Search Results - GameTap~

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Notasi lagu muzik gamelan by Hermantoro, Dwiono

    Published 2010
    Subjects: “…Gamelan music…”
    Book
  2. 2
  3. 3

    Behind the scenes basketball by Monson, James 1994

    Published 2020
    Table of Contents: “…Introduction : getting to the top -- Making the jump -- Getting ready for gameday -- Staying in shape -- Making an impact…”
    Book
  4. 4

    Human embryology and developmental biology by Carlson, Bruce M.

    Published 2009
    Table of Contents: “…Getting ready for pregnancy -- Transport of gametes and fertilization -- Cleavage and implantation -- Molecular basis for embryonic development -- Formation of germ layers and early derivatives -- Establishment of the basic embryonic body plan -- Placenta and extraembryonic membranes -- Developmental disorders: causes, mechanisms, and patterns -- Integumentary, skeletal, and muscular systems -- Limb development -- Nervous system -- Neural crest -- Sense organs -- Head and neck -- Digestive and respiratory systems and body cavities -- Urogenital system -- Cardiovascular system -- Fetal period and birth…”
    Book
  5. 5

    Jangan biarkan dia masuk by A.Darwisy

    Published 2017
    Book
  6. 6

    International law for international relations

    Published 2010
    Table of Contents: “…Borgen -- Use of force in international law / Nigel Rodley and Basak Cali -- International humanitarian law / Elizabeth Griffin and Basak Cali -- International criminal law / Paola Gaeta -- International human rights law / Basak Cali -- International law for environmental protection / David M. …”
    Book
  7. 7

    The Garland handbook of Southeast Asian music

    Published 2008
    Book
  8. 8

    Jangan biar dia masuk by A.Darwisy

    Published 2015
    Book
  9. 9

    The Blackwell guide to medical ethics

    Published 2007
    Table of Contents: “…Husak. Selling organs, gametes, and surrogacy services / Janet Radcliffe-Richards -- The patient as victim and vector : the challenge of infectious disease for bioethics / Margaret P. …”
    Book
  10. 10

    Introduction to cyber-warfare a multidisciplinary approach by Shakarian, Paulo, Shakarian, Jana, Ruef, Andrew

    Published 2013
    Table of Contents: “…-- Attribution, Deception, and Intelligence -- Information Assurance -- I.Cyber Attack -- 2.Political Cyber Attack Comes of Age in 2007 -- Reliance on Information as a Vulnerability -- Rudimentary but Effective: Denial of Service -- Leaving Unwanted Messages: Web Site Defacement -- Tools for Denial of Service -- The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS Attack -- Estonia Is Hit by Cyber Attacks -- General Response to DDoS -- Summary -- Suggested Further Reading -- 3.How Cyber Attacks Augmented Russian Military Operations -- The 2008 Russian Cyber Campaign Against Georgia -- What Is Interesting About the Russian Cyber Campaign -- Preparing for a Cyber-Capable Adversary -- Summary -- Suggested Further Reading -- 4.When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East -- Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah "July War" of 2006 -- Civilians in the Cyber Melee: Operation Cast Lead -- Summary -- Suggested Further Reading -- 5.Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia -- DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks -- Silencing Novaya Gazeta and Other Russian Dissidents -- Iran -- How the 2009 Elections Led to Aggressive Cyber Operations -- Summary -- 6.Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates -- "Chaotic" Beginnings: The Chaos Computer Club; CCC -- The Roots of the Anon -- 4chan, 7chan, and Other Message Boards -- How We Are Influenced by 4chan: Memes -- Anonymous -- On Image, Structure, and Motivation -- Anonymous -- External Connections and Spin Offs -- Your Security Is a Joke: LulzSec -- Anonymous' Modus Operandi -- Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous -- Software for the Legion: Anonymous Products -- Summary -- Suggested Further Reading -- II.Cyber Espionage And Exploitation -- 7.Enter the Dragon: Why Cyber Espionage Against Militaries, Dissidents, and Nondefense Corporations Is a Key Component of Chinese Cyber Strategy -- Introduction -- Why Cyber Espionage Is Important to China: A Look at Chinese Cyber Doctrine -- Leveraging Resources Beyond the Military: The Cyber Warriors of China -- Stealing Information from the U.S. …”
    Book