Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 2,222
- Història 1,562
- Universidad Pontificia de Salamanca (España) 1,505
- Documentales 1,157
- Engineering & Applied Sciences 827
- History 658
- Development 588
- Computer Science 583
- Església Catòlica 573
- Mapes 494
- Fonts 482
- Application software 475
- Documents pontificis 416
- Management 404
- Computer programs 359
- HTML (Document markup language) 354
- Design 352
- Web sites 336
- Web site development 318
- Iglesia Católica 297
- Data processing 295
- Fonts històriques 283
- Color 277
- Crítica e interpretación 277
- Documentos 264
- Universidad Pontificia de Salamanca, Facultad de Educación 241
- Política y gobierno 227
- Business & Economics 226
- Computer networks 226
- Operating systems (Computers) 220
-
35381Publicado 2019“…"Research has uncovered shocking violations of ethical and legal standards by the "good guys"--including Judge John Sirica, Archibald Cox, and Leon Jaworski. Documents that the Watergate Special Prosecution Force was an avenging army drawn from the ranks of Nixon's most partisan foes. …”
Libro -
35382Publicado 2020Tabla de Contenidos: “…Schwinghammer oChapter 1: Introduction: How to Use This Casebook oChapter 2: Active Learning Strategies oChapter 3: Patient Communication: Getting the Most Out of That One-on-One Time oChapter 4: The Patient Care Plan oChapter 5: Documentation of Pharmacist Encounters and Interventions oChapter 6: Pediatrics: Children Are Not Just Little Adults Level III oChapter 7: Geriatrics: Falling Frannie Level II oChapter 8: Palliative Care: Helpful Hospice Level III oChapter 9: Clinical Toxicology: Acetaminophen Toxicity: If One Is Good, More Is Better Level II oChapter 10: Cyanide Exposure: Expect the Unexpected Level II oChapter 11: Chemical Threat Agent Exposure: Name That Poison Level II *Section 2: Cardiovascular Disorders Section Editor: Julia M. …”
Libro electrónico -
35383Publicado 2017Tabla de Contenidos: “…9 1.1.4 FTC June 2015 Guidance on Data Security 11 1.1.5 FTC Protecting Personal Information Guide 14 1.1.6 Lessons from FTC Cybersecurity Complaints 15 1.1.6.1 Failure to Secure Highly Sensitive Information 16 1.1.6.1.1 Use Industry-Standard Encryption for Sensitive Data 16 1.1.6.1.2 Routine Audits and Penetration Testing are Expected 17 1.1.6.1.3 Health-Related Data Requires Especially Strong Safeguards 18 1.1.6.1.4 Data Security Protection Extends to Paper Documents 19 1.1.6.1.5 Business-to-Business Providers also are Accountable to the FTC For Security of Sensitive Data 20 1.1.6.1.6 Companies are Responsible for the Data Security Practices of Their Contractors 22 1.1.6.1.7 Make Sure that Every Employee Receives Regular Data Security Training for Processing Sensitive Data 23 1.1.6.1.8 Privacy Matters, Even in Data Security 23 1.1.6.1.9 Limit the Sensitive Information Provided to Third Parties 24 1.1.6.2 Failure to Secure Payment Card Information 24 1.1.6.2.1 Adhere to Security Claims about Payment Card Data 24 1.1.6.2.2 Always Encrypt Payment Card Data 25 1.1.6.2.3 Payment Card Data Should be Encrypted Both in Storage and at Rest 26 1.1.6.2.4 In-Store Purchases Pose Significant Cybersecurity Risks 26 1.1.6.2.5 Minimize Duration of Storage of Payment Card Data 28 1.1.6.2.6 Monitor Systems and Networks for Unauthorized Software 29 1.1.6.2.7 Apps Should Never Override Default App Store Security Settings 29 1.1.6.3 Failure to Adhere to Security Claims 30 1.1.6.3.1 Companies Must Address Commonly Known Security Vulnerabilities 30 1.1.6.3.2 Ensure that Security Controls are Sufficient to Abide by Promises about Security and Privacy 31 1.1.6.3.3 Omissions about Key Security Flaws can also be Misleading 33 1.1.6.3.4 Companies Must Abide by Promises for Security-Related Consent Choices 33 1.1.6.3.5 Companies that Promise Security Must Ensure Adequate Authentication Procedures 34 1.1.6.3.6 Adhere to Promises about Encryption 35 1.2 State Data Breach Notification Laws 36 1.2.1 When Consumer Notifications are Required 37 1.2.1.1 Definition of Personal Information 37 1.2.1.2 Encrypted Data 38 1.2.1.3 Risk of Harm 39 1.2.1.4 Safe Harbors and Exceptions to Notice Requirement 39 1.2.2 Notice to Individuals 40 1.2.2.1 Timing of Notice 40 1.2.2.2 Form of Notice 40 1.2.2.3 Content of Notice 41 1.2.3 Notice to Regulators and Consumer Reporting Agencies 41 1.2.4 Penalties for Violating State Breach Notification Laws 42 1.3 State Data Security Laws 42 1.3.1 Oregon 43 1.3.2 Rhode Island 45 1.3.3 Nevada 45 1.3.4 Massachusetts 46 1.4 State Data Disposal Laws 49 2 Cybersecurity Litigation 51 2.1 Article III Standing 52 2.1.1 Applicable Supreme Court Rulings on Standing 53 2.1.2 Lower Court Rulings on Standing in Data Breach Cases 57 2.1.2.1 Injury-in-Fact 57 2.1.2.1.1 Broad View of Injury-in-Fact 57 2.1.2.1.2 Narrow View of Injury-in-Fact 60 2.1.2.2 Fairly Traceable 62 2.1.2.3 Redressability 63 2.2 Common Causes of Action Arising from Data Breaches 64 2.2.1 Negligence 64 2.2.1.1 Legal Duty and Breach of Duty 65 2.2.1.2 Cognizable Injury 67 2.2.1.3 Causation 69 2.2.2 Negligent Misrepresentation or Omission 70 2.2.3 Breach of Contract 72 2.2.4 Breach of Implied Warranty 76 2.2.5 Invasion of Privacy by Publication of Private Facts 80 2.2.6 Unjust Enrichment 81 2.2.7 State Consumer Protection Laws 82 2.3 Class Action Certification in Data Breach Litigation 84 2.4 Insurance Coverage for Cybersecurity Incidents 90 2.5 Protecting Cybersecurity Work Product and Communications from Discovery 94 2.5.1 Attorney-Client Privilege 96 2.5.2 Work Product Doctrine 98 2.5.3 Non-Testifying Expert Privilege 101 2.5.4 Applying the Three Privileges to Cybersecurity: Genesco v. …”
Libro electrónico -
35384Publicado 2012“…Viewing curriculum as genuine inquiry into what is worth knowing, rather than simply a curricular document, this book explores the significances instilled and nurtured through aesthetic play. …”
Acceso restringido con credenciales, usuarios UPSA
Libro electrónico -
35385por Macintyre Latta, Margaret, 1955-“…Viewing curriculum as genuine inquiry into what is worth knowing, rather than simply a curricular document, this book explores the significances instilled and nurtured through aesthetic play. …”
Publicado 2012
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
35386Publicado 2010“…La francophonie 100 textes es el segundo volumen de la trilogía compuesta por La francophonie 100 fiches, francophonie 100 textes y francophonie 100 documents (de próxima publicación). Se trata de un cuaderno de actividades que permite mejorar, por una parte, la comprensión de la "francophonie/Francophonie" y, por otra, perfeccionar y afianzar los conocimientos léxicos de nuestros estudiantes dentro del ámbito B1 y B2 del Marco Común Europeo de Referencia para las lenguas extranjeras…”
Enlace del recurso
Electrónico -
35387por Khlevniuk, Oleg“…Russian historian Oleg Khlevniuk has mined the contents of extensive archives, including long-suppressed state and Communist Party documents, to uncover the secrets of the Gulag and how it became a central component of Soviet ideology and social policy."…”
Publicado 2004
Libro -
35388por Gatica, Mónica“…The book is intended for readers interested in Latin American history, migration studies, and social memory, and it draws on a combination of interviews, archival documents, and personal narratives to shed light on the lived experiences of these individuals and their enduring impact on regional identity…”
Publicado 2013
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
35389por Pla, Dolores“…This book is a comprehensive catalog of oral histories from Spanish refugees in Mexico, compiled by the Instituto Nacional de Antropología e Historia (INAH). It documents the experiences of Spanish exiles who fled their homeland during the Spanish Civil War and the subsequent dictatorship. …”
Publicado 2023
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
35390por Soriano Hernández, Silvia“…Authored by Silvia Soriano Hernández, it documents the indigenous and social movements in response to government policies perceived as anti-popular. …”
Publicado 2022
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
35391por Aretz, Isabel“…The book is a meticulous documentation of the country's folk music, aiming to preserve and analyze the cultural heritage embedded within. …”
Publicado 2008
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
35392por Weiss, Andrea“…El document dibuixa l'ambient intel·lectual femení del París d'entreguerres, hi apareixen Berenice Abbott, Margaret Anderson, Djuna Barnes, Natalie Clifford Barney, Sylvia Beach, Germaine Beaumont, Romaine Brooks, Bryther (Winifred Ellerman), Lily de Clermont-Tonnerre, Colette, Nancy Cunar, H. …”
Publicado 2014
Libro -
35393por Fernández Bueno, Aída“…Through a series of documented conversations held between 2008 and 2010, the book provides insights into Calonge's scholarly pursuits and personal reflections, emphasizing the humanistic aspects of his studies. …”
Publicado 2024
Libro electrónico -
35394Publicado 2005“…Though much has been made of the classic era of cinephilia from the 1950s to the 1970s, <i>Cinephilia</i> documents the latest generation of cinephiles and their use of new technologies. …”
Libro electrónico -
35395Publicado 1985“…To work as a historian of ancient India, knowledge of Sanskrit remains fundamental: without it, no intimate contact with the culture of this immense country, no possible reading of documents in their original language. But Sanskrit is not all of India. …”
Libro electrónico -
35396Publicado 2014“…The text affirms the primacy of archives as evidence and sources of the historical narrative, and looks back on the different stages of work on archives, from the location to the interpretation of documents. Both praised and criticized, this text remains undeniably modern and deserves to appear on the bedside tables of all apprentice researchers in the social sciences. …”
Libro electrónico -
35397Publicado 2016“…Olive tree products provide a number of documented presentations of the production and quality of the two most important olive tree products: virgin olive oil and table olives. …”
Libro electrónico -
35398por Sánchez Alvarez, Miguel“…The book 'Vigília Lula Livre: um movimento de resistência e solidariedade' by Áurea Lopes documents the sociopolitical movement that emerged in support of former Brazilian President Luiz Inácio Lula da Silva during his imprisonment. …”
Publicado 2019
Libro electrónico -
35399Publicado 2000“…Using primary research - including internal party documents - it concludes that rather than right-wing and extremist, the core ideology of these parties is xenophobic nationalist, including also a mix of law and order and welfare chauvinism. …”
Libro electrónico -
35400Publicado 2019“…Using previously unexamined film footage, photographic documentation, performance programs, and other historical and contemporary sources, Emily Wilcox challenges the commonly accepted view that Soviet-inspired revolutionary ballets are the primary legacy of the socialist era in China's dance field. …”
Libro electrónico