Mostrando 1,421 - 1,440 Resultados de 2,075 Para Buscar '"Damage"', tiempo de consulta: 0.09s Limitar resultados
  1. 1421
    por Cooke, David, 1950-
    Publicado 1990
    Tabla de Contenidos: “…; Giving orders; Handling requests; Writing reports; Summary; 9 Coping with disturbed prisoners; Describing psychological disturbance; Prisoners with learning difficulties; Brain damage; Summary…”
    Libro electrónico
  2. 1422
    Publicado 2000
    Tabla de Contenidos: “…A Pilot Study; Optic Nerve Damage in Human Glaucoma. III. Quantitative Correlation of Nerve Fiber Loss and Visual Field Defect in Glaucoma, Ischemic Neuropathy, Papilledema, and Toxic Neuropathy; Argon Laser Treatment for Medically Unresponsive Attacks of Angle-Closure Glaucoma; Enhanced Intraocular Pressure Controlling Effectiveness of Trabeculectomy by Local Application of Mitomycin; Axenfeld-Rieger Syndrome. …”
    Libro electrónico
  3. 1423
    por Committee on Toxicology
    Publicado 1984
    Tabla de Contenidos: “…REVIEW OF AVAILABLE INFORMATION ON PHENCYCLIDINECHEMISTRY; ABSORPTION, FATE, AND ELIMINATION; Absorption; Distribution; Metabolism; Elimination (Pharmacokinetics); ANIMAL TOXICOLOGY; NEUROPHARMACOLOGY; GENETIC AND REPRODUCTIVE EFFECTS; Mutagenicity; Teratogenic-Reproductive Effects; Summary; DELAYED AND LONG-TERM EFFECTS; Prolonged Psychotic Reactions; Organic Brain Damage; Residual Trauma in Connection with the Intoxicated State; Food and Drug Administration Reports of Adverse Reactions; Summary; EFFECTS ON VOLUNTEERS; REFERENCES…”
    Libro electrónico
  4. 1424
    Publicado 2008
    Tabla de Contenidos: “…Uganda : the applicability of international humanitarian law and human rights law in occupied territories / Tom Ruys and Sten Verhoeven -- Individuals as subjects of international humanitarian law and human rights law / Catia Lopes and Noelle Quenivet -- Concurrent application of international -- Humanitarian law and human rights law : a victim perspective / Jean-Marie Henckaerts -- The implementation of international humanitarian law by human rights courts : the example of the inter-American human rights system / Emiliano J. Buis -- "Collateral damages" of military operations : is implementation of international humanitarian law possible using international human rights law tools? …”
    Libro
  5. 1425
    Publicado 2012
    Tabla de Contenidos: “…Rustad and Timotheus Vermeulen -- Temporalities on collision course: time, knowledge, and temporal critique in Damages / Toni Pape -- Freaks of time: reevaluating memory and identity through Daniel Knauf's Carnivale / Frida Beckman -- The discourse of medium: time as a narrative device / Kristi McDuffie -- Moving beyond the televisual restraints of the past: reimagining genres and formats. …”
    Libro
  6. 1426
    Publicado 2006
    Tabla de Contenidos: “…-- Introduction -- Verbal interference effects -- Verbal mechanisms in remembering objects and object-position links -- Remembering locations when focusing on time -- Conclusions -- Acknowledgements -- Note -- References -- Variations on the image scanning paradigm -- Introduction -- Wider implications of the findings of image scanning experiments -- Two contrasting scanning processes -- Scanning along straight or complex paths -- Conclusion -- References -- The use of transcranial magnetic stimulation in spatial cognition -- Introduction -- TMS studies of spatial extinction -- Suppression of extinction with TMS in patients with unilateral brain damage -- TMS studies of visual spatial neglect -- Suppression of visual neglect with TMS in patients with unilateral brain damage -- Conclusions -- References -- Models and components of imagery and visuo-spatial processes…”
    Libro electrónico
  7. 1427
    por Dargie, Waltenegus
    Publicado 2010
    Tabla de Contenidos: “…Intro -- FUNDAMENTALS OF WIRELESS SENSOR NETWORKS -- Contents -- About the Series Editors -- Preface -- Part One: INTRODUCTION -- 1 Motivation for a Network of Wireless Sensor Nodes -- 1.1 Definitions and Background -- 1.1.1 Sensing and Sensors -- 1.1.2 Wireless Sensor Networks -- 1.2 Challenges and Constraints -- 1.2.1 Energy -- 1.2.2 Self-Management -- 1.2.3 Wireless Networking -- 1.2.4 Decentralized Management -- 1.2.5 Design Constraints -- 1.2.6 Security -- 1.2.7 Other Challenges -- Exercises -- References -- 2 Applications -- 2.1 Structural Health Monitoring -- 2.1.1 Sensing Seismic Events -- 2.1.2 Single Damage Detection Using Natural Frequencies -- 2.1.3 Multiple Damage Detection Using Natural Frequencies -- 2.1.4 Multiple Damage Detection Using Mode Shapes -- 2.1.5 Coherence -- 2.1.6 Piezoelectric Effect -- 2.1.7 Prototypes -- 2.2 Traffic Control -- 2.2.1 The Sensing Task -- 2.2.2 Prototypes -- 2.3 Health Care -- 2.3.1 Available Sensors -- 2.3.2 Prototypes -- 2.4 Pipeline Monitoring -- 2.4.1 Prototype -- 2.5 Precision Agriculture -- 2.5.1 Prototypes -- 2.6 Active Volcano -- 2.6.1 Prototypes -- 2.7 Underground Mining -- 2.7.1 Sources of Accidents -- 2.7.2 The Sensing Task -- Exercises -- References -- 3 Node Architecture -- 3.1 The Sensing Subsystem -- 3.1.1 Analog-to-Digital Converter -- 3.2 The Processor Subsystem -- 3.2.1 Architectural Overview -- 3.2.2 Microcontroller -- 3.2.3 Digital Signal Processor -- 3.2.4 Application-Specific Integrated Circuit -- 3.2.5 Field Programmable Gate Array -- 3.2.6 Comparison -- 3.3 Communication Interfaces -- 3.3.1 Serial Peripheral Interface -- 3.3.2 Inter-Integrated Circuit -- 3.3.3 Summary -- 3.4 Prototypes -- 3.4.1 The IMote Node Architecture -- 3.4.2 The XYZ Node Architecture -- 3.4.3 The Hogthrob Node Architecture -- Exercises -- References -- 4 Operating Systems -- 4.1 Functional Aspects…”
    Libro electrónico
  8. 1428
    Publicado 2017
    Tabla de Contenidos: “…Visa 102 3 Cybersecurity Requirements for Specific Industries 105 3.1 Financial Institutions: Gramm-Leach-Bliley Act Safeguards Rule 106 3.1.1 Interagency Guidelines 106 3.1.2 Securities and Exchange Commission Regulation S-P 109 3.1.3 FTC Safeguards Rule 110 3.2 Financial Institutions and Creditors: Red Flag Rule 112 3.2.1 Financial Institutions or Creditors 116 3.2.2 Covered Accounts 116 3.2.3 Requirements for a Red Flag Identity Theft Prevention Program 117 3.3 Companies that use Payment and Debit Cards: Payment Card Industry Data Security Standard (PCI DSS) 118 3.4 Health Providers: Health Insurance Portability and Accountability Act (HIPAA) Security Rule 121 3.5 Electric Utilities: Federal Energy Regulatory Commission Critical Infrastructure Protection Reliability Standards 127 3.5.1 CIP-003-6: Cybersecurity - Security Management Controls 127 3.5.2 CIP-004-6: Personnel and Training 128 3.5.3 CIP-006-6: Physical Security of Cyber Systems 128 3.5.4 CIP-007-6: Systems Security Management 128 3.5.5 CIP-009-6: Recovery Plans for Cyber Systems 129 3.5.6 CIP-010-2: Configuration Change Management and Vulnerability Assessments 129 3.5.7 CIP-011-2: Information Protection 130 3.6 Nuclear Regulatory Commission Cybersecurity Regulations 130 4 Cybersecurity and Corporate Governance 133 4.1 Securities and Exchange Commission Cybersecurity Expectations for Publicly Traded Companies 134 4.1.1 10-K Disclosures: Risk Factors 135 4.1.2 10-K Disclosures: Management's Discussion and Analysis of Financial Condition and Results of Operations (MD&A) 137 4.1.3 10-K Disclosures: Description of Business 137 4.1.4 10-K Disclosures: Legal Proceedings 138 4.1.5 10-K Disclosures: Examples 138 4.1.5.1 Wal-Mart 138 4.1.5.2 Berkshire Hathaway 143 4.1.5.3 Target Corp 144 4.1.6 Disclosing Data Breaches to Investors 147 4.2 Fiduciary Duty to Shareholders and Derivative Lawsuits Arising from Data Breaches 150 4.3 Committee on Foreign Investment in the United States and Cybersecurity 152 4.4 Export Controls and the Wassenaar Arrangement 154 5 Anti-Hacking Laws 159 5.1 Computer Fraud and Abuse Act 160 5.1.1 Origins of the CFAA 160 5.1.2 Access without Authorization and Exceeding Authorized Access 161 5.1.2.1 Narrow View of "Exceeds Authorized Access" and "Without Authorization" 163 5.1.2.2 Broader View of "Exceeds Authorized Access" and "Without Authorization" 167 5.1.2.3 Attempts to Find a Middle Ground 169 5.1.3 The Seven Sections of the CFAA 170 5.1.3.1 CFAA Section (a)(1): Hacking to Commit Espionage 172 5.1.3.2 CFAA Section (a)(2): Hacking to Obtain Information 172 5.1.3.3 CFAA Section (a)(3): Hacking a Federal Government Computer 176 5.1.3.4 CFAA Section (a)(4): Hacking to Commit Fraud 178 5.1.3.5 CFAA Section (a)(5): Hacking to Damage a Computer 181 5.1.3.5.1 CFAA Section (a)(5)(A): Knowing Transmission that Intentionally Damages a Computer Without Authorization 181 5.1.3.5.2 CFAA Section (a)(5)(B): Intentional Access Without Authorization that Recklessly Causes Damage 184 5.1.3.5.3 CFAA Section (a)(5)(C): Intentional Access Without Authorization that Causes Damage and Loss 185 5.1.3.5.4 CFAA Section (a)(5): Requirements for Felony and Misdemeanor Cases 186 5.1.3.6 CFAA Section (a)(6): Trafficking in Passwords 188 5.1.3.7 CFAA Section (a)(7): Threatening to Damage or Obtain Information from a Computer 190 5.1.4 Civil Actions under the CFAA 193 5.1.5 Criticisms of the CFAA 195 5.2 State Computer Hacking Laws 198 5.3 Section 1201 of the Digital Millennium Copyright Act 201 5.3.1 Origins of Section 1201 of the DMCA 202 5.3.2 Three Key Provisions of Section 1201 of the DMCA 203 5.3.2.1 DMCA Section 1201(a)(1) 203 5.3.2.2 DMCA Section 1201(a)(2) 208 5.3.2.2.1 Narrow Interpretation of Section (a)(2): Chamberlain Group v. …”
    Libro electrónico
  9. 1429
    Publicado 2013
    “…Offering an explanation of how the effects of coerced perpetration trauma are built, and the damage done to the psyches and lives of most trauma victims, the book extends our knowledge base in a thorough deconstruction of the nature of perpetration and its effects on the psyche. …”
    Libro electrónico
  10. 1430
    Publicado 2022
    “…The authors show how you too can become a relationship-based leader and thrive in our chaotic, digital world. By highlighting role models from different careers, backgrounds, skill sets, and schools of thought, the book offers readers an inspiring antidote to one of the most serious--andâ€underreported--crises of our era: the damage that digital distractions have done to our personal relationships.The book offers: Concrete strategies for combating the depersonalization of the Information Age and strengthening our connections with other people Real stories of how people from Olympic champions to small-business owners have put people first Take-away tips for the busy reader who needs quick insight or hopes to use the book in a modular curriculum for their organization or class Perfect for anyone who wants to lead both morally and effectively, Leadership is a Relationship provides a concise and convincing argument that leaders who put people first have the best chance of succeeding in the twenty-first century.Â"--…”
    Libro electrónico
  11. 1431
    “…Three of the six reactors at the plant sustained severe core damage and released hydrogen and radioactive materials. …”
    Libro electrónico
  12. 1432
    Publicado 2022
    Tabla de Contenidos: “…Fixing Ideas -- III. The Damage Detection System and Its Relation to Pain -- IV. …”
    Libro electrónico
  13. 1433
    Publicado 2005
    Tabla de Contenidos: “…Tran and Burkhard Becher -- Role of the immune response in tissue damage and repair in the injured spinal cord / Samuel David and Steve Lacroix -- Neural immune interactions in inflammatory/autoimmune disease / Jeanette I. …”
    Libro
  14. 1434
    Publicado 2013
    Tabla de Contenidos: “…Report: Malpractice, Defense (Clinician) (Alleged Fetal Damage from Medication); R15. Report: Accidental Overdose vs. …”
    Libro electrónico
  15. 1435
    por Murdock, M. Casey. author
    Publicado 2013
    Tabla de Contenidos: “…Expenses That Can Be Claimed and How to Claim ThemDeduct Insurance Premiums Pre-Tax; Defer or Postpone Income; Retirement Income; Social Security Income; Retirement Accounts (the Non-Roth Variety) and Required Minimum Distributions; Other Sources of Ordinary Income; State Tax refunds; Alimony; Alimony and Child Support Tax rules; Debt Forgiveness; Gambling Winnings and Losses; Royalties; Awards for Legal Damages; Unemployment Income; Bartering (Trading); Tax-Free "Unordinary" Income from Non-Investment Sources; Gifts and Inheritance; Gifts; Inherited Assets; Scholarships and Grants…”
    Libro electrónico
  16. 1436
    Publicado 2021
    Tabla de Contenidos: “…Mechanical Behaviour: Fracture, Damage, Fatigue. 5. Tribology and Wear. 6. Interfaces and Interphases. 7. …”
    Libro electrónico
  17. 1437
    Publicado 2015
    Tabla de Contenidos: “…Fault analysis of Metal Oxide Varistor (MOV) for series compensation capacitor banksExperimental study of the human retinal security by LED light; Analysis of the phenomenon in LFO of AC electric locomotive; The prototype of fatigue damage detection by the method of Metal Magnetic Memory Testing; Rotor composite faults diagnosis of asynchronous motor based on complex power; Commissioning and operation of Heze some leather wastewater treatment plant; Engineering depth treatment of pharmaceutical wastewater by magnetization catalytic oxidation-A2O-MBR combined process…”
    Libro electrónico
  18. 1438
    por OECD
    Publicado 2021
    Tabla de Contenidos: “…Intro -- Foreword -- Reader's guide -- Signs -- Country aggregates -- Currency -- Cut-off date -- Abbreviations and acronyms -- Basic statistics of Ireland -- Executive summary -- Additional effort is required to pursue the Sustainable Development Goals related to climate, energy, water and biodiversity -- Ireland needs to follow through on plans to meet its ambitious climate goals -- Ireland needs to consolidate the good outcomes of air and waste management -- Inadequate water infrastructure and farming exert high pressure on water quality More consistent action is needed to halt biodiversity loss -- Environmental governance is deliberative, participative and transparent, but compliance assurance needs to be strengthened further -- The response to the COVID-19 crisis should help make the economy greener and more inclusive -- Ireland should continue greening the tax and subsidy system -- Mobility patterns and trends are a source of rising environmental pressures -- Ireland has taken positive steps to reduce environmental damage from mobility -- Better incentives are needed to manage travel demand The cost-effectiveness of EV promotion could be enhanced -- The low-carbon transition of the freight sector needs a coherent strategy -- Assessment and recommendations -- 1. …”
    Libro electrónico
  19. 1439
    Tabla de Contenidos: “…Improving the Functioning of the Houseing Market 72 -An excessive channelling of resources into the construction industry damages business competitiveness 72 -Estimation of the impact of house prices on exports  74 -The role of housing policy  75 Annex 1. …”
    Libro electrónico
  20. 1440
    por Kossovsky, Nir
    Publicado 2012
    Tabla de Contenidos: “…BP Executives and Board of DirectorsCapital Market Analysts; Regulators; Reputational Value Lost: Summary; Retrospective; Consider This; By the Numbers; Endnotes; PART II Profit and Loss; CHAPTER 3 Customers; Safety; Rolls-Royce; Reputation Management; Process Controls; Trent 900 Explosion-and-Aftermath Timeline; Rolls-Royce Customers; Retrospective; Consider This; Quality: Zale Corporation; In Jewelry, Reputation Is Crucial; Damaging Zale's Reputation for Quality; Retrospective; Consider This; Innovation; Research In Motion; Retrospective; Consider This; Guidance; By the Numbers; Endnotes…”
    Libro electrónico