LEADER 00843nam0-22002891i-450 001 990004779510403321 005 20230306094657.0 035 $a000477951 035 $aFED01000477951 035 $a(Aleph)000477951FED01 100 $a19990530g19709999km-y0itay50------ba 101 0 $afre$aeng 102 $aGB 105 $ay-------001yy 200 1 $aHistorical French reader$eMedieval Period$fedited by Paul Studer and E.G.R. Waters 210 $aOxford$cClarendon Press$d1970 215 $aXII, 269 p.$d19 cm 325 $aRistampa dell'edizione del 1924 702 1$aStuder,$bPaul 702 1$aWaters,$bEdwin Georg Ross 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990004779510403321 952 $aMW 117$bFil. Mod. 22835$fFLFBC 959 $aFLFBC 996 $aHISTORICAL French reader$9559681 997 $aUNINA LEADER 02492oem 2200553I 450 001 9910712983803321 005 20200827084331.0 035 $a(CKB)5470000002498352 035 $a(OCoLC)1145340306$z(OCoLC)1149629020 035 $a(EXLCZ)995470000002498352 100 $a20200320d2019 da 101 0 $aeng 120 $ab|||||||||||| 121 $a||||||||| 124 $bd 135 $aurcn||||||||| 181 $ccri$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aGeologic map of the northern Harrat Rahat volcanic field, Kingdom of Saudi Arabia /$fby Drew T. Downs [and eight others] 210 1$aReston, Virginia :$cU.S. Department of the Interior, U.S. Geological Survey ;$aJeddah, Kingdom of Saudi Arabia :$cSaudi Geological Survey,$d2019. 215 $a1 online resource (3 maps) $ccolor +$edata sheet + pamphlet (vi, 65 pages : color maps) 225 1 $aScientific investigations map ;$v3428 225 0 $aSaudi Geological Survey special report SGS-SP ;$v2019-2 300 $aRelief shown by shading. 300 $aIncludes location map. 300 $aIncludes notes, four profiles, and ancillary map on data sheet.. 320 $aIncludes bibliographical references in pamphlet (pages 42-44). 327 $aGeologic map of the northern Harrat Rahat volcanic field, Kingdom of Saudi Arabia -- Geologic map of the northern, central, and southern Fingers Lava Flows, Northern Harrat Rahat Volcanic Field, Kingdom of Saudi Arabia -- Geologic map of the Silicic volcanic centers near Al Efairia, Al Wabarah, and Matan, northern Harrat Rahat Volcanic Field, Kingdom of Saudi Arabia -- Correlation and list of map units for the geologic map of the northern Harrat Rahat Volcanic Field, Kingdom of Saudi Arabia. 606 $aVolcanic fields$zSaudi Arabia$vMaps 606 $aGeology$zSaudi Arabia$vMaps 606 $aGeology$2fast 606 $aVolcanic fields$2fast 607 $aSaudi Arabia$2fast 608 $aMaps.$2fast 608 $aMaps.$2lcgft 615 0$aVolcanic fields 615 0$aGeology 615 7$aGeology. 615 7$aVolcanic fields. 702 $aDowns$b Drew T. 712 02$aHay?at al-Misa?h?ah al-Jiyu?lu?ji?yah al-Sa?u?di?yah, 801 0$bGPO 801 1$bGPO 801 2$bOCLCF 906 $aBOOK 912 $a9910712983803321 996 $aGeologic map of the northern Harrat Rahat volcanic field, Kingdom of Saudi Arabia$93338281 997 $aUNINA LEADER 05878nam 22007693u 450 001 9910963392403321 005 20251117090552.0 010 $a1-283-17725-0 010 $a9786613177254 010 $a1-118-11454-X 035 $a(CKB)2550000000040634 035 $a(EBL)693645 035 $a(OCoLC)747412541 035 $a(SSID)ssj0000539129 035 $a(PQKBManifestationID)11357033 035 $a(PQKBTitleCode)TC0000539129 035 $a(PQKBWorkID)10568613 035 $a(PQKB)10439950 035 $a(MiAaPQ)EBC693645 035 $a(EXLCZ)992550000000040634 100 $a20131028d2011 uy| 0 101 0 $aeng 135 $aur|nu---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aMicrosoft Windows Security $eEssentials /$fDarril Gibson 205 $a1st ed. 210 $aHoboken $cWiley$d2011 210 $aIndiana $cWiley$d2011 215 $a1 online resource (374 p.) 225 1 $aSybex serious skills 225 1 $aEssentials (Indianapolis, Ind.) 300 $aDescription based upon print version of record. 311 08$a1-118-72244-2 311 08$a1-118-01684-X 327 $aMicrosoft Windows Security Essentials; Introduction; Who Should Read This Book; What You Will Learn; Prerequisites; What You Need; What Is Covered in This Book; Chapter 1: Understanding Core Security Principles; Understanding Risk; Exploring the Security Triad; Protecting Against Loss of Confidentiality; Protecting Against Loss of Availability; Protecting Against Loss of Integrity; Implementing a Defense-in-Depth Security Strategy; Enforcing the Principle of Least Privilege; Hardening a Server; Reducing the Attack Surface; Keeping a System Updated; Enabling the Firewall 327 $aInstalling Antivirus Software Chapter 2: Understanding Malware and Social Engineering; Comparing Malware; Viruses; Worms; Trojan Horses; Buffer-Overflow Attacks; Spyware; Understanding the Threat; Protecting Against Malware; Using Antivirus Software; Using Microsoft Security Essentials on Desktops; Thwarting Social-Engineering Attacks; Social Engineering in Person; Social Engineering with a Phone Call; Recognizing Phishing Attempts; Recognizing Pharming; Protecting Email; Chapter 3: Understanding User Authentication; Comparing the Three Factors of Authentication 327 $aUsing Passwords for Authentication Comparing Password Attack Methods; Creating Strong Passwords; Enforcing Strong Passwords; Exploring Account Lockout Policies; Unlocking an Account; Resetting a Password; Changing a Password; Creating a Password-Reset Disk; Using Smart Cards and Token Devices for Authentication; Using Biometrics for Authentication; Starting Applications with Run As Administrator; Preventing Time Skew with Kerberos; Identifying RADIUS Capabilities; Identifying Unsecure Authentication Protocols; LM; NTLM (NTLMv1); Chapter 4: Securing Access with Permissions 327 $aComparing NTFS Permissions Identifying Basic NTFS Permissions; Identifying Advanced NTFS Permissions; Combining Permissions; Enabling and Disabling Permission Inheritance; Moving and Copying Files; Comparing NTFS and FAT; Exploring Share Permissions; Identifying Share Permissions; Combining NTFS and Share Permissions; Identifying Active Directory Permissions; Viewing Active Directory Users and Computers; Comparing NTFS and Active Directory Permissions; Viewing Active Directory Permissions; Assigning Registry Permissions; Chapter 5: Using Audit Policies and Network Auditing 327 $aExploring Audit Policies Exploring Object Access Auditing; Comparing Account Logon and Logon Events; Exploring Directory Service Access Auditing; Understanding Account Management Auditing; Understanding System Events Auditing; Understanding Privilege Use Auditing; Understanding Policy Change Auditing; Understanding Process Tracking; Enabling Auditing; Enabling Object Access Auditing; Enabling Directory Service Access Auditing; Viewing Audit Information; Managing Security Logs; Saving Audit Information; Securing Audit Information; Auditing a Network with MBSA; Installing MBSA; Running MBSA 327 $aChapter 6: Protecting Clients and Servers 330 $aWindows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be 410 0$aSerious skills 606 $aElectronic data processing personnel$xCertification$vStudy guides 606 $aComputer networks$xExaminations$vStudy guides 606 $aComputer networks - Examinations 606 $aComputer networks -- Examinations -- Study guides 606 $aComputer security - Examinations 606 $aElectronic data processing personnel - Certification 615 0$aElectronic data processing personnel$xCertification 615 0$aComputer networks$xExaminations 615 4$aComputer networks - Examinations. 615 4$aComputer networks -- Examinations -- Study guides. 615 4$aComputer security - Examinations. 615 4$aElectronic data processing personnel - Certification. 676 $a005.8 676 $a621.3916076 700 $aGibson$b Darril$01122631 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 801 2$bAzTeS 906 $aBOOK 912 $a9910963392403321 996 $aMicrosoft Windows Security$94456372 997 $aUNINA