1.

Record Nr.

UNISA996387625903316

Titolo

By the King [[electronic resource] ] : whereas the Kings Maiestie hath alwayes bene ready to imbrace and cherish such a perfect amitie betweene him and the king of Spaine .

Pubbl/distr/stampa

Imprinted at London, : By Robert Barker, Printer to the Kings most Excellent Maiestie, Anno Dom. 1605

Descrizione fisica

2 leaves

Altri autori (Persone)

James, King of England,  <1566-1625.>

Soggetti

Pirates

Great Britain History James I, 1603-1625

Great Britain Foreign relations Spain

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Proclamation against piracy.

Other title information from first 2 lines of text.

"Giuen at our Castle of Windsor the viij. of Iuly 1605. in the third yeere of our Reigne of Great Britaine, France and Ireland."

Imprint from colophon.

Reproduction of original in: Harvard University. Library.

Sommario/riassunto

eebo-0062



2.

Record Nr.

UNINA9910286443303321

Autore

Stern Claudio

Titolo

Encuentros y desencuentros en la salud reproductiva : políticas públicas, marcos normativos y actores sociales / / Juan Guillermo Figueroa y Claudio Stern, coordinadores

Pubbl/distr/stampa

El Colegio de México, 2001

Mexico, D.F. : , : El Colegio de Mexico, , 2001

©2001

ISBN

607-628-650-4

968-12-1001-8

Descrizione fisica

1 online resource (236 p.)

Altri autori (Persone)

SternClaudio

Figueroa PereaJuan Guillermo

Soggetti

Reproductive health - Mexico

Electronic books.

Lingua di pubblicazione

Spagnolo

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

"El Seminario Nacional sobre Políticas Públicas, Marcos Normativos y Actores Sociales se celebró en noviembre de 1996."--P. 13.

Nota di bibliografia

Includes bibliographical references.

Sommario/riassunto

La salud reproductiva surgió como un intento de recuperar el carácter multifacético de la reproducción, evidenciando la variedad de influencias sociales que repercuten en la misma y el papel protagónico que tienen las personas que se reproducen, en la conformación de las normas que influyen sobre dichos procesos. Este replanteamiento analítico y político ha permitido sistematizar la forma en que diferentes políticas públicas repercuten directa o indirectamente sobre la reproducción, a la par que diferentes marcos normativos estimulan o inhiben el protagonismo de los individuos en la construcción de sus procesos reproductivo. También se ha identificado la forma en que el quehacer colectivo de diferentes actores sociales mantiene, cuestiona, transgrede o transforma componentes de los marcos normativos y de las influencias institucionales. El presente libro integra algunos textos con el fin de estimular una reflexión colectiva sobre la relación entre políticas públicas, marcos normativos y actores sociales vinculados con



la sexualidad y la salud reproductiva.

3.

Record Nr.

UNINA9910300757203321

Autore

Hosmer Chet

Titolo

Defending IoT Infrastructures with the Raspberry Pi : Monitoring and Detecting Nefarious Behavior in Real Time / / by Chet Hosmer

Pubbl/distr/stampa

Berkeley, CA : , : Apress : , : Imprint : Apress, , 2018

ISBN

9781484237007

1484237005

Edizione

[1st ed. 2018.]

Descrizione fisica

1 online resource (XV, 178 p. 68 illus.)

Disciplina

005.8

Soggetti

Data protection

Python (Computer program language)

Computer input-output equipment

Security

Python

Hardware and Maker

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Nota di contenuto

Chapter 1: IoT Vulnerabilities -- Chapter 2: Classifying and Modeling IoT Behavior -- Chapter 3: Raspberry Pi Configuration and PackerRecorder.py Enhancements -- Chapter 4: Raspberry Pi as a Sensor -- Chapter 5: Operating the Raspberry Pi Sensor  -- Chapter 6: Adding Finishing Touches -- Chapter 7: Future Considerations -- Appendix: Obtaining the Python Source Code -- Glossary -- .

Sommario/riassunto

Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications and warning of attacks targeting IoT, ICS, and other critical network resources. Defending IoT Infrastructures with the Raspberry Pi provides techniques and scripts for the discovery of dangerous data leakage



events emanating from IoT devices. Using Raspbian Linux and specialized Python scripts, the book walks through the steps necessary to monitor, detect, and respond to attacks targeting IoT devices. There are several books that cover IoT, IoT security, Raspberry Pi, and Python separately, but this book is the first of its kind to put them all together. It takes a practical approach, providing an entry point and level playing field for a wide range of individuals, small companies, researchers, academics, students, and hobbyists to participate. What You’ll Learn: Create a secure, operational Raspberry Pi IoT sensor Configure and train the sensor using “normal” IoT behavior Establish analytics for detecting aberrant activities Generate real-time alerts to preempt attacks Identify and report data-leakage events originating from IoT devices Develop custom Python applications for cybersecurity.