Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Brandenburg  (3)
  • Berlin International  (2)
  • F.-Ebert-Stiftung  (1)
  • Licensed  (3)
  • 1
    Online Resource
    Online Resource
    London :[Verlag nicht ermittelbar], ; Jahrgang 1, Nummer 1 (9. Januar 1888)-Nummer 39358 (30. Dezember 2016)
    UID:
    almafu_BV037321776
    Format: Online-Ressource.
    Edition: Digital. Ausg. London Gale, a Cengage Company Gale primary sources
    Note: Gesehen am 19.11.2021. - Die Nationallizenz umfasst den Zeitraum von 1888-2006. - Reproduktion , The Financial Times began as a City of London news sheet and grew to become one of the best-known and most-respected newspapers in the world. Along the way, the Financial Times - printed on its distinctive salmon-colored paper - has chronicled the critical financial and economic events that shaped the world, from the late nineteenth and entire twentieth centuries to today. This historical archive is a comprehensive, accurate, and unbiased research tool for those studying economic and business history and current affairs of the last 120 years. Initially focused on the global financial and economic issues that were to become the predominant forces of the twentieth century, the Financial Times expanded coverage in the postwar years, reporting on topics such as industry, energy, and international politics. In more recent decades, coverage of management, personal finance, and the arts has been added.An online, fully searchable facsimile, the Financial Times Historical Archive delivers the complete run of the London edition of this internationally known daily paper, from its first issue through 2010 (part 1) and through 2016 (part 2). Every article, advertisement, and market listing is included - shown both individually and in the context of the full page and issue of the day. , Periodizität: 6x wöchentl.
    Additional Edition: Elektronische Reproduktion von Financial times London ISSN 0307-1766
    Additional Edition: Elektronische Reproduktion von Financial times / Europe. Europe London
    Additional Edition: Elektronische Reproduktion von FT magazine
    Additional Edition: Elektronische Reproduktion von How to spend it Wien
    Language: English
    Keywords: Finanzwirtschaft ; Wirtschaftswissenschaften ; Politik ; Datenbank ; Zeitung ; Datenbank ; Zeitung ; Datenbank ; Zeitung ; searchable full text ; Datenbank ; Zeitung ; Zeitschrift ; Online-Ressource ; Zeitschrift
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9949301482702882
    Format: 1 online resource (263 pages)
    ISBN: 9781430265726
    Note: Intro -- Contents at a Glance -- Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: Cyber Security in the Mobile Age -- Three Pillars of Mobile Computing -- Power Efficiency -- Internet Connectivity -- Security -- BYOD -- Incident Case Study -- eBay Data Breach -- Target Data Breach -- OpenSSL Heartbleed -- Key Takeaways -- Strong Authentication -- Network Management -- Boot Integrity -- Hardware-Based Protection -- Open-Source Software Best Practice -- Third-Party Software Best Practice -- Security Development Lifecycle -- Assessment -- Architecture -- Design -- Implementation -- Deployment -- Interface Testing -- Penetration Testing -- CVSS -- Limitations -- References -- Chapter 2: Intel's Embedded Solutions: from Management to Security -- Management Engine vs. Intel AMT -- Intel AMT vs. Intel vPro Technology -- Management Engine Overview -- Hardware -- Overlapped I/O -- Firmware -- Software -- Platform and System Management -- Software Solutions -- Hardware Solutions -- In-Band Solutions -- Out-of-Band Solutions -- Intel AMT Overview -- BIOS Extension -- Local Management Service and Tray Icon -- Remote Management -- The Engine's Evolvement: from Management to Security -- Embedded System as Security Solution -- Security Applications at a Glance -- EPID -- PAVP -- IPT -- Boot Guard -- Virtual Security Core: ARM TrustZone -- Secure Mode and Nonsecure Mode -- Memory Isolation -- Bus Isolation -- Physical Isolation vs. Virtual Isolation -- References -- Chapter 3: Building Blocks of the Security and Management Engine -- Random Number Generation -- Message Authentication -- Hash with Multiple Calls -- Symmetric-Key Encryption -- AES -- DES/3DES -- Asymmetric-Key Encryption: RSA -- Key Pair Generation and Validation -- Encryption and Decryption -- Digital Signature -- RSA -- ECDSA. , Key Pair Generation and Validation -- Scalar Multiplication -- Window Method -- Dual Scalar Multiplication -- Hardware Acceleration -- Other Cryptography Functions -- Secure Storage -- Debugging -- Debug Messaging -- Special Production-Signed Firmware Based on Unique Part ID -- Secure Timer -- Host-Embedded Communication Interface -- Direct Memory Access to Host Memory -- References -- Chapter 4: The Engine: Safeguarding Itself before Safeguarding Others -- Access to Host Memory -- Communication with the CPU -- Triggering Power Flow -- Security Requirements -- Confidentiality -- Integrity -- Availability -- Threat Analysis and Mitigation -- Load Integrity -- Memory Integrity -- Memory Encryption -- Task Isolation -- Asset Protection -- Memory Manager -- Thread Manager -- Memory Protection Control -- Loader -- Inter-Task Call Management -- Exception Handler -- Nonprivileged Tasks -- Firmware Update and Downgrade -- Published Attacks -- "Introducing Ring -3 Rootkits " -- References -- Chapter 5: Privacy at the Next Level: Intel's Enhanced Privacy Identification (EPID) Technology -- Redefining Privacy for the Mobile Age -- Passive Anonymity -- Active Anonymity -- Processor Serial Number -- EPID -- Key Structures and Provisioning -- Revocation -- Private Key-Based Revocation -- Signature-Based Revocation -- Group-Based Revocation -- Signature Generation and Verification -- Signature Generation -- Base Name -- Signature Verification -- SIGMA -- Verifier's Certificate -- Messages Breakdown -- Implementation of EPID -- Key Recovery -- Attack Mitigation -- Applications of EPID -- Next Generation of EPID -- Two-way EPID -- Optimization -- References -- Chapter 6: Boot with Integrity, or Don't Boot -- Boot Attack -- Evil Maid -- BIOS and UEFI -- BIOS Alteration -- Software Replacement -- Jailbreaking -- Trusted Platform Module (TPM). , Platform Configuration Register -- Field Programmable Fuses -- Field Programmable Fuses vs. Flash Storage -- Field Programmable Fuse Task -- Intel Boot Guard -- Operating System Requirements for Boot Integrity -- OEM Configuration -- Measured Boot -- Verified Boot -- Manifests -- Verification Flow -- References -- Chapter 7: Trust Computing, Backed by the Intel Platform Trust Technology -- TPM Overview -- Cryptography Subsystem -- Storage -- Endorsement Key -- Attestation -- Binding and Sealing -- Intel Platform Trust Technology -- Cryptography Algorithms -- Endorsement Key Storage -- Endorsement Key Revocation -- Endorsement Certificate -- Supporting Security Firmware Applications -- Integrated vs. Discrete TPM -- References -- Chapter 8: Unleashing Premium Entertainment with Hardware-Based Content Protection Technology -- Rights Protection -- DRM Schemes -- Device Key Management -- Rights Management -- Playback -- UltraViolet -- End-to-End Content Protection -- Content Server -- License Server -- Software Stack -- External Display -- Weak Points -- Intel's Hardware-Based Content Protection -- Protected Audio and Video Path (PAVP) -- Device Key Provisioning -- Rights Management -- Intel Wireless Display -- Authentication and Key Exchange -- Content Protection on TrustZone -- References -- Chapter 9: Breaking the Boundaries with Dynamically Loaded Applications -- Closed-Door Model -- DAL Overview -- DAL Architecture -- Loading an Applet -- Secure Timer -- Host Storage Protection -- Security Considerations -- Reviewing and Signing Process -- References -- Chapter 10: Intel Identity Protection Technology: the Robust, Convenient, and Cost-Effective Way to Deter Identity Theft -- One-Time Password -- HOTP -- TOTP -- Transaction Signing -- OTP Tokens -- Embedded OTP and OCRA -- Token Installation -- TOTP and OCRA Generation -- Highlights and Lowlights. , Protected Transaction Display -- Drawing a Sprite -- Gathering the User's PIN Input -- Firmware Architecture -- Embedded PKI and NFC -- References -- Chapter 11: Looking Ahead: Tomorrow's Innovations Built on Today's Foundation -- Isolated Computing Environment -- Security-Hardening Measures -- Basic Utilities -- Anonymous Authentication and Secure Session Establishment -- Protected Input and Output -- Dynamic Application Loader -- Summary of Firmware Ingredients -- Software Guard Extensions -- More Excitement to Come -- References -- Index.
    Additional Edition: Print version: Ruan, Xiaoyu Platform Embedded Security Technology Revealed Berkeley, CA : Apress L. P.,c2014 ISBN 9781430265719
    Language: English
    Keywords: Electronic books. ; Electronic books ; Electronic books. ; Electronic books.
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    gbv_1045302481
    Format: 1 online resource (220 pages)
    ISBN: 9781351018258
    Series Statement: Routledge Research in Race and Ethnicity Ser.
    Content: Cover -- Half Title -- Series -- Title -- Copyright -- Dedication -- Contents -- Acknowledgments -- List of figures -- Introduction -- Part I Before the crash -- 1 The trickster in the north: in the world of colonizers and colonized -- 2 The Colonial Exhibition in Tivoli: racism and colonial others -- 3 The desire to become modern: forging of the Icelandic subject -- 4 The big bite: the economic miracle in Iceland -- 5 Warehouse of cultural scenarios: creating the new Icelandic character -- 6 Probably the best in the world? engaging with Iceland's colonial past -- Part II After the crash -- 7 The fall from the top of the world: the economic crash in 2008 -- 8 Even McDonald's has left us: the hierarchies of nations -- 9 The iceberg drifting in the sea: creating a sense of national identity during times of crisis -- 10 The exceptional island in a world of crisis: reimaging iceland as exceptional -- 11 All's well that ends well: the aftermath of the crash -- References -- Index.
    Note: Description based on publisher supplied metadata and other sources
    Additional Edition: ISBN 9781138497603
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781138497603
    Language: English
    Keywords: Electronic books
    URL: Volltext  (lizenzpflichtig)
    URL: FULL  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean the beat times?
Did you mean the best tides?
Did you mean the best temes?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages