Электронный каталог


 

База данных: ЭБС EBSCO eBook

Страница 1, Результатов: 3

Отмеченные записи: 0

DDC 327.730519
H 22

Han, Jongwoo, (1962-).
    The metamorphosis of U.S.-Korea relations : : the Korean question revisited / / Jongwoo Han. - Lanham : : Lexington Books,, [2022]. - 1 online resource. - (Lexington studies on Korea's place in international relations). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/64B5950D-5C42-438A-9C7F-8368B17CBAD5. - ISBN 1498582826. - ISBN 9781498582827 (electronic bk.)
Description based on print version record and CIP data provided by publisher; resource not viewed.
Параллельные издания: Print version: : Han, Jongwoo, 1962- Metamorphosis of U.S.-Korea relations. - Lanham : Lexington Books, [2022]. - ISBN 9781498582810
    Содержание:
Origins of the Korean Question and the Consequences of the Korean War -- Encounter of Isolationist Joseon and Expansionist America -- The Two Korean Wars -- North Korean Quagmire: The Last Phase of U.S. Encounter? -- Upshots of Encounters -- The Corean Question Revisited.

~РУБ DDC 327.730519

Рубрики: Diplomatic relations.

   United States--Foreign relations--Korea.
    Korea--Foreign relations--United States.

    United States--Foreign relations, 1989-

    United States--Foreign relations, 20th century.

    Korea--Foreign relations, 1945-

    États-Unis--Relations extérieures--Corée.

    Corée--Relations extérieures--États-Unis.

    États-Unis--Relations extérieures, 1989-

    États-Unis--Relations extérieures, 20e siècle.

    Corée--Relations extérieures, 1945-

    Korea.

    United States.

Аннотация: "In tracing the history of U.S./Korea encounters, this book stresses that as America opened a Pandora Box with an initial raid, thereby unleashing the "Korean Question," the United States now needs to uphold its initial peaceful treaty commitment by normalizing relations with Pyeongyang, thus bringing closure to the "Korean Question.""--

Han, Jongwoo,. The metamorphosis of U.S.-Korea relations : [Электронный ресурс] : the Korean question revisited / / Jongwoo Han., [2022]. - 1 online resource. с. (Введено оглавление)

1.

Han, Jongwoo,. The metamorphosis of U.S.-Korea relations : [Электронный ресурс] : the Korean question revisited / / Jongwoo Han., [2022]. - 1 online resource. с. (Введено оглавление)


DDC 327.730519
H 22

Han, Jongwoo, (1962-).
    The metamorphosis of U.S.-Korea relations : : the Korean question revisited / / Jongwoo Han. - Lanham : : Lexington Books,, [2022]. - 1 online resource. - (Lexington studies on Korea's place in international relations). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/64B5950D-5C42-438A-9C7F-8368B17CBAD5. - ISBN 1498582826. - ISBN 9781498582827 (electronic bk.)
Description based on print version record and CIP data provided by publisher; resource not viewed.
Параллельные издания: Print version: : Han, Jongwoo, 1962- Metamorphosis of U.S.-Korea relations. - Lanham : Lexington Books, [2022]. - ISBN 9781498582810
    Содержание:
Origins of the Korean Question and the Consequences of the Korean War -- Encounter of Isolationist Joseon and Expansionist America -- The Two Korean Wars -- North Korean Quagmire: The Last Phase of U.S. Encounter? -- Upshots of Encounters -- The Corean Question Revisited.

~РУБ DDC 327.730519

Рубрики: Diplomatic relations.

   United States--Foreign relations--Korea.
    Korea--Foreign relations--United States.

    United States--Foreign relations, 1989-

    United States--Foreign relations, 20th century.

    Korea--Foreign relations, 1945-

    États-Unis--Relations extérieures--Corée.

    Corée--Relations extérieures--États-Unis.

    États-Unis--Relations extérieures, 1989-

    États-Unis--Relations extérieures, 20e siècle.

    Corée--Relations extérieures, 1945-

    Korea.

    United States.

Аннотация: "In tracing the history of U.S./Korea encounters, this book stresses that as America opened a Pandora Box with an initial raid, thereby unleashing the "Korean Question," the United States now needs to uphold its initial peaceful treaty commitment by normalizing relations with Pyeongyang, thus bringing closure to the "Korean Question.""--

DDC 930/.098224
E 50

Emanuel, Jeffrey P. ,
    Black ships and sea raiders : : the late bronze and early iron age context of Odysseus' second Cretan lie / / Jeffrey P. Emanuel. - Lanham : : Lexington Books,, 2018. - 1 online resource. - (Greek studies: interdisciplinary approaches). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/A058EBE3-C736-4BB5-9B0A-B9372C115022. - ISBN 9781498572224 (electronic). - ISBN 1498572227
Non-Latin script record. Description based on print version record and CIP data provided by publisher; resource not viewed.
Параллельные издания: Print version: : Emanuel, Jeffrey P., author. Black ships and sea raiders. - Lanham : Lexington Books, 2018. - ISBN 9781498572217
    Содержание:
Epic, oral tradition, and archaeology -- Structure and methodology -- Raiders, traders, and sea peoples in the late bronze age and beyond -- Mycenae, Ahhiyawa, and the collapse of the late bronze age order -- The sea peoples and the Egyptian records -- The changing face of war and society -- Hedgehog helmets, sea peoples, and ship-to-ship combat -- Mariners and their ships: vessel types, capacity, and rigging -- Life, prosperity, and health in the land of the pharaohs.

~РУБ DDC 930/.098224

Рубрики: Sea Peoples.

   Bronze age--Mediterranean Region.


   Iron age--Mediterranean Region.


   HISTORY / Ancient / Greece.


   Antiquities.


   Bronze age.


   Iron age.


   Sea Peoples.


   Egypt--History, Nineteenth dynasty, ca. 1320-1200 B.C.
    Greece.

    Mediterranean Region.


Доп.точки доступа:
Homer.

Emanuel, Jeffrey P., Black ships and sea raiders : [Электронный ресурс] : the late bronze and early iron age context of Odysseus' second Cretan lie / / Jeffrey P. Emanuel., 2018. - 1 online resource. с. (Введено оглавление)

2.

Emanuel, Jeffrey P., Black ships and sea raiders : [Электронный ресурс] : the late bronze and early iron age context of Odysseus' second Cretan lie / / Jeffrey P. Emanuel., 2018. - 1 online resource. с. (Введено оглавление)


DDC 930/.098224
E 50

Emanuel, Jeffrey P. ,
    Black ships and sea raiders : : the late bronze and early iron age context of Odysseus' second Cretan lie / / Jeffrey P. Emanuel. - Lanham : : Lexington Books,, 2018. - 1 online resource. - (Greek studies: interdisciplinary approaches). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/A058EBE3-C736-4BB5-9B0A-B9372C115022. - ISBN 9781498572224 (electronic). - ISBN 1498572227
Non-Latin script record. Description based on print version record and CIP data provided by publisher; resource not viewed.
Параллельные издания: Print version: : Emanuel, Jeffrey P., author. Black ships and sea raiders. - Lanham : Lexington Books, 2018. - ISBN 9781498572217
    Содержание:
Epic, oral tradition, and archaeology -- Structure and methodology -- Raiders, traders, and sea peoples in the late bronze age and beyond -- Mycenae, Ahhiyawa, and the collapse of the late bronze age order -- The sea peoples and the Egyptian records -- The changing face of war and society -- Hedgehog helmets, sea peoples, and ship-to-ship combat -- Mariners and their ships: vessel types, capacity, and rigging -- Life, prosperity, and health in the land of the pharaohs.

~РУБ DDC 930/.098224

Рубрики: Sea Peoples.

   Bronze age--Mediterranean Region.


   Iron age--Mediterranean Region.


   HISTORY / Ancient / Greece.


   Antiquities.


   Bronze age.


   Iron age.


   Sea Peoples.


   Egypt--History, Nineteenth dynasty, ca. 1320-1200 B.C.
    Greece.

    Mediterranean Region.


Доп.точки доступа:
Homer.

DDC 004.6782
P 92

Priyam, Prashant.
    Cloud Security Automation : : Get to grips with automating your cloud security on AWS and OpenStack. / Prashant. Priyam. - 1788627863. - Birmingham : : Packt Publishing,, 2018. - 1 online resource (326 pages) ( час. мин.), 1788627863. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/48FCC6A0-0666-479A-9F29-B4E08242C8C1. - ISBN 9781788622196 (electronic bk.). - ISBN 1788622197 (electronic bk.). - ISBN 1788627865. - ISBN 9781788627863
Neutron - OpenStack network. Print version record.
Параллельные издания: Print version: : Priyam, Prashant. Cloud Security Automation : Get to grips with automating your cloud security on AWS and OpenStack. - Birmingham : Packt Publishing, ©2018
    Содержание:
Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Introduction to Cloud Security; Types of cloud; Public cloud; Private cloud; Hybrid cloud; Software as a Service; Platform as a Service; Infrastructure as a Service; Cloud security; Confidentiality; Integrity; Availability; Authentication; Authorization; Auditing; Shared responsibility model; Shared responsibility model for infrastructure ; Shared responsibility model for container service; Shared responsibility model for abstract services; Key concern areas of cloud security.
Infrastructure levelUser access level ; Storage and data level ; Application access level; Network level; Logging and monitoring level; Summary; Chapter 2: Understanding the World of Cloud Automation; What is DevOps?; Why do we need automation?; Infrastructure as Code; Configuration management; Automate deployment -- AWS OpsWorks; Quick recap; Summary; Chapter 3: Identity and Access Management in the Cloud; IAM features; How does AWS work in IAM?; Anatomy of IAM users, groups, roles, and policies ; IAM users; IAM groups; IAM roles; IAM policies; Access right delegation using IAM.
Temporary credentialsCross-account access; Identity federation; IAM best practices; Other security options in AWS; AWS Certificate Manager; WAF and Shield; Cloud hardware security module; Cognito; Amazon Macie; AWS Inspector; AWS GuardDuty; Quick recap; Summary; Chapter 4: Cloud Network Security; Virtual private cloud; NACL; Security group; VPN connection; Direct Connect; DNS security; CDN-level security; Logging and monitoring; CloudTrail; CloudWatch; Quick recap; Summary; Chapter 5: Cloud Storage and Data Security; EBS; Fault tolerance at EBS; RAID 0; RAID 1; Encryption in EBS; S3.
Security in S3AWS Glacier ; Security in AWS Glacier; EFS ; Security in EFS; Storage gateway; Security in the storage gateway; AWS Snowball; Security in Snowball; A quick recap; Summary; Chapter 6: Cloud Platform Security; RDS; Security in RDS; Using security groups; Using IAM; Using SSL to encrypt database connections; Security best practices for AWS RDS ; Back up and restore database; Monitoring of RDS; AWS Redshift ; Security in Redshift; AWS DynamoDB; Security in DynamoDB; ElastiCache ; Securing ElastiCache; VPC-level security; Authentication and access control.
Authenticating with Redis authenticationData encryption; Data-in-transit encryption; Data-at-rest encryption; AWS ECS; Securing ECS; SQS; Securing SQS; Let's have a recap; Summary; Chapter 7: Private Cloud Security; Securing hypervisor; Securing KVM; Securing XenServer; Securing ESXi; Securing compute ; IAM; Authentication; Authentication methods -- internal and external; Authorization; Policy, tokens, and domains; Federated identity; Horizon -- OpenStack dashboard service; Cinder -- OpenStack block storage; Glance -- OpenStack image storage; Manila -- OpenStack shared file storage.

~РУБ DDC 004.6782

Рубрики: Cloud computing--Security measures.

   Computer networks--Security measures.


   Computers--Networking--Security.


   Computers--System Administration--General.


   Computer networking & communications.


   Network security.


   Computers--Security--General.


   Computer security.


   Computer networks--Security measures.


   COMPUTERS / Computer Literacy


   COMPUTERS / Computer Science


   COMPUTERS / Data Processing


   COMPUTERS / Hardware / General


   COMPUTERS / Information Technology


   COMPUTERS / Machine Theory


   COMPUTERS / Reference


Аннотация: In the current market, enterprise organizations are moving rapidly towards the cloud infrastructure because of its flexibility and cost effectiveness. Hence, it has become extremely important to have a security framework in place. Automating security functions will play a key role when it comes to cloud governance. This book supplies best ...

Priyam, Prashant. Cloud Security Automation : [Электронный ресурс] : Get to grips with automating your cloud security on AWS and OpenStack. / Prashant. Priyam, 2018. - 1 online resource (326 pages) с. (Введено оглавление)

3.

Priyam, Prashant. Cloud Security Automation : [Электронный ресурс] : Get to grips with automating your cloud security on AWS and OpenStack. / Prashant. Priyam, 2018. - 1 online resource (326 pages) с. (Введено оглавление)


DDC 004.6782
P 92

Priyam, Prashant.
    Cloud Security Automation : : Get to grips with automating your cloud security on AWS and OpenStack. / Prashant. Priyam. - 1788627863. - Birmingham : : Packt Publishing,, 2018. - 1 online resource (326 pages) ( час. мин.), 1788627863. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/48FCC6A0-0666-479A-9F29-B4E08242C8C1. - ISBN 9781788622196 (electronic bk.). - ISBN 1788622197 (electronic bk.). - ISBN 1788627865. - ISBN 9781788627863
Neutron - OpenStack network. Print version record.
Параллельные издания: Print version: : Priyam, Prashant. Cloud Security Automation : Get to grips with automating your cloud security on AWS and OpenStack. - Birmingham : Packt Publishing, ©2018
    Содержание:
Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Introduction to Cloud Security; Types of cloud; Public cloud; Private cloud; Hybrid cloud; Software as a Service; Platform as a Service; Infrastructure as a Service; Cloud security; Confidentiality; Integrity; Availability; Authentication; Authorization; Auditing; Shared responsibility model; Shared responsibility model for infrastructure ; Shared responsibility model for container service; Shared responsibility model for abstract services; Key concern areas of cloud security.
Infrastructure levelUser access level ; Storage and data level ; Application access level; Network level; Logging and monitoring level; Summary; Chapter 2: Understanding the World of Cloud Automation; What is DevOps?; Why do we need automation?; Infrastructure as Code; Configuration management; Automate deployment -- AWS OpsWorks; Quick recap; Summary; Chapter 3: Identity and Access Management in the Cloud; IAM features; How does AWS work in IAM?; Anatomy of IAM users, groups, roles, and policies ; IAM users; IAM groups; IAM roles; IAM policies; Access right delegation using IAM.
Temporary credentialsCross-account access; Identity federation; IAM best practices; Other security options in AWS; AWS Certificate Manager; WAF and Shield; Cloud hardware security module; Cognito; Amazon Macie; AWS Inspector; AWS GuardDuty; Quick recap; Summary; Chapter 4: Cloud Network Security; Virtual private cloud; NACL; Security group; VPN connection; Direct Connect; DNS security; CDN-level security; Logging and monitoring; CloudTrail; CloudWatch; Quick recap; Summary; Chapter 5: Cloud Storage and Data Security; EBS; Fault tolerance at EBS; RAID 0; RAID 1; Encryption in EBS; S3.
Security in S3AWS Glacier ; Security in AWS Glacier; EFS ; Security in EFS; Storage gateway; Security in the storage gateway; AWS Snowball; Security in Snowball; A quick recap; Summary; Chapter 6: Cloud Platform Security; RDS; Security in RDS; Using security groups; Using IAM; Using SSL to encrypt database connections; Security best practices for AWS RDS ; Back up and restore database; Monitoring of RDS; AWS Redshift ; Security in Redshift; AWS DynamoDB; Security in DynamoDB; ElastiCache ; Securing ElastiCache; VPC-level security; Authentication and access control.
Authenticating with Redis authenticationData encryption; Data-in-transit encryption; Data-at-rest encryption; AWS ECS; Securing ECS; SQS; Securing SQS; Let's have a recap; Summary; Chapter 7: Private Cloud Security; Securing hypervisor; Securing KVM; Securing XenServer; Securing ESXi; Securing compute ; IAM; Authentication; Authentication methods -- internal and external; Authorization; Policy, tokens, and domains; Federated identity; Horizon -- OpenStack dashboard service; Cinder -- OpenStack block storage; Glance -- OpenStack image storage; Manila -- OpenStack shared file storage.

~РУБ DDC 004.6782

Рубрики: Cloud computing--Security measures.

   Computer networks--Security measures.


   Computers--Networking--Security.


   Computers--System Administration--General.


   Computer networking & communications.


   Network security.


   Computers--Security--General.


   Computer security.


   Computer networks--Security measures.


   COMPUTERS / Computer Literacy


   COMPUTERS / Computer Science


   COMPUTERS / Data Processing


   COMPUTERS / Hardware / General


   COMPUTERS / Information Technology


   COMPUTERS / Machine Theory


   COMPUTERS / Reference


Аннотация: In the current market, enterprise organizations are moving rapidly towards the cloud infrastructure because of its flexibility and cost effectiveness. Hence, it has become extremely important to have a security framework in place. Automating security functions will play a key role when it comes to cloud governance. This book supplies best ...

Страница 1, Результатов: 3

 

Все поступления за 
Или выберите интересующий месяц