49 resultater (0,31691 sekunder)

Mærke

Butik

Pris (EUR)

Nulstil filter

Produkter
Fra
Butikker

Animal-Assisted Brief Therapy - Terri Pichot - Bog - Taylor & Francis Ltd - Plusbog.dk

Diameter - Sebastien Decugis - Bog - John Wiley & Sons Inc - Plusbog.dk

Diameter - Sebastien Decugis - Bog - John Wiley & Sons Inc - Plusbog.dk

Presents the principles, design, development and applications of the Diameter protocol suite The Diameter protocol was born in the Internet Engineering Task Force (IETF) and designed to be a general-purpose Authentication, Authorization, and Accounting (AAA) protocol applicable to many network environments. This book is for everyone who wants to understand the Diameter protocol and its applications. This book explains the place Diameter holds in global telecommunication networks and teaches system architects and designers how to incorporate Diameter into their network environments. Diameter: New Generation AAA Protocol - Design, Practice and Applications begins by describing the foundation of Diameter step-by-step, starting with building blocks of the protocol, and progressing from a simple two-party exchange to a multi-party exchange involving complex routing. It discusses the motivation for using Diameter, talks about its predecessor, RADIUS, and introduces the open source Diameter implementation, freeDiameter. The book expands beyond protocol basics to cover end-to-end communication, security functionality, and real-world applications, extending to the backend infrastructure of mobile telecommunications. In addition, an advanced chapter teaches readers how to develop Diameter extensions for their own AAA applications. Written by an experienced author team who are members of the group that standardized Diameter in the IETF and are at the forefront of this cutting-edge technologyPresents the still-developing topic of Diameter from both introductory and advanced levelsMakes available for download a virtual machine containing the open source implementation: https://diameter-book.infoProvides hands-on experience via freeDiameter examples and exercises throughout the book Diameter: New Generation AAA Protocol - Design, Practice and Applications will appeal to system architects and system designers, programmers, standardization experts new to Diameter, students and researchers interested in technology that is deployed by many network operators.

DKK 679.00
1

Breaking Out of the Games Industry - Matthew M. White - Bog - Taylor & Francis Inc - Plusbog.dk

Expanding American Anthropology, 1945-1980 - - Bog - The University of Alabama Press - Plusbog.dk

Unity 4 Fundamentals - Alan Thorn - Bog - Taylor & Francis Ltd - Plusbog.dk

Diagnostic Imaging for the General Surgeon, An Issue of Surgical Clinics - Thomas H. Cogbill - Bog - Elsevier Health Sciences - Plusbog.dk

The Image of God in the Garden of Eden - Catherine L. Mcdowell - Bog - Pennsylvania State University Press - Plusbog.dk

The Image of God in the Garden of Eden - Catherine L. Mcdowell - Bog - Pennsylvania State University Press - Plusbog.dk

Catherine McDowell presents a detailed and insightful analysis of the creation of adam in Gen 2:5–3:24 in light of the Mesopotamian mis pî pit pî (“washing of the mouth, opening of the mouth”) and the Egyptian wpt-r (opening of the mouth) rituals for the creation of a divine image. Parallels between the mouth washing and opening rituals and the Eden story suggest that the biblical author was comparing and contrasting human creation with the ritual creation, animation, and installation of a cult statue in order to redefine ?elem ?elohîm as a human being—the living likeness of God tending and serving in the sacred garden. McDowell also considers the explicit image and likeness language in Gen 1:26–27. Drawing from biblical and extrabiblical texts, she demonstrates that ?elem and demût define the divine-human relationship, first and foremost, in terms of kinship. To be created in the image and likeness of Elohim was to be, metaphorically speaking, God’s royal sons and daughters. While these royal qualities are explicit in Gen 1, McDowell persuasively argues that kinship is the primary metaphor Gen 1 uses to define humanity and its relationship to God. Further, she discusses critical issues, noting the problems inherent in the traditional views on the dating and authorship of Gen 1–3, and the relationship between the two creation accounts. Through a careful study of the tôledôt in Genesis, she demonstrates that Gen 2:4 serves as both a hinge and a “telescope”: the creation of humanity in Gen 2:5–3:24 should be understood as a detailed account of the events of Day 6 in Gen 1. When Gen 1–3 are read together, as the final redactor intended, these texts redefine the divine-human relationship using three significant and theologically laden categories: kinship, kingship, and cult. Thus, they provide an important lens through which to view the relationship between God and humanity as presented in the rest of the Bible.

DKK 430.00
1

Distributed Game Development - Tim Fields - Bog - Taylor & Francis Ltd - Plusbog.dk

Batman: Deluxe Cowl - Matthew K. Manning - Bog - Running Press,U.S. - Plusbog.dk

Ethics and Anthropology - Carolyn Fluehr Lobban - Bog - AltaMira Press - Plusbog.dk

IKEv2 IPsec Virtual Private Networks - Graham Bartlett - Bog - Pearson Education (US) - Plusbog.dk

IKEv2 IPsec Virtual Private Networks - Graham Bartlett - Bog - Pearson Education (US) - Plusbog.dk

Create and manage highly-secure Ipsec VPNs with IKEv2 and Cisco FlexVPN The IKEv2 protocol significantly improves VPN security, and Cisco’s FlexVPN offers a unified paradigm and command line interface for taking full advantage of it. Simple and modular, FlexVPN relies extensively on tunnel interfaces while maximizing compatibility with legacy VPNs. Now, two Cisco network security experts offer a complete, easy-tounderstand, and practical introduction to IKEv2, modern IPsec VPNs, and FlexVPN. The authors explain each key concept, and then guide you through all facets of FlexVPN planning, deployment, migration, configuration, administration, troubleshooting, and optimization. You’ll discover how IKEv2 improves on IKEv1, master key IKEv2 features, and learn how to apply them with Cisco FlexVPN. IKEv2 IPsec Virtual Private Networks offers practical design examples for many common scenarios, addressing IPv4 and IPv6, servers, clients, NAT, pre-shared keys, resiliency, overhead, and more. If you’re a network engineer, architect, security specialist, or VPN administrator, you’ll find all the knowledge you need to protect your organization with IKEv2 and FlexVPN. - - Understand IKEv2 improvements: anti-DDoS cookies, configuration payloads, acknowledged responses, and more - - Implement modern secure VPNs with Cisco IOS and IOS-XE - - Plan and deploy IKEv2 in diverse real-world environments - - Configure IKEv2 proposals, policies, profiles, keyrings, and authorization - - Use advanced IKEv2 features, including SGT transportation and IKEv2 fragmentation - - Understand FlexVPN, its tunnel interface types, and IOS AAA infrastructure - - Implement FlexVPN Server with EAP authentication, pre-shared keys, and digital signatures - - Deploy, configure, and customize FlexVPN clients - - Configure, manage, and troubleshoot the FlexVPN Load Balancer - - Improve FlexVPN resiliency with dynamic tunnel source, backup peers, and backup tunnels - - Monitor IPsec VPNs with AAA, SNMP, and Syslog - - Troubleshoot connectivity, tunnel creation, authentication, authorization, data encapsulation, data encryption, and overlay routing - - Calculate IPsec overhead and fragmentation - - Plan your IKEv2 migration: hardware, VPN technologies, routing, restrictions, capacity, PKI, authentication, availability, and more -

DKK 476.00
1

New Frontiers in Artificial Intelligence - - Bog - Springer International Publishing AG - Plusbog.dk

New Frontiers in Artificial Intelligence - - Bog - Springer International Publishing AG - Plusbog.dk

This book constitutes the thoroughly refereed post-conference proceedings of the JSAI-isAI 2015 Workshops LENLS 12, JURISIN 9, AAA 2015, HAT-MASH 2015, TSDAA 2015, ASD-HR 2015, and SKL 2015, held in Kanagawa, Japan, in November 2015. The 39 regular papers presented in this volume were carefully reviewed and selected from 114 submissions. LENLS 12 (Logic and Engineering of Natural Language Semantics) is an annual international workshop on formal semantics and pragmatics and focused on discourse particles; disjunction; truth; copredication; expressive content; categorial grammar; dependent type semantics; sequent calculus; and various aspects of formal pragmatics. JURISIN 9 (Juris-Informatics) is the 9th event in the series. The purpose of this workshop is to discuss fundamental and practical issues such as law, social science, information and intelligent technology, logic and philosophy, including the conventional "AI and law" area. AAA 2015 (Argument for Agreement and Assurance) has the goal of deepening a mutual understanding and exploring a new research field involving researchers/practitioners in formal and informal logic, artificial intelligence, and safety engineering working on agreement and assurance through argument. HAT-MASH 2015 (Healthy Aging Tech Mashup Service, Data and People) provides a forum to discuss important research questions and practical challenges in healthy aging and elderly care support to promote transdisciplinary approaches. TSDAA 2015 (Workshop on Time Series Data Analysis and its Applications) aimes at providing an interdisciplinary forum for discussion of different approaches and techniques of time series data analysis and their implementation in various real life applications. ASD-HR 2015 (Autism Spectrum Disorders Using a Humanoid Robot) presents the studies in the interdisciplinary field of research including both engineering and medical sides. SKL 2015 (Skill Science) discusses the theoretical foundations of skill science as well as practical and engineering issues.

DKK 426.00
1

Integrated Security Technologies and Solutions - Volume II - Chad Mitchell - Bog - Pearson Education (US) - Plusbog.dk

Integrated Security Technologies and Solutions - Volume II - Chad Mitchell - Bog - Pearson Education (US) - Plusbog.dk

The essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity and virtualization Integrated Security Technologies and Solutions – Volume II brings together more expert-level instruction in security design, deployment, integration, and support. It will help experienced security and network professionals manage complex solutions, succeed in their day-to-day jobs, and prepare for their CCIE Security written and lab exams. Volume II focuses on the Cisco Identity Services Engine, Context Sharing, TrustSec, Application Programming Interfaces (APIs), Secure Connectivity with VPNs, and the virtualization and automation sections of the CCIE v5 blueprint. Like Volume I, its strong focus on interproduct integration will help you combine formerly disparate systems into seamless, coherent, next-generation security solutions. Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint. Each chapter starts with relevant theory, presents configuration examples and applications, and concludes with practical troubleshooting. - - Review the essentials of Authentication, Authorization, and Accounting (AAA) - - Explore the RADIUS and TACACS+ AAA protocols, and administer devices with them - - Enforce basic network access control with the Cisco Identity Services Engine (ISE) - - Implement sophisticated ISE profiling, EzConnect, and Passive Identity features - - Extend network access with BYOD support, MDM integration, Posture Validation, and Guest Services - - Safely share context with ISE, and implement pxGrid and Rapid Threat Containment - - Integrate ISE with Cisco FMC, WSA, and other devices - - Leverage Cisco Security APIs to increase control and flexibility - - Review Virtual Private Network (VPN) concepts and types - - Understand and deploy Infrastructure VPNs and Remote Access VPNs - - Virtualize leading Cisco Security products - - Make the most of Virtual Security Gateway (VSG), Network Function Virtualization (NFV), and microsegmentation -

DKK 572.00
1

Popular Music in the Nostalgia Video Game - Andra Ivanescu - Bog - Springer Nature Switzerland AG - Plusbog.dk

King Cottons Advocate - Lawrence J. Nelson - Bog - University of Tennessee Press - Plusbog.dk

King Cottons Advocate - Lawrence J. Nelson - Bog - University of Tennessee Press - Plusbog.dk

One of the largest cotton planters in the United States, Oscar G. Johnston of Mississippi (1880–1955) became King Cotton's most effective advocate during the New Deal era. In this biography, Lawrence J. Nelson explores Johnston's long career and the critical role he played in shaping public policy toward a vital but depressed industry. In 1927, the year of the Great Mississippi River Flood, Johnston became president of the largely British-owned Delta and Pine Land Company of Mississippi, a mammoth plantation that encompassed some 38,000 acres and employed thousands of black sharecroppers. During the Great Depression, Johnston helped formulate Agricultural Adjustment Administration (AAA) loans, assisted in organizing the Commodity Credit Corporation, and traveled abroad for President Franklin Roosevelt to seek international cotton stabilization. He also developed and managed the federal Cotton Pool, which, in the mid-1930s, dispensed nearly two million bales of cotton at a profit to its farmer-members. Johnston's activities embroiled him in various controversies—over huge subsidies to his plantations, over the infamous "Section 7" debate that led to the so-called "purge" of AAA liberals in 1935, over the question of how best to limit cotton production, and, during World War II, over the collectivising efforts efforts of the Farm Security Administration. By then, Johnston had abandoned New Deal solutions and successfully organized the National Cotton Council of America, which united an industry threatened by low prices, internal division, and loss of exports. A revisionist work, King Cotton's Advocate in the New Deal challenges the monochromatic, demonized image of the southern planter in the twentieth century. Nelson portrays a successful businessman who ran a highly efficient, welfare-capitalist plantation that, by the time of Johnston's retirement in 1950, exemplified the transformation of the old mule-and-sharecrop system into a capital-intensive, mechanized agribusiness. The Author: Lawrence J. Nelson is professor of history at the University of North Alabama. His articles have appeared in the Journal of Southern History, Agricultural History, Missouri Historical Review, Alabama Review, Tennessee Historical Quarterly, and other publications."

DKK 455.00
1

OpenGL Insights - - Bog - Taylor & Francis Ltd - Plusbog.dk

Data Communications and Network Technologies - Ltd. Huawei Technologies Co. - Bog - Springer Verlag, Singapore - Plusbog.dk

A Practical Guide to Level Design - Benjamin Bauer - Bog - Taylor & Francis Ltd - Plusbog.dk

Collaborative Worldbuilding for Video Games - Kaitlin Tremblay - Bog - Taylor & Francis Ltd - Plusbog.dk

Approaching a Pedagogy of Game Writing - Seth (george Mason University Hudson - Bog - Taylor & Francis Ltd - Plusbog.dk