feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Charité  (37)
  • SB Luckenwalde  (1)
  • SB Rathenow
  • Stiftung FVV
  • 2005-2009  (38)
Type of Medium
Language
Region
Library
Year
Subjects(RVK)
Access
  • 1
    UID:
    b3kat_BV035367932
    Format: 143 S. , zahlr. Ill. , 250 mm x 230 mm
    ISBN: 9783421037077
    Language: German
    Subjects: Engineering
    RVK:
    Keywords: Gartengestaltung ; Staude ; Ratgeber ; Ratgeber ; Ratgeber
    Author information: Barth, Ursula
    Author information: Rogers, Gary 1938-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Rockland, MA :Syngress :
    UID:
    almahu_9948026231802882
    Format: 1 online resource (401 p.)
    Edition: 1st ed.
    ISBN: 1-281-03579-3 , 9786611035792 , 0-08-048888-9 , 1-59749-016-4
    Content: Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic ""insider's look"" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to ""hack along"" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combina
    Note: Description based upon print version of record. , Cover; Contents; Foreword; Prologue; Chapter 1: The Mind of Terror; Chapter 2: Unseen Planning; Chapter 3: Making Friends; Chapter 4: One Step Closer; Chapter 5: Over the Line; Chapter 6: Images of Death; Chapter 7: The Real Assignment; Chapter 8: Creating the Code; Chapter 9: Over the Edge; Chapter 10: Biding Time; Chapter 11: Covert Channels; Chapter 12: Facing the Truth; Chapter 13: Taking Command; Chapter 14: Racing the Clock; Chapter 15: Losing Control; Chapter 16: Heightened Motivation; Chapter 17: Chasing Ghosts; Chapter 18: Taking Back Control; Chapter 19: Vengeance for Deceit , Chapter 20: Eliminating False PositivesChapter 21: Gaining a Finger Hold; Chapter 22: Compressing Timelines; Chapter 23: A Plan Comes Together; Chapter 24: Turning Fiction into Reality; Glossary; Other books from Russ Rogers and Security Horizon, Inc.... , English
    Additional Edition: ISBN 1-928994-98-9
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Rockland, MA :Syngress Publishing,
    UID:
    almahu_9948025403202882
    Format: 1 online resource (642 p.)
    Edition: 1st edition
    ISBN: 1-281-03571-8 , 9786611035716 , 0-08-048977-X , 1-59749-125-X
    Content: The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection and Prevention Systems, and Access Control Systems. The first and last word on managing IT security projects, this book provides the level of detail and content expertise required to competently handle highly complex security deployments. In most enterprises, be they corporate or governmental, these are generally the hig
    Note: Includes index. , Ch. 1. IT security project management building blocks -- Ch. 2. Defining the security project -- Ch. 3. Organizing the IT security project -- Ch. 4. Building quality into IT security projects -- Ch. 5. Forming the IT security project team -- Ch. 6. Planning the IT security project -- Ch. 7. Managing the IT security project -- Ch. 8. Closing out the IT security project -- Ch. 9. Corporate IT security project plan -- Ch. 10. General IT security plan -- Ch. 11. IT Infrastructure security plan -- Ch. 12. Wireless security project plan -- Ch. 13. IT operational security plan. , English
    Additional Edition: ISBN 1-59749-076-8
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9948025233502882
    Format: 1 online resource (433 p.)
    Edition: 1st edition
    ISBN: 1-281-07188-9 , 9786611071882 , 0-08-055397-4
    Content: "This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the countermeasures to address them. Some of the topics and thoughts discussed here are as new as tomorrow's headlines, whereas others have been around for decades without being properly addressed. I hope you enjoy this book as much as we have enjoyed working with the various authors and friends during its d
    Note: Includes index. , Front Cover; Techno Security'sTM Guide to Managing Risks: For IT Managers, Auditors, and Investigators; Copyright Page; Contents; Introduction; Foreword; Chapter 1. Social Engineering: Risks, Threats, Vulnerabilities, and Countermeasures; Introduction; How Easy Is It?; Human Nature: Human Weakness; Risk Management: Performing a Mini Risk Assessment; Outsider-Insider Threats; The Mind of a Social Engineer; The Mind of a Victim; Countermeasures: How Do Bad Guys Target Us, and What Can We Do About It; Social Engineering Awareness: A War Story; Answer to the Riddle; Summary , Chapter 2. Personal, Workforce, and Family PreparednessIntroduction; Threats; Your Personal Preparedness Plan; Summary; Chapter 3. Seizure of Digital Information; Introduction; Defining Digital Evidence; Digital Evidence Seizure Methodology; Factors Limiting the Wholesale Seizure of Hardware; Other Options for Seizing Digital Evidence; Common Threads within Digital Evidence Seizure; Determining the Most Appropriate Seizure Method; Summary; Works Cited; Chapter 4. Handheld Forensics; Digital Forensics; What Is the Handheld Forensic Impact?; Cellular Handling; Evidence Preservation , Maintain a Forensic Data ConnectionAnalysis and Reporting; Summary; Bibliography; Chapter 5. RFID: An Introduction to Security Issues and Concerns; Introduction; Background; RFID Purposes; Where Does RFID fit in?; Technology Involved; Summary; Chapter 6. Open Source Intelligence; Introduction; Direction; Discovery; Summary; Notes; Chapter 7. Wireless Awareness: Increasing the Sophistication of Wireless Users; Introduction; Putting Together a War-Driving Team; Increasing User Sophistication; Summary; Chapter 8. No-Tech Hacking; Introduction: What Is ""No-Tech Hacking?""; Physical Security , Lock BumpingInformation Security; Checklist; Summary; Notes; Chapter 9. The Basics of Penetration Testing; Introduction; Know the Security Analysis Life Cycle; Know When to Deviate; The Penetration Tester Mentality; The Penetration Methodology; Summary; Chapter 10. What Is Steganography?; Introduction; Defining Steganography; Analog Steganography; Digital Steganography; The Six Categories of Steganography; Types of Steganography; Steganography Applied to Different Media; Hiding in Network Packets; Issues in Information Hiding; Watermarking; Steganography Tools; Real-World Uses , Detection and AttacksSummary; Chapter 11. Insider Threat; Introduction; The Devil Inside; The Importance of Insider Threat; Why the Insider Threat Has Been Ignored; Why the Insider Threat Is Worse Than the External Threat; The Effect of Insider Threats on a Company; How Bad Is It-Statistics on What Is Happening .; Targets of Attack; The Threat Is Real; New World Order; Future Trends; Summary; Index , English
    Additional Edition: ISBN 1-59749-138-1
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Book
    Book
    Firenze :SISMEL, Ed. del Galluzzo,
    UID:
    almafu_BV021736380
    Format: 296 S. : , Ill. ; , 21 cm.
    ISBN: 88-8450-199-7
    Series Statement: Micrologus' library 15
    Note: Contains bibliography, bibl. references, notes and indices
    Language: English
    Subjects: History
    RVK:
    Keywords: Chirurgie ; Verwissenschaftlichung ; Chirurgie ; Verwissenschaftlichung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Cambridge, U.K. :Royal Society of Chemistry,
    UID:
    edocfu_9958087173702883
    Format: 1 online resource (243 p.)
    Edition: 1st ed.
    ISBN: 1-84755-759-7
    Content: Carried in wallets and displayed in homes, photographs are a common, but often an overlooked feature of modern life. And, with the advent of digital technology many believe that the so called 'wet chemistry' behind old fashioned photography is a thing of the past - but is it? The Chemistry of Photography endeavours to unravel the mysteries of picture taking and reflects on the diversity and complexity of the science. It gives readers an insight into the chemistry needed to generate pictures, spanning all mediums including still and motion picture as well as digital imaging. Beginning with the
    Note: Description based upon print version of record. , The Chemistry of Photography; i_iv; v_vi; vii_x; 001_015; 016_023; 024_042; 043_053; 054_065; 066_093; 094_108; 109_130; 131_166; 167_183; 184_195; 196_201; 202_213; 214_227; 228_229; 230_232 , English
    Additional Edition: ISBN 0-85404-273-3
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Leiden :Martinus Nijhoff Publishers,
    UID:
    edoccha_9958118292102883
    Format: 1 online resource (1047 p.)
    ISBN: 1-281-40052-1 , 9786611400521 , 90-474-1090-4
    Series Statement: Immigration and asylum law and policy in Europe ; v. 12
    Content: Since entry into force of the Treaty of Amsterdam on 1 May 1999, the EU has considered, and in many cases adopted, many proposals for legislation or measures implementing legislation in the area of immigration and asylum law. These measures run the gamut from highly technical operational matters to broad measures covering basic aspects of immigration and asylum law. Between them, the proposed or adopted measures cover virtually every possible issue in relation to immigration or asylum. This book contains the text of and commentary upon a large number of these measures proposed or adopted up until 1 January 2006, including all of the most important ones. It also includes the text of the key measures concerning asylum, legal migration and irregular migration. A full list of the measures with references to their legislative history is provided. The authors of each commentary are experts in the field of EU immigration and asylum law, and the areas covered include visa and border controls, asylum, legal migration and integration, and irregular migration.
    Note: Description based upon print version of record. , Preliminary Material / , Chapter 1. Overview / , Chapter 2. From Black Market to Constitution: the Development of the Institutional Framework for EC Immigration and Asylum Law / , Chapter 3. The EU Institutions and Title IV / , Chapter 4. Out of the Ghetto? the Personal Scope of EU Law / , Chapter 5. Human Rights in the EU Legal Order: Practical Relevance for EC Immigration and Asylum Law / , Chapter 6. Enlargement of the EU and Title IV by Judit Tóth / , Chapter 7. Border Controls / , Chapter 8. Visa List / , Chapter 9. Visa Policy / , Chapter 10. Responsibility for Applications for Asylum / , Chapter 11. Eurodac / , Chapter 12. Minimum Standards for Reception / , Chapter 13. Refugee Definition and Subsidiary Protection / , Chapter 14. Asylum Procedures / , Chapter 15. Temporary Protection / , Chapter 16. Massive Refugee Flows and Europes Temporary Protection / , Chapter 17. Challenges to Forging a Common European Asylum System in Line with International Obligations / , Chapter 18. Gender and EU Asylum Law / , Chapter 19. Family Reunion / , Chapter 20. Long-term Residents / , Chapter 21. Migration for Employment and Self-employment / , Chapter 22. Admission of Students and Others / , Chapter 23. Social Security / , Chapter 24. The Socio-Economic Agenda of EC Immigration and Asylum Policy / , Chapter 25. Mutual Recognition of Expulsion Decisions / , Chapter 26. Carrier Sanctions / , Chapter 27. Trafficking in Human Beings / , Chapter 28. Facilitation of Irregular Entry, Residence and Movement / , Chapter 29. Victims of Trafficking or Smuggling / , Chapter 30. Transit for Expulsion / , Chapter 31. EC Readmission Agreements / , Chapter 32. Control of Irregular Migration and EU Law and Policy: a Human Rights Deficit / , Annexes / , English
    Additional Edition: ISBN 90-04-15374-8
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    edoccha_9958131692102883
    Format: 1 online resource (295 p.)
    ISBN: 1-136-38037-X , 1-280-64228-9 , 9786610642281 , 0-08-045906-4
    Series Statement: Events management series
    Content: Marketing Destinations and Venues for Conferences, Conventions and Business Events covers key areas in marketing and promotion, such as:* Trends and issues in destination and venue marketing* Strategic marketing planning, ROI and strategy evaluation* Destination and venue selling strategies* Future challenges, opportunities and supply-side developments
    Note: Description based upon print version of record. , Cover; Marketing Destinations and Venues for Conferences, Conventions and Business Events; Copyright; Contents; Series editors; The authors; Foreword; Series preface; Preface; List of extended case studies; Abbreviations; Chapter 1 The Role of Marketing and Selling in the Convention and Business Events Sector; Chapter 2 The Marketing Environment for Destinations; Chapter 3 The Marketing Environment for Venues; Chapter 4 Marketing Planning for Destinations and Venues: Principles and Theories; Chapter 5 Marketing Communications for Destinations and Venues: Principles and Theories , Chapter 6 Marketing Communications for Destinations and Venues: Practice (I)Chapter 7 Marketing Communications for Destinations and Venues: Practice (II); Chapter 8 Sales Strategies for Destinations and Venues: Principles and Theories; Chapter 9 Sales Strategies for Destinations and Venues: Practice; Chapter 10 Building Effective Marketing Partnerships; Chapter 11 Current Initiatives in the Conferences, Conventions and Business Events Sector; Chapter 12 Future Trends and Challenges for the Conferences, Conventions and Business Events Sectors , Appendix Major Trade Shows for the Conference IndustryIndex , English
    Additional Edition: ISBN 1-138-12926-7
    Additional Edition: ISBN 0-7506-6700-1
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    edoccha_9958095202602883
    Series Statement: Policy research working paper ; 4847
    Content: "Expanding and improving basic education in developing countries requires, at a minimum, teachers who are present in the classroom and motivated to teach, but this essential input is often missing. This paper describes the findings of a series of recent World Bank and other studies on teacher absence and incentives for performance. Surprise school visits reveal that teachers are absent at high rates in countries such as India, Indonesia, Uganda, Ecuador, and Zambia, reducing the quality of schooling for children, especially in rural, remote, and poor areas. More broadly, poor teacher management and low levels of teacher accountability afflict many developing-country education systems. The paper presents evidence on these shortcomings, but also on the types of incentives, management, and support structures that can improve motivation and performance and reduce avoidable absenteeism. It concludes with policy options for developing countries to explore as they work to meet Education for All goals and improve quality. "--World Bank web site.
    Note: Title from PDF file as viewed on 5/8/2009. , Also available in printing.
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    University Park, PA :Penn State University Press,
    UID:
    edoccha_9960868918602883
    Format: 1 online resource (260 p.)
    ISBN: 0-271-04982-0 , 0-271-03497-1
    Series Statement: Penn State Romance Studies ; 3
    Content: In Career Stories, Juliette Rogers considers a body of largely unexamined novels from the Belle Époque that defy the usual categories allowed the female protagonist of the period. While most literary studies of the Belle Époque (1880–1914) focus on the conventional housewife or harlot distinction for female protagonists, the heroines investigated in Career Stories are professional lawyers, doctors, teachers, writers, archeologists, and scientists.In addition to the one well-known woman writer from the Belle Époque, Colette, this study will expand our knowledge of relatively unknown authors, including Gabrielle Reval, Marcelle Tinayre, and Colette Yver, who actively participated in contemporary debates on women's possible roles in the public domain and in professional careers during this period. Career Stories seeks to understand early twentieth century France by examining novels written about professional women, bourgeois and working-class heroines, and the particular dilemmas that they faced. This book contributes a new facet to literary histories of the Belle Époque: a subgenre of the bildungsroman that flourished briefly during the first decade of the twentieth century in France. Rogers terms this subgenre the female berufsroman, or novel of women's professional development.Career Stories will change the way we think about the Belle Époque and the interwar period in French literary history, because these women writers and their novels changed the direction that fiction writing would take in post-World War I France.
    Note: Frontmatter -- , Contents -- , Acknowledgments -- , Introduction -- , 1 Innovation and Education: Historical Contexts from the Belle Epoque -- , 2 Literary Contexts: Bildungsroman, Erziehungsroman, and Berufsroman -- , 3 Dreams and Disappointments: Women’s Education Novels -- , 4 Cervelines: Women Scientists in Novels of Professional Development -- , 5 Indépendantes: Professional Women Writers -- , 6 The Composite Novel: Women Lawyers in Les Dames du Palais -- , 7 After the War -- , Appendixes -- , References -- , Index , In English.
    Additional Edition: ISBN 0-271-03269-3
    Language: English
    Keywords: Llibres electrònics
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages