База данных: Электронная библиотека
Страница 1, Результатов: 2
Отмеченные записи: 0
1.
Подробнее
DDC 930/.098224
E 50
Emanuel, Jeffrey P. ,
Black ships and sea raiders : : the late bronze and early iron age context of Odysseus' second Cretan lie / / Jeffrey P. Emanuel. - Lanham : : Lexington Books,, 2018. - 1 online resource. - (Greek studies: interdisciplinary approaches). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/285CF63B-B6B9-44CD-8D07-0EB9BCF524CA. - ISBN 9781498572224 (electronic). - ISBN 1498572227
Non-Latin script record. Description based on print version record and CIP data provided by publisher; resource not viewed.
Параллельные издания: Print version: : Emanuel, Jeffrey P., author. Black ships and sea raiders. - Lanham : Lexington Books, 2018. - ISBN 9781498572217
Содержание:
Epic, oral tradition, and archaeology -- Structure and methodology -- Raiders, traders, and sea peoples in the late bronze age and beyond -- Mycenae, Ahhiyawa, and the collapse of the late bronze age order -- The sea peoples and the Egyptian records -- The changing face of war and society -- Hedgehog helmets, sea peoples, and ship-to-ship combat -- Mariners and their ships: vessel types, capacity, and rigging -- Life, prosperity, and health in the land of the pharaohs.
~РУБ DDC 930/.098224
Рубрики: Sea Peoples.
Bronze age--Mediterranean Region.
Iron age--Mediterranean Region.
HISTORY / Ancient / Greece.
Antiquities.
Bronze age.
Iron age.
Sea Peoples.
Egypt--History, Nineteenth dynasty, ca. 1320-1200 B.C.
Greece.
Mediterranean Region.
Доп.точки доступа:
Homer.
E 50
Emanuel, Jeffrey P. ,
Black ships and sea raiders : : the late bronze and early iron age context of Odysseus' second Cretan lie / / Jeffrey P. Emanuel. - Lanham : : Lexington Books,, 2018. - 1 online resource. - (Greek studies: interdisciplinary approaches). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/285CF63B-B6B9-44CD-8D07-0EB9BCF524CA. - ISBN 9781498572224 (electronic). - ISBN 1498572227
Non-Latin script record. Description based on print version record and CIP data provided by publisher; resource not viewed.
Параллельные издания: Print version: : Emanuel, Jeffrey P., author. Black ships and sea raiders. - Lanham : Lexington Books, 2018. - ISBN 9781498572217
Содержание:
Epic, oral tradition, and archaeology -- Structure and methodology -- Raiders, traders, and sea peoples in the late bronze age and beyond -- Mycenae, Ahhiyawa, and the collapse of the late bronze age order -- The sea peoples and the Egyptian records -- The changing face of war and society -- Hedgehog helmets, sea peoples, and ship-to-ship combat -- Mariners and their ships: vessel types, capacity, and rigging -- Life, prosperity, and health in the land of the pharaohs.
Рубрики: Sea Peoples.
Bronze age--Mediterranean Region.
Iron age--Mediterranean Region.
HISTORY / Ancient / Greece.
Antiquities.
Bronze age.
Iron age.
Sea Peoples.
Egypt--History, Nineteenth dynasty, ca. 1320-1200 B.C.
Greece.
Mediterranean Region.
Доп.точки доступа:
Homer.
2.
Подробнее
DDC 004.6782
P 92
Priyam, Prashant.
Cloud Security Automation : : Get to grips with automating your cloud security on AWS and OpenStack. / Prashant. Priyam. - 1788627863. - Birmingham : : Packt Publishing,, 2018. - 1 online resource (326 pages) ( час. мин.), 1788627863. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/AE28796E-80C5-4D77-A650-FA32888F1010. - ISBN 9781788622196 (electronic bk.). - ISBN 1788622197 (electronic bk.). - ISBN 1788627865. - ISBN 9781788627863
Neutron - OpenStack network. Print version record.
Параллельные издания: Print version: : Priyam, Prashant. Cloud Security Automation : Get to grips with automating your cloud security on AWS and OpenStack. - Birmingham : Packt Publishing, ©2018
Содержание:
Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Introduction to Cloud Security; Types of cloud; Public cloud; Private cloud; Hybrid cloud; Software as a Service; Platform as a Service; Infrastructure as a Service; Cloud security; Confidentiality; Integrity; Availability; Authentication; Authorization; Auditing; Shared responsibility model; Shared responsibility model for infrastructure ; Shared responsibility model for container service; Shared responsibility model for abstract services; Key concern areas of cloud security.
Infrastructure levelUser access level ; Storage and data level ; Application access level; Network level; Logging and monitoring level; Summary; Chapter 2: Understanding the World of Cloud Automation; What is DevOps?; Why do we need automation?; Infrastructure as Code; Configuration management; Automate deployment -- AWS OpsWorks; Quick recap; Summary; Chapter 3: Identity and Access Management in the Cloud; IAM features; How does AWS work in IAM?; Anatomy of IAM users, groups, roles, and policies ; IAM users; IAM groups; IAM roles; IAM policies; Access right delegation using IAM.
Temporary credentialsCross-account access; Identity federation; IAM best practices; Other security options in AWS; AWS Certificate Manager; WAF and Shield; Cloud hardware security module; Cognito; Amazon Macie; AWS Inspector; AWS GuardDuty; Quick recap; Summary; Chapter 4: Cloud Network Security; Virtual private cloud; NACL; Security group; VPN connection; Direct Connect; DNS security; CDN-level security; Logging and monitoring; CloudTrail; CloudWatch; Quick recap; Summary; Chapter 5: Cloud Storage and Data Security; EBS; Fault tolerance at EBS; RAID 0; RAID 1; Encryption in EBS; S3.
Security in S3AWS Glacier ; Security in AWS Glacier; EFS ; Security in EFS; Storage gateway; Security in the storage gateway; AWS Snowball; Security in Snowball; A quick recap; Summary; Chapter 6: Cloud Platform Security; RDS; Security in RDS; Using security groups; Using IAM; Using SSL to encrypt database connections; Security best practices for AWS RDS ; Back up and restore database; Monitoring of RDS; AWS Redshift ; Security in Redshift; AWS DynamoDB; Security in DynamoDB; ElastiCache ; Securing ElastiCache; VPC-level security; Authentication and access control.
Authenticating with Redis authenticationData encryption; Data-in-transit encryption; Data-at-rest encryption; AWS ECS; Securing ECS; SQS; Securing SQS; Let's have a recap; Summary; Chapter 7: Private Cloud Security; Securing hypervisor; Securing KVM; Securing XenServer; Securing ESXi; Securing compute ; IAM; Authentication; Authentication methods -- internal and external; Authorization; Policy, tokens, and domains; Federated identity; Horizon -- OpenStack dashboard service; Cinder -- OpenStack block storage; Glance -- OpenStack image storage; Manila -- OpenStack shared file storage.
~РУБ DDC 004.6782
Рубрики: Cloud computing--Security measures.
Computer networks--Security measures.
Computers--Networking--Security.
Computers--System Administration--General.
Computer networking & communications.
Network security.
Computers--Security--General.
Computer security.
Computer networks--Security measures.
COMPUTERS / Computer Literacy
COMPUTERS / Computer Science
COMPUTERS / Data Processing
COMPUTERS / Hardware / General
COMPUTERS / Information Technology
COMPUTERS / Machine Theory
COMPUTERS / Reference
Аннотация: In the current market, enterprise organizations are moving rapidly towards the cloud infrastructure because of its flexibility and cost effectiveness. Hence, it has become extremely important to have a security framework in place. Automating security functions will play a key role when it comes to cloud governance. This book supplies best ...
P 92
Priyam, Prashant.
Cloud Security Automation : : Get to grips with automating your cloud security on AWS and OpenStack. / Prashant. Priyam. - 1788627863. - Birmingham : : Packt Publishing,, 2018. - 1 online resource (326 pages) ( час. мин.), 1788627863. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/AE28796E-80C5-4D77-A650-FA32888F1010. - ISBN 9781788622196 (electronic bk.). - ISBN 1788622197 (electronic bk.). - ISBN 1788627865. - ISBN 9781788627863
Neutron - OpenStack network. Print version record.
Параллельные издания: Print version: : Priyam, Prashant. Cloud Security Automation : Get to grips with automating your cloud security on AWS and OpenStack. - Birmingham : Packt Publishing, ©2018
Содержание:
Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Introduction to Cloud Security; Types of cloud; Public cloud; Private cloud; Hybrid cloud; Software as a Service; Platform as a Service; Infrastructure as a Service; Cloud security; Confidentiality; Integrity; Availability; Authentication; Authorization; Auditing; Shared responsibility model; Shared responsibility model for infrastructure ; Shared responsibility model for container service; Shared responsibility model for abstract services; Key concern areas of cloud security.
Infrastructure levelUser access level ; Storage and data level ; Application access level; Network level; Logging and monitoring level; Summary; Chapter 2: Understanding the World of Cloud Automation; What is DevOps?; Why do we need automation?; Infrastructure as Code; Configuration management; Automate deployment -- AWS OpsWorks; Quick recap; Summary; Chapter 3: Identity and Access Management in the Cloud; IAM features; How does AWS work in IAM?; Anatomy of IAM users, groups, roles, and policies ; IAM users; IAM groups; IAM roles; IAM policies; Access right delegation using IAM.
Temporary credentialsCross-account access; Identity federation; IAM best practices; Other security options in AWS; AWS Certificate Manager; WAF and Shield; Cloud hardware security module; Cognito; Amazon Macie; AWS Inspector; AWS GuardDuty; Quick recap; Summary; Chapter 4: Cloud Network Security; Virtual private cloud; NACL; Security group; VPN connection; Direct Connect; DNS security; CDN-level security; Logging and monitoring; CloudTrail; CloudWatch; Quick recap; Summary; Chapter 5: Cloud Storage and Data Security; EBS; Fault tolerance at EBS; RAID 0; RAID 1; Encryption in EBS; S3.
Security in S3AWS Glacier ; Security in AWS Glacier; EFS ; Security in EFS; Storage gateway; Security in the storage gateway; AWS Snowball; Security in Snowball; A quick recap; Summary; Chapter 6: Cloud Platform Security; RDS; Security in RDS; Using security groups; Using IAM; Using SSL to encrypt database connections; Security best practices for AWS RDS ; Back up and restore database; Monitoring of RDS; AWS Redshift ; Security in Redshift; AWS DynamoDB; Security in DynamoDB; ElastiCache ; Securing ElastiCache; VPC-level security; Authentication and access control.
Authenticating with Redis authenticationData encryption; Data-in-transit encryption; Data-at-rest encryption; AWS ECS; Securing ECS; SQS; Securing SQS; Let's have a recap; Summary; Chapter 7: Private Cloud Security; Securing hypervisor; Securing KVM; Securing XenServer; Securing ESXi; Securing compute ; IAM; Authentication; Authentication methods -- internal and external; Authorization; Policy, tokens, and domains; Federated identity; Horizon -- OpenStack dashboard service; Cinder -- OpenStack block storage; Glance -- OpenStack image storage; Manila -- OpenStack shared file storage.
Рубрики: Cloud computing--Security measures.
Computer networks--Security measures.
Computers--Networking--Security.
Computers--System Administration--General.
Computer networking & communications.
Network security.
Computers--Security--General.
Computer security.
Computer networks--Security measures.
COMPUTERS / Computer Literacy
COMPUTERS / Computer Science
COMPUTERS / Data Processing
COMPUTERS / Hardware / General
COMPUTERS / Information Technology
COMPUTERS / Machine Theory
COMPUTERS / Reference
Аннотация: In the current market, enterprise organizations are moving rapidly towards the cloud infrastructure because of its flexibility and cost effectiveness. Hence, it has become extremely important to have a security framework in place. Automating security functions will play a key role when it comes to cloud governance. This book supplies best ...
Страница 1, Результатов: 2