feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Charité  (96)
  • Heinrich-Mann-Bibl. Strausberg  (2)
  • SB Forst (Lausitz)  (2)
  • HFS Ernst Busch  (1)
  • SB Senftenberg  (1)
Type of Medium
Language
Region
Library
Access
  • 1
    Online Resource
    Online Resource
    Cambridge :Cambridge University Press,
    UID:
    almahu_9947414631002882
    Format: 1 online resource (xi, 451 pages) : , digital, PDF file(s).
    ISBN: 9780511614217 (ebook)
    Content: This is a book about Kant's views on causality as understood in their proper historical context. Specifically, Eric Watkins argues that a grasp of Leibnizian and anti-Leibnizian thought in eighteenth-century Germany helps one to see how the critical Kant argued for causal principles that have both metaphysical and epistemological elements. On this reading Kant's model of causality does not consist of events, but rather of substances endowed with causal powers that are exercised according to their natures and circumstances. This innovative conception of Kant's view of causality casts a light on Kant's philosophical beliefs in general, such as his account of temporality, his explanation of the reconciliation of freedom and determinism, and his response to the skeptical arguments of Hume.
    Note: Title from publisher's bibliographic system (viewed on 05 Oct 2015). , Pre-established harmony versus physical influx -- , Kant's pre-critical theory of causality -- , Kant's second and third analogies of experience -- , Kant's model of causality -- , The metaphysics of freedom -- , Kant's reply to Hume : historical and contemporary considerations.
    Additional Edition: Print version: ISBN 9780521835671
    Language: English
    Subjects: Philosophy
    RVK:
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Cham :Springer International Publishing, | Cham :Palgrave Macmillan.
    UID:
    edoccha_BV048456726
    Format: 1 Online-Ressource (XVI, 464 p. 22 illus., 11 illus. in color).
    Edition: 1st ed. 2022
    ISBN: 978-3-031-04416-8
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-04415-1
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-04417-5
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-04418-2
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Book
    Book
    Berlin [u.a.] :Springer Spektrum,
    UID:
    almahu_BV039868299
    Format: XXIII, 1425 S. : , Ill., graph. Darst. ; , 27 cm.
    Edition: 2. Aufl.
    ISBN: 978-3-8274-2909-4 , 3-8274-2909-9
    Uniform Title: Microbiology
    Language: German
    Subjects: Biology
    RVK:
    Keywords: Mikrobiologie ; Mikrobiologe ; Lehrbuch
    Author information: Slonczewski, Joan L.
    Author information: Foster, John Watkins.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Book
    Book
    Berlin [u.a.] :Springer Spektrum,
    UID:
    almafu_BV039868299
    Format: XXIII, 1425 S. : , Ill., graph. Darst. ; , 27 cm.
    Edition: 2. Aufl.
    ISBN: 978-3-8274-2909-4 , 3-8274-2909-9
    Uniform Title: Microbiology
    Language: German
    Subjects: Biology
    RVK:
    Keywords: Mikrobiologie ; Mikrobiologe ; Lehrbuch
    Author information: Slonczewski, Joan L.
    Author information: Foster, John Watkins
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Cham :Palgrave Macmillan,
    UID:
    edoccha_BV047047470
    Format: 1 Online-Ressource (XIX, 524 Seiten).
    ISBN: 978-3-030-59840-2
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-59839-6
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-59841-9
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-59842-6
    Language: English
    Keywords: Islamische Bank ; Kapitalismus
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Book
    Book
    Ann Arbor, Mich. :Ann Arbor Science,
    UID:
    almafu_BV003276950
    Format: IX, 174 S.
    ISBN: 0-250-40154-1
    Language: English
    Subjects: Psychology , Sociology
    RVK:
    RVK:
    Keywords: Techniksoziologie ; Technikbewertung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    New York :Routledge,
    UID:
    almahu_BV043106573
    Format: 1 Online-Ressource (viii, 164 pages).
    ISBN: 0-203-90634-9 , 978-0-203-90634-7 , 0-203-90510-5 , 978-0-203-90510-4 , 978-0-415-92911-0 , 0-415-92911-3 , 978-0-415-92913-4 , 0-415-92913-X , 0-203-90603-9 , 978-0-203-90603-3
    Note: Making the personal political : class in the family -- - Coming to class consciousness -- - Class and the politics of living simply -- - Money hungry -- - Politics of greed -- - Being rich -- - Me-me class : the young and the ruthless -- - Class and race : the new black elite -- - Feminism and class power -- - White poverty : the politics of invisibility -- - Solidarity with the poor -- - Class claims : real estate racism -- - Crossing class boundaries -- - Living without class hierarchy. - Drawing on both her roots in Kentucky and her adventures with Manhattan coop boards, bell hooks provides a successful black woman's reflection, personal, straightforward, and rigorously honest on how our dilemmas of class and race are intertwined, and how we can find ways to think beyond them."--Page [4] of cover
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-0-415-92913-4
    Language: English
    Subjects: Comparative Studies. Non-European Languages/Literatures , Political Science , Ethnology , English Studies , Sociology
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Schwarze Frau ; Arbeiterklasse ; Wirtschaftliche Lage ; Soziale Situation ; Klassengesellschaft ; Armut ; Ausgrenzung ; Rassenfrage ; Rassismus ; Arbeiterklasse ; Soziale Situation ; Ausgrenzung ; Rassismus ; Sexismus ; Kapitalismus ; Klassengesellschaft ; Soziale Klasse ; 1952-2021 hooks, bell ; Autobiografie
    Author information: hooks, bell, 1952-2021.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    almahu_9949348532702882
    Format: 1 online resource (X, 131 p. 7 illus.)
    Edition: 1st ed. 2018.
    ISBN: 94-024-1251-4
    Series Statement: Mobile Communication in Asia: Local Insights, Global Implications,
    Content: This book offers a detailed account of a range of mHealth initiatives across South, Southeast and East Asia. It provides readers with deep insights into the challenges such initiatives face on the ground, and a view of the diverse cultural contexts shaping strategies for overcoming these challenges. The book brings together various discussions on the broader mHealth literature, and demonstrates how a research focus on diverse Asian contexts influences the success and/or failure of current mHealth initiatives. It also highlights the important roles social scientists can play in advancing theoretical approaches, as well as planning, implementing and evaluating mHealth initiatives. The book is a valuable resource for project planners, policy developers in NGOs and government institutions, as well as academics, researchers and students in the fields of public health, communications and development studies. This book is open access under a CC BY license.
    Note: Introduction to the Volume -- Section 1: Challenges -- Chapter 1: Barriers to informal mHealth adoption by community health workers in regional Indonesia -- Chapter 2: Take care of your health, this is what the Qur’an said - The use of mobile phone among poor rural women with Type-2 Diabetes in Central Java, Indonesia -- Chapter 3: One size does not fit all - The importance of contextually sensitive mHealth strategies for frontline female health workers -- Chapter 4: Chinese Consumers’ Perceptions and Interpretations of Fitness Mobile Apps: Qualitative Insights -- Section 2: Strategies -- Chapter 5: The Path to Scale: Navigating design, policy and infrastructure -- Chapter 6: mHealth, health and mobility - A culture-centered interrogation -- Afterword. , English
    Additional Edition: ISBN 94-024-1250-6
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    almahu_9949697639102882
    Format: 1 online resource (481 p.)
    Edition: 1st edition
    ISBN: 1-281-27977-3 , 9786611279776 , 0-08-050774-3 , 1-59749-145-4
    Content: This book looks at network security in a new and refreshing way. It guides readers step-by-step through the ""stack"" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer: The people layer. This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attacker's exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers th
    Note: Includes index. , Front Cover; Hack The Stack: Using Snort and Ethereal to Master The 8 Layers of an Insecure Network; Copyright Page; Contents; Foreword; Chapter 1. Extending OSI to Network Security; Introduction; Our Approach to This Book; Common Stack Attacks; Mapping OSI to TCP/IP; The Current State of IT Security; Using the Information in This Book; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. The Physical Layer; Introduction; Defending the Physical Layer; Attacking the Physical Layer; Layer 1 Security Project; Summary; Solutions Fast Track; Frequently Asked Questions , Chapter 3. Layer 2: The Data Link LayerIntroduction; Ethernet and the Data Link Layer; Understanding PPP and SLIP; Working with a Protocol Analyzer; Understanding How ARP Works; Attacking the Data Link Layer; Defending the Data Link Layer; SecuringYour Network from Sniffers; Employing Detection Techniques; Data Link Layer Security Project; Using the Auditor Security Collection to Crack WEP; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Layer 3: The Network Layer; Introduction; The IP Packet Structure; The ICMP Packet Structure; Attacking the Network Layer , Defending the Network LayerNetwork Layer Security Project; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Layer 4: The Transport Layer; Introduction; Connection-Oriented versus Connectionless Protocols; Protocols at the Transport Layer; The Hacker's Perspective; Scanning the Network; Operating System Fingerprinting; Detecting Scans on Your Network; Defending the Transport Layer; Transport Layer Project-Setting Up Snort; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Layer 5: The Session Layer; Introduction; Attacking the Session Layer , Defending the Session LayerSession Layer Security Project; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Layer 6: The Presentation Layer; Introduction; The Structure of NetBIOS and SMB; Attacking the Presentation Layer; Defending the Presentation Layer; Presentation Layer Security Project; Summary; Solutions Fast Track; Frequently Asked Questions; Notes; Chapter 8. Layer 7: The Application Layer; Introduction; The Structure of FTP; Analyzing Domain Name System and Its Weaknesses; Other Insecure Application Layer Protocols; Attacking the Application Layer , Defending the Application LayerNessus; Application-Layer Security Project: Using Nessus to Secure the Stack; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Layer 8: The People Layer; Introduction; Attacking the People Layer; Defending the People Layer; Making the Case for Stronger Security; People Layer Security Project; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix A. Risk Mitigation: Securing the Stack; Introduction; Physical; Data Link; Network; Transport; Session; Presentation; Application; People; Summary; Index , English
    Additional Edition: ISBN 1-59749-109-8
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almahu_9949577258702882
    Format: 1 online resource (xxiv, 71 pages) : , illustrations (some color)
    Edition: 1st ed.
    ISBN: 1-282-94042-2 , 9786612940422 , 0-8330-5027-3
    Series Statement: Rand Corporation monograph series
    Content: A critical question surrounding the withdrawal of U.S. forces from Iraq is Iraq's internal security and stability. Although the U.S. withdrawal plan is designed with care to avoid weakening Iraq's security, the end of U.S. occupation may alter the strategies of the main Iraqi political actors, each of which has enough armed power to be able to shatter Iraq's domestic peace. In view of the potential for insecurity in Iraq, the United States cannot afford to take a passive or reactive stance. To anticipate dangers and act purposefully, U.S. policy-makers need a dynamic analytic framework with which to examine the shifting motivations and capabilities of the actors that affect Iraq's security. This monograph offers such a framework.
    Note: "Prepared for the Office of the Secretary of Defense."--T.p. , "National Defense Research Institute." , Introduction -- Political and security conditions of U.S. withdrawal -- Future U.S. security responsibilities in Iraq. , English
    Additional Edition: ISBN 0-8330-4771-X
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages