Search Results - feudal system
Suggested Topics within your search.
Suggested Topics within your search.
-
1
The history of modern Japanese education constructing the national school system,1872-1890 /
Published 2009NetLibrary
ebrary
MyiLibrary
Electronic eBook -
2
Comparative politics the principal-agent perspective /
Published 2008Table of Contents: “…Introduction : micro foundations of comparative politics -- The states of the world -- Rule of law -- Environmental factors -- Impact of political institutions -- Changing principal-agent institutions -- Party system instability and volatility from the principal-agent perspective -- Regime fitness : on the survival of polities -- The concept of a polity : from the city-state to the empire -- The ancient empires : Oriental despotism or the patrimonial state -- Feudalism : political, economical and modern -- The nation-state and colonial empires -- The regionalisation of the state -- Conclusion : evolutionary advantage of rule of law regimes.…”
NetLibrary
MyiLibrary
Electronic eBook -
3
Information security and IT risk management
Published 2014Table of Contents: “…Maxx -- Chapter review questions -- Example case questions -- Hands-on Activity -- Linux system installation -- Critical thinking exercise -- Google executives sentenced to prison over video -- Design case -- ch. 3 System Administration (Part 2) -- Overview -- Operating system structure -- The command-line interface -- Files and directories -- Moving around the filesystem -- pwd, cd -- Listing files and directories -- Shell expansions -- File management -- Viewing files -- Searching for files -- Access control and user management -- Access control lists -- File ownership -- Editing files -- Software installation and updates -- Account management -- Command-line user administration -- Example case -- Northwest Florida State College -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- basic Linux system administration -- Critical thinking exercise -- offensive cyber effects operations (OCEO) -- Design Case -- ch. 4 The Basic Information Security Model -- Overview -- Introduction -- Components of the basic information security model -- Common vulnerabilities, threats, and controls -- Example case -- ILOVEYOU virus -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- web server security -- Critical thinking exercise -- the internet, "American values," and security -- Design case -- ch. 5 Asset Identification and Characterization -- Overview -- Assets overview -- Determining assets that are important to the organization -- Asset types -- Asset characterization -- IT asset life cycle and asset identification -- System profiling -- Asset ownership and operational responsibilities -- Example case -- Stuxnet -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- course asset identification -- Critical thinking exercise -- uses of a hacked PC -- Design case -- ch. 6 Threats and Vulnerabilities -- Overview -- Introduction -- Threat models -- Threat agent -- Threat action -- Vulnerabilities -- Example case -- Gozi -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- Vulnerability scanning -- Critical thinking exercise -- Iraq cyberwar plans in 2003 -- Design case -- ch. 7 Encryption Controls -- Overview -- Introduction -- Encryption basics -- Encryption types overview -- Encryption types details -- Encryption in use -- Example case -- Nation technologies -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- encryption -- Critical thinking exercise -- encryption keys embed business models -- Design case -- ch. 8 Identity and Access Management -- Overview -- Identity management -- Access management -- Authentication -- Single sign-on -- Federation -- Example case -- Markus Hess -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- identity match and merge -- Critical thinking exercise -- feudalism the security solution for the internet? …”
Book


