feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Book
    Book
    Bosten [u.a.] : Addison-Wesley
    UID:
    b3kat_BV039911125
    Format: XXVII, 242 S.
    ISBN: 0321268539
    Series Statement: Addison-Wesley information technology series
    Language: Undetermined
    Keywords: Shareware ; Open Source
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV042481076
    Format: 1 v.
    ISBN: 9781849283595
    Language: English
    Keywords: Cloud Computing
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    gbv_094749582
    Format: S. 267 - 289 , Ill
    Series Statement: Bulletin/Bureau of American Ethnology 189
    Language: Undetermined
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    gbv_754883701
    Format: Online-Ressource (419 p) , illustrations, maps, tables
    Edition: Online-Ausg. Chester, Vt NewsBank, inc 2008 U.S. Congressional Serial Set, 1817-1980
    Series Statement: United States congressional serial set serial set no. 12478
    Note: Archeological investigations at the Hickey Brothers site (39LM4), Big Bend Reservoir, Lyman County, South Dakota, by Warren W. Caldwell, Lee G. Madison and Bernard Golden, p. 267 , Archeological investigations at the Hosterman site (39PO7), Oahe Reservoir area, Potter County, South Dakota, 1956, by Carl F. Miller, p. 139 , Archeological investigations in the Toronto Reservoir area, Kansas, by James H. Howard, p. 319 , Index, p. 393 , Table of contents, p. VII , The Demery site (39CO1), Oahe Reservoir area, South Dakota, by Alan R. Woolworth and W. Raymond Wood, p. 67 , The Good Soldier site (39LM238), Big Bend Reservoir, Lyman County, South Dakota, by Robert W. Neuman, p. 291 , The Paul Brave site (32SI4), Oahe Reservoir area, North Dakota, by W. Raymond Wood and Alan R. Woolworth, p. IX , © 2008 by NewsBank, Inc. All rights reserved
    Language: English
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Oxford ; : Oxford University Press,
    UID:
    almahu_9948311772702882
    Format: ix, 325 p. : , ill.
    Edition: Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Hoboken, N.J. :John Wiley & Sons, Inc.,
    UID:
    almahu_9948318891602882
    Format: xiv, 364 p. : , ill. (some col.).
    Edition: Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
    Series Statement: --For dummies
    Note: "A Wiley brand." , Includes index. , pt. I. Getting started with AWS -- pt. II. Diving into AWS offerings -- pt. III. Using AWS -- pt. IV. The part of tens.
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Book
    Book
    Pizo : Edistudio
    UID:
    gbv_1886274177
    Format: 137 pages , 21 cm
    Edition: eldono de la jubileo esperanto 1887-1987
    Language: Esperanto
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Ely, Cambridgeshire :IT Governance Publishing,
    UID:
    almafu_9959239622902883
    Format: 1 online resource (297 p.)
    Edition: 1st edition
    ISBN: 1-62870-011-4 , 1-84928-361-3 , 1-299-46849-7 , 1-84928-360-5
    Content: Cloud Computing: Assessing the risks answers these questions and many more. Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing.
    Note: Description based upon print version of record. , What others are saying about this book; Foreword; About the Authors; Acknowledgements; Contents; Chapter 1: Cloud Computing Explained; The potential of Cloud Computing; Cloud Computing defined; Cloud Computing deployment models; Cloud Computing service models; Discussion of each service model; Key characteristics of Cloud Computing; Characteristic One: On-demand self-service; Implications of Characteristic One; Characteristic Two: Broad network access; Implications of Characteristic Two; Characteristic Three: Resource pooling; Implications of Characteristic Three , Characteristic Four: Rapid elasticityImplications of Characteristic Four; Characteristic Five: Measured service; Implications of Characteristic Five; Summary of Cloud Computing characteristics; Cloud Computing definition summary; What The New York Times tells us about Cloud Computing; Chapter 2: How Cloud Computing Changes Security, Governance, Risk and Compliance; Relationship between security, compliance and risk; Understanding the trust boundary; Governance, compliance and risk in a Cloud environment; Security in a Cloud Computing environment; The challenge of dynamism , The challenge of a shared environmentThe challenge of security deperimeterisation; Cloud security challenges summary; Conclusion; Chapter 3: Governance of Cloud Computing; Which governance framework is right for Cloud?; Role of the service catalogue; Dude, where's my server? (The need for policy management); Conclusion; Additional resources; Chapter 4: Cloud Computing Top Security Risks; Security - the shift from static to dynamic; Breakdown of security assumptions; Facility: Cloud provider responsibility; Facility physical infrastructure: Cloud provider responsibility , Facility computing infrastructure: Cloud provider responsibilityComputing hardware infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud provider responsibility; Computing software infrastructure: Cloud user responsibility; Operating system; Middleware; Application code; Other application components; Templates; Licensing; Conclusion; Chapter 5: Assessing Security in the Cloud; Assessing Cloud security; Peeking below the trust boundary; The challenge of evaluation; Role of certification; Certifications and audits; How certifications work , Dealing with multiple compliance standardsCloud Security Alliance; Leveraging the CSA; Overview of the CAI and CCM; Mapping the CAI and CCM to the security stack; Conclusion; Chapter 6: Cloud Computing Application Security; Identity management and role-based access controls; User identity management; Administrator identity management; Identity management conclusion; Network security; Network security conclusion; Data security; Data security conclusion; Instance security; Firewall; System services; Vulnerability assessment/penetration testing , Intrusion detection system/intrusion prevention system , English
    Additional Edition: ISBN 1-84928-359-1
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    almafu_BV041105547
    Format: 26 Bl.
    Series Statement: Linguistische Berichte / LB-Papier 61
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Oxford ; : Oxford University Press,
    UID:
    almafu_9959236927402883
    Format: ix, 325 p. : , ill.
    Edition: 1st ed.
    ISBN: 0-19-773567-3 , 0-19-518426-2 , 1-280-50253-3 , 1-60256-783-2 , 0-19-972858-5
    Series Statement: Oxford scholarship online
    Content: Geared towards parents and teachers, this highly readable book is full of practical information and clear step-by-step guidelines. The author teaches how to study our own experience of anger, and to detect anger in our children and teens who may not recognize the emotion in themselves.
    Note: Includes index. , Previously issued in print: 2003. , Intro -- Contents -- Acknowledgments -- Introduction -- I: Understanding and Recognizing Anger in Children and Teens -- 1 The Key Component for Anger Management: Your Relationship with Your Child -- 2 Guiding Principles of Healthy Anger -- 3 The Adverse Effects of Anger -- 4 A Comprehensive View of Anger -- 5 How Children and Teens Express Anger -- II: How to Apply the Model of Anger with Your Child or Teen -- 6 General Guidelines for Using the Model of Anger -- 7 Identifying Emotions Associated with Anger -- 8 Identifying and Confronting Self-talk Based on "Child Logic" -- 9 What Does Your Child Really Want or Need? -- 10 Making Sense of Anger in the World Around Us -- 11 Relaxation: A Primary Task in Managing Anger -- 12 I Need to Think About It -- 13 Okay, I'm Ready to Talk About It -- 14 Acceptance and Forgiveness -- III: Special Considerations -- 15 Rewarding Behaviors -- 16 Responding to Escalating Anger -- 17 Anger, Hostility, and Aggression: The Need for Special Support -- Conclusion -- Notes -- Resources / Movies / Publications / Bibliography -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- R -- S -- T -- U -- V -- W. , English
    Additional Edition: ISBN 0-19-515657-9
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages