feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Charité  (45)
  • FH Potsdam  (3)
  • Kreisbibliothek des Landkreises Spree-Neiße  (1)
  • 2010-2014  (48)
Type of Medium
Language
Region
Library
Year
Access
  • 1
    UID:
    almafu_BV041983788
    Format: 388 S. : , Ill., graph. Darst.
    Edition: 1. Aufl.
    ISBN: 978-3-456-85385-7 , 3-456-85385-8
    Uniform Title: Early Start Denver Model for young children with autism
    Language: German
    Subjects: Education , Psychology , Medicine
    RVK:
    RVK:
    RVK:
    Keywords: Frühkindlicher Autismus ; Frühdiagnostik ; Intervention
    Author information: Rogers, Sally J.
    Author information: Dawson, Geraldine
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Book
    Book
    London :Faber and Faber [u.a.],
    UID:
    almahu_BV041131751
    Format: 311 S. : , zahlr. Ill. ; , 26 cm.
    Edition: 1. publ.
    ISBN: 978-0-571-30161-4 , 0-571-30161-4
    Language: English
    Subjects: General works
    RVK:
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almafu_9959046437302883
    Format: 1 online resource (xi, 250 pages) : , illustrations
    ISBN: 953-51-6827-4
    Content: The field of performing transcatheter interventions to treat vascular lesions has exploded over the past 20 years. Not only has the technology changed, especially in the arena of balloon/stent devices, but the techniques of approaching complex lesions has evolved over the past decade. Lesions that no one would have imagined treating back in the 1990's are now being done routinely in the catheterization suite. This book provides an update on the current techniques and devices used to treat a wide variety of lesions. Though, at first, the outward appearance of the topics appears to be varied, they are all related by the common thread of treating vascular lesions. We hope, by publishing this book, to accomplish two things: First, to offer insight from experts in their field to treat, both medically and procedurally, complex vascular lesions that we frequently encounter. Secondly, we hope to promote increased communication between areas of medicine that frequently don't communicate, between adult interventional cardiologists, pediatric interventional cardiologists, interventional radiologists, and neurosurgeons. Much can be learned from our respective colleagues in these areas which can further our own world of interventions.
    Note: English
    Additional Edition: ISBN 953-51-0084-X
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9948093715502882
    Format: 1 online resource (321 p.)
    Edition: 1st edition
    ISBN: 1-283-11878-5 , 9786613118783 , 1-59749-638-3
    Content: Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the
    Note: Description based upon print version of record. , Front Cover; Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners; Copyright Page; Acknowledgments; Table of Contents; About the Authors; About the Technical Editor; Foreword; Introduction; Chapter1. What is Cyber Warfare?; What is Cyber Warfare?; Have We Seen a Cyber War?; Why Cyber Warfare is Important; Summary; Endnotes; Chapter2. The Cyberspace Battlefield; Boundaries in Cyber Warfare; Where Cyber Fits in the War-fighting Domains; Threatscape; Fielding Systems at the Speed of Need; Summary; Endnotes; Chapter3. Cyber Doctrine; Current U.S. Doctrine , Sample Doctrine/Strategy from Around the WorldTranslating Traditional Military Doctrine; Guidance and Directives; Operations and Exercises; Summary; Endnotes; Chapter4. Cyber Warriors; What Does a Cyber Warrior Look Like?; Differences from Traditional Forces; Present Cyber Warfare Forces; Staffing for Cyber War; Summary; Endnotes; Chapter5. Logical Weapons; Reconnaissance Tools; Scanning Tools; Access and Escalation Tools; Exfiltration Tools; Sustainment Tools; Assault Tools; Obfuscation Tools; Summary; Endnotes; Chapter6. Physical Weapons; How the Logical and Physical Realms are Connected , Infrastructure ConcernsSupply Chain Concerns; Tools for Physical Attack and Defense; Summary; Endnotes; Chapter7. Psychological Weapons; Social Engineering Explained; How the Military Approaches Social Engineering; How the Military Defends Against Social Engineering; Summary; Endnotes; Chapter8. Computer Network Exploitation; Intelligence and Counter-Intelligence; Reconnaissance; Surveillance; Summary; Endnotes; Chapter9. Computer Network Attack; Waging War in the Cyber Era; The Attack Process; Summary; Endnotes; Chapter10. Computer Network Defense; What We Protect , Security Awareness and TrainingDefending against Cyber Attacks; Summary; Endnotes; Chapter11. Non-State Actors in Computer Network Operations; Individual Actors; Corporations; Cyber Terrorism; Organized Cyber Crime; Autonomous Actors; Summary; Endnotes; Chapter12. Legal System Impacts; Legal Systems; Key U.S. Laws; Privacy Impacts; Digital Forensics; Summary; Endnotes; Chapter13. Ethics; Ethics in Cyber Warfare; Bellum Iustum (Just War Theory); Summary; Endnotes; Chapter14. Cyberspace Challenges; Cybersecurity Issues Defined; Interrelationship of Cybersecurity Issues; Way Ahead; Summary , EndnotesChapter15. The Future of Cyber War; Near Term Trends; Most Likely and Most Dangerous Courses of Action; New Technologies and New problems; International Interactions; Summary; Endnotes; Appendix: Cyber Timeline; Index
    Additional Edition: ISBN 1-59749-637-5
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9949698036302882
    Format: 1 online resource (319 p.)
    ISBN: 1-282-73819-4 , 9786612738197 , 1-4377-7824-0
    Series Statement: Micro and nano technologies
    Content: This book is an overview of the strategies to generate high-quality films of one-dimensional semiconductor nanostructures on flexible substrates (e.g., plastics) and the use of them as building blocks to fabricating flexible devices (including electronics, optoelectronics, sensors, power systems). In addition to engineering aspects, the physics and chemistry behind the fabrication and device operation will also be discussed as well. Internationally recognized scientists from academia, national laboratories, and industries, who are the leading researchers in the emerging areas, are contributi
    Note: Description based upon print version of record. , Front Cover; Semiconductor Nanomaterials for Flexible Technologies; Copyright; Contents; Contact Information; Preface; Acknowledgment; Chapter 1 - Flexible Organic Single-Crystal Field-Effect Transistors; Chapter 2 - Chemically Synthesized Semiconductor Nanowires for High-Performance Electronics and Optoelectronics; Chapter 3 - Fast Flexible Electronics Made from Nanomembranes Derived from High-Quality Wafers; Chapter 4 - Thin Films of Single-Walled Carbon Nanotubes for Flexible Electronic Device Applications; Chapter 5 - Flexible Field Emitters Based on Carbon Nanotubes and Other Materials , Chapter 6 - Flexible Solar Cells Made of Nanowires/MicrowiresChapter 7 - Zinc Oxide Nanowire Arrays on Flexible Substrates: Wet Chemical Growth and Applications in Energy Conversion; Chapter 8 - Flexible Energy Storage Devices Using Nanomaterials; Chapter 9 - Flexible Chemical Sensors; Chapter 10 - Mechanics of Stiff Thin Films of Controlled Wavy Geometry on Compliant Substrates for Stretchable Electronics; Index , English
    Additional Edition: ISBN 1-4377-7823-2
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9949697352402882
    Format: 1 online resource (301 p.)
    ISBN: 1-282-87941-3 , 9786612879418 , 0-12-381427-8
    Content: The Field Guide to Freshwater Invertebrates of North America focuses on freshwater invertebrates that can be identified using at most an inexpensive magnifying glass. This Guide will be useful for experienced nature enthusiasts, students doing aquatic field projects, and anglers looking for the best fish bait, lure, or fly. Color photographs and art, as well as the broad geographic coverage, set this guide apart. 362 color photographs and detailed descriptions aid in the identification of species Introductory chapters instruct the reader on how to use the book
    Note: Description based upon print version of record. , Cover; Field Guide to Freshwater Invertebrates of North America; Copyright; Contents; Preface; Acknowledgments; Biographic Sketches of the Authors; Photograph Credits; Part1 Introduction; 1. Using This Book Effectively; I. Introduction to This Field Guide; II. How Invertebrates are Classified; III. A Cautionary Note; 2. General Techniques for Collecting and Identification; I. Finding, Collecting, and Culturing Aquatic Invertebrates; II. How to Use a Dichotomous Key; III. Introductory Taxonomic Key for Invertebrates and Chapter Guide; Part II General Ecology of Freshwater Invertebrates , 3. The Nature of Inland Water HabitatsI. Introduction; II. Lotic Environments-Creeks and Rivers; III. Subterranean Habitats: Hyporheic Zone and Cave Environments; IV. Lentic Ecosystems; 4. A Primer on Ecological Relationships amongFreshwater Invertebrates; I. Introduction; II. Physiological Ecology; III. Organismal and Population Ecology; IV. Community Ecology; Part III Ecology and Identification of Specific Taxa; 5. Sponges: Phylum Porifera; I. Introduction, Diversity, and Distribution; II. Form and Function; III. Ecology, Behavior, and Environmental Biology; IV. Collection and Culturing , V. Representative Taxa of Freshwater Sponges: Phylum Porifera6. Hydra and Jellyfish: Phylum Cnidaria; I. Introduction, Diversity, and Distribution; II. Form and Function; III. Ecology, Behavior, and Environmental Biology; IV. Collection and Culturing; V. Representative Taxa: Phylum Cnidaria; 7. Flatworms: Phylum Platyhelminthes, Class Turbellaria; I. Introduction, Diversity, and Distribution; II. Form and Function; III. Ecology, Behavior, and Environmental Biology; IV. Collection and Culturing; V. Representative Taxa of Flatworms: Class Turbellaria; 8. Hairworms: Phylum Nematomorpha , I. Introduction, Diversity, and DistributionII. Form and Function; III. Ecology, Behavior, and Environmental Biology; IV. Collection and Culturing; V. Representative Taxa of Hairworms: Phylum Nematomorpha; 9. Snails: Phylum Mollusca, Class Gastropoda; I. Introduction, Diversity, and Distribution; II. Form and Function; III. Ecology, Behavior, and Environmental Biology; IV. Collection and Culturing; V. Representative Taxa of Snails and Limpets: Class Gastropoda; 10. Mussels and Clams: Phylum Mollusca, Class Bivalvia; I. Introduction, Diversity, and Distribution; II. Form and Function , III. Ecology, Behavior, and Environmental BiologyIV. Collection and Culturing; V. Representative Taxa of Clams and Mussels: Class Bivalvia; 11. Aquatic Segmented Worms and Leeches: Phylum Annelida; I. Introduction to the Phylum Annelida; II. Form and Function; III. Ecology, Behavior, and Environmental Biology; IV. Collection and Culturing; V. Representative Taxa of Aquatic Earthworms and Leeches:Phylum Annelida; 12. Moss Animals: Phylum Ectoprocta, or Bryozoa; I. Introduction, Diversity, and Distribution; II. Form and Function; III. Ecology, Behavior, and Environmental Biology , IV. Collection and Culturing , English
    Additional Edition: ISBN 0-12-381426-X
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9948026091102882
    Format: 1 online resource (270 p.)
    Edition: 1st edition
    ISBN: 1-282-96747-9 , 9786612967474 , 1-59749-614-6
    Content: Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed "Subversive Multi-Vector Threats? or 'SMT's. Whether the goal is to acquire and subsequently sell intellectual property from
    Note: Description based upon print version of record. , Front Cover; Cybercrime and Espionage An Analysis of SubversiveMultivector Threats; Copyright; Contents; Foreword; Preface; Acknowledgements; About the authors; Chapter 1: Cybercrime and Espionage and the New Security 101; Introduction; He Who Does Not Prevent a Crime When He Can, Encourages It; What's Old Is New Again; A Changing World; Cybercriminal Statistics: U.S. and Abroad; The Statistics of Cybercrime; Separating the Wheat from the Chaff: Qualifying Amateurs and Professionals; Trends in 2011; Myopic to the Catastrophic: Advanced Persistent Threats , Points of Confluence: Events That Have Shaped the Future of Privatized Cybercrime and EspionageAgendas in Next Generation Cybercriminal Activity; The Coming Decade; Summary; Chapter 2: Evolution Revolution; Introduction; Communication; Criminal Activity; Summary; Chapter 3:The Silent Killer: HowRegulatory ComplianceHas Worsened the Stateof Information Security; Introduction; Regulatory Compliance Telemetry; Transborder Data Flow Restrictions; ISO Security Standards; Health Insurance Portability and Accountability Act (HIPAA); Family Education Rights and Privacy Act (FERPA) , Payment Card Industry Data Security Standard (PCI DSS)North America Electric Reliability Corporation: Critical Infrastructure Protection (NERC CIP); Summary; References; Chapter 4: Mediating The Great Divorce : The convergenceof Physical andLogical Security; Introduction; The CISSP Physical Security Domains; Environmental Security; The Silos of Security; Two-Factor Authentication; Converging the Great Physical Divide; Physical Device Security (Cryptography); Proximity-Based Access Control; Summary; References , Chapter 5: Nonstate Sponsored Attacks: Tealing Information is OurBusiness. . . And Business is GoodIntroduction; Asymmetric Forms of Information Gathering; Blended Reconnaissance; Social Engineering and Social Networking; Point, Click, and Own; Summary; References; Chapter 6: State-Sponsored Intelligence; Introduction; Espionage and Its Influence on Next-Generation Threats; Intelligence Types; Traditional Forms of Intelligence Gathering; Summary; Chapter 7: Cyber X: CriminalSyndicates, Nation States,Subnational Entities, andBeyond; Introduction; Classifying the Cyber Actor , Attack Sophistication ModelModus Operandi; The Importance of Attribution; Criminal and Organized Syndicates; Nation States; Subnational Entities; Summary; References; Chapter 8: The Rise of the Subversive Multivector Threat; Introduction; Sun Tzu and The Art of War; Defining the Subversive Multivector Threat (SMT); Summary; Chapter 9: Seven Commonalities of Subversive Multivector Threats; Introduction; Seven Commonalities of Subversive Multivector Threats; Five Names in Threats You Should Know; Next-Generation Techniques and Tools for Avoidance and Obfuscation; Summary; References , Chapter 10: Examples of Compromise and Presence of Subversive Multivector Threats , English
    Additional Edition: ISBN 1-59749-613-8
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    almahu_9949697652202882
    Format: 1 online resource (249 p.)
    Edition: 1st edition
    ISBN: 1-283-85226-8 , 1-59749-954-4
    Content: Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide links from the authors, commentary and updates.
    Note: Description based upon print version of record. , Half Title; The Hacker's Guide to OS X; Copyright; Contents; Foreword; 1 Introduction; Why You are Reading This Book?; What is Contained Within the Guide?; Chapter 1: The Introduction; Chapter 2: OS History; Chapter 3: The Filesystem; Chapter 4: Footprinting OSX; Chapter 5: Application and System Vulnerabilities; Chapter 6: Defensive Applications; Chapter 7: Offensive Tactics; Chapter 8: Reverse Engineering; Chapter 9: Mobile Platforms; Chapter 10: Tips, Tricks, and the Future; The Path Ahead; Reference; 2 History and Introduction to OSX; History and Introduction to OSX; OSX Origins , A Byte of HistoryPowerPC Architecture and Transition to Intel; Firmware-EFI; File System-HFS+; Common Misconceptions; Better for Designers/Creative People; Secure; Perceptions; Capabilities; Environments Leveraging OSX; Home; Business; Security; Virtualization; Mobile Expansion; Appstore; What Next?; 3 The Filesystem; Introduction; What is a File System?; The Difference Between Memory Types; Partition Tables; Identifying GUIDs; Booting; Master Boot Records; Blessed be Thy Volume; Booting from the Network; Working up to HFS+; How a File System Works; File System Addressing; Disk Fragmentation , The File System ForefathersFile System Layouts; Hierarchical File System (circa 1985); Microsoft File Systems; HFS Plus; Journaled HFS; MetaData; Understanding Forks; Data Forks; Resource Forks; Named Forks; Fiddling with the File System; Playing with Attributes; Hidden Files; Conclusion; 4 Footprinting OSX; Introduction; Off the Client; On the Client; Conclusion; 5 Application and System Vulnerabilities; Introduction; Understanding Vulnerabilities; Vulnerabilities are Equal Opportunity; Media Layers; Host Layers; History of Vulnerabilities in Apple Products; Mac OS X Specific , A Recent Example-FlashbackHow it Works; Understanding Apple's Security Response; Apple iOS Specific; Keeping it Under Control; Advanced Persistent Threats; Apple Script; Conclusion; 6 Defensive Applications; Introduction; Secure Configurations; Passwords, Passphrases, and Multi-Factor Authentication; Account Access Restriction; FileVault; Firewall Configuration; Network Services; Kernel Extension Removal; Examining Commercial Tools; PrivacyScan by SecureMac; MacScan by SecureMac; Conclusion; 7 Offensive Tactics; Introduction; The Exploits; mDNSResponder UPnP Location Exploit , Using the Ammo in the WeaponMS08-067 "Old reliable"; Web Exploits; Physical Attacks; Data Gathering and Extraction; Summary; References; 8 Reverse Engineering; Introduction; The Basics; Coding; Decompiling Journey; CPU Registers; Memory Monster; Assembly Time; Ripping It Apart; Taking It Home; Analysis Techniques; Summary; References; 9 Mobile Platforms; Introduction; Apple iOS Security Model and Overview; Insecurity Overview; Jailbreakme.com; ROP and Jailbreakme.com; redsn0w; Charlie Miller and Nitro; Safari JavaScript Vulnerability; Remote Attack Scenario; The Goods , Please Don't Hurt My Toys , English
    Additional Edition: ISBN 1-59749-950-1
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Book
    Book
    Frankfurt am Main :Suhrkamp,
    UID:
    almafu_BV043704998
    Format: 305 S.
    Edition: 12. Aufl.
    ISBN: 978-3-518-28058-4
    Series Statement: Suhrkamp-Taschenbuch Wissenschaft
    Uniform Title: Speech acts
    Note: Aus dem Engl. übers.
    Language: German
    Subjects: Comparative Studies. Non-European Languages/Literatures , Philosophy
    RVK:
    RVK:
    Keywords: Referenz ; Sprechakttheorie ; Sprechakt ; Depression ; Hochschulschrift ; Hochschulschrift
    Author information: Searle, John R. 1932-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    kobvindex_VBRD-i97838354074730239
    Format: 239 S. : zahlr. Ill.
    ISBN: 9783835407473
    Language: German
    Keywords: Bildband ; Bildband
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages