LEADER 03325nam 22006855 450 001 9910588781903321 005 20250821190112.0 010 $a3-11-055587-5 010 $a3-11-055803-3 024 7 $a10.1515/9783110558036 035 $a(CKB)4100000007389768 035 $a(DE-B1597)483631 035 $a(OCoLC)1083621092 035 $a(DE-B1597)9783110558036 035 $a(MiAaPQ)EBC5158093 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/91520 035 $a(oapen)doab91459 035 $a(oapen)doab91520 035 $a(EXLCZ)994100000007389768 100 $a20190123d2018 fg 101 0 $ager 135 $aur||#|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aDie Geschichte der Shoah im virtuellen Raum $eEine Quellenkritik /$fAlina Bothe 210 $aBerlin/Boston$cDe Gruyter$d2019 210 1$aMünchen ;$aWien :$cDe Gruyter Oldenbourg,$d[2018] 210 4$d©2019 215 $a1 online resource (499 p.) 225 0 $aEuropäisch-jüdische Studien - Beiträge ;$v41 311 08$a3-11-055577-8 327 $tFrontmatter --$tInhalt --$t1. Einleitung --$t2. Zeugnis und ZeugInnenschaft --$t3. Die USC Shoah Foundation und das Visual History Archive: Grundlagen und Quellenkritik --$t4. Die virtuelle Sphäre als virtueller Zwischenraum der Erinnerung --$t5. Fallstudien --$t6. Fazit --$tAbkürzungsverzeichnis --$tLiteraturverzeichnis --$tQuellenverzeichnis --$tZur Autorin --$tPersonenregister 330 $aWelche Bedeutung haben digitale Medien für die Geschichte, wie entsteht eine digitale Geschichte? Wie funktioniert Forschen und Schreiben unter veränderten Bedingungen, wie die demokratische Auseinandersetzung um die Erinnerungskultur? Diesen zentralen Fragen einer digitalen Geschichtswissenschaft wird in dieser Studie anhand des paradigmatischen Visual History Archives (VHA) nachgegangen. Im VHA sind mehr als 49.000 digitale Zeugnisse Überlebender der Shoah gespeichert. Diese Studie analysiert zunächst die Quellengattung des Zeugnisses, die spezifischen Bedingungen der Zeugnisse im VHA, bevor ein theoretischer Rahmen für das Verstehen dieses digital turns, mit dem an Hannah Arendt und Homi Bhabha angelehnten Entwurf eines virtuellen Zwischenraums der Erinnerung formuliert wird. Die theoretischen Annahmen werden abschließend in drei Fallstudien zur Forschung, Darstellung und Rezeption geprüft. Ergebnis dieser Studie ist eine konzise Quellenkritik digitaler Zeugnisse, ihr Dispositiv. 606 $aDigital History 606 $aDigital history 606 $aErinnerung 606 $aGeschichtstheorie 606 $aHolocaust 606 $aremembrance 606 $atheory of history 610 $aDigital history 610 $aremembrance 610 $atheory of history 610 $aHolocaust 615 4$aDigital History. 615 4$aDigital history. 615 4$aErinnerung. 615 4$aGeschichtstheorie. 615 4$aHolocaust. 615 4$aremembrance. 615 4$atheory of history. 676 $a940 700 $aBothe$b Alina$00 801 0$bDE-B1597 801 1$bDE-B1597 906 $aBOOK 912 $a9910588781903321 996 $aDie Geschichte der Shoah im virtuellen Raum$92843199 997 $aUNINA LEADER 06202nam 2200661 a 450 001 9910957118403321 005 20251117091615.0 010 $a1-283-40073-1 010 $a9786613400734 010 $a1-118-11366-7 035 $a(CKB)2550000000059582 035 $a(EBL)697705 035 $a(OCoLC)759117225 035 $a(SSID)ssj0000551100 035 $a(PQKBManifestationID)11318758 035 $a(PQKBTitleCode)TC0000551100 035 $a(PQKBWorkID)10523937 035 $a(PQKB)11386585 035 $a(MiAaPQ)EBC697705 035 $a(CaSebORM)9781118113684 035 $a(EXLCZ)992550000000059582 100 $a20110415d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCompTIA security+ deluxe study guide /$fEmmett Dulaney 205 $a2nd ed. 210 $aIndianapolis $cWiley Pub., Inc.$dc2011 215 $a1 online resource (703 p.) 300 $aIncludes: "A handy tear card that maps every official exam objective"--P. 4 of cover. 300 $a"Exam SY0-301"--Cover. 300 $aIncludes index. 311 08$a1-118-01474-X 327 $aCompTIA Discount Coupon; CompTIA Security+ Deluxe Study Guide; Contents; Foreword; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Measuring and Weighing Risk; Risk Assessment; Developing Policies, Standards, and Guidelines; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 2: Infrastructure and Connectivity; Mastering TCP/IP; Distinguishing between Security Topologies; Understanding Infrastructure Security; Understanding the Different Network Infrastructure Devices; Understanding Remote Access; Summary; Exam Essentials; Review Questions 327 $aAnswers to Review QuestionsChapter 3: Protecting Networks; Monitoring and Diagnosing Networks; Understanding Intrusion Detection Systems; Understanding Protocol Analyzers; Securing Workstations and Servers; Securing Internet Connections; Understanding Network Protocols; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 4: Threats and Vulnerabilities; Understanding Software Exploitation; Surviving Malicious Code; Calculating Attack Strategies; Recognizing Common Attacks; Identifying TCP/IP Security Concerns; Summary; Exam Essentials; Review Questions 327 $aAnswers to Review QuestionsChapter 5: Access Control and Identity Management; Access Control Basics; Understanding Remote Access Connectivity; Understanding Authentication Services; Understanding Access Control; Implementing Access Control Best Practices; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 6: Educating and Protecting the User; Understanding Security Awareness and Training; Classifying Information; Information Access Controls; Complying with Privacy and Security Regulations; Understanding Social Engineering; Summary; Exam Essentials 327 $aReview QuestionsAnswers to Review Questions; Chapter 7: Operating System and Application Security; Hardening the Operating System; Application Hardening; Working with Data Repositories; Host Security; Mobile Devices; Best Practices for Security; Attack Types to Be Aware Of; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 8: Cryptography Basics; An Overview of Cryptography; Understanding Cryptographic Algorithms; Using Cryptographic Systems; Understanding Cryptography Standards and Protocols; Summary; Exam Essentials; Review Questions 327 $aAnswers to Review QuestionsChapter 9: Cryptography Implementation; Using Public Key Infrastructure; Preparing for Cryptographic Attacks; Understanding Key Management and the Key Life Cycle; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 10: Physical and Hardware-Based Security; Implementing Access Control; Maintaining Environmental and Power Controls; Fire Suppression; Summary; Exam Essentials; Review Questions; Answers to Review Questions; Chapter 11: Security and Vulnerability in the Network; Network Security Threats 327 $aSecure Network Administration Principles 330 $a"Get a host of extras with this Deluxe version of our top-selling Security+ study guide!Prepare for CompTIA's new Security+ exam SY0-301 with this Deluxe Edition of our popular CompTIA Security+ Study Guide, 5th Edition. In addition to the 100% coverage of all exam objectives and study tools you'll find in the regular study guide, the Deluxe Edition gives additional hands-on exercises and study aides, three additional practice exams, over 100 additional electronic flashcards, valuable video demonstrations by the author, and an exclusive security administration simulator. Provides 100% coverage of all exam objectives for Security+ exam SY0-301 Packed with a hundred additional pages, located on the CD Features Deluxe-Edition-only additional practice exams and electronic flashcard, video demonstrations, and an exclusive Security Administrator simulator so you can practice in a real-world environment Covers key topics such as general security concepts, communication and infrastructure security, the basics of cryptography, operational security, and more Shows you pages of practical examples and offers insights drawn from the real world Get deluxe preparation, pass the exam, and jump-start your career. It all starts with CompTIA Security+ Deluxe Study Guide, 2nd Edition"--$cProvided by publisher. 606 $aElectronic data processing personnel$xCertification 606 $aComputer security$xExaminations$vStudy guides 606 $aComputer networks$xSecurity measures$xExaminations$vStudy guides 615 0$aElectronic data processing personnel$xCertification. 615 0$aComputer security$xExaminations 615 0$aComputer networks$xSecurity measures$xExaminations 676 $a005.8 686 $aCOM053000$2bisacsh 700 $aDulaney$b Emmett A$0866974 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910957118403321 996 $aCompTIA security+ deluxe study guide$94456254 997 $aUNINA