01515nam 2200397Ia 450 99638954240331620210104172042.0(CKB)4940000000095719(EEBO)2248501933(OCoLC)ocm82474597e(OCoLC)82474597(EXLCZ)99494000000009571920070209d1602 uy 0engurbn||||a|bb|The Song of songsThe first part[electronic resource] Penned by the Holighost his canonicall scribe, Salomon: wherein is vttered, the diuine loues, betweene Christ and his Church. /Expounded and applied by Henoch Clapham[London] Printed by Valentine Simmes1602.[172] pThe second and third parts were published, with a new edition of the first part, in 1603. Parts 4 and 5 were published in 1606 (cf. STC).Signatures: A-L⁸.Advertisements on L5v, and errata on L6v.L6r bears a note "To all printers."With the text of ch. 1.Printer's device (McK. 333) on t.p.Errata: p. [172].Reproduction of original in: Cambridge University. Library.Includes bibliographical references in marginal notes.eebo-0021Clapham Henoch1002046UMIUMIUMIBOOK996389542403316The Song of songs2331171UNISA01672nam 2200421 a 450 991070010340332120110419092151.0(CKB)5470000002407937(OCoLC)713266971(EXLCZ)99547000000240793720110419d2011 ua 0engurmn|||||||||txtrdacontentcrdamediacrrdacarrierElevation of the March-April 2010 flood high water in selected river reaches in Rhode Island[electronic resource] /by Phillip J. Zarriello and Gardner C. Bent ; prepared in cooperation with the U.S. Department of Homeland Security, Federal Emergency Management AgencyReston, Va. :U.S. Dept. of the Interior, U.S. Geological Survey,2011.1 online resource (iv, 34 pages) illustrations, mapsOpen-file report ;2011-1029Title from PDF title screen (USGS, viewed Apr. 18, 2011).Includes bibliographical references.FloodsRhode IslandFloodsRhode IslandManagementFlood forecastingRhode IslandFloodsFloodsManagement.Flood forecastingZarriello Phillip J1385653Bent Gardner C1392576United States.Federal Emergency Management Agency.Geological Survey (U.S.)GPOGPOBOOK9910700103403321Elevation of the March-April 2010 flood high water in selected river reaches in Rhode Island3468407UNINA03208nam 22005775 450 991085536780332120251116205035.03-658-43879-710.1007/978-3-658-43879-1(MiAaPQ)EBC31318935(Au-PeEL)EBL31318935(CKB)31889907300041(DE-He213)978-3-658-43879-1(OCoLC)1433081081(EXLCZ)993188990730004120240502d2024 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierThe Art of Cyber Warfare Strategic and Tactical Approaches for Attack and Defense in the Digital Age /by Peter Kestner1st ed. 2024.Wiesbaden :Springer Fachmedien Wiesbaden :Imprint: Springer,2024.1 online resource (300 pages)Computer Science Series3-658-43878-9 Introduction: 1984 and the lessons of the past -- Lessons from the past -- Modern and hybrid warfare -- The art of cyber warfare -- Outlook: The future of cyber warfare.The Art of Cyber Warfare explores the strategic and tactical approaches for offense and defense in the digital age. Drawing on historical conflicts from Sun Tzu to Carl von Clausewitz, the author illustrates that, despite changed conditions such as time, location, means, and resources – but not the laws of physics – it is possible to learn from past actions and reactions. The author aims to demonstrate in this book that, in reality, we have only transferred old methods into our current era but have forgotten to translate their reasons, effects, and the resulting lessons. For, as it has been for thousands of years, the reasons for human-created conflicts remain the same: wealth, fame, power, honor, or desire. Can we learn something from history for present and future (cyber) wars? The author Peter Kestner is a security consultant with over 25 years of experience in the field of cybersecurity. He advises SMEs and DAX30 companies, as well as government and defense entities, on cybersecurity, cybercrime, and cyberterrorism. His focus has been on the security of databases, operating systems, hardware, networks, as well as cryptography and steganography. The translation was done with the help of artificial intelligence. A subsequent human revision was done primarily in terms of content.Computer Science SeriesData protectionComputer crimesComputer securityData and Information SecurityComputer CrimePrinciples and Models of SecurityData protection.Computer crimes.Computer security.Data and Information Security.Computer Crime.Principles and Models of Security.005.8Kestner Peter1737768MiAaPQMiAaPQMiAaPQBOOK9910855367803321The Art of Cyber Warfare4159694UNINA