilhelm Reich, Erik Erikson, Karen Horney, Erich Fromm, and Helene Deutsch envisioned a new role for psychoanalysis. …”
Publicado 2005
Libro electrónico -
40157Publicado 2013“…Podemos utilizar este tipo de imágenes para informar, para crear, expresar o comunicar, para persuadir y seducir, para convencer y verificar, para deleitar, para infundir temor o seguridad, para servir como instrumento ideológico, o como arma arrojadiza para exhortar, para evocar o incluso para exorcizar. …”
Enlace del recurso
Electrónico -
40158Publicado 2013“…Podemos utilizar este tipo de imágenes para informar, para crear, expresar o comunicar, para persuadir y seducir, para convencer y verificar, para deleitar, para infundir temor o seguridad, para servir como instrumento ideológico, o como arma arrojadiza para exhortar, para evocar o incluso para exorcizar. …”
Enlace del recurso
Electrónico -
40159Publicado 2023“…You will have the knowledge and skills required to do the following: Architect, engineer, integrate, and implement secure solutions across complex environments to support a resilient enterprise Use monitoring, detection, incident response, and automation to proactively support ongoing security operations in an enterprise environment Apply security practices to cloud, on-premises, endpoint, and mobile infrastructure, while considering cryptographic technologies and techniques Consider the impact of governance, risk, and compliance requirements throughout the enterprise The 4 courses in the CASP series covers the following topics: Architecture Analyze security requirements and objectives to ensure an appropriate, secure network architecture for a new or existing network Services Deperimeterization/zero trust Merging of networks from various organizations Software-defined networking Analyze organizational requirements to determine proper infrastructure security design Scalability Resiliency Automation Performance Containerization Virtualization Content delivery network Caching Integrate software applications securely into an enterprise architecture Baseline and templates Software assurance Considerations of integrating enterprise applications Integrating security into development life cycle Implement data security techniques for securing enterprise architecture Data loss prevention Data loss detection Data classification, labeling, and tagging Obfuscation Anonymization Encrypted versus unencrypted Data life cycle Data inventory and mapping Data integrity management Data storage, backup, and recovery Analyze security requirements and objectives to provide appropriate authentication and authorization controls Credential management Password policies Federation Access control Protocols Multifactor authentication One-time password Hardware root of trust Single sign-on JavaScript Object Notation web token Attestation and identity proofing Implement secure cloud and virtualization solutions Virtualization strategies Provisioning and deprovisioning Middleware Metadata and tags Deployment models and considerations Hosting models Service models Cloud provider limitations Extending appropriate on-premises controls Storage models Explain how cryptography and public key infrastructure support security objectives and requirements Privacy and confidentiality requirements Integrity requirements Non-repudiation Compliance and policy requirements Common cryptography use cases Common Public key infrastructure use cases Explain impact of emerging technologies on enterprise security and privacy Artificial intelligence Machine learning Quantum computing Blockchain Homomorphic encryption Secure multiparty computation Distributed consensus Big Data Virtual reality Three Dimetional printing Passwordless authentication Nano technology Deep learning Biometric impersonation Operations Perform threat management activities Intelligence types Actor types Threat actor properties Intelligence collection methods Frameworks Analyze indicators of compromise and formulate an appropriate response Indicators of compromise Response Rules Perform vulnerability management activities Vulnerability scans Security Content Automation Protocol Self-assessment or third party vendor assessment Patch management Information sources Use appropriate vulnerability assessment and penetration testing methods and tools Methods Tools Dependency management Requirements Analyze vulnerabilities and recommend risk mitigations Vulnerabilities Inherently vulnerable system or application Attacks Use processes to reduce risk Proactive and detection Security data analytics Preventive Application control Security automation Physical security Given an incident, implement appropriate response Event classifications Triage event Preescalation tasks Incident response process Specific response playbooks Communication plan Stakeholder management Explain importance of forensic concepts Legal versus internal corporate purposes Forensic process Integrity preservation Cryptanalysis Steganalysis Use forensic analysis tools File carving tools Binary analysis tools Analysis tools Imaging tools Hashing utilities Live collection versus post-mortem tools Engineering and Cryptography Apply secure configurations to enterprise mobility Managed configurations Deployment scenarios Security considerations Configure and implement endpoint security controls Hardening techniques Processes Mandatory access control Trustworthy computing Compensating controls Explain security considerations impacting specific sectors and operational technologies Embedded ICS/supervisory control and data acquisition Protocols Sectors Explain how cloud technology adoption impacts organizational security Automation and orchestration Encryption configuration Logs Monitoring configurations Key ownership and location Key life-cycle management Backup and recovery methods Infrastructure versus serverless computing Application virtualization Software-defined networking Misconfigurations Collaboration tools Storage configurations Cloud access security broker Given a business requirement, implement appropriate Public key infrastructure solution Public key infrastructure hierarchy Certificate types Certificate usages/profiles/templates Extensions Trusted providers Trust model Cross-certification Configure profiles Life-cycle management Public and private keys Digital signature Certificate pinning Certificate stapling Certificate signing requests Online Certificate Status Protocol versus certificate revocation list HTTP Strict Transport Security Given a business requirement, implement appropriate cryptographic protocols and algorithms Hashing Symmetric algorithms Symetric Complexity Contruction Asymmetric algorithms Protocols Elliptic curve cryptography Forward secrecy Authenticated encryption with associated data Key stretching Troubleshoot issues with cryptographic implementations Implementation and configuration issues Keys Governance, Risk, and Compliance Given a set of requirements, apply appropriate risk strategies Risk assessment Risk handling techniques Risk types Risk management life cycle Risk tracking Risk appetite Risk tolerance Policies and security practices Explain importance of managing and mitigating vendor risk Shared responsibility model Vendor lock-in and vendor lockout Vendor viability Meeting client requirements Support availability Geographical considerations Supply chain visibility Incident reporting requirements Source code escrows Ongoing vendor assessment tools Third-party dependencies Technical considerations Explain compliance frameworks and legal considerations, and IR organizational impact Security concerns of integrating diverse industries Data considerations Geographic considerations Third-party attestation of compliance Regulations, accreditations, and standards Legal considerations Contract and agreement types Explain importance of business continuity and disaster recovery concepts Business impact analysis Privacy impact assessment Disaster recovery plan Business continuity plan Incident response plan Testing plans…”
Video -
40160Publicado 2018“…Por todo ello, y como el lector puede comprobar fácilmente, se ha considerado que el libro que tiene en sus manos debía tener un contenido particularmente divulgativo al objeto de que pueda servir de guía vehicular para que nuestros ciudadanos conozcan con mayor profundidad las singularidades de la Defensa como un activo importante y necesario del Estado y de la sociedad.No quiero terminar con esta presentación sin agradecer la colaboración generosa y altruista de todos los autores que han colaborado en este libro, que con su talento, experiencia y buen hacer, desde un exministro hasta varios generales, pasando por diputados, embajadores, directores de instituciones oficiales y civiles, y profesores de distintas universidades han proporcionado un excelente conocimiento, enriquecimiento y divulgación de la Defensa, como asunto de Estado y como asunto de la sociedad. …”
Libro