Бази даних

Наукова електронна бібліотека - результати пошуку

Mozilla Firefox Для швидкої роботи та реалізації всіх функціональних можливостей пошукової системи використовуйте браузер
"Mozilla Firefox"

Вид пошуку
у знайденому
Сортувати знайдені документи за:
авторомназвоюроком видання
Формат представлення знайдених документів:
повнийстислий
 Знайдено в інших БД:Віртуальна довідка (97)Тематичний інтернет-навігатор (13)Автореферати дисертацій (3231)Реферативна база даних (21190)Книжкові видання та компакт-диски (5207)Журнали та продовжувані видання (169)
Пошуковий запит: (<.>K=ЗАХИСТ$<.>)
Загальна кількість знайдених документів : 312
Представлено документи з 1 до 20
...

   Тип видання:   методичний посібник   
1.


Abwehr englischer gangster-methoden "Silent killing" [Electronic resource]. - [S. l. : s. n.]. - 52 S.
Переклад назви: Захист від англійських гангстерських прийомів "Тихе вбивство"

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ




Кл.слова:
німецька армія -- рукопашний бій

   Тип видання:   методичний посібник   
2.

Schneier, B.
Applied Cryptography [Electronic resource] : protocols, Algorthms, and Source Code in C / B. Schneier. - 2th. ed.. - New York : John Wiley & Sons, 1996
Переклад назви: Прикладна криптографія

Рубрики:

  Повний текст доступний у читальних залах НБУВ


There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter. If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter, that’s not security. That’s obscurity. On the other hand, if I take a letter and lock it in a safe, and then give you the safe along with the design specifications of the safe and a hundred identical safes with their combinations so that you and the world’s best safecrackers can study the locking mechanism—and you still can’t open the safe and read the letter—that’s security. For many years, this sort of cryptography was the exclusive domain of the military. The United States’ National Security Agency (NSA), and its counterparts in the former Soviet Union, England, France, Israel, and elsewhere, have spent billions of dollars in the very serious game of securing their own communications while trying to break everyone else’s. Private individuals, with far less expertise and budget, have been powerless to protect their own privacy against these governments. During the last 20 years, public academic research in cryptography has exploded. While classical cryptography has been long used by ordinary citizens, computer cryptography was the exclusive domain of the world’s militaries since World War II. Today, state–of–the–art computer cryptography is practiced outside the secured walls of the military agencies. The layperson can now employ security practices that can protect against the most powerful of adversaries—security that may protect against military agencies for years to come. Do average people really need this kind of security? Yes. They may be planning a political campaign, discussing taxes, or having an illicit affair. They may be designing a new product, discussing a marketing strategy, or planning a hostile business takeover. Or they may be living in a country that does not respect the rights of privacy of its citizens. They may be doing something that they feel shouldn’t be illegal, but is. For whatever reason, the data and communications are personal, private, and no one else’s business. This book is being published in a tumultuous time. In 1994, the Clinton administration approved the Escrowed Encryption Standard (including the Clipper chip and Fortezza card) and signed the Digital Telephony bill into law. Both of these initiatives try to ensure the government’s ability to conduct electronic surveillance. Some dangerously Orwellian assumptions are at work here: that the government has the right to listen to private communications, and that there is something wrong with a private citizen trying to keep a secret from the government. Law enforcement has always been able to conduct court–authorized surveillance if possible, but this is the first time that the people have been forced to take active measures to make themselves available for surveillance. These initiatives are not simply government proposals in some obscure area; they are preemptive and unilateral attempts to usurp powers that previously belonged to the people. Clipper and Digital Telephony do not protect privacy; they force individuals to unconditionally trust that the government will respect their privacy. The same law enforcement authorities who illegally tapped Martin Luther King Jr.’s phones can easily tap a phone protected with Clipper. In the recent past, local police authorities have either been charged criminally or sued civilly in numerous jurisdictions—Maryland, Connecticut, Vermont, Georgia, Missouri, and Nevada—for conducting illegal wiretaps. It’s a poor idea to deploy a technology that could some day facilitate a police state. The lesson here is that it is insufficient to protect ourselves with laws; we need to protect ourselves with mathematics. Encryption is too important to be left solely to governments. This book gives you the tools you need to protect your own privacy; cryptography products may be declared illegal, but the information will never be.



Кл.слова:
шифрування -- захист інформації

   Тип видання:   методичний посібник   
3.

Chapman, D. B.
Building Internet firewalls [Electronic resource] / D. B. Chapman, E. D. Zwicky. - Sebastopol : O'Reilly, 1995. - 517 p.
Переклад назви: Побудова інтернет-фаєрволів

Рубрики:

  Повний текст доступний у читальних залах НБУВ


More than a million systems are now connected to the Internet, and something like 15 million people in 100 countries on all seven continents use Internet services. More than 100 million email messages are exchanged each day, along with countless files, documents, and audio and video images. Everyone is jumping on the Internet bandwagon. Once a haven for academicians and scientists, the Net is now reaching large and small businesses, government at all levels, school children, and senior citizens. The commercial world is rushing headlong into doing business on the Internet, barely pausing while technologies and policies catch up with their desire to go online. But, too few of the seekers after Internet wisdom and riches consider whether their businesses will be safe on the Net. What kinds of security risks are posed by the Internet? Some risks have been around since the early days of networking -- password attacks (guessing them or cracking them via password dictionaries and cracking programs), denial of service, and exploiting known security holes. Some risks are newer and even more dangerous -- packet sniffers, IP (Internet Protocol) forgery, and various types of hijacking attacks. Firewalls are a very effective way to protect your system from these Internet security threats. Firewalls in computer networks keep damage on one part of the network (e.g., eavesdropping, a worm program, file damage) from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. What is a firewall? It's a hardware and/or software solution that restricts access from your internal network to the Internet -- and vice versa. A firewall may also be used to separate two or more parts of your local network (for example, protecting finance from R&D). The firewall is installed at the perimeter of the network, ordinarily where it connects to the Internet. You can think of a firewall as a checkpoint; all traffic, incoming and outgoing, is stopped at this point. Because it is, the firewall can make sure that it is acceptable. "Acceptable" means that whatever is passing through -- email, file transfers, remote logins, NFS mounts, etc. -- conforms to the security policy of the site. Building Internet Firewalls is a practical guide to building firewalls on the Internet. If your site is connected to the Internet, or if you're considering getting connected, you need this book. It describes a variety of firewall approaches and architectures and discusses how you can build packet filtering and proxying solutions at your site. It also contains a full discussion of how to configure Internet services (e.g., FTP, SMTP, Telnet) to work with a firewall. The book also includes a complete list of resources, including the location of many publicly available firewall construction tools. The book is divided into four parts: Part I discusses Internet threats, the benefits of firewalls, overall security strategies, and a summary of Internet services and their security risks. Part II describes possible firewall designs and general terms and concepts, how to protect the bastion host in your firewall configuration, how to build proxying and packet filtering firewalls, and how to configure Internet services to operate with a firewall. Part III describes how to maintain a firewall, develop a security policy, and respond to a security incident. Part IV contains appendic



Кл.слова:
мережа -- захист

   Тип видання:   наукове видання   
4.

Paquet, C.
Business case for network security [Electronic resource] : advocacy, governance, and ROI / C. Paquet, W. Saxe. - Indianapolis : Cisco Press, 2004. - 408 p
Переклад назви: Економічна модель для мережевої безпеки: захист, управління та дохід від інвестицій

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The business case for network security: advocacy, governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization’s risksand objectively quantify both costs and cost savings related to network security technology investments. This book covers the latest topics in network attacks and security. It includes a detailed security-minded examination of return on investment (ROI) and associated financial methodologies that yield both objective and subjective data. The book also introduces and explores the concept of return on prevention (ROP) and discusses the greater implications currently facing corporations, including governance and the fundamental importance of security, for senior executives and the board.



Кл.слова:
інвестиція -- кошти -- мережа -- бізнес

   Тип видання:   наукове видання   
5.

Bastien, G.
CCSP Cisco Secure PIX® Firewall advanced exam certification guide [Electronic resource] / G. Bastien, E. Carter, C. Degu. - 2th. ed.. - Indianapolis : Cisco Press, 2004. - 816 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Becoming a CCSP distinguishes you as part of an exclusive group of experts, ready to take on today's most challenging security tasks. Administration of the Cisco PIX Firewall is a difficult and complex task, critical for protecting a network. Whether you are seeking a PIX-focused certification or the full-fledged CCSP certification, learning what you need to know to pass the Cisco Secure PIX Firewall Advanced (CSPFA) exam will qualify you to keep your company's network safe while meeting business needs.



Кл.слова:
адміністрування мереж -- захист мережі

   Тип видання:   наукове видання   
6.

Dubrawsky, I.
CCSP Self-Study CCSP CSI [Electronic resource] : exam Certification Guide / I. Dubrawsky, P. Grey. - 2-е вид.. - Indianapolis : Cisco Press, 2004. - 528 p.
Переклад назви: CCSP самовчитель CCSP CSI: Керівництво сертифікаційного іспиту

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The official self-study test preparation guide for the CCSP CSI exam 642-541 This study guide helps you master all the topics on the CCSP CSI exam, including Classifying and mitigating network attacks Securing designs for small, medium-sized, remote-user, and enterprise networks Understanding the SAFE network modules Using Host IPS and the Cisco Security Agent Identifying security threats Securing a wireless network Applying the SAFE Blueprint to networks utilizing IP telephony Implementing appropriate security products to prevent or counteract vulnerabilities Defining a security policy Using the Cisco Secure product portfolio, including perimeter security, IDS, secure connectivity, security management, and Cisco AVVID Understanding the SAFE architectural overview CCSP CSI Exam Certification Guide, Second Edition, is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CSI exam. Inside, you'll find preparation hints and test-taking tips to help you identify areas of weakness and improve both your conceptual and hands-on knowledge of network security. CCSP CSI Exam Certification Guide, Second Edition, presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Foundation Summary lists and tables make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions reinforce key concepts. An entire chapter of scenarios helps you place the exam objectives in real-world situations, thus increasing recall during exam time. New in this edition is coverage of wireless networks, IP telephony, Host Intrusion Prevention System (IPS), and enterprise networks. The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take a complete, timed exam. The assessment engine tracks your performance and provides feedback on a module-by-module basis, presenting links to the text for further review and helping you devise a complete study plan. Well-regarded for its level of detail, assessment features, challenging review questions, and hands-on exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCSP CSI Exam Certification Guide, Second Edition, is part of a recommended study program from Cisco Systems that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Companion CD-ROM The CD-ROM contains more than 200 practice questions for the CCSP CSI exam, including simulation-based questions. CD-ROM test engine powered by www.boson.com. Boson Software is a Cisco Learning Partner.



Кл.слова:
програмне забезпечення -- база даних -- електронний ресурс -- сервер -- захист даних -- CCSP CSI exam

   Тип видання:   наукове видання   
7.

Deal, R. A.
Cisco ASA Configuration [Electronic resource] / R. A. Deal. - New York : McGRAW-HILL, 2009. - 753 p. - (Networking Professional's Library)
Переклад назви: Конфігурація Cisco ASA

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The Cisco ASA product replaces Cisco PIX Firewalls, and Cisco expert Richard Deal updates his bestselling book, Cisco PIX Firewalls, to cover ASA. This book shows you how to configure and maintain a Cisco ASA appliance to control traffic in the corporate network and protect the network from internal and external threats and attacks. Cisco ASA Configuration covers the latest features available in versions 8.0 and 8.1, and includes detailed examples of complex configurations and troubleshooting. Implement and manage this powerful multifunction network adaptive security appliance with help from this expert guide.



Кл.слова:
продукт -- захист мережі -- пристрій

   Тип видання:   науково-популярне видання   
8.

Smaldone, William.
Confronting Hitler [Electronic resource] : german social democrats in defense of the Weimar republic, 1929-1933 / William Smaldone. - Lanham : Lexington Books, 2009. - 335 p
Переклад назви: Протистояння Гітлера: німецькі соціал-демократи на захисті Веймарської республіки, 1929-1933

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


Confronting Hitler examines the lives of ten socialist leaders in their fight against Nazism. It reveals the aspects of these people's lives that most decisively shaped their views and actions during the Weimar Republic's final crisis, and it compares the German socialist experience of 1933 with those of other democratic socialist movements in the twentieth century.



Кл.слова:
Веймарська республіка -- нацизм -- політологія

   Тип видання:   методичний посібник   
9.

Cobb, С.
Cryptography For Dummies [Electronic resource] / С. Cobb. - Indianapolis : John Wiley & Sons, 2004. - 336 p.
Переклад назви: Криптографія для чайників

Рубрики:

  Повний текст доступний у читальних залах НБУВ


This guide to keeping your data safe offers the latest security techniques and advice on choosing and using cryptography products. It covers terminology, specific encryption technologies, pros and cons of different implementations, and more.



Кл.слова:
інформація -- захист

   Тип видання:   підручник   
10.

Gupta, A.
Defend I.T.: security by example [Electronic resource] / A. Gupta, S. Laliberte. - Boston : Addison Wesley, 2004. - 384 p.
Переклад назви: Захист ІТ: безпека за зразком

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Defend I.T.: Security by Example draws on detailed war stories to identify what was done right and what was done wrong in actual computer-security attacks, giving you the opportunity to benefit from real experiences. Approaches to securing systems and networks vary widely from industry to industry and organization to organization. By examining a variety of real-life incidents companies are too embarrassed to publicly share, the authors explain what could have been done differently to avoid the losses incurred--whether creating a different process for incident response or having better security countermeasures in place to begin with.



Кл.слова:
комп'ютерна безпека

   Тип видання:   енциклопедія   
Категорія: Соціологія   
11.


Encyclopedia of homelessness [Electronic resource] : in 2 vol. / ed. D. Levinson. - Thousand Oaks : Sage Publications, 2004. - 908 p.
Переклад назви: Енциклопедія безпритульності

Рубрики:

  Повний текст доступний у читальних залах НБУВ


There is nothing new about homelessness. There have been homeless people for some 10,000 years—from the time when humans built their first permanent homes in the first towns of the Fertile Crescent. The historical record, novels and poems, and sacred texts tell us the stories of beggars, wandering ascetics, penniless friars, displaced peasants, lost soldiers, street youths, vagrants, new arrivals in the city, and displaced workers. Homelessness has changed over the years. In the United States, during the late nineteenth century, it was hoboes and tramps who drew the attention of the public, the police, and then the social reformers of the Progressive Era. From the 1920s through the Great Depression, attention shifted to the skid rows, home to transient workers and retired single men. The decline of skid rows in the 1970s was followed by a new era of homelessness with many formerly institutionalized people—who had untreated or poorly treated emotional disorders—winding up on the streets of America. In the 1980s, the nature of homelessness changed again. Growing economic inequality, racism, a permanent decrease in the number of well-paid unskilled jobs, and a lack of affordable housing combined to make several million people—many of them African-American women and their children—homeless on America’s streets, in shelters, in motels, and in substandard and temporary apartments. This pattern continues in 2004. Homelessness is not just a U.S. problem, although when viewed cross-culturally, it becomes a more complex issue. In many developed nations, homeless families, many of them immigrants, are the major issue. In the developing nations of Asia, Africa, and Latin America, the homeless are often women and their children, youths, and migrants from rural areas who have come to cities looking for work and opportunity. The emergence of many cities in developing nations as major regional or global commercial centers has made the problem even worse, by increasing the appeal of cities as employment centers to the rural poor while at the same time providing less and less affordable housing and support services for immigrants. The goal of the Encyclopedia of Homelessness is to summarize our knowledge of homelessness. This includes describing the patterns of homelessness in the past, focusing on the recent and current situation in the United States, and sampling homelessness around the world. Entries cover causes; history; legal issues, advocacy, and policy; legislation and programs; lifestyle and health problems; organizations; research; services and service settings; size and perceptions; subpopulations and lifestyles; and world issues and perspectives. Descriptive articles cover homelessness today in eight major American cities and more than thirty cities and nations around the world. These entries allow for quick and easy comparisons.



Кл.слова:
безхатченко -- волоцюга -- вуличне життя -- соціальний захист

   Тип видання:   наукове видання   
12.

Eekelaar, J.
Family Law Advocacy [Electronic resource] : how Barristers help the Victims of Family Failure / J. Eekelaar, M. Maclean. - Portland : Hart Publishing, 2009. - 132 p.
Переклад назви: Захист сімейного права: як адвокати допомогають жертвам сімейних відмов

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


The role of the law in settling family disputes has been a matter of particular debate over the past 25 years. In keeping with the general public perception, the media has been largely critical about the role of lawyers in family law matters, sustaining a general lack of confidence in the legal profession, and a more specific feeling that, in family matters, lawyers aggravate conflict or even represent a female conspiracy. The climate in which family lawyers practice in England and Wales is a harsh one. The authors of this path-breaking study felt it was time to find out more about the contributions of barristers in family law cases in the UK. Much of the study is comprised of an in-depth examination of the day-to-day activity of members of the UK Family Law Bar through observation of individual barristers as they performed their role in the context of a court hearing. In answering questions, such as whether the family justice system is excessively adversarial, whether family barristers earn too much from human unhappiness, or indeed whether those working in the front line of child protection earn enough, the authors reach some surprising conclusions. "The barrister is both mentor and guide for the client" is how they begin their conclusion; "we hope that we have shown that society should value their contribution better" is how they finish.



Кл.слова:
сімейне право

   Тип видання:   наукове видання   
13.

Alt, B. L.
Fleecing grandma and grandpa [Electronic resource] : protecting Against Scams, Cons, and Frauds / B. L. Alt, S. K. Wells. - Westport : Praeger Publishers, 2004. - 167 p.
Переклад назви: Оббираючи бабусь і дідусів: захист від шахрайства

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


Falling for a scam or con is humiliating for anyone, and can have terrible consequences. But for the elderly, being the victim of fraud can be disastrous, and they are the most common and vulnerable targets of everyday scams, cons, and frauds. From identity theft to gambling scams, from power of attorney issues to pyramid schemes, there is no dearth of creativity in the ways some criminals will relieve the elderly from their money and their homes. Here, Alt and Wells describe the most common scams, offer the stories of actual victims, and detail ways to protect yourself and your family from becoming easy targets. What makes the elderly such easy marks for con artists? How can they avoid the common traps? Knowing about them is one place to start, and this book helps readers to understand and identify the most common scams perpetrated against the elderly. Because such cons are so hard to prosecute, it is important to know the methods criminals employ to separate innocents from their hard-earned money. This lively, vivid account of one of the most insidious forms of crime will help families and individuals protect themselves and their loved ones from the machinations of those who view them as easy marks.



Кл.слова:
соціологія -- шахрайство

   Тип видання:   науково-популярне видання   
14.

Fairman, C. M.
Fuck [Electronic resource] : word taboo and protecting our First Amendment liberties / C. M. Fairman. - Naperville : Sphinx Publishing, 2009. - 250 p.
Переклад назви: Дідько: табуйоване слово і захист нашої свободи в Першій поправці

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


This entertaining read is about the word "fuck", the law, and the taboo. Whether you shout it out in the street or whisper it in the bedroom, deliberately plan a protest, or spontaneously blurt it out, if you say "fuck," someone wants to silence you, either with a dirty look across the room or by making a rule that you cannot say the word. When it's the government trying to cleanse your language, though, you should worry. Words are ideas. If the government controls the words we use, it can control what we think. To protect this liberty, we must first understand why the law's treatment of "fuck" puts that freedom at risk. This book examines the law surrounding the word and reveals both inconsistencies in its treatment and tension with other identifiable legal rights that the law simply doesn't answer. The power of taboo provides the framework to understand these uncertainties. It also explains why attempts to curtail the use of "fuck" through law are doomed to fail. Fundamentally, it persists because it is taboo; not in spite of it.



Кл.слова:
закон -- свобода слова -- обсценна лексика

   Тип видання:   науково-популярне видання   
15.
 


Zehner, Ozzie.
Green Illusions [Electronic resource] : the dirty secrets of clean energy and the future of environmentalism / Ozzie Zehner. - London : University of Nebraska Press, 2012. - 400 p
Переклад назви: Зелені ілюзії: брудні секрети чистої енергії і майбутнє захисту навколишнього середовища

Рубрики:

  Повний текст доступний у читальних залах НБУВ


We don’t have an energy crisis. We have a consumption crisis. And this book, which takes aim at cherished assumptions regarding energy, offers refreshingly straight talk about what’s wrong with the way we think and talk about the problem. Though we generally believe we can solve environmental problems with more energy—more solar cells, wind turbines, and biofuels—alternative technologies come with their own side effects and limitations. How, for instance, do solar cells cause harm? Why can’t engineers solve wind power’s biggest obstacle? Why won’t contraception solve the problem of overpopulation lying at the heart of our concerns about energy, and what will? This practical, environmentally informed, and lucid book persuasively argues for a change of perspective. If consumption is the problem, as Ozzie Zehner suggests, then we need to shift our focus from suspect alternative energies to improving social and political fundamentals: walkable communities, improved consumption, enlightened governance, and, most notably, women’s rights. The dozens of first steps he offers are surprisingly straightforward. For instance, he introduces a simple sticker that promises a greater impact than all of the nation’s solar cells. He uncovers why carbon taxes won’t solve our energy challenges (and presents two taxes that could). Finally, he explores how future environmentalists will focus on similarly fresh alternatives that are affordable, clean, and can actually improve our well-being. Watch a book trailer.



Кл.слова:
природа -- альтернативна енергія -- екологія

   Тип видання:   підручник   
16.

Hatch, B.
Hacking Linux Exposed [Electronic resource] : linux security secrets & solutions / B. Hatch, J. Lee, G. Kurtz. - Berkeley : McGraw-Hill, 2001. - 600 p
Переклад назви: Взлом незахищенного Linux: рішення таємниць безпеки

Рубрики:

  Повний текст доступний у читальних залах НБУВ


"Throw up a Linux box," comes the chorus whenever there's a need to provide some network service or other without impinging upon the boss's martini budget. Fair enough, but by doing so are you opening security holes you don't know how to find or fix? The newest edition of Hacking Linux Exposed helps you answer that question and solve many of the security problems you find. To a certain extent this book is a recipe collection in that it describes weaknesses in Linux (calling attention to specific distributions where appropriate). The authors stop short of explicitly showing you how to wage most kinds of attacks, a reasonable thing to do from an ethical point of view even though the instructions can be found easily on the Internet. Rather than do that, they give step-by-step instructions on how to defend against the attacks they catalog. The point is not, "Here's precisely how to bring down a server by means of an ACK storm," but rather, "Here's how to defend against such problems." They do demonstrate plenty of weaknesses, though, as in their coverage of the conversation that goes back and forth between an FTP server and its client.



Кл.слова:
захист -- сервер

   Тип видання:   науково-популярне видання   
17.

Rodgers III, W. М.
Handbook on the economics of discrimination [Electronic resource] / W. М. Rodgers III. - Cheltenham : Edward Elgar, 2006. - 320 p.
Переклад назви: Керівництво з економічної дискримінації

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


Discrimination's dynamic nature means that no single theory, method, data or study should be relied upon to assess its magnitude, causes, or remedies. Despite some gains in our understanding, these remain active areas of debate among researchers, practitioners and policymakers. The specially commissioned papers in this volume, all by distinguished contributors, present the full range of issues related to this complex and challenging problem.



Кл.слова:
право -- захист

   Тип видання:   методичний посібник   
18.
 


Chevallier, Andrew.
Herbal remedies [Electronic resource] / A. Chevallier. - London : Dorling Kindersley, 2007. - 290 p. - (Eyewitness companions)
Переклад назви: Лікувальні трави

Рубрики:

  Повний текст доступний у читальних залах НБУВ


For anyone who wants to learn more about medicinal plants and how to use them at home, Herbal Remedies provides essential information on how to safely use herbal medicines and shows you how to create your own remedies to target common ailments.



Кл.слова:
трави -- захист -- лікування

   Тип видання:   наукове видання   
19.

Barken, L.
How secure is your wireless network? Safeguarding your wi-fi LAN [Electronic resource] / L. Barken. - Upper Saddle River : Prentice Hall PTR, 2003. - 224 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Now you can have the awesome benefits of wireless LANs without falling victim to their notorious security flaws. Leading wireless security expert Lee Barken shows you practical workarounds and fixes for the vulnerabilities in today's WLANs, introduces high-security wireless protocols new to the marketplace, and offers step-by-step instructions for protecting all your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you've been searching for-whether you're a network administrator,security specialist, manager, or home user.



Кл.слова:
бездротові локальні мережі -- захист інформації

   Тип видання:   науково-популярне видання   
20.

Labonte, Melissa.
Human rights and humanitarian norms, strategic framing, and intervention [Electronic resource] : lessons for the responsibility to protect / M. Labonte. - New York : Routledge, 2013. - 240 p.. - (Routledge global institutions series ; 71)
Переклад назви: Права людини та норми гуманітарного права, стратегічна структура та межі втручання: висновки щодо відповідальності за захист

Рубрики:

  Повний текст доступний у читальних залах НБУВ


This book analyzes the strategic framing of mass atrocity cases in US and UN policy arenas to build knowledge concerning whether and how the humanitarian and human rights norms embedded within those frames affected decision outcomes in each of three mass atrocity cases: Somalia, Rwanda, and Sierra Leone. By exploring strategic framing in relation to the interactive nature of decision-making logics that policy elites utilize in formulating responses to mass atrocity cases, especially complex policy decisions like humanitarian intervention, we can discern how human rights and humanitarian norms travel and compete with other prevailing norms in the policy-making process.



Кл.слова:
експлуатація -- злочини проти людства -- порушення прав людини -- Африка
...
 

Всі права захищені © Національна бібліотека України імені В. І. Вернадського