Narrow your search

Library

ULiège (3)

ULB (2)

FARO (1)

KBC (1)

KU Leuven (1)

LUCA School of Arts (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UAntwerpen (1)

More...

Resource type

book (4)


Language

English (4)


Year
From To Submit

2019 (4)

Listing 1 - 4 of 4
Sort by

Book
Pet sematary
Author:
ISBN: 9781529378313 Year: 2019 Publisher: London : Hodder & Stoughton,

Loading...
Export citation

Choose an application

Bookmark

Abstract

he house looks right, feels right to Dr Louis Creed. Rambling, old and comfortable. A place where the family can settle ; the children grow and play and explore. The rolling hills and meadows of Maine seem a world away from the fume-choked dangers of the city. It's only those big trucks on the road outside which growl out unnerving threats. Behind the house there's a carefully cleared path up into the woods to a place where generations of local children have walked in procession with the solemn innocence of the young, taking with them their dear departed pets for burial.A sad place maybe, but safe. Surely a safe place. Not a place to seep into your dreams, to wake you, sweating with fear and foreboding...


Book
It
Author:
ISBN: 9781473666948 Year: 2019 Publisher: London : Hodder & Stoughton,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Queering Mennonite literature : archives, activism, and the search for community
Author:
ISBN: 0271082445 9780271082448 Year: 2019 Publisher: University Park (Pa.) : The Pennsylvania State University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Examines the ways queer theory and Mennonite litterature have intersected over the past decade and how these two traditions hold fundamental commitements to social justice in common." —

Vulnerability Management.
Author:
ISBN: 0415015464 0415015472 1000005097 0429289650 9781000005097 9780429289651 9781000018455 1000018458 9781000011937 1000011933 0367235145 1032401435 9780415015462 Year: 2019 Publisher: Milton : Auerbach Publications,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Vulnerability management (VM) has been around for millennia. Cities, tribes, nations, and corporations have all employed its principles. The operational and engineering successes of any organization depend on the ability to identify and remediate a vulnerability that a would-be attacker might seek to exploit. What were once small communities became castles. Cities had fortifications and advanced warning systems. All such measures were the result of a group recognizing their vulnerabilities and addressing them in different ways. Today, we identify vulnerabilities in our software systems, infrastructure, and enterprise strategies. Those vulnerabilities are addressed through various and often creative means. Vulnerability Management demonstrates a proactive approach to the discipline. Illustrated with examples drawn from Park Foreman's more than three decades of multinational experience, the book demonstrates how much easier it is to manage potential weaknesses than to clean up after a violation. Covering the diverse realms that CISOs need to know and the specifics applicable to singular areas of departmental responsibility, he provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps, especially those that are inherent in a larger organization. Completely updated, the second edition provides a fundamental understanding of technology risks--including a new chapter on cloud vulnerabilities and risk management--from an interloper's perspective. This book is a guide for security practitioners, security or network engineers, security officers, and CIOs seeking understanding of VM and its role in the organization. To serve various audiences, it covers significant areas of VM. Chapters on technology provide executives with a high-level perspective of what is involved. Other chapters on process and strategy, although serving the executive well, provide engineers and security managers with perspective on the role of VM technology and processes in the success of the enterprise.

Keywords

Fiction --- American literature --- English literature --- anno 1900-1999 --- American fiction --- English fiction --- Feminism and literature --- Identity (Psychology) in literature --- Postmodernism --- Sex role in literature --- Women and literature --- Roman américain --- Roman anglais --- Féminisme et littérature --- Identité (Psychologie) dans la littérature --- Postmodernisme --- Rôle selon le sexe dans la littérature --- Femmes et littérature --- Women authors --- History and criticism --- Femmes écrivains --- Histoire et critique --- 82.015.9 --- 82:396 --- -American fiction --- -English fiction --- -Feminism and literature --- Psychological fiction --- -Fiction --- Literature --- Post-modernism --- Postmodernism (Philosophy) --- Arts, Modern --- Avant-garde (Aesthetics) --- Modernism (Art) --- Philosophy, Modern --- Post-postmodernism --- Literaire stromingen: postmodernisme --- Literatuur en feminisme --- -History and criticism --- Woolf, Virginia --- -Criticism and interpretation --- 82:396 Literatuur en feminisme --- 82.015.9 Literaire stromingen: postmodernisme --- -Literaire stromingen: postmodernisme --- -Literature --- -Post-modernism --- Roman américain --- Féminisme et littérature --- Identité (Psychologie) dans la littérature --- Rôle selon le sexe dans la littérature --- Femmes et littérature --- Femmes écrivains --- Postmodernism (Literature) --- Women authors&delete& --- Woolf, Virginia, --- Woolf, Virginia Stephen, --- Stephen, Virginia, --- Ulf, Virzhinii︠a︡, --- Ṿolf, Ṿirg'inyah, --- Vulf, Virdzhinii︠a︡, --- Вулф, Вирджиния, --- וולף, וירג׳יניה --- וולף, וירג׳יניה, --- Stephen, Adeline Virginia, --- Criticism and interpretation. --- Information technology --- Computer security. --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Littérature anglaise --- Littérature américaine --- Woolf, Virginia (1882-1941) --- 20e siècle --- Critique et interprétation

Listing 1 - 4 of 4
Sort by