Mostrando 1,121 - 1,140 Resultados de 2,746 Para Buscar '"Aššur"', tiempo de consulta: 0.08s Limitar resultados
  1. 1121
    por OECD
    Publicado 2022
    Tabla de Contenidos: “…. -- Kyrgyzstan: Use of economic instruments for water resource management -- Kazakhstan: Large-scale multi-purpose water infrastructure -- Policy recommendations -- Building clear and comprehensive compliance and enforcement mechanisms for environmental regulatory frameworks -- Recent progress in environmental compliance assurance systems in Eastern Europe and the Caucasus countries -- New compliance assurance institutions have been set up. -- Some countries have improved information management systems and others plan to do so. -- Initiatives to share compliance assurance information with the public and to promote voluntary compliance -- Planned inspections are mostly set based on risk following newly adopted methodologies -- The use of self-monitoring mechanisms and Pollutant Release and Transfer Registers has expanded -- Some Eastern Europe and Caucasus countries plan to update their environmental penalties with the goal of increasing their dissuasive effect -- Work on environmental liability in the region is progressing to varying extents. -- Policy recommendations -- References -- 5 A focus on finance for green growth in EECCA -- Reforming fossil-fuel subsidies to promote transition towards a green economy in EECCA countries -- Key findings and data on fossil fuel subsidies in EECCA -- Policy recommendations -- Enhancing public financial management for green finance mobilisation in EECCA -- A crucial role for public financial management in promoting green economy transition -- Progress on, and remaining challenges to, developing and financing public investments towards a green economy…”
    Libro electrónico
  2. 1122
    Publicado 2014
    Tabla de Contenidos: “…; When employees misinterpret managers ; Management debt ; Management quality assurance -- 6. Concerning the going concern : How to minimize politics in your company ; The right kind of ambition ; Titles and promotions ; When smart people are bad employees ; Old people ; One-on-one ; Programming your culture ; Taking the mystery out of scaling a company ; The scale anticipation fallacy -- 7. …”
    Libro electrónico
  3. 1123
    Publicado 2015
    Tabla de Contenidos: “…Why do Romanian universities fail to internalise quality assurance? Koen Geven, Oana Sarbu, Robert Santa, Adina Maricut, Norbert Sabic.-4. …”
    Libro electrónico
  4. 1124
    Publicado 2020
    Tabla de Contenidos: “…Open data and records management - activating public engagement to improve information: case studies from Sierra Leone and Cambodia -- Katherine Townsend, Tamba Lamin, Amadu Massally and Pyrou Chung -- 8. Assuring authenticity in public sector data: a case study of the Kenya Open Data Initiative -- James Lowry -- 9. …”
    Libro electrónico
  5. 1125
    Tabla de Contenidos: “…References 87 Appendix A: Summary of cost item hierarchy 89 Appendix B: List of assumptions and boundary conditions in decommissioning costing 97 Appendix C: Quality assurance and contingency 103 Appendix D: Standardised definitions for cost items 113 Appendix E: Glossary 181 Contributors to drafting and review 191 …”
    Libro electrónico
  6. 1126
    Publicado 2007
    Tabla de Contenidos: “…Invited Talk -- Erlang – Software for a Concurrent World -- Types -- Gradual Typing for Objects -- Generic Universe Types -- Declarative Object Identity Using Relation Types -- Runtime Implementation -- Object-Relative Addressing: Compressed Pointers in 64-Bit Java Virtual Machines -- Generational Real-Time Garbage Collection -- AS-GC: An Efficient Generational Garbage Collector for Java Application Servers -- Empirical Studies -- Exception Handling: A Field Study in Java and .NET -- On the Impact of Aspectual Decompositions on Design Stability: An Empirical Study -- Dahl-Nygaard Prize Invited Talk -- An Accidental Simula User -- Programs and Predicates -- Validity Invariants and Effects -- Non-null References by Default in Java: Alleviating the Nullity Annotation Burden -- Efficiently Generating Structurally Complex Inputs with Thousands of Objects -- Language Design -- Matching Objects with Patterns -- DirectFlow: A Domain-Specific Language for Information-Flow Systems -- A Relational Model of Object Collaborations and Its Use in Reasoning About Relationships -- Inheritance and Derivation -- JavaGI: Generalized Interfaces for Java -- Metaprogramming with Traits -- Morphing: Safely Shaping a Class in the Image of Others -- A Higher Abstraction Level Using First-Class Inheritance Relations -- Dahl-Nygaard Prize Invited Talk -- Assuring Object-Oriented Architecture -- Aspects -- MAO: Ownership and Effects for More Effective Reasoning About Aspects -- Joinpoint Inference from Behavioral Specification to Implementation -- A Machine Model for Aspect-Oriented Programming -- A Staged Static Program Analysis to Improve the Performance of Runtime Monitoring -- Language About Language -- Tracking Linear and Affine Resources with Java(X) -- Attribute Grammar-Based Language Extensions for Java -- Metamodel Adaptation and Model Co-adaptation…”
    Libro electrónico
  7. 1127
    Publicado 2015
    Tabla de Contenidos: “…Chapter 7: Issues and Considerations in the Application of Data Mining in BusinessChapter 8: The Importance of Data Quality Assurance to the Data Analysis Activities of the Data Mining Process; Chapter 9: Critical Success Factors in Knowledge Discovery and Data Mining Projects; Chapter 10: Data Mining for Organizations: Challenges and Opportunities for Small Developing States; Chapter 11: Determining Sources of Relative Inefficiency in Heterogeneous Samples Using Multiple Data Analytic Techniques; Chapter 12: Applications of Data Mining in Organizational Behavior…”
    Libro electrónico
  8. 1128
    Publicado 2011
    Tabla de Contenidos: “…TYPES OF ATTACKS10 ENCRYPTION IS SOMETIMES NOT ENOUGH; RISK-RISK TRADE-OFFS; THE EFFECTS OF ENCRYPTION; NOTES; 11 NFC: ANOTHER ONE FOR THE ACRONYM SOUP; 12 NETWORK SECURITY WHEN GOING MOBILE; NAC = RIP AND REPLACE; NAC = ANOTHER BRICK IN THE WALL; NAC = THE SECURITY ORCHESTRATOR; 13 IMPROVING YOUR NETWORK AND APPLICATION ASSURANCE STRATEGY; THE 0DAY MENACE; TIERED APPROACH; NOTES; 14 MOBILE RULES FOR SECURITY OFFICERS: A 'CASE STUDY'; MOBILE RULES; USEFUL LINKS; RESEARCH AND ARTICLES; ORGANISATIONS; BLOGS; OTHER…”
    Libro electrónico
  9. 1129
    Publicado 2018
    Tabla de Contenidos: “…-- Rapid release -- Summary -- Questions -- Further reading -- Chapter 2: Security Goals and Metrics -- Organization goal -- Strategy and metrics -- Policy and compliance -- Education and guidance -- Development goal/metrics -- Threat assessment -- Threat assessment for GDPR -- Deliverables and development team self-assessment -- Security requirements -- QA goal/metrics -- Design review -- Implementation review -- Third-party components -- IDE-plugin code review -- Static code review -- Target code review -- Security testing -- Operation goal/metrics -- Issue management -- Environment Hardening -- Secure configuration baseline -- Constant monitoring mechanism -- Operational enablement -- Code signing for application deployment -- Application communication ports matrix -- Application configurations -- Summary -- Questions -- Further reading -- Chapter 3: Security Assurance Program and Organization -- Security assurance program -- SDL (Security Development Lifecycle) -- OWASP SAMM -- Security guidelines and processes -- Security growth with business -- Stage 1 - basic security control -- Stage 2 - building a security testing team -- Stage 3 - SDL activities…”
    Libro electrónico
  10. 1130
    Publicado 2004
    Tabla de Contenidos: “…Nécessité d'un contrôle conjoint des activités de banque et d'assurance…”
    Libro electrónico
  11. 1131
    Publicado 2023
    Tabla de Contenidos: “…10.2.1 Traditional Task Allocation Methods -- 10.2.2 Need of Machine Learning in Task Allocation -- 10.3 Machine Learning-Based Task Allocation Model -- 10.4 Conclusion -- References -- Chapter 11 Software Quality Management by Agile Testing -- 11.1 Introduction -- 11.2 A Brief Introduction to JMeter -- 11.3 Review of Literature -- 11.4 Performance Testing Using JMeter -- 11.5 Proposed Work -- 11.6 Results and Discussions -- 11.7 Conclusion -- References -- Chapter 12 A Deep Drive into Software Development Agile Methodologies for Software Quality Assurance -- 12.1 Introduction -- 12.2 Background Work -- 12.2.1 Factors of Quality Assurance in Agility -- 12.3 Understanding Agile Software Methodologies -- 12.3.1 Need for Agile Software Methodology Framework -- 12.4 Agile Methodology Evaluation Framework -- 12.4.1 Extreme Programming (XP) -- 12.4.2 Scrum -- 12.4.3 Lean Development -- 12.4.4 Crystal Methodology -- 12.4.5 Kanban Methodology -- 12.4.6 Feature Driven Development (FDD) Methodology -- 12.4.7 Dynamic System Development Method (DSDM) -- 12.5 Agile Software Development - Issues and Challenges -- 12.6 Conclusion -- References -- Chapter 13 Factors and Techniques for Software Quality Assurance in Agile Software Development -- 13.1 Introduction -- 13.1.1 Values of the Agile Manifesto -- 13.1.2 The Twelve Agile Manifesto Principles -- 13.1.3 Agile for Software Quality Assurance -- 13.2 Literature Review -- 13.3 Agile Factors in Quality Assurance -- 13.3.1 Success Factors -- 13.3.2 Failure Factors -- 13.4 Quality Assurance Techniques -- 13.5 Challenges and Limitations of Agile Technology -- 13.6 Conclusion and Future Scope -- References -- Chapter 14 Classification of Risk Factors in Distributed Agile Software Development Based on User Story -- 14.1 Introduction -- 14.2 Software Risk Management -- 14.2.1 Risk Assessment -- 14.3 Literature Review…”
    Libro electrónico
  12. 1132
    Publicado 2024
    Tabla de Contenidos: “…-- 4:1-11 : otherworldly throne hall -- 5:1-14 : worthy Lamb -- 6:1-17 : trials on earth -- 7:1-17 : interlude: assurance from heaven -- 8:1-13 : stillness begets cataclysm -- 9:1-12 : fifth trumpet : first woe -- 9:13-21 : sixth trumpet : second woe -- 10:1-11 : another interlude : renewed prophecy -- 11:1-14 : Ecclesia militans -- 11:15-19 : seventh trumpet : third woe -- 12:1-18 : Ecclesia pressa -- 13:1-10 : sea-beast -- 13:11-18 : land-beast -- 14:1-5 : Ecclesia triumphans -- 14:6-12 : judgment as good news -- 14:13-20 : judgment as harvest and vintage -- 15:1-8 : Pantocrator globally acknowledged -- 16:1-21 : final effusion of divine wrath -- 17:1-18 : anti-Marian mystery -- 18:1-8 : anti-Marian demise -- 18:9-19 : funereal quadrilogy -- 18:20-24 : supernal eulogy -- 19:1-8 : Ecclesia sponsalis -- 19:9-10 : the Lamb's nuptial supper -- 19:11-16 : supreme commander -- 19:17-21 : the birds' raptorial meal -- 20:1-6 : millenary toward eternity -- 20:7-10 : siege broken -- 20:11-15 : Basileian tribunal -- 21:1-8 : Theandric family -- 21:9-27 : Ecclesia consummata -- 22:1-5 : Eden regained -- 22:6-21 : Mar©Łna-th©Ł! …”
    Libro
  13. 1133
    Publicado 2019
    Tabla de Contenidos: “…FASE Invited Talk -- Software Assurance in an Uncertain World -- Software Verification -- Tool Support for Correctness-by-Construction -- Automatic Modeling for Opaque Code in JavaScript Static Analysis -- SMT-Based Bounded Schedulability Analysis of the Clock Constraint Specification Language -- A Hybrid Dynamic Logic for Event/Data-based Systems -- Model-driven Development and Model Transformation -- Pyro: Generating Domain-Specific Collaborative Online Modeling Environments -- Efficient Model Synchronization by Automatically Constructed Repair Processes -- Offline Delta-driven Model Transformation with Dependency Injection -- A Logic-Based Incremental Approach to Graph Repair -- Software Verification -- DeepFault: Fault Localization For Deep Neural Networks -- Variability Abstraction and Refinement for Game-based Lifted Model Checking of full CTL -- Formal Verification of Safety and Security Related Timing Constraints for A Cooperative Automotive System -- Checking Observational Purity Of Procedures -- Software Evolution & Requirements Engineering -- Structural and Nominal Cross-Language Clone Detection -- SL2SF: Refactoring Simulink to Stateflow -- Metric Temporal Graph Logic over Typed Attributed Graphs -- KupC: A Formal Tool for Modeling and Verifying Dynamic Updating of C Programs -- Business Process Privacy Analysis in PLEAK -- Specification, Design, and Implementation of Particular Classes of Systems -- CLTestCheck: Measuring Test Effectiveness for GPU Kernels -- Implementing SOS with Active Objects: A Case Study of a Multicore Memory System -- Optimal and Automated Deployment for Microservices -- A Data Flow Model with Frequency Arithmetic -- Software Testing -- CoVeriTest: Cooperative Verifier-Based Testing -- Pardis: Priority Aware Test Case Reduction -- Automatically Identifying Sufficient Object Builders from Module APIs…”
    Libro electrónico
  14. 1134
    Publicado 2004
    Tabla de Contenidos: “…Cover; Preface; Sponsor Guidance; The RAND Corporation Quality Assurance Process; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; CHAPTER ONE Introduction; Assessing the Homeland Security Implication of Geospatial Information; Public Access to Geospatial Information; Research Objectives; Research Methodology; Need for an Analytical Framework; How the Report Is Organized; CHAPTER TWO What Are the Attackers' Key Information Needs?…”
    Libro electrónico
  15. 1135
    por OECD
    Publicado 2019
    Tabla de Contenidos: “…Intro -- Table des matières -- Signes et abréviations conventionnels -- Comparaisons internationales -- Total des services -- Services de fabrication fournis sur des intrants physiques détenus par des tiers -- Services d'entretien et de réparation n.i.a -- Transports -- Transports maritimes -- Transports aériens -- Autres modes de transports -- Services postaux et de messagerie -- Voyages -- Construction -- Services d'assurance et de pension -- Services financiers -- Frais pour usage de propriété intellectuelle n.i.a -- Services de télécommunications, d'informatique et d'information -- Autres services aux entreprises -- Services personnels, culturels et relatifs aux loisirs -- Biens et services des administrations publiques, n.i.a. -- Tableaux par pays -- Australie -- Australie -- Autriche -- Autriche -- Belgique -- Belgique -- Canada -- Canada -- Chili -- Chili -- République tchèque -- République tchèque -- Danemark -- Danemark -- Estonie -- Estonie -- Finlande -- Finlande -- France -- France -- Allemagne -- Allemagne -- Grèce -- Grèce -- Hongrie -- Hongrie -- Islande -- Islande -- Irlande -- Irlande -- Israël -- Israël -- Italie -- Italie -- Japon -- Japon -- Corée -- Corée -- Lettonie -- Lettonie -- Lituanie -- Lituanie -- Luxembourg -- Luxembourg -- Mexique -- Mexique -- Pays-Bas -- Pays-Bas -- Nouvelle-Zélande -- Nouvelle-Zélande -- Norvège -- Norvège -- Pologne -- Pologne -- Portugal -- Portugal -- République slovaque -- République slovaque -- Slovénie -- Slovénie -- Espagne -- Espagne -- Suède -- Suède -- Suisse -- Suisse -- Turquie -- Turquie -- Royaume-Uni -- Royaume-Uni -- États-Unis -- États-Unis -- Union européenne (28) -- Union européenne (28) -- Zone euro (19) - zone euro -- Zone euro (19) - zone euro -- Colombie -- Colombie -- Costa Rica -- Costa Rica -- Fédération de Russie -- Fédération de Russie…”
    Libro electrónico
  16. 1136
    Tabla de Contenidos: “…Construction; Tableau 11. Services d'assurance et de pension; Tableau 12. Services financiers…”
    Libro electrónico
  17. 1137
    Tabla de Contenidos: “…4.4 Recommendations for future development of resourcing5. Assuring and Improving the Quality of Tertiary Education; 5.1 The present situation; 5.2 Issues identified by the Review Team; 5.3 Implications and recommendations; 6. …”
    Libro electrónico
  18. 1138
    Publicado 2016
    Tabla de Contenidos:
    Libro electrónico
  19. 1139
    Publicado 2014
    Tabla de Contenidos: “…Chapter 10 - Security Implications of Bring Your Own Device, IT Consumerization, and Managing User ChoicesChapter 11 - Information Assurance: Open Research Questions and Future Directions; Chapter 12 - Protecting Us from Us: Human Firewall Vulnerability Assessments; Chapter 13 - Service-Oriented Architecture; Chapter 14 - Managing the Security Testing Process; Chapter 15 - Security and Resilience in the Software Development Life Cycle; Chapter 16 - Cloud Cryptography; Chapter 17 - Identity and Access Management Architecture; Chapter 18 - FedRAMP: Entry or Exit Ramp for Cloud Security?…”
    Libro electrónico
  20. 1140
    por OECD
    Publicado 2018
    Tabla de Contenidos: “…Construction -- Tableau 11. Services d'assurance et de pension -- Tableau 12. Services financiers -- Tableau 13. …”
    Libro electrónico