Бази даних

Наукова електронна бібліотека - результати пошуку

Mozilla Firefox Для швидкої роботи та реалізації всіх функціональних можливостей пошукової системи використовуйте браузер
"Mozilla Firefox"

Вид пошуку
у знайденому
Сортувати знайдені документи за:
авторомназвоюроком видання
Формат представлення знайдених документів:
повнийстислий
 Знайдено в інших БД:Віртуальна довідка (135)Тематичний інтернет-навігатор (14)Автореферати дисертацій (5349)Реферативна база даних (37362)Книжкові видання та компакт-диски (7928)Журнали та продовжувані видання (239)
Пошуковий запит: (<.>K=ЗАХИСТ$<.>+<.>K=НАСЕЛЕНН$<.>)
Загальна кількість знайдених документів : 539
Представлено документи з 1 до 20
...

   Тип видання:   науково-популярне видання   
Категорія: Біологічні науки   
1.
 


Бернацкий, Анатолий.
100 великих рекордов животных [Електронний ресурс] / Анатолий Бернацкий. - Москва : Вече, 2012. - 1582 с.. - (100 великих)

  Повний текст доступний у читальних залах НБУВ


Животный мир Земли многолик и многообразен. И это неудивительно, если учесть насколько различны условия жизни на нашей планете. Животные приспособились к глубинам океана и высокогорьям, к зонам вечных льдов, пустыням и влажным тропикам. На суше и в воде океанов не найти уголка, не населенного живыми организмами. Мохнатые, пернатые, с панцирем и без него, крылатые, двуногие, четвероногие, летающие, плавающие и ползающие существа. Очень разнообразны животные и по своим размерам. Среди них встречаются и настоящие гиганты, и совсем крошки, пигмеи. В очередной книге серии рассказывается о самых удивительных рекордах животного мира. Читатель узнает о самых высокорослых и самых маленьких животных, о рекордсменах в покорении высот и по прыжкам в длину и высоту, о самых холодоустойчивых и самых ядовитых организмах, а также о самых оригинальных способах размножения простейших, моллюсков, насекомых, рептилий, птиц и многом другом.



Кл.слова:
зоологія -- природні аномалії

   Тип видання:   наукове видання   
2.
 


Levitan, Kathrin.
A Cultural History of the British Census [Electronic resource] : envisioning the Multitude in the Nineteenth Century / K. Levitan. - New York : Palgrave Macmillan, 2011. - 272 p
Переклад назви: Культурна історія британського перепису населення: представлення кількості в дев'ятнадцятому столітті

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


The British census plays an unquestioned role in governance today, and the recent digitization of nineteenth century census data has allowed millions of amateur and professional researchers to visualize their national and familial past. This study tells the tangled story of how the census took shape over the early decades of its existence, developing from a simple counting of households during the Napoleonic Wars into a centralized undertaking that involved the governmental and intellectual luminaries of Victorian Britain. Along the way, the census intertwined with the pressing questions of the day, including Malthusianism, industrialization, political representation, Irish immigration, women’s employment, reproduction, and empire. The book explores the hotly disputed process by which the census was created and developed and examines how a wide cast of characters, including statisticians, novelists, national and local officials, political and social reformers, and journalists responded to and used the idea of a census. It shows that the act of describing British society in statistical terms was also an act of contestation.



Кл.слова:
перепис -- населення -- демографія

   Тип видання:   науково-популярне видання   
3.


A History of Settlement in Ireland [Electronic resource] / ред. Terry Barry. - London : Routledge, 2000. - 321 p
Переклад назви: Історія поселень в Ірландії

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


This book developed out of the twentieth anniversary conference of the Group for the Study of Irish Historic Settlement held in Dublin in 1989, at which it was decided that the papers should also be published. I would like to thank all the contributors for both their perseverance and their patience which has meant that this book has finally come to see the light of day. I would like to thank especially Dr Ruth Johnson, Curator of DVBLINIA, without whom this book would not have been produced. She spent many hours editing the contributions and she also produced the very successful bibliography which you will find at the end of the volume. Professor Anngret Simms was also very helpful both in reading the draft copy of the book and in the whole editing process. I would also like to thank the library staff in the Royal Irish Academy and Trinity College Dublin, for alltheir assistance. The staff of Routledge, Taylor and Francis Books Ltd are also owed a debt of de ep gratitude by the editor and authors for their efficiency and support in ensuring that this book saw the light of day: especially Victoria Peters, the Archaeology Editor, her Assistant Editor, Nadia Jacobson; and Barbara Duke, Senior Production Editor. Finally, I must also thank the external copy editor, Sophie Richmond, for all her extremely useful observations and corrections. Financialsupport has come from the Department of Medieval History, Trinity College Dublin, the Group for the S tudy of Irish Historic Settlement the Institute of Irish Studies, Queen’s University, Belfast and from the School of Irish Studies, Dublin, for which I am very grateful.



Кл.слова:
Британські острови -- історія Ірландії -- населення

   Тип видання:   методичний посібник   
4.


Abwehr englischer gangster-methoden "Silent killing" [Electronic resource]. - [S. l. : s. n.]. - 52 S.
Переклад назви: Захист від англійських гангстерських прийомів "Тихе вбивство"

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ




Кл.слова:
німецька армія -- рукопашний бій

   Тип видання:   науково-популярне видання   
5.

Daniels, Roger.
American immigration [Electronic resource] : a student companion / Roger Daniels. - New York : Oxford University Press, 2001. - 304 p. - (Student Companions to American History)
Переклад назви: Американська імміграція: довідник студента

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


"Once I thought to write a history of the immigrants in America. Then I discovered that the immigrants were American history," wrote historian Oscar Handlin. Immigrants and generations of their descendants have defined the American nation from its beginning and continue to provide America's characteristic diversity, representing practically every race, nationality, religion, and ethnic group around the world. Some immigrants came to the New World in search of economic gain. Others were brought in chains. Still others found refuge in America from religious or ethnic persecution. This single-volume encyclopedia includes more than 300 entries, covering multiple aspects of immigration history and policy: ethnic groups, including census and immigration statistics, major periods of immigration and areas of settlement, predominant religion, and historical background key immigration legislation, such as the Chinese Exclusion Act, Immigration Act of 1990, and Refugee Act of 1980 terms and concepts, including green card, quota system, citizen, naturalization, picture brides, and nativism categories of immigrants, including refugees, indentured servants, children, and exiles immigration stations: Angel Island, Castle Garden, and Ellis Island religious groups and churches, such as Amish, Huguenots, Muslims, and Eastern Rite churches further reading lists and cross-references follow each entry An introductory essay provides a cogent overview of the entire scope of the book. More than 150 photographs and illustrations complement the entries. Statistical boxes supplement the articles with key information. A list of immigration, ethnic, and refugee organizations; a guide to further research that includes books, museums, and websites; and a detailed chronology conclude this useful resource for research in American history, ethnic and multicultural studies, and genealogy. Oxford's Student Companions to American History are state-of-the-art references for school and home, specifically designed and written for ages 12 through adult. Each book is a concise but comprehensive A-to-Z guide to a major historical period or theme in U.S. history, with articles on key issues and prominent individuals. The authors--distinguished scholars well-known in their areas of expertise--ensure that the entries are accurate, up-to-date, and accessible. Special features include an introductory section on how to use the book, further reading lists, cross-references, chronology, and full index.



Кл.слова:
імміграція -- населення США -- демографічна політика

   Тип видання:   науково-популярне видання   
6.
 


Shorto, Russell.
Amsterdam [Electronic resource] : a History of the World's Most Liberal City / Russell Shorto. - New York : Doubleday, 2013. - 368 p.
Переклад назви: Амстердам: історія найліберальнішого міста світу

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


Tourists know Amsterdam as a picturesque city of low-slung brick houses lining tidy canals; student travelers know it for its legal brothels and hash bars; art lovers know it for Rembrandt's glorious portraits. But the deeper history of Amsterdam, what makes it one of the most fascinating places on earth, is bound up in its unique geography-the constant battle of its citizens to keep the sea at bay and the democratic philosophy that this enduring struggle fostered. Amsterdam is the font of liberalism, in both its senses. Tolerance for free thinking and free love make it a place where, in the words of one of its mayors, "craziness is a value." But the city also fostered the deeper meaning of liberalism, one that profoundly influenced America: political and economic freedom. Amsterdam was home not only to religious dissidents and radical thinkers but to the world's first great global corporation. In this effortlessly erudite account, Russell Shorto traces the idiosyncratic evolution of Amsterdam, showing how such disparate elements as herring anatomy, naked Anabaptists parading through the streets, and an intimate gathering in a sixteenth-century wine-tasting room had a profound effect on Dutch-and world-history. Weaving in his own experiences of his adopted home, Shorto provides an ever-surprising, intellectually engaging story of Amsterdam from the building of its first canals in the 1300s, through its brutal struggle for independence, its golden age as a vast empire, to its complex present in which its cherished ideals of liberalism are under siege.



Кл.слова:
урбаністика -- суспільство -- міське населення -- толерантність

   Тип видання:   методичний посібник   
7.

Schneier, B.
Applied Cryptography [Electronic resource] : protocols, Algorthms, and Source Code in C / B. Schneier. - 2th. ed.. - New York : John Wiley & Sons, 1996
Переклад назви: Прикладна криптографія

Рубрики:

  Повний текст доступний у читальних залах НБУВ


There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter. If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter, that’s not security. That’s obscurity. On the other hand, if I take a letter and lock it in a safe, and then give you the safe along with the design specifications of the safe and a hundred identical safes with their combinations so that you and the world’s best safecrackers can study the locking mechanism—and you still can’t open the safe and read the letter—that’s security. For many years, this sort of cryptography was the exclusive domain of the military. The United States’ National Security Agency (NSA), and its counterparts in the former Soviet Union, England, France, Israel, and elsewhere, have spent billions of dollars in the very serious game of securing their own communications while trying to break everyone else’s. Private individuals, with far less expertise and budget, have been powerless to protect their own privacy against these governments. During the last 20 years, public academic research in cryptography has exploded. While classical cryptography has been long used by ordinary citizens, computer cryptography was the exclusive domain of the world’s militaries since World War II. Today, state–of–the–art computer cryptography is practiced outside the secured walls of the military agencies. The layperson can now employ security practices that can protect against the most powerful of adversaries—security that may protect against military agencies for years to come. Do average people really need this kind of security? Yes. They may be planning a political campaign, discussing taxes, or having an illicit affair. They may be designing a new product, discussing a marketing strategy, or planning a hostile business takeover. Or they may be living in a country that does not respect the rights of privacy of its citizens. They may be doing something that they feel shouldn’t be illegal, but is. For whatever reason, the data and communications are personal, private, and no one else’s business. This book is being published in a tumultuous time. In 1994, the Clinton administration approved the Escrowed Encryption Standard (including the Clipper chip and Fortezza card) and signed the Digital Telephony bill into law. Both of these initiatives try to ensure the government’s ability to conduct electronic surveillance. Some dangerously Orwellian assumptions are at work here: that the government has the right to listen to private communications, and that there is something wrong with a private citizen trying to keep a secret from the government. Law enforcement has always been able to conduct court–authorized surveillance if possible, but this is the first time that the people have been forced to take active measures to make themselves available for surveillance. These initiatives are not simply government proposals in some obscure area; they are preemptive and unilateral attempts to usurp powers that previously belonged to the people. Clipper and Digital Telephony do not protect privacy; they force individuals to unconditionally trust that the government will respect their privacy. The same law enforcement authorities who illegally tapped Martin Luther King Jr.’s phones can easily tap a phone protected with Clipper. In the recent past, local police authorities have either been charged criminally or sued civilly in numerous jurisdictions—Maryland, Connecticut, Vermont, Georgia, Missouri, and Nevada—for conducting illegal wiretaps. It’s a poor idea to deploy a technology that could some day facilitate a police state. The lesson here is that it is insufficient to protect ourselves with laws; we need to protect ourselves with mathematics. Encryption is too important to be left solely to governments. This book gives you the tools you need to protect your own privacy; cryptography products may be declared illegal, but the information will never be.



Кл.слова:
шифрування -- захист інформації

   Тип видання:   атлас   
8.
 


McEvedy, Colin.
Atlas of World Population History [Electronic resource] / Colin McEvedy, Richard M. Jones. - 2th. ed.. - London : Penguin Books, 1979. - 185 p. - (Hist Atlas)
Переклад назви: Атлас всесвітньої історії народонаселення

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


The book details population changes in every region of the planet from 400 BC to 1978 AD. McEvedy and Jones used seventy line graphs and accompanying commentary text to describe population changes in seventy regions. The only negative aspect of this book is that the authors estimates of pre-European, Native American populations are considerably lower than most other estimates and seem somewhat outdated. While many books describe population changes, few cover such a huge breadth of space and time and few give so much information so directly. This book is much appreciated and other books like this would certainly be welcome.



Кл.слова:
демографія -- населення світу -- народжуваність -- плинність населення -- міграції

   Тип видання:   методичний посібник   
9.

Chapman, D. B.
Building Internet firewalls [Electronic resource] / D. B. Chapman, E. D. Zwicky. - Sebastopol : O'Reilly, 1995. - 517 p.
Переклад назви: Побудова інтернет-фаєрволів

Рубрики:

  Повний текст доступний у читальних залах НБУВ


More than a million systems are now connected to the Internet, and something like 15 million people in 100 countries on all seven continents use Internet services. More than 100 million email messages are exchanged each day, along with countless files, documents, and audio and video images. Everyone is jumping on the Internet bandwagon. Once a haven for academicians and scientists, the Net is now reaching large and small businesses, government at all levels, school children, and senior citizens. The commercial world is rushing headlong into doing business on the Internet, barely pausing while technologies and policies catch up with their desire to go online. But, too few of the seekers after Internet wisdom and riches consider whether their businesses will be safe on the Net. What kinds of security risks are posed by the Internet? Some risks have been around since the early days of networking -- password attacks (guessing them or cracking them via password dictionaries and cracking programs), denial of service, and exploiting known security holes. Some risks are newer and even more dangerous -- packet sniffers, IP (Internet Protocol) forgery, and various types of hijacking attacks. Firewalls are a very effective way to protect your system from these Internet security threats. Firewalls in computer networks keep damage on one part of the network (e.g., eavesdropping, a worm program, file damage) from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. What is a firewall? It's a hardware and/or software solution that restricts access from your internal network to the Internet -- and vice versa. A firewall may also be used to separate two or more parts of your local network (for example, protecting finance from R&D). The firewall is installed at the perimeter of the network, ordinarily where it connects to the Internet. You can think of a firewall as a checkpoint; all traffic, incoming and outgoing, is stopped at this point. Because it is, the firewall can make sure that it is acceptable. "Acceptable" means that whatever is passing through -- email, file transfers, remote logins, NFS mounts, etc. -- conforms to the security policy of the site. Building Internet Firewalls is a practical guide to building firewalls on the Internet. If your site is connected to the Internet, or if you're considering getting connected, you need this book. It describes a variety of firewall approaches and architectures and discusses how you can build packet filtering and proxying solutions at your site. It also contains a full discussion of how to configure Internet services (e.g., FTP, SMTP, Telnet) to work with a firewall. The book also includes a complete list of resources, including the location of many publicly available firewall construction tools. The book is divided into four parts: Part I discusses Internet threats, the benefits of firewalls, overall security strategies, and a summary of Internet services and their security risks. Part II describes possible firewall designs and general terms and concepts, how to protect the bastion host in your firewall configuration, how to build proxying and packet filtering firewalls, and how to configure Internet services to operate with a firewall. Part III describes how to maintain a firewall, develop a security policy, and respond to a security incident. Part IV contains appendic



Кл.слова:
мережа -- захист

   Тип видання:   наукове видання   
10.

Paquet, C.
Business case for network security [Electronic resource] : advocacy, governance, and ROI / C. Paquet, W. Saxe. - Indianapolis : Cisco Press, 2004. - 408 p
Переклад назви: Економічна модель для мережевої безпеки: захист, управління та дохід від інвестицій

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The business case for network security: advocacy, governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization’s risksand objectively quantify both costs and cost savings related to network security technology investments. This book covers the latest topics in network attacks and security. It includes a detailed security-minded examination of return on investment (ROI) and associated financial methodologies that yield both objective and subjective data. The book also introduces and explores the concept of return on prevention (ROP) and discusses the greater implications currently facing corporations, including governance and the fundamental importance of security, for senior executives and the board.



Кл.слова:
інвестиція -- кошти -- мережа -- бізнес

   Тип видання:   наукове видання   
Категорія: Релігія   
11.

da Costa, J. R.
Candomble de Angola [Electronic resource] / J. R. da Costa. - Rio de Janeiro : Pallas, 1996. - 117 с.
Переклад назви: Кандомбле Анголи

  Повний текст доступний у читальних залах НБУВ


Кандомбле - афро-бразильська релігійна традиція, в основі якої лежить поклоніння духам Оріша, пов'язаним зі стихіями, різними родами людської діяльності і духовними аспектами буття. Широко розповсюджена віра на території Бразилії, особливо в регіонах з великим числом темношкірого населення



Кл.слова:
традиція -- дух -- езотерика

   Тип видання:   наукове видання   
Категорія: Релігія   
12.

Ominare, B.
Candomble de Keto [Electronic resource] / B. Ominare. - Rio de Janeiro : Pallas, 1996. - 89 с.
Переклад назви: Кандомбле кету

  Повний текст доступний у читальних залах НБУВ


Кандомбле - афро-бразильська релігійна традиція, в основі якої лежить поклоніння духам Оріша, пов'язаним зі стихіями, різними родами людської діяльності і духовними аспектами буття. Широко розповсюджена віра на території Бразилії, особливо в регіонах з великим числом темношкірого населення



Кл.слова:
езотерика -- традиція

   Тип видання:   науково-популярне видання   
13.


Causes and consequences of human migration [Electronic resource] : an evolutionary perspective / ed. Michael H. Crawford, Benjamin C. Campbell. - Cambridge : Cambridge university press, 2012. - 568 p
Переклад назви: Причини і наслідки міграції населення: еволюційна точка зору

Рубрики:

Географічні рубрики:
  

  Повний текст доступний у читальних залах НБУВ


Migration is a widespread human activity dating back to the origin of our species. Advances in genetic sequencing have greatly increased our ability to track prehistoric and historic population movements and allowed migration to be described both as a biological and socioeconomic process. Presenting the latest research, Causes and Consequences of Human Migration provides an evolutionary perspective on human migration past and present. Crawford and Campbell have brought together leading thinkers who provide examples from different world regions, using historical, demographic and genetic methodologies, and integrating archaeological, genetic and historical evidence to reconstruct large-scale population movements in each region. Other chapters discuss established questions such as the Basque origins and the Caribbean slave trade. More recent evidence on migration in ancient and present day Mexico is also presented. Pitched at a graduate audience, this book will appeal to anyone with an interest in human population movements.



Кл.слова:
міграція -- переселення -- демографія

   Тип видання:   наукове видання   
14.

Bastien, G.
CCSP Cisco Secure PIX® Firewall advanced exam certification guide [Electronic resource] / G. Bastien, E. Carter, C. Degu. - 2th. ed.. - Indianapolis : Cisco Press, 2004. - 816 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Becoming a CCSP distinguishes you as part of an exclusive group of experts, ready to take on today's most challenging security tasks. Administration of the Cisco PIX Firewall is a difficult and complex task, critical for protecting a network. Whether you are seeking a PIX-focused certification or the full-fledged CCSP certification, learning what you need to know to pass the Cisco Secure PIX Firewall Advanced (CSPFA) exam will qualify you to keep your company's network safe while meeting business needs.



Кл.слова:
адміністрування мереж -- захист мережі

   Тип видання:   наукове видання   
15.

Dubrawsky, I.
CCSP Self-Study CCSP CSI [Electronic resource] : exam Certification Guide / I. Dubrawsky, P. Grey. - 2-е вид.. - Indianapolis : Cisco Press, 2004. - 528 p.
Переклад назви: CCSP самовчитель CCSP CSI: Керівництво сертифікаційного іспиту

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The official self-study test preparation guide for the CCSP CSI exam 642-541 This study guide helps you master all the topics on the CCSP CSI exam, including Classifying and mitigating network attacks Securing designs for small, medium-sized, remote-user, and enterprise networks Understanding the SAFE network modules Using Host IPS and the Cisco Security Agent Identifying security threats Securing a wireless network Applying the SAFE Blueprint to networks utilizing IP telephony Implementing appropriate security products to prevent or counteract vulnerabilities Defining a security policy Using the Cisco Secure product portfolio, including perimeter security, IDS, secure connectivity, security management, and Cisco AVVID Understanding the SAFE architectural overview CCSP CSI Exam Certification Guide, Second Edition, is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CSI exam. Inside, you'll find preparation hints and test-taking tips to help you identify areas of weakness and improve both your conceptual and hands-on knowledge of network security. CCSP CSI Exam Certification Guide, Second Edition, presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Foundation Summary lists and tables make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions reinforce key concepts. An entire chapter of scenarios helps you place the exam objectives in real-world situations, thus increasing recall during exam time. New in this edition is coverage of wireless networks, IP telephony, Host Intrusion Prevention System (IPS), and enterprise networks. The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take a complete, timed exam. The assessment engine tracks your performance and provides feedback on a module-by-module basis, presenting links to the text for further review and helping you devise a complete study plan. Well-regarded for its level of detail, assessment features, challenging review questions, and hands-on exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCSP CSI Exam Certification Guide, Second Edition, is part of a recommended study program from Cisco Systems that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Companion CD-ROM The CD-ROM contains more than 200 practice questions for the CCSP CSI exam, including simulation-based questions. CD-ROM test engine powered by www.boson.com. Boson Software is a Cisco Learning Partner.



Кл.слова:
програмне забезпечення -- база даних -- електронний ресурс -- сервер -- захист даних -- CCSP CSI exam

   Тип видання:   наукове видання   
16.

Deal, R. A.
Cisco ASA Configuration [Electronic resource] / R. A. Deal. - New York : McGRAW-HILL, 2009. - 753 p. - (Networking Professional's Library)
Переклад назви: Конфігурація Cisco ASA

Рубрики:
  

  Повний текст доступний у читальних залах НБУВ


The Cisco ASA product replaces Cisco PIX Firewalls, and Cisco expert Richard Deal updates his bestselling book, Cisco PIX Firewalls, to cover ASA. This book shows you how to configure and maintain a Cisco ASA appliance to control traffic in the corporate network and protect the network from internal and external threats and attacks. Cisco ASA Configuration covers the latest features available in versions 8.0 and 8.1, and includes detailed examples of complex configurations and troubleshooting. Implement and manage this powerful multifunction network adaptive security appliance with help from this expert guide.



Кл.слова:
продукт -- захист мережі -- пристрій

   Тип видання:   монографія   
17.

Tarallo, V. L.
Classics of population health [Електронний ресурс] = Классика популяционного здоровья = Класика популяційного здоров'я / V. L. Tarallo. - Чернівці : [б. в.], 2015. - 736 с.

Рубрики:

Географічні рубрики:

  Текст у форматі PDF 42.92 Мб


У монографії представлена нова інформаційна технологія взаємопов’язаного інтегрального контролю здоров’я населення і середовища його проживання, що базується на законі виживання популяцій і законі збереження здоров’я, що дозволяє використовувати інтегральні параметри здоров’я населення в якості коду побудови і розвитку соціальних оздоровчих систем, охорони здоров’я, формування національних і територіальних загальносоціальних і цільових медичних та екологічних програм, спрямованих на поліпшення здоров’я людей та середовища їх проживання. Вперше представлені довідкові таблиці очікуваних прогнозів здоров’я населення, необхідні для планування та контролю реалізації таких оздоровчих програм на територіях його проживання. З їх допомогою пропонується всім країнам і окремим територіям прагнути в область безпечного існування для збереження здоров’я і життя людей шляхом обмеження або стимуляції людської діяльності в межах, що позначені трьома критичними, системно пов'язаними інтегральними показниками, що відображають якість середовища існування і похідну від неї і генетичних факторів зовнішню і внутрішню життє- і хворобостійкість популяцій (населення); контроль їх здійснюється в режимі on-line. Матеріали монографії призначені для медиків усіх спеціальностей, екологів, економістів, демографів та інших фахівців, зайнятих у вирішенні соціальних проблем своїх країн і регіонів.



Кл.слова:
здоров'я населення -- оздоровчі заходи -- життєстійкість населення -- прогнозування здоров'я

   Тип видання:   науково-популярне видання   
18.

Smaldone, William.
Confronting Hitler [Electronic resource] : german social democrats in defense of the Weimar republic, 1929-1933 / William Smaldone. - Lanham : Lexington Books, 2009. - 335 p
Переклад назви: Протистояння Гітлера: німецькі соціал-демократи на захисті Веймарської республіки, 1929-1933

Рубрики:
  

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


Confronting Hitler examines the lives of ten socialist leaders in their fight against Nazism. It reveals the aspects of these people's lives that most decisively shaped their views and actions during the Weimar Republic's final crisis, and it compares the German socialist experience of 1933 with those of other democratic socialist movements in the twentieth century.



Кл.слова:
Веймарська республіка -- нацизм -- політологія

   Тип видання:   методичний посібник   
19.

Cobb, С.
Cryptography For Dummies [Electronic resource] / С. Cobb. - Indianapolis : John Wiley & Sons, 2004. - 336 p.
Переклад назви: Криптографія для чайників

Рубрики:

  Повний текст доступний у читальних залах НБУВ


This guide to keeping your data safe offers the latest security techniques and advice on choosing and using cryptography products. It covers terminology, specific encryption technologies, pros and cons of different implementations, and more.



Кл.слова:
інформація -- захист

   Тип видання:   підручник   
20.

Gupta, A.
Defend I.T.: security by example [Electronic resource] / A. Gupta, S. Laliberte. - Boston : Addison Wesley, 2004. - 384 p.
Переклад назви: Захист ІТ: безпека за зразком

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Defend I.T.: Security by Example draws on detailed war stories to identify what was done right and what was done wrong in actual computer-security attacks, giving you the opportunity to benefit from real experiences. Approaches to securing systems and networks vary widely from industry to industry and organization to organization. By examining a variety of real-life incidents companies are too embarrassed to publicly share, the authors explain what could have been done differently to avoid the losses incurred--whether creating a different process for incident response or having better security countermeasures in place to begin with.



Кл.слова:
комп'ютерна безпека
...
 

Всі права захищені © Національна бібліотека України імені В. І. Вернадського