Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
Computer security
3
History
3
Security measures
3
Computer crimes
2
Foreign relations
2
Globalization
2
Mobile communication systems
2
Politics and government
2
September 11 Terrorist Attacks, 2001
2
Social conditions
2
Aggression (International law)
1
Agricultural entomology
1
Aquatic biodiversity
1
Aquatic ecology
1
Artificial intelligence
1
BIOGRAPHY & AUTOBIOGRAPHY
1
BUSINESS & ECONOMICS
1
Biometric identification
1
Business
1
Cancer -- Popular works. Cancer -- Treatment -- Popular works. Cancer -- Genetic aspects -- Popular works. View all subjects
1
Cells
1
Comparative law
1
Computer networks
1
Computer networks- security measures
1
Computercriminaliteit
1
Corporate power
1
Cyber intelligence (Computer security)
1
Cytology
1
Czech literature - Fiction - criticism
1
Data protection
1
-
1por Chirillo, JohnTabla de Contenidos: “...1. Understanding communication protocols 2. Novell IPX, SPX, and NetBIOS technology 3...”
Publicado 2002
Printed Book -
2Publicado 2011Tabla de Contenidos: “...Introduction : When trauma shapes the news / Barbie Zelizer and Stuart Allan -- Part I: The trauma...”
Printed Book -
3
-
4
-
5por Žižek, SlavojMaterias: “...September 11 Terrorist Attacks, 2001....”
Publicado 2002
Enlace del recurso
Enlace del recurso
Printed Book -
6por Warr, KatyTabla de Contenidos: “...Part 1. An introduction to fooling AI. Introduction -- Attack motivations -- Deep neural network...”
Publicado 2019
Printed Book -
7por Stevenson, DavidTabla de Contenidos: “...Part 1. Atlantic Prologue -- Unleashing the U-boats -- Enter America -- Britain adopts convoys...”
Publicado 2017
Printed Book -
8por Paul ScottingTabla de Contenidos: “...Acknowledgments -- Introduction -- Brief history of cancer -- Part 1: Selfish Cell: -- Circle...”
Publicado 2010
Printed Book -
9por Chapple, MikeTabla de Contenidos: “...Part I: The Cyberwarfare Landscape -- Chapter 1: Information as a Military Asset Chapter -- 2...”
Publicado 2015
Printed Book -
10por Leonard, Christopher, 1975-Tabla de Contenidos: “...Preface: The fighter -- Part 1: The Koch method. Under surveillance ; The age of volatility begins...”
Publicado 2019
Printed Book -
11por Maiwald, EricTabla de Contenidos: “...PART I: Information Security Basics Chapter 1: What Is Information Security? Chapter 2: Types...”
Publicado 2004
Printed Book -
12Publicado 2012Tabla de Contenidos: “...Machine generated contents note: Introduction James Crawford and Martti Koskenniemi; Part I...”
Enlace del recurso
-
13por Pfleeger, Charles P.Tabla de Contenidos: “... Chapter 6: Networks 341 6.1 Network Concepts 342 Part I-War on Networks: Network Security Attacks 353 6.2...”
Publicado 2018
Printed Book -
14por Capra, FritjofTabla de Contenidos: “...Machine generated contents note: Part One Life, Mind, and Society -- 1 The Nature of Life, -- 2...”
Publicado 2002
Enlace del recurso
Enlace del recurso
Enlace del recurso
Enlace del recurso
Printed Book -
15Publicado 2019Tabla de Contenidos: “... Purakayastha and Birte Heidemann -- Part I. Structural Violence: Ideologies, Hierarchies and Symbolic Acts: 2...”
Printed Book -
16por Kroenig, MatthewTabla de Contenidos: “...Part 1. The advantages of nuclear advantages -- Toward a new theory of nuclear deterrence...”
Publicado 2018
Printed Book -
17por Dinstein, YoramTabla de Contenidos: “...Part I. The Legal Nature of War: 1. What is war? -- The course of war -- Part II. The Illegality...”
Publicado 2012
Printed Book -
18Publicado 2012Tabla de Contenidos: “...Machine generated contents note: Part I. Communication Architectures and Models for Smart Grid: 1...”
Enlace del recurso
Printed Book -
19por Diamond, JaredTabla de Contenidos: “...Prologue: Legacies of Coconut Grove -- Part 1. Individuals. Personal crises -- Part 2. Nations...”
Publicado 2019
Printed Book -
20por Lee, Ruby B.Tabla de Contenidos: “....2 Access control -- 1.1.3 Trustworthy versus trusted -- 1.2 Threats and attacks -- 1.3 Countermeasures...”
Publicado 2013
Abstract with links to full text
eBook