Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
61Publicado 2000Tabla de Contenidos: “…Something Happened -- Feudal Dynamics -- The Limits of Urban Capitalism -- State Formation: England and France -- A Dead End and a Detour: Spain and the Netherlands -- Elite Defensiveness and the Transformation of Class Relations: England and France -- Religion and Ideology -- Conclusion…”
Libro -
62Publicado 2015Libro electrónico
-
63Publicado 2013Tabla de Contenidos: “…Cover; Title; Copyright; Dedication; Contents; Preface; Acknowledgements; 1 Understanding the language of psychodynamic psychotherapy; 2 Starting out; 3 History taking and formulation; 4 Selecting appropriate patients; 5 The ongoing therapy; 6 Stick-handling defensive patients; 7 Ending; 8 Using supervision; Bibliography; Index…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
64Publicado 2018Tabla de Contenidos: “…The beginning of the end: the conversion of Constantine -- Back to the beginning: the conversion and mission of Paul -- The religious world of conversion: Roman paganism -- Reasons for the Christian success -- Miraculous incentives for conversion -- The growth of the church -- Christians under assault: persecution, martyrdom, and self-defense -- The first Christian emperor -- Conversion and coercion: the beginnings of a Christian empire -- Gains and losses…”
Libro -
65
-
66
-
67por Vinson, Richard Bolling, 1957-Tabla de Contenidos: “…1 Peter -- Introduction -- Outline of 1 Peter -- Called by God to holiness (1 Peter 1) -- Stones, sojourners, and slaves (1 Peter 2) -- Conduct at home and in the world (1 Peter 3) -- The end of suffering (1 Peter 4) -- Closing advice from Peter the elder (1 Peter 5) -- Bibliography…”
Publicado 2010
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
68por Mills, David, 1969-Tabla de Contenidos: “…; Ch 4-The Politics of disciplinary professionalisation; Ch 5-Anthropology at the end of empire; Ch 6-Tribes and territories; Ch 7-How not to apply anthropological knowledge; Ch 8-Anthropologists and 'race'; Ch 9-Discipline on the defensive?…”
Publicado 2008
Libro electrónico -
69Publicado 2008Tabla de Contenidos: “…The Origins and Authorities of CPA Goals; Other Governing Institutions; Organization of CPA; Location and Staffing; Relations with CJTF-7; Concluding Observations; CHAPTER NINE- Building New Iraqi Security Forces; Defining and Building Iraqi Security Forces; Building the MoI; Creating the Iraqi Police Service (IPS); The Facilities Protection Services; The Border Police; High-End MoI Forces; Ministry of Defense; The Iraqi Armed Forces; Iraqi Civil Defense Corps (ICDC); Intelligence; National Security Decision making Structures; Iraqi Armed Forces and the Handover of Power…”
Libro electrónico -
70Publicado 2024“…You'll learn about AI's defensive and offensive uses in cybersecurity, including the threat of generative AI models. …”
Vídeo online -
71por Heuss, Theodor, 1884-1963“…Under the National Socialist regime, Theodor Heuss was rapidly forced onto the defensive. He lost nearly all his public offices and posts, yet as a publicist Heuss continued to defend his liberal convictions. …”
Publicado 2009
Libro electrónico -
72
-
73por Barany, Zoltan D.“…Why have there been no radical defense reforms in Russia since the end of the cold war, even though they were high on the agenda of the country's new president in 2000? …”
Publicado 2007
Libro electrónico -
74por O'Leary, Mike. author“…Key defensive techniques are integrated throughout the exposition. …”
Publicado 2015
Libro electrónico -
75por Miller, John W., 1926-Tabla de Contenidos: “…Origins of the Father-involved family -- Male-centered reproductive biology and the dynamics of Biblical patriarchy -- God as Father in the Bible and the Father Image in several contemporary Ancient Near Eastern myths: a comparison -- Depatriarchalizing God in Biblical interpretation: a critique -- New modes of human fathering (Hebrew Scriptures) -- New modes of human fathering (New Testament Scriptures) -- The Contemporary fathering crisis: the Bible and research psychology -- In defense of monotheistic Father religion -- The Refutation of the "Father" in God in feminist theologies at the end of the twentieth century: analysis and critique -- Which way ahead? …”
Publicado 1999
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
76Publicado 1905Tabla de Contenidos: “…Involvement of the United States in forging and forming the Alliance until the end of the Cold War 29 -- 3. Historical explanations for US engagement in and with (NATO) Europe: Oscillating between unilateralism and multilateralism 36 -- 4. …”
Libro electrónico -
77
-
78por Dobbins, JamesTabla de Contenidos: “…Cover -- Title Page -- Copyright -- Preface -- Foreword -- Contents -- Figures and Tables -- Executive Summary -- Acknowledgments -- Chapter One: Introduction -- Alternative Models -- Assessing and Accepting Risk -- Values and Interests -- Keeping Pace with Change -- Choices for America -- Chapter Two: The Global Economy -- Trends and Challenges -- Including or Excluding China -- Global Versus Regional Rule-Setting -- Chapter Three: National Defense -- Europe -- East Asia -- Counterterrorist Operations -- Nuclear Forces -- Counterinsurgency and Stability Operations -- Readiness -- Enhancing Allied Defenses -- Choices for Sizing the Defense Budget -- Chapter Four: Counterterrorism -- Tactical Versus Strategic Counterterrorism -- What Will Be Needed to Defeat ISIS? …”
Publicado 2015
Libro electrónico -
79Publicado 2016Libro electrónico
-
80Publicado 2022“…Before concluding the course, you will understand how to exploit race conditions in web applications and how serious the consequences of this attack can be. At the end of this course, you would have gained knowledge about other powerful, full-stack attacks on modern web applications such as HTTP parameter pollution, subdomain takeover, and clickjacking. …”
Video