02609nam 22004693 450 991083293970332120240506103649.03-428-58925-410.3790/978-3-428-58925-8(CKB)5840000000424157(MiAaPQ)EBC7386512(Au-PeEL)EBL7386512(NjHacI)995840000000424157(EXLCZ)99584000000042415720240501d2024 uy 0gerurcnu||||||||txtrdacontentcrdamediacrrdacarrierEin Update für den Kernbereichsschutz. Die Gefahr der Bildung von Persönlichkeitsprofilen bei der strafprozessualen Online-Durchsuchung1st ed.Berlin :Duncker & Humblot,2024.©2024.1 online resource (0 pages)Schriften zum Strafrecht3-428-18925-6 According to the warnings, online searches are associated with the dangers of all-round surveillance, total surveillance and the creation of psychological profiles. But what lies behind this investigative measure? What are the actual dangers of online searches? What do they implicate for us and how should we react to them? All these questions will be examined and clarified in this thesis. In doing so, it explains which legislative changes need to be made to meet constitutional and European legal requirements.Drei wesentliche Grundsätze finden sich bisher in dem Schutz des Kernbereichs privater Lebensgestaltung nicht wieder, sie sind aber zur Verhinderung der Bildung von Persönlichkeitsprofilen essenziell: Wenn eine solche Gefahr bereits vor Beginn der Maßnahme besteht, ist ihre Durchführung unzulässig. Gleiches gilt dann, wenn sich während der Durchführung eine solche Gefahr herauskristallisiert. Darüber hinaus ist die Maßnahme zu unterbrechen, wenn einer Prognose ergibt, dass kernbereichsrelevante Daten erhoben werden könnten. Nur mit der Umsetzung dieser Grundsätze kann der Gesetzgeber verfassungsrechtlichen und europarechtlichen Vorgaben gerecht werden.Schriften zum StrafrechtUpdate für den KernbereichsschutzElectronic surveillanceGermanyElectronic surveillance363.20943309045Conrad Catharina Pia1737158MiAaPQMiAaPQMiAaPQBOOK9910832939703321Ein Update für den Kernbereichsschutz4158330UNINA05121nam 2200769Ia 450 991097144670332120200520144314.097866139064589781283594004128359400597818496860991849686092(CKB)2670000000246109(EBL)1019535(OCoLC)810317546(SSID)ssj0000738634(PQKBManifestationID)11478381(PQKBTitleCode)TC0000738634(PQKBWorkID)10791112(PQKB)11311465(Au-PeEL)EBL1019535(CaPaEBR)ebr10598988(CaONFJC)MIL390645(PPN)228018862(OCoLC)827797166(OCoLC)ocn827797166 (FR-PaCSA)88850793(CaSebORM)9781849686082(MiAaPQ)EBC1019535(FRCYB88850793)88850793(DE-B1597)723531(DE-B1597)9781849686099(EXLCZ)99267000000024610920111102d2012 uy 0engur|n|---|||||txtccrOracle SOA Suite 11g administrator's handbook /Ahmed Aboulnaga, Arun Pareek1st editionBirmingham Packt Publishing20121 online resource (380 p.)Includes index.9781849686082 1849686084 Cover; Copyright; Credits; About the Authors; Acknowledgement; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: SOA Infrastructure Management: What you Need to Know; Identifying and overcoming monitoring and management challenges in SOA; Monitoring the SOA platform-centralized management and monitoring; Oracle Enterprise Manager Fusion Middleware Control; Oracle SOA Suite 11g infrastructure stack; Performance monitoring and management; Managing composite application lifecycles; Automating application deployments and migrations through continuous integrationCloning domains from test to productionIntroducing Oracle Enterprise Manager Fusion Middleware Control; Accessing the Oracle Enterprise Manager Fusion Middleware Control Console; Navigating the console through the navigator; Presenting the dashboards; SOA suite configuration; Deployed Java EE applications; The other consoles; Summary; Chapter 2: Management of SOA Composite Applications; Managing composite lifecycles; Understanding revisions; Changing the composite default revision at runtime; Deploying, redeploying, and undeploying composites; Deploying a composite; Redeploying a compositeUndeploying a compositeStarting up and shutting down composites; Starting a composite; Shutting down a composite; Retiring and activating composites; Retiring a composite; Activating a composite; Deleting instances; Structuring composite deployments with partitions; The default partition; Managing partitions; Creating a partition; Deleting a partition; Grouping SOA composite applications into partitions; Considerations for partition management; Setting up ant for automated composite management; Setting the environment; Setting the environment path for antStarting and stopping composites with antPackaging, deploying, and undeploying composites with ant; Packaging a composite via ant; Deploying a composite via ant; Undeploying a composite via ant; Exporting MDS artifacts with ant; Importing artifacts to the MDS with ant; Promoting code using configuration plans; Why we need configuration plans; Understanding configuration plan contents; ; ; ; ; Attaching a configuration plan; Best practices with configuration plans; Using configuration plans; Understanding and configuring composite audit levelsAudit levelsOrder of precedence for audit level settings; Modifying audit levels; Modifying component audit levels; Modifying composite audit levels; Modifying service engine audit levels; Modifying SOA Infrastructure Audit Levels; Summary; Chapter 3: Monitoring Oracle SOA Suite 11g; Transaction monitoring; Monitoring instances; Monitoring faulted instances; Searching composite sensors; Searching BPEL process sensors; Understanding IDs and ECIDs; Instance states; Monitoring instance performance; Understanding last update time of instancesViewing performance summary graphs and request processing metricsCreate a reliable, secure, and flexible environment for your Oracle SOA Suite 11g Service Infrastructure and SOA composite applications.Service-oriented architecture (Computer science)Service-oriented architecture (Computer science)004.6/54004.65004.654Aboulnaga Ahmed1795560Pareek Arun1599445MiAaPQMiAaPQMiAaPQBOOK9910971446703321Oracle SOA Suite 11g administrator's handbook4336933UNINA