Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Security measures 92
- Computer security 80
- Computer networks 63
- Cloud computing 20
- Penetration testing (Computer security) 18
- Examinations 16
- History 16
- Management 16
- Certification 14
- Politics and government 14
- Data protection 13
- United States 13
- Artificial intelligence 12
- Engineering & Applied Sciences 12
- Application software 11
- Development 11
- Information technology 11
- National security 11
- Electronic data processing personnel 10
- Foreign relations 10
- Prevention 10
- Business enterprises 9
- Computer crimes 9
- Python (Computer program language) 9
- Access control 8
- Armed Forces 8
- Computers 8
- Electrical & Computer Engineering 7
- Military policy 7
- Operating systems (Computers) 7
-
81
-
82Publicado 2014Tabla de Contenidos: “…. -- Igniting an evangelical conversation / Introduction to evangelical conditionalism / Influential defenses of conditionalism. -- The final end of the wicked / The nature of final destiny / Judgment and hell / The destruction of the finally impenitent / The case for conditional immortality / Biblical support for conditionalism. -- The doom of the lost / New Testament teaching on hell / Does Revelation 14:11 teach eternal torment? …”
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
83Publicado 2013“…However, changing economic realities and the ongoing reductions in overall defense spending related to the end of more than a decade of war will affect the funding available for these initiatives. …”
Libro electrónico -
84Publicado 2010Tabla de Contenidos: “…Agency for International Development; Department of Defense; Stability Operations Roles and Missions; Department of State; U.S. …”
Libro electrónico -
85por O'Leary, Mike. author“…You will continue with more advanced network services, web servers, and database servers and you will end by building your own web applications servers, including WordPress and Joomla!. …”
Publicado 2019
Libro electrónico -
86
-
87Publicado 2020“…You will learn how to build automation tools for information security, and will hopefully find that these examples will help inspire you to design and build your own! By the end of this course, you will have the skills and confidence you need to automate both offensive and defensive security techniques using Python; and have developed several small security tools and one large comprehensive penetration testing tool, all of which can be used in the real world…”
-
88por Amada, GeraldTabla de Contenidos: “…; chapter 20. how do my defense mechanisms work?; chapter 21. when should i end psychotherapy?…”
Publicado 2010
Libro electrónico -
89Publicado 2011Libro electrónico
-
90Publicado 2015Tabla de Contenidos: “…'A Statistical Time Series Approach to the Use of Mark by Matthew and Luke' -- Andris Abakuks7. 'Matthew's Ending and the Genesis of Acts: The Farrer Hypothesis and the Composition of Luke's Two Volumes' -- Jeffrey Peterson8. …”
Libro -
91Publicado 2018Libro electrónico
-
92por Davis, Paul K., 1943-Tabla de Contenidos: “…Chapter Six - A Second Example: Ballistic Missile Defense Defining Ballistic Missile Defense Missions; A Parameterized Scenario Space for BMD; CONOPS and Critical Components; Framework for Portfolio Analysis; Shortfalls, Opportunities, and Surpluses for the BMD Program; Identifying, Evaluating, and Comparing BMD Options; Chapter Seven - Conclusions and Next Steps; Conclusions; Next Steps; Appendix A - Joint Capability Areas; Appendix B - Implications for Systems Engineering and Modeling and Simulation; Appendix C - RAND's Portfolio-Analysis Tools; End notes; Bibliography…”
Publicado 2008
Libro electrónico -
93
-
94Publicado 2014Libro electrónico
-
95
-
96por Porche, Isaac, 1968-Tabla de Contenidos: “…Avoid Long Lists of Capabilities to Define IO Arguments Can Be Made That IO Is Everything; Discussion of Possible Ends to Be Sought; The List of Relevant Capabilities Remains Too Long to Be Useful; Pros and Cons of a Narrow Set of Ends; Information Tasks as Potential Ends; Influence as an End; Command-and-Control Warfare; A Proposed Definition of Information Operations; Proposed Definition; IIO and ITO: Compartmentalizing the Definition; CHAPTER FIVE How Electronic Warfare Overlaps with Other Areas; Analysis of Electronic Warfare and Electromagnetic Spectrum Operations…”
Publicado 2013
Libro electrónico -
97por Kummel, GerhardTabla de Contenidos: “…Change and Persistence in Patterns of Civil-Military Relations in Germany before and after the End of the Cold War -- Conscription in Germany Today: A Military Necessity or a Mere Symbol? …”
Publicado 2009
Libro electrónico -
98por Wilson, John K., 1969-Tabla de Contenidos: “…10 Making Crime a Progressive Issue11 Winning the Culture Wars; 12 Equality for Every Child: Reforming Education; 13 Fighting the Union Label: Labor on the Left; 14 The Race for Justice: Defending Affirmative Action; 15 Universal Health Care; 16 Greener Politics: Progressives and the Environment; 17 Why We Need Welfare and How to Change It; 18 Ending Corporate Welfare As We Know It; 19 The Defense Industry: How to Protect America byCutting the Military; 20 Saving Social Security; 21 The Future of Progressives: Generation Left; About the Author…”
Publicado 2001
Libro electrónico -
99Publicado 2004“…For the later periods, investigation has proceeded on the Great Defensive Wall of Parthian age, and on the large edifice in the lower city…”
Libro electrónico -
100Publicado 2020Tabla de Contenidos: “…Visas -- Help from Eleanor Roosevelt and Other Americans -- Three Crucial Meetings on December 27, -- 1940 Correspondence -- Eva's Other Activities before the End of -- Further Pleas to Help Otto and Other Refugees -- Otto's Wait for Visa in Southern France -- Otto's Escape to America -- Eva's Defense of Her Decision to Marry Otto -- Part VI. …”
Libro electrónico