LEADER 03078nam 22007335 450 001 996234837903316 005 20200623100627.0 010 $a3-11-042218-2 010 $a3-11-042226-3 024 7 $a10.1515/9783110422184 035 $a(CKB)3710000000469463 035 $a(EBL)2189976 035 $a(SSID)ssj0001550676 035 $a(PQKBManifestationID)16166364 035 $a(PQKBTitleCode)TC0001550676 035 $a(PQKBWorkID)14811008 035 $a(PQKB)11049330 035 $a(MiAaPQ)EBC2189976 035 $a(DE-B1597)451408 035 $a(OCoLC)952798648 035 $a(DE-B1597)9783110422184 035 $a(PPN)202106683 035 $a(EXLCZ)993710000000469463 100 $a20200623h20152015 fg 101 0 $alat 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCento Vergilianus /$fFaltonia Betitia Proba; Carlo M. Lucarini, Alessia Fassina 210 1$aBerlin ;$aBoston : $cDe Gruyter, $d[2015] 210 4$d©2015 215 $a1 online resource (196 p.) 225 0 $aBibliotheca scriptorum Graecorum et Romanorum Teubneriana 300 $aIncludes index. 311 $a3-11-042652-8 327 $tFrontmatter -- $tHoc Volvmine Continentvr -- $tPraefatio -- $tConspectus librorum impressorum -- $tConspectus siglorum -- $tIncerti auctoris (fortasse Aemili Probi) epigramma -- $tFaltoniae Betitiae Probae Cento Vergilianus -- $tIndices 330 $aIn 1888 K. Schenkl published the first critical edition of Proba?s Cento. Schenkl knew about 25 manuscripts, only eleven of which are referred to in his apparatus. Since that time about 70 new manuscripts have been discovered; this volume provides a full description of the manuscript tradition in the praefatio and demonstrates that the tradition originates from a manuscript preserved near Aachen, probably at the court of Charles the Great. 410 0$aBibliotheca scriptorum Graecorum et Romanorum Teubneriana. 606 $aClassical and Ancient Near Eastern Studies$xClassical Studies$xLatin$xLatin Authors 606 $aCento 606 $aManuskript 606 $aVergil-Tradition 606 $aVergilian tradition 606 $amanuscript 606 $aLITERARY COLLECTIONS / Ancient & Classical$2bisacsh 615 0$aClassical and Ancient Near Eastern Studies$xClassical Studies$xLatin$xLatin Authors. 615 4$aCento. 615 4$aManuskript. 615 4$aVergil-Tradition. 615 4$aVergilian tradition. 615 4$amanuscript. 615 7$aLITERARY COLLECTIONS / Ancient & Classical. 676 $a811.54 686 $aFX 296300$2rvk 700 $aFaltonia Betitia Proba$4aut$4http://id.loc.gov/vocabulary/relators/aut$01017824 702 $aFassina$b Alessia, $4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLucarini$b Carlo M., $4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bDE-B1597 801 1$bDE-B1597 906 $aBOOK 912 $a996234837903316 996 $aCento Vergilianus$92390027 997 $aUNISA LEADER 00891nam0-22003011i-450 001 990004452820403321 005 20230613173333.0 035 $a000445282 035 $aFED01000445282 035 $a(Aleph)000445282FED01 100 $a19990530d1958----km-y0itay50------ba 101 0 $aeng$cger 105 $ay-------001yy 200 1 $a<>doctrine of the Buddha$ethe religion of reason and meditation$fGeorge Grimm$gedited by M. Keller-Grimm and Max Hoppe 205 $a2a ed. rev. 210 $aBerlin$cAkademie$d1958 215 $aVI, 415 p.$d24 cm 676 $a294.363 700 1$aGrimm,$bGeorge$0177513 702 1$aHoppe,$bMax 702 1$aKeler-Grimm,$bMaya 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990004452820403321 952 $a6/III 15$bBibl.33518$fFLFBC 959 $aFLFBC 996 $aDoctrine of the Buddha$9544498 997 $aUNINA LEADER 04222nam 2200481 450 001 9910483665303321 005 20220114161938.0 010 $a1-4842-6672-2 024 7 $a10.1007/978-1-4842-6672-4 035 $a(CKB)4100000011918730 035 $a(DE-He213)978-1-4842-6672-4 035 $a(MiAaPQ)EBC6605985 035 $a(Au-PeEL)EBL6605985 035 $a(OCoLC)1250080931 035 $a(PPN)255886349 035 $a(CaSebORM)9781484266724 035 $a(EXLCZ)994100000011918730 100 $a20220114d2021 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCisco networks $eengineers' handbook of routing, switching, and security with IOS, NX-OS, and ASA /$fChris Carthern, William Wilson, Noel Rivera 205 $aSecond edition. 210 1$a[Place of publication not identified] :$cApress,$d[2021] 210 4$d©2021 215 $a1 online resource (XXXI, 1073 p. 589 illus.) 300 $aIncludes index. 311 $a1-4842-6671-4 327 $aChapter 1. Practical Networking Intro -- Chapter 2. The Physical Medium -- Chapter 3. Protocols and the data link layer -- Chapter 4. The Network Layer -- Chapter 5. Intermediate LAN Switching -- Chapter 6. Routing -- Chapter 7. Introduction to Tools and Automation -- Chapter 8. Switch and Router Troubleshooting -- Chapter 9. NAT/DHCP -- Chapter 10. Management Plane -- Chapter 11. Data Plane -- Chapter 12. Control Plane -- Chapter 13. Introduction to Availability -- Chapter 14. Advanced Routing -- Chapter 15. QoS -- Chapter 16. Advanced Security -- Chapter 17. Advanced Troubleshooting -- Chapter 18. Effective Network Management -- Chapter 19. Data Center -- Chapter 20. Wireless LAN -- Chapter 21. Firepower -- Chapter 22. Network Penetration Testing -- Chapter 23. MPLS -- Chapter 24. DMVPN -- Chapter 25. Network Automation. 330 $aCisco Networks, 2nd Edition is a practical guide and desk reference for Cisco engineers. For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this book lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices. This new edition will discuss tools that can be used to automate and troubleshoot networks. A new chapter on quality of service has been added to teach managing network resources by prioritizing specific types of network traffic. The new edition has an updated wireless section which focuses on an updated controller and integration with Cisco Identity Services Engine (ISE) and Cisco Prime Infrastructure. This practical desk companion doubles as a comprehensive overview of the basic knowledge and skills needed by CCNA and CCNP exam takers. Prior familiarity with Cisco routing and switching is desirable but not necessary, as Chris Carthern, Dr. Will Wilson, and Noel Rivera start their book with a review of network basics. Further they explain practical considerations and troubleshooting when establishing a physical medium for network communications. Later they explain the concept of network layers, intermediate LAN switching, and routing. Next they introduce you to the tools and automation used with Cisco networks. Moving forward they explain management planes, data planes, and control planes. Next they describe advanced security, trouble shooting, and network management. They conclude the book with a section which focuses on using network automation to automate Cisco IOS networks. You will: Configure Cisco switches, routers, and data center devices in typical corporate network architectures Use black-hat tools to conduct penetration testing on the security of your network Configure and secure virtual private networks (VPNs) Enable identity management in your network with the Cisco Identity Services Engine (ISE) to. . 676 $a005.44769 700 $aCarthern$b Chris$0888904 702 $aWilson$b William$c(Network engineer), 702 $aRivera$b Noel 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483665303321 996 $aCisco Networks$91985618 997 $aUNINA