feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Charité  (82)
  • SRB Cottbus  (17)
  • Moses Mendelssohn Zentrum  (6)
  • Feministisches Archiv  (1)
Type of Medium
Language
Region
Library
Virtual Catalogues
Access
  • 1
    UID:
    gbv_158113276
    Format: 230 S , 20 cm
    Edition: 2. Aufl.
    ISBN: 3353007032
    Uniform Title: Playback 〈dt.〉
    Note: Lizenzausg. d. Verl. Volk u. Welt, Berlin. - Übers. aus dem Amerikan
    Language: German
    Subjects: American Studies
    RVK:
    Keywords: Krimis, Thriller, Spionage ; Belletristische Darstellung ; Belletristische Darstellung
    Author information: Chandler, Raymond 1888-1959
    Author information: Teichmann, Wulf
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    kobvindex_SBC1114756
    Format: 188 S. , 19 cm
    ISBN: 3-442-45200-7
    Series Statement: Goldmann 45200
    Uniform Title: Cat chat 〈dt.〉
    Content: Eigentlich hat sich Hélène nur für einige Wochen an einen kleinen Ort in der Provence zurückgezogen, um in Ruhe arbeiten zu können. Doch sie wird ihr Herz für immer verlieren: an das Dorf, an Bébe, den schönsten Kater der Welt - und an Monsieur, Bébes charmanten Besitzer...
    Language: German
    Keywords: Erlebnisbericht ; Erlebnisbericht ; Erlebnisbericht
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Book
    Book
    New York :Vintage Books,
    UID:
    almafu_BV012676473
    Format: 231 S.
    Edition: 1. Vintage crime/black lizard ed.
    ISBN: 0-394-75828-5
    Series Statement: Vintage crime/black lizard
    Content: When a case of blackmail involving the daughter of a California millionaire leads to murder, the inimitable Philip Marlowe is stirred into action as he becomes embroiled in a troublesome case of extortion complicated by kidnapping, pornography, seduction, and murder.
    Language: English
    Subjects: American Studies
    RVK:
    Keywords: 1888-1959 The big sleep Chandler, Raymond ; Verfilmung ; The big sleep ; Mystery fiction ; Mystery fiction
    Author information: Chandler, Raymond 1888-1959
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9948025370802882
    Format: 1 online resource (266 p.)
    Edition: 1st edition
    ISBN: 1-281-03565-3 , 9786611035655 , 0-08-048965-6 , 1-59749-108-X
    Content: RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID syst
    Note: Includes index. , Cover; Contents; Part I: Overview; Chapter 1: What Is RFID?; Introduction; What This Book Is and Is Not; RFID Radio Basics; Why Use RFID?; RFID Architecture; Data Communications; Physical Form Factor (Tag Container); Summary; Links to Sites; Chapter 2: RFID Uses; Introduction; Applied Use; Standards in the Marketplace; Failures in the Marketplace; RFID for the Consumer: Case Studies; Summary; References; Part II: Attacking RFID; Chapter 3: Threat and Target Identification; Introduction; Attack Objectives; Blended Attacks; Chapter 4: RFID Attacks: Tag Encoding Attacks; Introduction , Case Study: Johns Hopkins vs. SpeedPassThe SpeedPass; Summary; Chapter 5: RFID Attacks: Tag Application Attacks; MIM; Chip Clones-Fraud and Theft; Tracking: Passports/Clothing; Chip Cloning 〉 Fraud; Disruption; Summary; Chapter 6: RFID Attacks: Securing Communications Using RFID Middleware; RFID Middleware Introduction; Understanding Security Fundamentals and Principles of Protection; Addressing Common Risks and Threats; Securing RFID Data Using Middleware; Using DES in RFID Middleware for Robust Encryption , Using Stateful Inspection in the Application Layer Gateway For Monitoring RFID Data StreamsProviding Bulletproof Security Using Discovery, Resolution, and Trust Services in AdaptLinkTM; Summary; Chapter 7: RFID Security: Attacking the Backend; Introduction; Overview of Backend Systems; Virus Attacks; RFID Data Collection Tool- Backend Communication Attacks; Attacks on ONS; Summary; Part III: Defending RFID; Chapter 8: ; Management of RFID Security; Introduction; Risk and Vulnerability Assessment; Risk Management; Threat Management; Summary , Chapter 9: Case Study: Using Commerce Events' AdaptLinkTM to Secure the DoD Supply Network- Leveraging the DoD RFID MandateBackground on the Use of RFID in the DoD Supply Chain; Improved Asset Tracking for the DoD Is Critical; A Proposed Solution in Silent Commerce; References; Summary; Appendix A: Additional RFID Reference Material; Frequently Asked Questions; RFID Solutions Fast Track; Index; Techno Security Registration , English
    Additional Edition: ISBN 1-59749-047-4
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Bloomington, : Indiana University Press
    UID:
    almafu_9959892719102883
    Format: 1 online resource (1 online resource x, 403 pages)
    ISBN: 0-253-05057-X
    Note: To build a Communist movement in China, 1917-1927 -- The "Soviet" experiment, 1927-1931 -- Defeat in Kiangsi, 1931-1934 -- From the long march to the united front, 1934-1937 -- The road to war, 1937-1941 -- World War II, the United States and China, 1941-1944 -- The United States, the Soviet Union and China, 1945 -- Strategies in conflict, 1946-1949 -- The Soviet Union and the Chinese People's Republic, 1949-1959 -- The polarization of Communist politics, 1959-1965 -- The great proletarian cultural revolution II: protracted crisis, 1967-1968 -- China, the unsettled dragon, 1969-1972.
    Language: English
    Keywords: History. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almafu_BV046179225
    Format: XIII, 346 Seiten.
    Edition: 1. Auflage
    ISBN: 978-3-16-156298-3 , 3-16-156298-4
    Uniform Title: Philo of Alexandria
    Note: Literaturverzeichnis Seite 299-333
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-3-16-158354-4
    Language: German
    Subjects: Theology , Philosophy
    RVK:
    RVK:
    RVK:
    Keywords: Alexandrinus v25-40 Philo ; Biografie ; Biografie
    Author information: Niehoff, Maren R. 1963-
    Author information: Tyrell, Eva
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Totowa, NJ :Humana Press :
    UID:
    almahu_9949251558002882
    Format: 1 online resource (XI, 329p. 48 illus., 4 illus. in color.)
    Edition: 1st ed. 2012.
    ISBN: 1-61779-513-5
    Series Statement: Methods in Molecular Biology, 842
    Content: Epithelial mucins are large complex cell surface and secreted glycoproteins produced by mucosal epithelial cells.  In, Mucins: Methods and Protocols expert researchers in the field detail many of the methods which are now commonly used to study Mucins. These include methods and techniques  for the best approaches to analysing each specific area of mucin biochemistry, physiology and biophysics before providing individual detailed experimental protocols together with troubleshooting and interpretation tips. Written in the highly successful Methods in Molecular Biology™ series format, chapters include introductions to their respective topics, lists of the necessary materials and reagents, step-by-step, readily reproducible laboratory protocols, and key tips on troubleshooting and avoiding known pitfalls.   Authoritative and practical, Mucins: Methods and Protocols is designed to be a useful resource for those entering the mucin field and to facilitate those already studying mucins to broaden their experimental approaches to understanding mucosal biology.
    Note: Bibliographic Level Mode of Issuance: Monograph , Mucin Methods: Genes Encoding Mucins And Their Genetic Variation With A Focus On Gel Forming Mucins -- Gel-forming and Cell-associated Mucins – preparation for Structural and Functional Studies -- Detecting, Visualising and Quantifying Mucins -- Mass Spectrometric Analysis of Mucin Core Proteins -- O-Glycoprotein Biosynthesis:  Site Localization by Edman Degradation and Site Prediction Based on Random Peptide Substrates -- Analysis of Assembly of Secreted Mucins -- MUC1 Membrane Trafficking: Protocols for Assessing Biosynthetic Delivery, Endocytosis, Recycling and Release Through Exosomes -- Glycomic Work-flow for Analysis of Mucin O-linked Oligosaccharides -- Glycomic Work-flow for Analysis of Mucin O-linked Oligosaccharides -- O-Glycomics: Profiling and Structural Analysis of Mucin-type O-linked Glycans -- O-Glycoproteomics: Site-specific O-glycoprotein Analysis by CID/ETD Electrospray Ionization Tandem Mass Spectrometry and Top-Down Glycoprotein Sequencing by In-Source Decay MALDI Mass Spectrometry -- Analysing Mucin Degradation -- Assessment of Mucus Thickness and Production In Situ -- Preservation of Mucus in Histological Sections, Immunostaining of Mucins in Fixed Tissue and Localization of Bacteria with FISH -- In vitro Measurements of Mucus Secretion by Colon Explants -- Establishment of Respiratory Air-Liquid Interface Cultures and their Use in Studying Mucin Production, Secretion, and Function -- Studying Mucin Secretion from Human Bronchial Epithelial Cell Primary Cultures -- Assessment of Intracellular Mucin Content In Vivo -- Techniques for Assessment of Interactions of Mucins with Microbes and Parasites In Vitro and In Vivo -- Assessing Mucin Expression and Function in Human Ocular Surface Epithelia In Vivo and In Vitro. , English
    Additional Edition: ISBN 1-61779-512-7
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    kobvindex_VBRD-i97833520095560564
    Format: 564 Seiten
    Edition: 1. Auflage
    ISBN: 9783352009556
    Content: Zuallererst bin ich eine Frau." - Ein großer Roman über Jackie Kennedy.Gegen den Widerstand ihrer Familie löst die junge Jacqueline Bouvier ihre vielversprechende Verlobung. Dann trifft sie ihre große Liebe: John F. Kennedy. Das strahlend schöne Paar wird zum Symbol der Hoffnung des jungen Amerikas: Jackies Eleganz und ihr Charisma machen sie zum Vorbild der Frauen, zugleich ist die hochintelligente Journalistin Triebfeder der Karriere ihres Mannes. Doch die Ehe ist unglücklich, und das Leben als First Lady gerät zur Zerreißprobe für sie. Trotz allem kämpft sie um ihre Liebe zu JFK - bis zu jenem Tag in Dallas. Auf der Suche nach einer Zukunft für sich und ihre Kinder muss Jackie nun ihren eigenen Weg finden. Die so intime wie mitreißende Geschichte einer Frau, die wie keine andere zur Ikone wurde.
    Language: German
    Keywords: Fiktionale Darstellung ; Fiktionale Darstellung
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Rockland, MA :Syngress Publishing,
    UID:
    almahu_9948025486102882
    Format: 1 online resource (593 p.)
    Edition: 1st ed.
    ISBN: 1-281-01991-7 , 9786611019914 , 0-08-053231-4
    Content: The worldwide video game console market surpassed 10 billion in 2003. Current sales of new consoles is consolidated around 3 major companies and their proprietary platforms: Nintendo, Sony and Microsoft. In addition, there is an enormous installed ""retro gaming"" base of Ataria and Sega console enthusiasts. This book, written by a team led by Joe Grand, author of ""Hardware Hacking: Have Fun While Voiding Your Warranty"", provides hard-core gamers with they keys to the kingdom: specific instructions on how to crack into their console and make it do things it was never designed to do.
    Note: Includes index. , Front Cover; Game Console Hacking; Copyright Page; Contents; Foreword; Introduction 2.0; Introduction; Part I: Introduction to Hardware Hacking; Chapter 1. Tools of the Warranty-Voiding Trade; Introduction; The Essential Tools; Basic Hardware Hacking; Advanced Projects and Reverse Engineering; Where to Obtain the Tools; Chapter 2. Case Modifications: Building an Atari 2600PC; Introduction; Choosing your Features: Why the Atari 2600?; Preparing for the Hack; Performing the Hack; In Conclusion; Resources and Other Hacks; Part II: Modern Game Consoles; Chapter 3. The Xbox; Introduction , Opening the Xbox Controller Hacks; Getting Inside Your Controller; Xbox Networking Hacks; Creating Your Own Crossover Cable; Extending the Network Status LED's to the Front Panel; Wireless Networking Hacks; Installing a Modchip; Running Linux on an Unmodified Xbox; Other Hacks; Homebrew Game Development; Xbox Resources on the Web; Chapter 4. PlayStation 2; Introduction; Commercial Hardware Hacking: Modchips; Getting Inside the PS2; Installing a Serial Port; Booting Code from the Memory Card; Other Hacks: Independent Hard Drives; PS2 Technical Details; Homebrew Game Development , PS2 Resources on the Web Part III: Handheld Game Platforms; Chapter 5. Nintendo Game Boy Advance; Introduction; A Very Brief History of Nintendo; Opening the GBA Console; Replacing the Display Lens; Light Up Your LCD with the GBA Afterburner Mod; Enhancing Your Afterburner with the GBA Stealth Dimmer Chip; Nintendo GBA Technical Specifications; Homebrew Game Development; Other Hacks; Nintendo GBA Resources on the Web; Chapter 6. Gamepark 32 (GP32); Introduction; Out of the Box: Configuring Your GP32; Opening the GP32 Console; Replacing the GP32 Screen Cover; Repairing Your Buttons , Accelerating Your GP32 (CPU Core Voltage Increase)Creating a DC Power Adapter; Installing the Multifirmware Loader; Homebrew Game Development; Other Hacks; GP32 Resources on the Web; Part IV: Retro and Classic Systems; Chapter 7. Nintendo NES; Introduction; Opening the NES Console; Replacing the 72-Pin Cartridge Connector; Blue Power LED Modification; Disabling the NES ""Lockout Chip""; Opening an NES Game Cartridge; Replacing the Battery in Certain Game Cartridges; Creating an EPROM Cartridge for Homebrew Game Development; Homebrew Game Development; Other Hacks; NES Resources on the Web , Chapter 8. Atari 2600 Introduction; Atari 2600 Left-Handed Joystick Modification; Repair Your Atari 2600 Joysticks; Revitalize Your Atari 2600 Paddles; Use an NES Control Pad with your 2600; Atari 2600 S-Video/Audio Mod; Atari 2600 Stereo Audio Output; Homebrew Game Development; Atari 2600 Resources on the Web; Chapter 9. Atari 5200; Introduction; Opening the Atari 5200; Atari 5200 Blue LED Modification; Atari 5200 Two-Port BIOS Replacement; Creating an Atari 5200 Paddle Controller; Freeing Yourself from the 5200 Four-Port Switchbox; Atari 5200 Video and Audio Upgrade Modification; Other Hacks , Homebrew Game Development , English
    Additional Edition: ISBN 1-931836-31-0
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Burlington, MA :Syngress Publishing, Inc.,
    UID:
    almahu_9948025419202882
    Format: 1 online resource (271 p.)
    Edition: 1st edition
    ISBN: 1-282-76895-6 , 9786612768958 , 0-08-055870-4
    Content: Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book co
    Note: Includes index. , Front Cover; Kismet Hacking; Copyright Page; Contributing Authors; Contents; Chapter 1: Introduction to Wireless Networking, Wardriving, and Kismet; Exploring Past Discoveries That Led to Wireless; Discovering Electromagnetism; Exploring Conduction; Inventing the Radio; Mounting Radio-Telephones in Cars; Inventing Computers and Networks; Inventing Cell Phones; Exploring Present Applications for Wireless; Applying Wireless Technology to Vertical Markets; Using Wireless in Delivery Services; Using Wireless for Public Safety; Using Wireless in the Financial World , Using Wireless in the Retail WorldUsing Wireless in Monitoring Applications; Applying Wireless Technology to Horizontal Applications; Using Wireless in Messaging; Using Wireless for Mapping; Using Wireless for Web Surfing; Using Bluetooth Wireless Devices; Introduction to Wardriving; The Origins of Wardriving; Definition; The Terminology History of Wardriving; Wardriving Misconceptions; The Truth about Wardriving; The Legality of Wardriving; Introduction to Wardriving with Linux; Preparing Your System to Wardrive; Preparing the Kernel; Preparing the Kernel for Monitor Mode , Preparing the Kernel for a Global Positioning SystemInstalling the Proper Tools; Installing Kismet; Installing GPSD; Configuring Your System to Wardrive; Wardriving with Linux and Kismet; Starting Kismet; Using the Kismet Interface; Understanding the Kismet Options; Using a Graphical Front End; Summary; Chapter 2: Basic Installation; Introduction; Kismet Prerequisites; Kismet Installation; Choosing a Wireless Card Driver; Wireless Card Driver Compiling and Installation; Configuring Kismet (Editing kismet.conf); Run Kismet; Chapter 3: Operating Kismet; Introduction; The Kismet User Interface , The Introductory Splash ScreenPlay Sounds; Additional RF Equipment: Antennas and Cables; Pigtails; Using a GPS Receiver with Kismet; Typical GPS Problems; Putting It All together: The Complete Kismet Setup; Summary; Chapter 4: Kismet Menus; Introduction; Main Display; Network List Panel; Sorting; Columns; Decay; Name; Type; WEP; Channel; Packets; Flags; IP; Size; Colors; GPS; Information Panel; Status Panel; Pop-up Windows; Network Details; Client List; Columns; Decay; Type; Manufacturer; Data; Crypt; Size; IP Range; Sgn; Client Details; Packet rate; Packet Types; Statistics , Wireless Card PowerNetwork Location; Customizing the Panels Interface; Customizing the Network List Window; Customizing the Client List Window; Customizing Colors; Third Party Front-ends; gkismet; KisWin; dumb kismet client; Further information; Summary; Solutions Fast Track; Chapter 5: Configuring the Kismet Server; Introduction; The Kismet Config File; Kismet Parameters; Kismet.conf; Kismet Server Command Line; Summary; Chapter 6: Kismet Client Configuration File; Introduction; The Kismet Client Config File; Kismet Parameters; Command-Line Switches; Summary , Chapter 7: Server.conf File Advanced Configuration , English
    Additional Edition: ISBN 1-59749-117-9
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages