Angebote zu "Endgame" (10 Treffer)

Kategorien

Shops

Hot Toys Avengers: Endgame Life-Size Masterpiec...
674,99 € *
zzgl. 1,49 € Versand

The Avengers take the final stand against Thanos in Marvel Studios' Avengers: Endgame. In this long-awaited installment, the Earth's Mightiest Heroes travel back in time to retrieve the Infinity Stones and create the new Nano Gauntlet. Hoping to bring everything back into existence, Hulk steps up as the person who wields the Gauntlet to save the universe from this massive chaos. Sideshow and Hot Toys present the Nano Gauntlet (Hulk Version) Life-Size Replica based on the last installment of the Infinity Saga! Inspired by the cinematic debut of Iron Man's classic red and gold suit, the Nano Gauntlet Life-Sized Replica stands approximately 71 cm overall in height and features detailed paint application to present the sleek design of this essential armor. The Hulk Version Replica features six LED light-up Infinity Stones with two lighting modes for alternative display, and a custom base that keeps the gauntlet in an upright position. Inspired by the cinematic debut of Iron Man's classic red and gold suit, the Nano Gauntlet Life-Sized Replica stands approximately 71 cm overall in height and features detailed paint application to present the sleek design of this essential armor. The Hulk Version Replica features six LED light-up Infinity Stones with two lighting modes for alternative display, and a custom base that keeps the gauntlet in an upright position. This incredible Hulk Version of the Nano Gauntlet collectible will undoubtedly be the centerpiece to your Marvel Cinematic Universe collection!

Anbieter: Zavvi
Stand: 27.11.2020
Zum Angebot
Hot Toys Avengers: Endgame Replica 1/4 Nano Gau...
203,49 € *
zzgl. 1,49 € Versand

To undo the devastating damage done by Thanos, our beloved superheroes must gather to collect all the remarkably powerful Infinity Stones. Courtesy of Tony Stark, the Avengers have one last chance to bring everyone back from chaos, and Hulk has stepped forward for this mission that leads everything to the unknown. Sideshow and Hot Toys present the Quarter Scale Nano Gauntlet (Hulk Version) collectible inspired by Avengers: Endgame! The highly detailed collectible measures approximately 22 cm overall features authentic and fine details of the Nano Gauntlet on Hulk's arm. Six LED light-up Infinity Stones with two lighting modes including solid light effect and pulsing light effect, articulations on individual fingers developed for range of movement and different poses, and a specially designed custom base with movie logo that holds the gauntlet in an upright position. Batteries required (3x AAA, not included).

Anbieter: Zavvi
Stand: 27.11.2020
Zum Angebot
Hot Toys Avengers: Endgame Replica 1/4 Nano Gau...
134,99 € *
zzgl. 1,49 € Versand

The end is finally here. Set to be the grand conclusion to 22 movies in Marvel Cinematic Universe, Avengers: Endgame has brought fans tons of memorable scenes filled with emotion and some of the greatest laughs. In the final showdown against Thanos, Iron Man decided to wield the Infinity Stones on his own Nano Gauntlet, snap and save the universe, despite the fatal toll it takes. Sideshow and Hot Toys present the quarter scale Nano Gauntlet (Movie Promo Edition) collectible, based on the visual design work in the early production stage of Marvel Studios' Avengers: Endgame. Measuring approximately 19 cm tall, the newly introduced collectible features authentic details of Nano Gauntlet with phenomenal painting, six LED light up Infinity Stones with two lighting modes including solid light effect and pulsing light effect, articulations on individual fingers developed for movements and poses, and a specially designed custom base with movie logo that will hold the gauntlet in an upright position. This movie promo edition of Nano Gauntlet collectible will surely be a phenomenal masterpiece for all Marvel fans' collection! Batteries required (3x AAA, not included).

Anbieter: Zavvi
Stand: 27.11.2020
Zum Angebot
Hot Toys Avengers: Endgame Life-Size Masterpiec...
449,99 € *
zzgl. 1,49 € Versand

Avengers: Endgame is a stunning finale to a great cinematic journey! After Thanos snapped his fingers and half the population disappeared in the universe, the remaining Avengers have been searching for a way to bring everyone back. Their last hope falls on this Nano Gauntlet, an ultimate weapon that is designed to channel the awesome powers of all Infinity Stones at once. Recreated with exacting attention to detail, Sideshow and Hot Toys proudly present the Nano Gauntlet in its real size and proportion as seen in the epic film by Marvel Studios! The Life-Size Replica of this Nano Gauntlet is a faithful reproduction of the iconic gauntlet worn by Iron Man in the final act of Avengers: Endgame. Measuring approximately 52 cm overall in height, it features an accurate paint scheme with Iron Man armor's classic red and gold, sophisticated hardware design, six LED light-up Infinity Stones with two lighting modes perfect for display, completed with a custom base that keeps the gauntlet in an upright position. Display this impressive Life-Size replica with other Avengers members or on its own! It is an instantly recognizable collectible that will be an imposing addition to your favorite Marvel collection!

Anbieter: Zavvi
Stand: 27.11.2020
Zum Angebot
Hot Toys Avengers: Endgame Replica 1/4 Nano Gau...
168,99 € *
zzgl. 1,49 € Versand

Created by Tony Stark, the Nano Gauntlet is a weapon designed to contain and allow the user to utilize the powers of all Infinity Stones to defeat Thanos. But to save the universe, our beloved heroes struggle to make the ultimate sacrifice. Bringing one of the most powerful weapons to reality, Sideshow and Hot Toys present the Nano Gauntlet Quarter Scale Collectible Figure from the record-breaking Avengers: Endgame. Crafted with impressive painting techniques, the movie-accurate Nano Gauntlet Quarter Scale Collectible Figure features six LED light up Infinity Stones with two lighting modes including a solid light effect and a pulsing light effect, articulations on individual fingers developed for movements and poses, and a specially designed custom base with movie logo that will hold the gauntlet in an upright position. Measuring approximately 20.5 cm in height with base included. The Nano Gauntlet Quarter Scale Collectible Figure is a stunning centerpiece that will surely capture attention in your Marvel Cinematic Universe display! Batteries required (3x AAA, not included).

Anbieter: Zavvi
Stand: 27.11.2020
Zum Angebot
Cybersecurity
83,90 CHF *
ggf. zzgl. Versand

Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. This book is your ultimate resource for Cybersecurity. Here you will find the most up-to-date information, analysis, background and everything you need to know. In easy to read chapters, with extensive references and links to get you to know all there is to know about Cybersecurity right away, covering: Cyber security standards, Hacker (term), 2007 cyberattacks on Estonia, 2010 cyberattacks on Myanmar, Camfecting, Chinese intelligence operations in the United States, Comprehensive National Cybersecurity Initiative, Computer insecurity, Cyber Operations, Cyber spying, Cyber-security regulation, Cyberattacks during the 2008 South Ossetia war, Cyberstrategy 3.0, Cyberterrorism, Cyberwarfare, Cyberwarfare in the United States, Denial-of-service attack, Echelon (signals intelligence), Electronic warfare, Endgame systems, Espionage, Firewall (computing), Fleet Electronic Warfare Center, GhostNet, Industrial espionage, Information warfare, Internet censorship in the People's Republic of China, Intervasion of the UK, IWar, July 2009 cyber attacks, Küberkaitseliit, List of cyber attack threat trends, Military-digital complex, National Cyber Security Division, National Cybersecurity Center, Political repression of cyber-dissidents, Proactive Cyber Defence, Signals intelligence, Stars virus, Stuxnet, TCP reset attack, W3af, WarVOX, Web brigades, Wireless signal jammer, AFSSI-5020, BLACKER, BS 7799, Common Criteria, CTCPEC, Datacenter star audit, FIPS 140, FIPS 140-2, FIPS 140-3, IEEE 802.10, ISO 15292, ISO 27799, ISO/IEC 27002, ITSEC, Pluggable Authentication Modules, Rainbow Series, Standard of Good Practice, Trusted Computer System Evaluation Criteria, Computer security, Portal:Computer security, 2009 Sidekick data loss, AAFID, Absolute Manage, Accelops, Acceptable use policy, Access token, Advanced Persistent Threat, Air gap (networking), Ambient authority, Anomaly-based intrusion detection system, Application firewall, Application security, Asset (computer security), Attack (computer), AutoRun, Blacklist (computing), Blue Cube Security, BlueHat, Centurion guard, Client honeypot, Cloud computing security, Collaboration-oriented architecture, Committee on National Security Systems, Computer Law and Security Report, Computer security compromised by hardware failure, Computer security incident management, Computer security model, Computer surveillance, Confused deputy problem, Countermeasure (computer), CPU modes, Crackme, Cross-site printing, CryptoRights Foundation, CVSS, Control system security, Cyber Storm Exercise, Cyber Storm II, Cyberheist, Dancing pigs, Data breach, Data loss prevention software, Data validation, Digital self-defense, Dolev-Yao model, DREAD: Risk assessment model, Dynamic SSL, Economics of security, Enterprise information security architecture, Entrust, Evasion (network security), Event data, Federal Desktop Core Configuration, Federal Information Security Management Act of 2002, Flaw hypothesis methodology, Footprinting, Forward anonymity, Four Horsemen of the Infocalypse, Fragmented distribution attack, Higgins project, High Assurance Guard, Host Based Security System, Human-computer interaction (security), Inference attack, Information assurance...and much more This book explains in-depth the real drivers and workings of Cybersecurity. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Cybersecurity

Anbieter: Orell Fuessli CH
Stand: 27.11.2020
Zum Angebot
Beckett's Critical Complicity
140,00 CHF *
ggf. zzgl. Versand

' Winner of the Midwest MLA Book Award Samuel Beckett's work harbors an inevitable complicity with traditional modes and values. His idealist and even nihilist inclinations, for example, are closely related to the abstracting and systematizing tendencies that have predominated in Western thinking. His drama and fiction, in reproducing these tendencies, also help to reinforce and legitimate them. Beckett's work can thus be said to encourage an attitude of stoic resignation or life-denying withdrawal. Sylvie Debevec Henning's study reveals an important countertendency. In examining Beckett's art and literary criticism, his novel Murphy, plays Krapp's Last Tape and Endgame, his only film venture, and the late story ''The Lost Ones,'' she shows that through a variety of double-voiced techniques -- irony, parody, and satire -- Beckett also brings a powerful critical light to bear upon our culture's repeated attempts to reduce or eliminate the more problematic aspects of existence and even mocks our desire to do so. His disquieting and occasionally uproarious interweaving of contradictory perspectives -- somber and carnivalized, established and contestory -- suggests that suffering and anguish are fundamental to life, while it affirms their relation to laughter and creative vigor within a richer, if less settled, cultural context. Drawing upon the work of Nietzsche, Heidegger, Foucault, Derrida, and particularly Bakhtin, Henning argues that Beckett's profound critique of Western intellectual tradition does not necessarily entail the loss of all positive values and beliefs. On the contrary, his use of carnivalesque and dialogized modes signals a revitalizing capacity that has not been fully appreciated.

Anbieter: Orell Fuessli CH
Stand: 27.11.2020
Zum Angebot
Beckett's Critical Complicity
78,99 € *
ggf. zzgl. Versand

' Winner of the Midwest MLA Book Award Samuel Beckett's work harbors an inevitable complicity with traditional modes and values. His idealist and even nihilist inclinations, for example, are closely related to the abstracting and systematizing tendencies that have predominated in Western thinking. His drama and fiction, in reproducing these tendencies, also help to reinforce and legitimate them. Beckett's work can thus be said to encourage an attitude of stoic resignation or life-denying withdrawal. Sylvie Debevec Henning's study reveals an important countertendency. In examining Beckett's art and literary criticism, his novel Murphy, plays Krapp's Last Tape and Endgame, his only film venture, and the late story ''The Lost Ones,'' she shows that through a variety of double-voiced techniques -- irony, parody, and satire -- Beckett also brings a powerful critical light to bear upon our culture's repeated attempts to reduce or eliminate the more problematic aspects of existence and even mocks our desire to do so. His disquieting and occasionally uproarious interweaving of contradictory perspectives -- somber and carnivalized, established and contestory -- suggests that suffering and anguish are fundamental to life, while it affirms their relation to laughter and creative vigor within a richer, if less settled, cultural context. Drawing upon the work of Nietzsche, Heidegger, Foucault, Derrida, and particularly Bakhtin, Henning argues that Beckett's profound critique of Western intellectual tradition does not necessarily entail the loss of all positive values and beliefs. On the contrary, his use of carnivalesque and dialogized modes signals a revitalizing capacity that has not been fully appreciated.

Anbieter: Thalia AT
Stand: 27.11.2020
Zum Angebot
Cybersecurity
48,99 € *
ggf. zzgl. Versand

Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation. Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. This book is your ultimate resource for Cybersecurity. Here you will find the most up-to-date information, analysis, background and everything you need to know. In easy to read chapters, with extensive references and links to get you to know all there is to know about Cybersecurity right away, covering: Cyber security standards, Hacker (term), 2007 cyberattacks on Estonia, 2010 cyberattacks on Myanmar, Camfecting, Chinese intelligence operations in the United States, Comprehensive National Cybersecurity Initiative, Computer insecurity, Cyber Operations, Cyber spying, Cyber-security regulation, Cyberattacks during the 2008 South Ossetia war, Cyberstrategy 3.0, Cyberterrorism, Cyberwarfare, Cyberwarfare in the United States, Denial-of-service attack, Echelon (signals intelligence), Electronic warfare, Endgame systems, Espionage, Firewall (computing), Fleet Electronic Warfare Center, GhostNet, Industrial espionage, Information warfare, Internet censorship in the People's Republic of China, Intervasion of the UK, IWar, July 2009 cyber attacks, Küberkaitseliit, List of cyber attack threat trends, Military-digital complex, National Cyber Security Division, National Cybersecurity Center, Political repression of cyber-dissidents, Proactive Cyber Defence, Signals intelligence, Stars virus, Stuxnet, TCP reset attack, W3af, WarVOX, Web brigades, Wireless signal jammer, AFSSI-5020, BLACKER, BS 7799, Common Criteria, CTCPEC, Datacenter star audit, FIPS 140, FIPS 140-2, FIPS 140-3, IEEE 802.10, ISO 15292, ISO 27799, ISO/IEC 27002, ITSEC, Pluggable Authentication Modules, Rainbow Series, Standard of Good Practice, Trusted Computer System Evaluation Criteria, Computer security, Portal:Computer security, 2009 Sidekick data loss, AAFID, Absolute Manage, Accelops, Acceptable use policy, Access token, Advanced Persistent Threat, Air gap (networking), Ambient authority, Anomaly-based intrusion detection system, Application firewall, Application security, Asset (computer security), Attack (computer), AutoRun, Blacklist (computing), Blue Cube Security, BlueHat, Centurion guard, Client honeypot, Cloud computing security, Collaboration-oriented architecture, Committee on National Security Systems, Computer Law and Security Report, Computer security compromised by hardware failure, Computer security incident management, Computer security model, Computer surveillance, Confused deputy problem, Countermeasure (computer), CPU modes, Crackme, Cross-site printing, CryptoRights Foundation, CVSS, Control system security, Cyber Storm Exercise, Cyber Storm II, Cyberheist, Dancing pigs, Data breach, Data loss prevention software, Data validation, Digital self-defense, Dolev-Yao model, DREAD: Risk assessment model, Dynamic SSL, Economics of security, Enterprise information security architecture, Entrust, Evasion (network security), Event data, Federal Desktop Core Configuration, Federal Information Security Management Act of 2002, Flaw hypothesis methodology, Footprinting, Forward anonymity, Four Horsemen of the Infocalypse, Fragmented distribution attack, Higgins project, High Assurance Guard, Host Based Security System, Human-computer interaction (security), Inference attack, Information assurance...and much more This book explains in-depth the real drivers and workings of Cybersecurity. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Cybersecurity

Anbieter: Thalia AT
Stand: 27.11.2020
Zum Angebot