Résultats de recherche de titre
Articles 1 à 5 sur 5
Extensive collection of poetry featuring the work of fifteen poets, such as Annie Dillard and Daniel Berrigan. Poems are divided…
into the following sections: The Cross, Transformation, Death, Injustice, Presence, God's Body, Fools, Wayfarers, Love, The Dark, Grace, Praise, The Mystical Body, Sacrament, The Leap, and HolyDieu, la science, les preuves: l'aube d'une révolution
Par Michel-Yves Bolloré. 2021
S'appuyant sur un travail de trois années en collaboration avec une vingtaine de scientifiques et de spécialistes, les auteurs présentent…
les preuves modernes de l'existence de Dieu. A partir de 1543 et durant trois siècles, des découvertes scientifiques ont remis en cause l'idée d'un dieu créateur. Depuis le début du XXe siècle, de nouvelles connaissances bouleversent à nouveau les certitudesBuilding a cyber risk management program: Evolving security for the digital age
Par Brian Allen. 2024
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for…
designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for. You'll learn how to define and establish a sustainable, defendable, cyber risk management program, and the benefits associated with proper implementation. Cyber risk management experts Brian Allen and Brandon Bapst, working with writer Terry Allan Hicks, also provide advice that goes beyond risk management. You'll discover ways to address your company's oversight obligations as defined by international standards, case law, regulation, and board-level guidance. This book helps you: understand the transformational changes digitalization is introducing, and new cyber risks that come with it; learn the key legal and regulatory drivers that make cyber risk management a mission-critical priority for enterprises; gain a complete understanding of four components that make up a formal cyber risk management program; and implement or provide guidance for a cyber risk management program within your enterpriseThe case for miracles: A journalist investigates evidence for the supernatural
Par Lee Strobel. 2018
New York Times bestselling author Lee Strobel trains his investigative sights on the hot-button question: is it really credible to…
believe God intervenes supernaturally in people's lives today? This provocative book starts with an unlikely interview in which America's foremost skeptic builds a seemingly persuasive case against the miraculous. But then Strobel travels the country to quiz scholars to see whether they can offer solid answers to atheist objections. Along the way, he encounters astounding accounts of healings and other phenomena that simply cannot be explained away by naturalistic causes. The book features the results of exclusive new scientific polling that shows miracle accounts are much more common than people think. What's more, Strobel delves into the most controversial question of all: what about miracles that don't happen? If God can intervene in the world, why doesn't he do it more often to relieve suffering? Many American Christians are embarrassed by the supernatural, not wanting to look odd or extreme to their neighbors. Yet, The Case for Miracles shows not only that the miraculous is possible, but that God still does intervene in our world in awe-inspiring ways. Here's a unique book that examines all sides of this issue and comes away with a passionate defense for God's divine action in lives today. Also available: The Case for Miracles Spanish edition, kids' edition, and student editionHacker culture can be esoteric, but this entertaining reference is here to help. Written by a longtime hacker, this fun…
reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From phreaking to deepfakes, and from APT (advanced package tool) to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. This book from Kim Crawley (8 Steps to Better Security) is written in a conversational style and organized from A to Z. If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and some perhaps surprising facts about familiar cultural touchstones. This book will help you understand the relationship between hacker culture and cybersecurity; get to know the ideas behind the hacker ethos, like "knowledge should be free"; explore topics and publications central to hacker culture, from 2600 Magazine to Cult of the Dead Cow; appreciate the history of cybersecurity; learn about key figures in the history of hacker culture; and understand the difference between hackers and cybercriminals