LEADER 00978nam1-2200289 -450 001 9910166360503321 005 20170313093002.0 100 $a20170313d1947----km y0itay50 ba 101 0 $anor 102 $aNO 105 $aa 001yy 200 1 $aNorge i kart$fby Tore Sund and Axel Sømme 210 $aBergen$cJ. Griegs Boktreykkeri$d1947 215 $a2 v.$cill.$d24 cm$e1 cofanetto (19 c. geogr. ripieg.) 225 1 $aSkrifter fra Norges handelshøyskole 463 \1$10019910166360003321$12001 $ac. Topografisk kart 463 \1$10019910166360203321$12001 $aB. Kartskisser og fotografier 463 \1$10019910166360403321$12001 $aA: Tekstbind$emed analyser av kartene 610 0 $aNorvegia 700 1$aSund,$bTore$f<1914-1965>$0740415 701 1$aSomme,$bAxel Christian Zellitz$f<1899-1991>$0740416 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a9910166360503321 959 $aILFGE 996 $aNorge i kart$91469317 997 $aUNINA LEADER 03964nam 2200673 450 001 9910453595903321 005 20200520144314.0 010 $a3-11-087045-2 024 7 $a10.1515/9783110870459 035 $a(CKB)2550000001198821 035 $a(EBL)3045520 035 $a(OCoLC)922948900 035 $a(SSID)ssj0001082486 035 $a(PQKBManifestationID)12486367 035 $a(PQKBTitleCode)TC0001082486 035 $a(PQKBWorkID)11098279 035 $a(PQKB)11117632 035 $a(MiAaPQ)EBC3045520 035 $a(DE-B1597)55628 035 $a(OCoLC)979587659 035 $a(DE-B1597)9783110870459 035 $a(Au-PeEL)EBL3045520 035 $a(CaPaEBR)ebr10834618 035 $a(EXLCZ)992550000001198821 100 $a19930825d1993 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$a1870/71-1989/90 $eGerman unifications and the change of literary discourse /$fedited by Walter Pape 205 $aReprint 2013 210 1$aBerlin ;$aNew York :$cW. de Gruyter,$d1993. 215 $a1 online resource (388 p.) 225 1 $aEuropean cultures ;$vvolume 1 300 $aDescription based upon print version of record. 311 $a3-11-013878-6 320 $aIncludes bibliographical references and index. 327 $tFrontmatter -- $tContents -- $tCultural Change and Cultural Memory: The Principle of Hope in the Times of German Unifications / $rPape, Walter -- $tHistory, Education, Language, and National Identity -- $tNational History and National Identity in the New Germany / $rSheehan, James J. -- $tThe Franco-Prussian War and Unification in German History Schoolbooks / $rKelly, Alfred -- $tLanguage and the Social Foundations of Radical Nationalism in the Wilhelmine Era / $rChickering, Roger -- $t"Dann weg 'mit's Milletär' und wieder ein civiler Civilist": Theodor Fontane and the Wars of German Unification / $rCornell, John S. -- $tLiterature, Aesthetics, and Literary Market after 1870/71 -- $t"Hurra, Germania - mir graut vor dir": Hoffmann von Fallersleben, Freiligrath, Herwegh, and the German Unification of 1870/71 / $rPape, Walter -- $tFriedrich Spielhagen - Critic of Bismarck's Empire / $rNeuhaus, Volker -- $t"Gibt es nicht Völker, in denen vergessen zu werden eine Ehre ist?": Raabe and German Unification / $rMeyer-Krentler, Eckhardt -- $tLiterary Changes Compared - 1870/71 and 1990 -- $tImagining the German Capital: Berlin Writers on the Two Unification Eras / $rRoper, Katherine -- $tTelling German History: Forms and Functions of the Historical Narrative Against the Background of the National Unifications / $rFulda, Daniel -- $t1990: The Priciple of Hope or: Nailed to the Cross of the Past? -- $tAnother Piece of the Past / $rReed, Terence James -- $tIntellectuals, Unification, and Political Change 1990: The Case of Christa Wolf / $rSchoeps, Karl-Heinz J. -- $t"Wir hausen im Prenzlauer Berg": On the Very Last Generation of GDR Poets / $rBrady, Philip -- $tThe End of the Dream of the "Other Germany": The "German Question" in West German Letters / $rBullivant, Keith -- $tBibliography -- $tNotes on Contributors -- $tIndex 410 0$aEuropean cultures ;$vv. 1. 606 $aGerman literature$y19th century$xPolitical aspects 606 $aGerman literature$y20th century$xPolitical aspects 606 $aNationalism in literature 606 $aFranco-Prussian War, 1870-1871 607 $aGermany$xHistory$yUnification, 1990 608 $aElectronic books. 615 0$aGerman literature$xPolitical aspects. 615 0$aGerman literature$xPolitical aspects. 615 0$aNationalism in literature. 615 0$aFranco-Prussian War, 1870-1871. 676 $a830.9/358 701 $aPape$b Walter$0223991 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910453595903321 996 $a1870$92454527 997 $aUNINA LEADER 05577nam 2200697Ia 450 001 9910784790303321 005 20230721030550.0 010 $a1-280-97384-6 010 $a9786610973842 010 $a0-470-23138-6 035 $a(CKB)1000000000400391 035 $a(EBL)315200 035 $a(OCoLC)630529467 035 $a(SSID)ssj0000291085 035 $a(PQKBManifestationID)11230502 035 $a(PQKBTitleCode)TC0000291085 035 $a(PQKBWorkID)10248466 035 $a(PQKB)10050803 035 $a(MiAaPQ)EBC315200 035 $a(Au-PeEL)EBL315200 035 $a(CaPaEBR)ebr10296353 035 $a(CaONFJC)MIL97384 035 $a(EXLCZ)991000000000400391 100 $a20070813d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe CEH prep guide$b[electronic resource] $ethe comprehensive guide to certified ethical hacking /$fRonald L. Krutz, Russell Dean Vines 210 $aIndianapolis, IN $cWiley$dc2007 215 $a1 online resource (770 p.) 300 $aIncludes index. 311 $a0-470-13592-1 327 $aThe CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking; About the Authors; Credits; Contents; Foreword; Acknowledgments; Introduction; Exam Eligibility; Part I: The Business and Legal Issues of Ethical Hacking; Chapter 1: Introduction to Ethical Hacking; Terminology; Hacking History; Ethical Hacking Objectives and Motivations; Steps in Malicious Hacking; Hacker and Ethical Hacker Characteristics and Operations; Related Types of Computer Crime; Assessment Questions; Chapter 2: Legality and Ethics; Law and Legal Systems; Computer Crime Penalties; Ethics; Assessment Questions 327 $aChapter 3: Penetration Testing for BusinessPenetration Testing from a Business Perspective; Justification of Penetration Testing through Risk Analysis; Management Responsibilities in Risk Analysis Relating to Penetration Testing; Assessment Questions; Part II: The Pre-Attack Phases; Chapter 4: Footprinting; Gathering Information; Locating the Network Range; Assessment Questions; Chapter 5: Scanning; Identifying Active Machines; Identifying Open Ports and Available Services; War Dialing; War Driving and War Walking; Fingerprinting; Mapping the Network; Assessment Questions 327 $aChapter 6: EnumeratingProtection Rings; Windows Architecture; Windows Security Elements; Enumerating Techniques for Windows; Countermeasures; Assessment Questions; Part III: Attack Techniques and Tools; Chapter 7 System Hacking Techniques; Password Guessing; Privilege Escalation; Password Cracking; Covering Tracks; Countermeasures; Assessment Questions; Chapter 8: Trojans, Backdoors, and Sniffers; Trojans and Backdoors; Sniffers; Assessment Questions; Chapter 9: Denial of Service Attacks and Session Hijacking; Denial of Service/Distributed Denial of Service (DoS/DDoS); Session Hijacking 327 $aAssessment QuestionsChapter 10: Penetration Testing Steps; Penetration Testing Overview; Legal and Ethical Implications; The Three Pretest Phases; Penetration Testing Tools and Techniques; Wireless Network Penetration Testing; Social Engineering; Intrusion Detection System (IDS); Assessment Questions; Chapter 11: Linux Hacking Tools; Linux History; Scanning Networks with Linux Tools; Linux Hacking Tools; Linux Rootkits; Linux Security Tools; Assessment Questions; Chapter 12: Social Engineering and Physical Security; Social Engineering; Physical Security; Assessment Questions 327 $aPart IV: Web Server and Database AttacksChapter 13: Web Server Hacking and Web Application Vulnerabilities; Web Server Hacking; Web Application Vulnerabilities; Countermeasures; Assessment Questions; Chapter 14:SQL Injection Vulnerabilities; SQL Injection Testing and Attacks; SQL Injection Prevention and Remediation; Automated SQL Injection Tools; Assessment Questions; Chapter 15: Cryptography; Symmetric Key Cryptography; Public Key Cryptosystems; Public Key Certificates; Cryptanalysis; Managing Encryption Keys; Email Security; Electronic Transaction Security; Wireless Security 327 $aDisk Encryption 330 $aThe Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scopePresents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, and moreDiscusses key areas such as Web application vulnerabilities, Web-based password cracking techniques, SQL injection, wireless hacking, viruses and worms, physical security, and Linux hackingContains a CD-ROM that enables read 606 $aComputer security$xTesting$xExaminations$vStudy guides 606 $aComputer networks$xSecurity measures$xExaminations$vStudy guides 606 $aComputer networks$xExaminations$vStudy guides 606 $aComputer hackers 615 0$aComputer security$xTesting$xExaminations 615 0$aComputer networks$xSecurity measures$xExaminations 615 0$aComputer networks$xExaminations 615 0$aComputer hackers. 676 $a004.16 676 $a005.8 686 $a54.89$2bcl 700 $aKrutz$b Ronald L.$f1938-$0543581 701 $aVines$b Russell Dean$f1952-$01114690 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910784790303321 996 $aThe CEH prep guide$93725134 997 $aUNINA