feed icon rss

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Charité  (15)
  • SB Finsterwalde  (1)
  • Landeshauptarchiv Brandenburg
  • 2005-2009  (16)
Medientyp
Sprache
Region
Bibliothek
Erscheinungszeitraum
Jahr
Fachgebiete(RVK)
  • 1
    UID:
    almahu_9948026294102882
    Umfang: 1 online resource (969 p.)
    ISBN: 1-4160-6531-8
    Inhalt: The only physical rehabilitation text modeled after the concepts of the APTA's Guide to Physical Therapist Practice, 2nd Edition, this detailed resource provides the most complete coverage of rehabilitation across the preferred practice patterns of physical therapy all in one place! Each chapter is consistently organized to make it easy to find the information you need, with clear guidelines, examples, and summaries based on the latest clinical evidence to help you improve quality of care and ensure positive patient outcomes.In-depth, evidence-based coverage of more key content areas than any
    Anmerkung: Description based upon print version of record. , Front Cover; Physical Rehabilitation: Evidence-Based Examination, Evaluation, and Intervention; Copyright Page; Contributors; Preface; Acknowledgments; Table of Contents; Chapter1. Introduction; PHYSICAL REHABILITATION; DISABLEMENT MODELS; THE GUIDE TO PHYSICAL THERAPIST PRACTICE; STRUCTURE OF THIS BOOK; CHAPTER SUMMARY; ADDITIONAL RESOURCES; GLOSSARY; References; Chapter2. Evidence-Based Practice; DEFINING EVIDENCE-BASED PRACTICE; APPLYING EVIDENCE-BASED PRACTICE TO REHABILITATION; FINDING REHABILITATION EVIDENCE; CHAPTER SUMMARY; ADDITIONAL RESOURCES; GLOSSARY; References , PART 1: Musculoskeletal SystemChapter3. Skeletal Demineralization; PATHOLOGY; EXAMINATION; EVALUATION, DIAGNOSIS, AND PROGNOSIS; INTERVENTION; CHAPTER SUMMARY; ADDITIONAL RESOURCES; GLOSSARY; References; Chapter4. Posture; IDEAL ALIGNMENT; FORCES AFFECTING POSTURE; PATHOLOGY; EXAMINATION; EVALUATION, DIAGNOSIS, AND PROGNOSIS; INTERVENTION; CHAPTER SUMMARY; ADDITIONAL RESOURCES; GLOSSARY; References; Chapter5. Muscle Weakness; MUSCLE STRUCTURE; PATHOLOGY; EXAMINATION; EVALUATION, DIAGNOSIS, AND PROGNOSIS; INTERVENTION; CHAPTER SUMMARY; ADDITIONAL RESOURCES; GLOSSARY; References , Chapter6. Connective Tissue DysfunctionPATHOLOGY; EXAMINATION; EVALUATION, DIAGNOSIS, AND PROGNOSIS; INTERVENTION; CHAPTER SUMMARY; ADDITIONAL RESOURCES; GLOSSARY; References; Chapter7. Localized Inflammation; PATHOLOGY; EXAMINATION; EVALUATION, DIAGNOSIS, AND PROGNOSIS; INTERVENTION; CHAPTER SUMMARY; ADDITIONAL RESOURCES; GLOSSARY; References; Chapter9. Fractures; NORMAL BONE; PATHOLOGY; EXAMINATION; EVALUATION, DIAGNOSIS, AND PROGNOSIS; INTERVENTION; CHAPTER SUMMARY; ADDITIONAL RESOURCES; GLOSSARY; Reference; Chapter10. Joint Arthroplasty; PATHOLOGY; EXAMINATION , EVALUATION, DIAGNOSIS, AND PROGNOSISINTERVENTION; CHAPTER SUMMARY; ADDITIONAL RESOURCES; GLOSSARY; References; Chapter11. Soft Tissue Surgery; PATHOLOGY; EXAMINATION; EVALUATION, DIAGNOSIS, AND PROGNOSIS; INTERVENTION; CHAPTER SUMMARY; ADDITIONAL RESOURCES; GLOSSARY; References; Chapter12. Amputations and Prostheses; PATHOLOGY; EXAMINATION; EVALUATION, DIAGNOSIS, AND PROGNOSIS; INTERVENTION; CHAPTER SUMMARY; ADDITIONAL RESOURCES; GLOSSARY; References; PART 2: Neuromuscular System; Chapter13. Balance and Fall Risk; PATHOLOGY; EXAMINATION; EVALUATION, DIAGNOSIS, AND PROGNOSIS; INTERVENTION , CHAPTER SUMMARYADDITIONAL RESOURCES; GLOSSARY; References; Chapter14. Impaired Neuromotor Development; INTRODUCTION; EXAMINATION; CHAPTER SUMMARY; ADDITIONAL RESOURCES; GLOSSARY; References; Chapter15. Pediatric Nonprogressive Central Nervous System Disorders; CEREBRAL PALSY; PATHOLOGY; EXAMINATION; EVALUATION, DIAGNOSIS, AND PROGNOSIS; MEDICAL AND SURGICAL INTERVENTION FOR CHILDREN WITH CEREBRAL PALSY; SPINAL DYSRAPHISM; PATHOLOGY; EXAMINATION; EVALUATION, DIAGNOSIS, AND PROGNOSIS; REHABILITATION INTERVENTION FOR CHILDREN WITH CEREBRAL PALSY AND MYELOMENINGOCELE; CHAPTER SUMMARY , ADDITIONAL RESOURCES , English
    Weitere Ausg.: ISBN 0-7216-0361-0
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Rockland, MA :Syngress Publishing,
    UID:
    almahu_9948025244802882
    Umfang: 1 online resource (769 p.)
    Ausgabe: 1st edition
    ISBN: 1-281-07298-2 , 9786611072988 , 0-08-050284-9
    Inhalt: Juniper Networks family of NetScreen and SSG Firewalls are second only to Cisco in worldwide unit sales. These devices are becoming increasingly sophisticated as threats to networks continue to grow exponentially. This is the essential reference for any IT professional responsible for configuring and managing the devices.Configuring Juniper Networks NetScreen & SSG Firewalls is the only complete reference to this family of products. It covers all of the newly released features of the product line as highlighted by Juniper Networks, including: Deep Inspection firewall extends s
    Anmerkung: Includes index. , Front Cover; Configuring Juniper® Networks NetScreen® & SSG Firewalls Configuring; Copyright Page; Contents; Foreword; Chapter 1. Networking, Security, and the Firewall; Introduction; Understanding Networking; Understanding Security Basics; Understanding Firewall Basics; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Dissecting the Juniper Firewall; Introduction; The Juniper Security Product Offerings; The Juniper Firewall Core Technologies; The NetScreen and SSG Firewall Product Line; Summary; Solutions Fast Track; Frequently Asked Questions , Chapter 3. Deploying Juniper FirewallsIntroduction; Managing Your Juniper Firewall; Configuring Your Firewall for the Network; Configuring System Services; Resources; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Policy Configuration; Introduction; Firewall Policies; Policy Components; Creating Policies; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Advanced Policy Configuration; Introduction; Traffic-Shaping Fundamentals; Deploying Traffic Shaping on Juniper Firewalls; Advanced Policy Options; Summary; Solutions Fast Track , Frequently Asked QuestionsChapter 6. User Authentication; Introduction; User Account Types; Policy-Based User Authentication; 802.1x Authentication; Enhancing Authentication; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Routing; Introduction; Virtual Routers; Static Routing; Routing Information Protocol; Open Shortest Path First; Border Gateway Protocol; Route Redistribution; Policy-Based Routing; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. Address Translation; Introduction; Overview of Address Translation; Juniper NAT Overview , Juniper Packet FlowSource NAT; Destination NAT; Summary; Links to Sites; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Transparent Mode; Introduction; Interface Modes; Understanding How Transport Mode Works; Configuring a Device to Use Transport Mode; Transparent Mode Deployment Options; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Attack Detection and Defense; Introduction; The Juniper Security Research Team; Understanding Attacks; Worms, Viruses, and Other Automated Malware; TCP/IP Protocol Anomaly Detection; Using Attack Objects; Antivirus Rules , Understanding Application Layer GatewaysKeeping Systems Updated; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 11. VPN Theory and Usage; Introduction; IPSec Tunnel Negotiations; Public Key Cryptography; How to Use VPNs in NetScreen Appliances; Advanced VPN Configurations; Summary; Solutions Fast Track; Links to Sites; Mailing Lists; Frequently Asked Questions; Chapter 12. High Availability; Introduction; The Need for High Availability; High-Availability Options; Improving Availability Using NetScreen SOHO Appliances; Introducing the NetScreen Redundancy Protocol , Building an NSRP Cluster , English
    Weitere Ausg.: ISBN 1-59749-118-7
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    Rockland, MA :Syngress Publishing,
    UID:
    almahu_9948026353202882
    Umfang: 1 online resource (737 p.)
    Ausgabe: 1st ed.
    ISBN: 1-281-05622-7 , 9781597490148 , 9786611056223 , 0-08-047678-3
    Inhalt: Configuring NetScreen Firewalls covers all of the aspects of Juniper's NetScreen product line, from devices to Enterprise NetScreen firewalls. Coverage includes basic policy creation and administration, advanced troubleshooting techniques, the NetScreen Security Manager and VPN configuration. In addition, this book covers both the WebUI and the command line interface of NetScreen ScreenOS 5.0. as well as the NetScreen Security Manager (NSM). As a special bonus, Juniper Networks provides detailed coverage of the new features and enhancements included with ScreenOS 5.1.0.
    Anmerkung: Includes index. , ""Cover""; ""Contents""; ""Foreword""; ""Networking, Security, and the Firewall""; ""Dissecting the NetScreen Firewall""; ""Deploying NetScreen Firewalls""; ""Policy Configuration""; ""Advanced Policy Configuration""; ""User Authentication""; ""Routing""; ""Address Translation""; ""Transparent Mode""; ""Attack Detection and Defense""; ""VPN Theory and Usage""; ""Virtual Systems""; ""High Availability""; ""Troubleshooting the NetScreen Firewall""; ""Enterprise NetScreen Management""; ""ScreenOS 5.1.0 Enhancements and New Features""; ""Index""; ""Related Titles""
    Weitere Ausg.: ISBN 1-932266-39-9
    Weitere Ausg.: ISBN 1-59749-014-8
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    UID:
    almafu_BV021503090
    Umfang: xvii, 430 S. : , Ill.
    ISBN: 1-59385-256-8
    Anmerkung: Includes bibliographical references and index
    Sprache: Englisch
    Fachgebiete: Psychologie
    RVK:
    Schlagwort(e): Posttraumatisches Stresssyndrom ; Psychotherapie ; Katastrophe ; Psychisches Trauma ; Krisenintervention ; Aufsatzsammlung
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    UID:
    kobvindex_VBRD-baxflodidrscve37münbued
    Umfang: 1 DVD ; Gesamtspiellänge : ca. 95 min
    Inhalt: Justus Jonas, Peter Shaw und Bob Andrews fällt in Rocky Beach ein Videoband in die Hände, auf dem eine verschlüsselten Botschaft zu einem besonders vertrackten Rätsel und einem verfluchten Schloss übermittelt wird. Die drei ??? machen sich unverzüglich auf den Weg zu dem verlassenen Anwesen des verrückten Erfinders Terrill. Dort soll es spuken! Obwohl Justus, Peter und Bob schon viele Gefahren gemeistert haben, müssen sie all ihren Mut zusammen nehmen, bevor sie in das gespenstische Gemäuer eintreten. Das Schloss scheint ein Eigenleben zu besitzen. Und es ist nicht erfreut über ungebetene Besucher, die sein Geheimnis lösen wollen. Für die drei ??? beginnt ein Abenteuer, das spannender und geheimnisvoller nicht sein könnte.
    Sprache: Deutsch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    UID:
    edoccha_9961075608502883
    Umfang: 1 online resource (xii, 264 pages, 1 unnumbered page) : , illustrations, maps ; , 28 cm
    Anmerkung: Title from title screen (viewed July 15, 2009) , "August 2007." , "NPS D-233"--P. [265]. , Mode of access: Internet from the NPS web site. Address as of 07/15/09: http://www.nps.gov/history/history/online_books/caha/caha_ah.pdf ; current access is available via PURL.
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Online-Ressource
    Online-Ressource
    Atlanta, Ga. :Cultural Resources, Southeast Region, National Park Service,
    UID:
    edoccha_9961075442202883
    Umfang: xii, 140 pages : , illustrations, map, plans ; , 28 cm
    Anmerkung: Title from title screen (viewed June 30, 2009) , "August 2008"-- P. [141]. , "NPS D-45"--P. [141]. , Mode of access: Internet from the NPS web site. Address as of 06/30/09: http://www.nps.gov/history/history/online_books/anjo/admin_history.pdf ; current access is available via PURL.
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Online-Ressource
    Online-Ressource
    [Place of publication not identified] :Pickel Partners Publishing,
    UID:
    edoccha_9961074598902883
    Umfang: 1 online resource (xi, 255 pages) : , illustrations, maps
    ISBN: 1-78289-531-0
    Anmerkung: Title from title screen (viewed on April 3, 2006). , Mode of access: Internet from the CGSC web site. Address as of 4/3/06: http://www.cgsc.army.mil/carl/download/csipubs/cameron.pdf; current access is available via PURL.
    Sprache: Englisch
    Schlagwort(e): Guidebooks. ; Guidebooks.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    UID:
    edoccha_9961078671102883
    Umfang: 1 online resource (2 unnumbered pages)
    Anmerkung: November 29, 2006. , "EPA-COUNCIL-07-001."
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Online-Ressource
    Online-Ressource
    Burlington, MA :Syngress Publishing,
    UID:
    edoccha_9960072687802883
    Umfang: 1 online resource (713 p.)
    Ausgabe: 1st edition
    ISBN: 1-281-76295-4 , 9786611762957 , 0-08-056019-9
    Inhalt: Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of ""live forensics,"" where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss ?live forensics? on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised
    Anmerkung: Includes index. , Front Cover; Malware Forensics: Investigating and Analyzing Malicious Code; Copyright Page; Dedication Page; Acknowledgements; Authors; Technical Editor; Contents; Introduction; Investigative And Forensic Methodologies; Forensic Analysis; Malware Analysis; From Malware Analysis To Malware Forensics; Chapter 1: Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System; Introduction; Building Your Live Response Toolkit; Testing and Validating your Tools; System/Host Integrity Monitoring; Volatile Data Collection Methodology; Preservation of Volatile Data , Full Memory CaptureFull Memory Acquisition on a Live Windows System; Collecting Subject System Details; System Date and Time; System Identifiers; Network Configuration; Enabled Protocols; System Uptime; System Environment; Identifying Users Logged into the System; Psloggedon; Quser (Query User Utility); Netusers; LogonSessions; Inspect Network Connections and Activity; Current and Recent Network Connections; Netstat; DNS Queries from the Host System; NetBIOS Connections; ARP Cache; Collecting Process Information; Process Name and Process Identification (PID); Temporal Context; Memory Usage , Process to Executable Program Mapping: Full System Path to Executable FileProcess to User Mapping; Child Processes; Command-line Parameters; File Handles; Dependencies Loaded by Running Processes; Exported DLLs; Capturing the Memory Contents of a Process on a Live Windows System; Correlate Open Ports with Running Processes and Programs; Openports; CurrPorts; Identifying Services and Drivers; Determining Open Files; Identifying Files Opened Locally; Identifying Files Opened Remotely; Collecting the Command History; Identifying Shares; Determining Scheduled Tasks; Collecting Clipboard Contents , Non-Volatile Data Collection from a Live Windows SystemForensic Duplication of Storage Media on a Live Windows System; Forensic Preservation of Select Data on a Live Windows System; Assess Security Configuration; Assess Trusted Host Relationships; Inspect Prefetch Files; Inspect Auto-starting Locations; Collect Event Logs; Review User Account and Group Policy Information; Examine the File System; Dumping and Parsing Registry Contents; Examine Web Browsing Activities; Incident Response Tool Suites for Windows; Windows Forensic Toolchest; ProDiscoverIR; OnlineDFS/LiveWire , Regimented Potential Incident Examination Report (RPIER)Nigilant32; Malware Discovery and Extraction From a Live Windows System; Nigilant32; Extracting Suspicious Files; Conclusions; Notes; Chapter 2: Malware Incident Response: Volatile Data Collection and Examination on a Live Linux System; Introduction; Volatile Data Collection Methodology; Incident Response Tool Suites for Linux; Full Memory Dump on a Live UNIX System; Preserving Process Memory on a Live UNIX System; Collecting Subject System Details; Identifying Users Logged into the System; Determining Network Connections and Activity , Collecting Process Information , English
    Weitere Ausg.: ISBN 1-59749-268-X
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz