Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Business & Economics 444
- Engineering & Applied Sciences 406
- Development 365
- Design 332
- Application software 323
- Management 321
- History 315
- Web sites 277
- Filosofía 268
- Matemáticas 244
- Computer Science 242
- Mecánica 241
- Web site development 241
- Photography 227
- Finance 214
- Digital techniques 211
- Data processing 209
- Historia 200
- Computer programs 175
- Ensenyament 172
- JavaScript (Computer program language) 170
- Computer networks 162
- Física 161
- Programming 157
- Teoría de las estructuras 147
- Computer graphics 143
- HTML (Document markup language) 143
- Estudio y enseñanza 138
- Computer programming 130
- Leadership 130
-
17041por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Job Network - principaux éléments du dispositif et évaluation -- La réforme de la protection sociale : accroître le taux d'activité…”
Publicado 2004
Libro electrónico -
17042por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Évolutions des politiques commerciales -- Les politiques commerciales comportent peu d'éléments nouveaux en 2002 -- Encadré 1.1. État d'avancement des négociations à l'OMC -- Les changements sont peu sensibles sur le plan de l'accès aux marchés... -- ... de l'utilisation des subventions à l'exportation... -- ... et des autres politiques relatives aux exportations -- De nouveaux accords bilatéraux et régionaux ont été conclus -- Chapitre 2. …”
Publicado 2003
Libro electrónico -
17043por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…Pratiques de gestion des éléments fertilisants sur les emblavures de maïs... -- Tableau 6. …”
Publicado 2001
Libro electrónico -
17044por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…Le traitement de la corruption dans les codes de conduite d'entreprise -- Introduction -- Engagements de lutte contre la corruption -- Tableau 1. Les éléments relatifs à la corruption dans les codes -- Mise en œuvre des codes relatifs à la corruption -- Définition des grands concepts utilisés dans l'analyse des textes relatifs à la corruption -- Graphique 1.a. …”
Publicado 2000
Libro electrónico -
17045por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…L'intégration des différents éléments du développement durable dans l'action des pouvoirs publics -- Pollution de l'air…”
Publicado 2004
Libro electrónico -
17046por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…Crédits à l'exportation selon leur durée -- Graphique III.2 Durée des crédits à l'exportation -- Graphique III.3 Estimations du montant de l'élément subvention au début de 1998 -- Plus d'un tiers des crédits à l'exportation de l'enquête concerne des céréales en vrac... -- Tableau III.4. …”
Publicado 2002
Libro electrónico -
17047Publicado 2016Tabla de Contenidos: “…6.6 Passive solar heating systems at high latitudes: a case study -- 6.6.1 Environmental performance analyses of the Living Lab -- 6.7 Conclusions and future trends -- References -- 7 - Innovations in passive solar water heating systems -- 7.1 Introduction -- 7.2 Flat plate collector-thermosiphon -- 7.2.1 Thermal performance of solar collectors -- 7.2.2 Absorber plate design -- 7.2.3 Coatings and nanofluids -- 7.3 Evacuated tube collector -- 7.3.1 All-glass evacuated tube collector -- 7.3.2 Heat pipe collector -- 7.3.3 U-tube collector -- 7.4 Integrated collector storage systems and compound parabolic collectors -- 7.4.1 The solar water heating system dawn -- 7.4.2 Facing heat losses -- 7.4.3 The coupled collector -- 7.5 Hybrid photovoltaic/thermal collector -- 7.5.1 Combining technologies -- 7.5.2 The photovoltaic/thermal collector efficiency -- 7.6 Conclusion and future trends -- Nomenclature -- Subscripts -- Greek letters -- References -- 8 - Active solar space heating -- 8.1 Background on active space heating -- 8.1.1 Improvement of energy efficiency in buildings -- 8.1.2 Changes in space heating concepts and technology applied -- 8.1.3 Development of solar combi systems -- 8.2 Operation of active solar space heating systems -- 8.2.1 Basic classification of the systems -- 8.2.2 Main components of the systems -- 8.2.3 Heat storage as a crucial element of the system -- 8.2.4 Modes of operation, configuration, and functions of the systems -- 8.3 Solar hybrid systems -- 8.3.1 Integration and complementarity of various energy sources -- 8.3.2 Solar-assisted heat pump systems -- 8.3.3 Small- and large-scale systems: autonomous, distributed, and centralized systems -- 8.4 Energy efficiency of active solar space heating -- 8.4.1 Conditions influencing energy efficiency of the systems -- 8.4.2 Evaluation of the seasonal performance factor…”
Libro electrónico -
17048Publicado 2017Tabla de Contenidos: “…. -- Nomenclature -- 2.1 Introduction -- 2.2 Thermal Insulation Materials -- 2.2.1 Composition-Based Classification of Thermal Insulation Materials -- 2.2.2 Physics of Performance-Based Classification of Thermal Insulation Materials -- 2.3 Environmental and Economic Assessment of Thermal Insulation Materials -- 2.3.1 Environmental Assessment of Thermal Insulation Materials -- 2.3.2 Economic Assessment of Thermal Insulation Materials -- 2.4 Advancements in the Field of Building Materials Applied for the Energy Upgrade of Buildings -- 2.4.1 Thermal Insulation Building Elements and Systems -- 2.4.1.1 Inorganic Insulation Materials -- 2.4.1.2 Organic Insulation Materials -- 2.4.1.3 Plasters and Mortars -- 2.4.1.4 Thermally Insulating Concrete -- 2.4.1.5 Vacuum Insulation Panels -- 2.4.1.6 Phase Change Materials -- 2.4.1.7 Aerogels -- 2.4.1.8 Vacuum Insulation Materials and Gas Insulation Materials -- 2.4.1.9 Nano Insulation Materials -- 2.4.1.10 Dynamic Insulation Materials -- 2.4.2 LCC of Renovation Measures -- 2.5 Conclusions -- References -- 3 Phase Change Materials for Application in Energy-Efficient Buildings -- 3.1 Introduction -- 3.2 Phase Change Materials in General -- 3.2.1 General…”
Libro electrónico -
17049Publicado 2018Tabla de Contenidos: “…12.8.3 Nachbereitung -- 12.8.4 Abschlussbericht -- Kapitel 13: Management von Sicherheitsereignissen und IT-Forensik -- 13.1 Kapitelzusammenfassung -- 13.2 Einführung -- 13.3 Angriffe auf Ihre Daten -- 13.3.1 Durch eigene Mitarbeiter -- 13.3.2 Durch Außenstehende -- 13.3.3 Angriffe und Angriffsvektoren -- 13.3.4 Angriffsarten -- 13.4 Management von Sicherheitsereignissen -- 13.5 IT-Forensik -- 13.5.1 Arten der IT-Forensik-Analyse -- 13.5.2 Einrichtung von Honeypots -- 13.6 Elemente der forensischen Untersuchung -- 13.6.1 Zielsetzung -- 13.6.2 Anforderungen an die Analyse -- 13.6.3 Forensische Methoden -- 13.6.4 Forensische Untersuchung -- Kapitel 14: Kennzahlen -- 14.1 Kapitelzusammenfassung -- 14.2 Einführung -- 14.3 Die Aufgabe von Kennzahlen -- 14.4 Quantifizierbare Kennzahlen -- 14.5 Steuerung mithilfe von Kennzahlen -- 14.6 Qualität von Kennzahlen -- 14.6.1 Gute Kennzahlen -- 14.6.2 Schlechte Kennzahlen -- 14.6.3 Vergleichbarkeit von Kennzahlen -- 14.7 Verschiedene Kennzahlen aus der IT-Security -- 14.8 Kennzahlen im laufenden Verbesserungsprozess -- 14.9 Laufende Auswertung von Kennzahlen -- 14.10 Annualized Loss Expectancy -- 14.11 IT-Security Balanced Scorecard -- 14.11.1 Einführung der IT-Security Balanced Scorecard -- 14.11.2 Maßnahmenziele für den Bereich IT-Security -- Kapitel 15: Praxis: Aufbau eines ISMS -- 15.1 Kapitelzusammenfassung -- 15.2 Einführung -- 15.3 ISMS in Kürze -- 15.4 Herangehensweise -- 15.5 Schritt für Schritt zum ISMS -- 15.5.1 Plan-Do-Check-Act -- 15.5.2 Vorarbeiten -- 15.5.3 Plan: Gestaltung des ISMS -- 15.5.4 Do: Umsetzung der Arbeitspakete -- 15.5.5 Check: Überprüfung des ISMS -- 15.5.6 Act: Umsetzung von erkannten Defiziten -- 15.5.7 Dokumentation -- 15.6 Softwaregestützter Aufbau eines ISMS -- 15.6.1 Auswahl einer ISMS-Lösung -- 15.6.2 Darstellung der Risiken und der Unternehmenswerte…”
Libro electrónico -
17050Publicado 2023Tabla de Contenidos: “…11.8 Updating ICT from Time to Time and Means of Growth in the Field of Education -- 11.9 People Involved to be Trained for ICT -- 11.10 Adapting to Changes -- 11.11 Institutional Changes and ICT in Teaching -- 11.12 Global Changes and ICT in Teaching -- 11.13 Nationwide Changes and ICT in Teaching -- 11.14 Climatic Changes and ICT in Teaching -- 11.15 Types of Teaching Using ICT in Higher Educational Institutions -- 11.15.1 On Campus Teaching -- 11.15.2 Online Teaching -- 11.15.3 Blended or Hybrid Mode Teaching -- 11.15.3.1 Understanding Blended Learning -- 11.15.3.2 Measures to be Followed in Order to Ensure Effective Blended Learning -- 11.16 Analysis of ICT -- 11.17 People that Use ICT in the Field of Education -- 11.17.1 Teachers and their Use of ICT -- 11.17.2 Students and their Use of ICT -- 11.17.3 Department Heads and their Use of ICT -- 11.17.4 IT Support and their Use of ICT -- 11.18 Ease of Use of ICT -- 11.19 Problems Encountered During ICT-Based Class -- 11.19.1 Technical Problems -- 11.19.2 Non-Technical Problems -- 11.20 Recommendations -- 11.21 Conclusion -- References -- Chapter 12 Digital Tools for Interactive E-Content Development -- 12.1 Introduction -- 12.2 Digital Learning -- 12.3 Theories of Learning -- 12.4 HTML5 Package (H5P) -- 12.4.1 Course Presentation -- 12.4.2 Branching Scenario -- 12.4.3 Interactive Video -- 12.4.4 Slack -- 12.4.5 Camtasia -- 12.4.6 Accordion -- 12.4.7 Agamotto -- 12.4.8 Documentation Tool -- 12.4.9 Image Hotspots -- 12.4.10 Image Juxtaposition -- 12.4.11 Image Sequencing -- 12.4.12 Interactive Book -- 12.5 Conclusion -- References -- Chapter 13 Analysis of Changing Landscape of Virtual Learning in India -- 13.1 Introduction -- 13.2 Affecting Elements in Organizations -- 13.3 Dealing with Exceptional Youngsters -- 13.4 ICT Tools in VL for Flipped, Blended Learning and its Pitfalls…”
Libro electrónico -
17051Publicado 2019Tabla de Contenidos: “…3.2 Security Issues in e-Business -- 3.2.1 Vulnerabilities -- 3.2.2 Security Attacks -- 3.2.3 Malware as a Threat -- 3.3 Common Vulnerabilities in e-Business -- 3.3.1 Phishing -- 3.3.2 Cross-Site Scripting (XSS) -- 3.4 Threats in e-Business -- 3.4.1 Ransomware -- 3.4.2 Spyware -- 3.4.3 Worms -- 3.4.4 Trojan Horse -- 3.5 Prevention Mechanism -- 3.6 Conclusion -- References -- 4 e-Commerce Security: Threats, Issues, andMethods -- 4.1 Introduction -- 4.2 Literature Review -- 4.3 e-Commerce -- 4.3.1 Characteristics of e-Commerce Technology -- 4.3.2 Architectural Framework of e-Commerce -- 4.3.2.1 Two-Tier Architecture -- 4.3.2.2 Three-Tier Architecture -- 4.3.3 Advantages and Disadvantages of e-Commerce -- 4.4 Security Overview in e-Commerce -- 4.4.1 Purpose of Security in e-Commerce -- 4.4.2 Security Element at Different Levels of e-Commerce System -- 4.4.2.1 Hardware -- 4.4.2.2 Software -- 4.4.2.3 Environment -- 4.5 Security Issues in e-Commerce -- 4.5.1 Client Level -- 4.5.2 Front-End Servers and Software Application Level -- 4.5.3 Network and Server Level -- 4.6 Security Threats in e-Commerce -- 4.7 Security Approaches in e-Commerce -- 4.8 Comparative Analysis of Various Security Threats in e-Commerce -- 4.9 e-Commerce Security Life-Cycle Model -- 4.10 Conclusion -- References -- 5 Cyberwar is Coming -- 5.1 Introduction -- 5.2 Ransomware Attacks -- 5.2.1 Petya -- 5.2.2 WannaCry -- 5.2.3 Locky -- 5.3 Are Nations Ready? …”
Libro electrónico -
17052por Guidetti, OliverTabla de Contenidos: “…Cover -- Half Title -- Title -- Copyright -- Dedication -- Contents -- Preface -- About the editors -- List of contributors -- 1 Integrating human factors and systemic resilience: an interdisciplinary approach to cybersecurity in critical infrastructures and utilities -- 1.1 Introduction: the convergence of disciplines in cybersecurity -- 1.1.1 Statement of the problem -- 1.1.2 Significance of this study -- 1.1.3 Research objectives -- 1.1.4 Chapter overview -- 1.2 Cyber-physical security and critical infrastructure: the indivisible duo -- 1.2.1 Definition of key terms -- 1.2.2 Evolution and importance of cyber-physical systems -- 1.2.3 Specific challenges in cyber-physical security -- 1.3 Systemic vulnerabilities and cybersecurity threats -- 1.3.1 Systemic vulnerabilities: an overview -- 1.3.2 The interface between systemic vulnerabilities and cybersecurity -- 1.3.3 Cyberthreats leveraging systemic weaknesses -- 1.4 The human element in cybersecurity: the weakest link -- 1.4.1 Human factors in cybersecurity: an overview -- 1.4.2 Human errors: a breach in cyber defence -- 1.4.3 The psychology behind social engineering -- 1.4.4 Insider threats: a hidden menace -- 1.5 Role of culture in cybersecurity: shaping the human factor -- 1.5.1 The significance of cybersecurity culture -- 1.5.2 Creating a cybersecurity culture in utilities -- 1.5.3 Shift from information security to cybersecurity -- 1.5.4 Impact of culture on cybersecurity performance -- 1.6 Integrated cybersecurity frameworks and strategies: a holistic approach -- 1.6.1 The need for integration in cybersecurity -- 1.6.2 Principles of integrated cybersecurity frameworks -- 1.6.3 Risk analyses and hazard management in cybersecurity -- 1.6.4 Implementing an integrated cybersecurity strategy -- 1.7 Systemic resilience in cybersecurity: bouncing back from attacks…”
Publicado 2024
Libro electrónico -
17053Tabla de Contenidos: “…Deployment Services -- 5.1 Activity Planner -- 5.1.1 Activity Planner components -- 5.1.2 Roles required for the Activity Planner -- 5.1.3 Types of activities -- 5.1.4 Activity Plan Editor -- 5.1.5 Activity Plan Monitor -- 5.1.6 Activity Planner commands -- 5.2 Change Manager -- 5.2.1 Change Manager components -- 5.2.2 Sample Change Manager scenario -- 5.3 Enterprise Directory integration -- 5.3.1 Exchanging data with a directory server -- 5.3.2 Manipulating DirectoryContext objects -- 5.3.3 Directory query libraries and query directories -- 5.4 Resource Manager and pervasive devices -- 5.4.1 Choosing where to install the Resource Manager components -- 5.4.2 Web Gateway installation -- 5.4.3 Web objects -- 5.4.4 Registering the resource types -- 5.4.5 Associating endpoints with the resource gateway -- 5.4.6 Enrolling pervasive devices -- 5.4.7 Installing and configuring devices for resource manager -- 5.4.8 Installing the device agent for Windows CE devices -- 5.4.9 The user ID of palm devices -- 5.4.10 Inventory scans on pervasive devices -- 5.5 Pristine Manager -- 5.5.1 Pristine Manager architecture and new components -- 5.5.2 Supported platforms for pristine installation -- 5.5.3 Key terms -- 5.5.4 Pristine Manager concepts -- 5.5.5 Prerequisites -- 5.5.6 Installing pristine machines -- 5.5.7 Customizing Pristine Manager -- 5.5.8 Adding an Operating System Element to a reference model -- 5.5.9 Pristine Manager commands -- 5.5.10 IBM Tivoli Enterprise Console notification -- Chapter 6. …”
Libro electrónico -
17054Publicado 2012Tabla de Contenidos: “…Cover -- Preface to the Third Edition -- Preface -- Contents -- About the Author -- Part I: Fundamental Concepts of Financial Management -- Chapter 1: Nature and Goal of Financial Decisions -- 1.1 Nature of Financial Decisions -- 1.1.1 Long-term Investment Decision -- 1.1.2 Working Capital Decision -- 1.1.3 Financing Decision -- 1.1.4 Dividend Decision -- 1.2 Factors Influencing Financial Decisions -- 1.2.1 Microeconomic Factors -- 1.2.2 Macroeconomic Factors -- 1.3 Objective of Corporate Financial Decisions -- 1.3.1 Profit Maximisation -- 1.3.2 Objective of Wealth Maximisation -- 1.3.3 Appraisal of the Objective of Maximisation of Corporate Wealth -- 1.3.4 The Agency Problem -- Summary -- Points to Remember -- Descriptive Questions -- Objective-type Questions -- Study Topic: Managing Agency Problem -- References -- Select Further Readings -- Chapter 2: Time Value of Money -- 2.1 The Concept -- 2.2 Computation of Future Value -- 2.2.1 Future Value of a Single Amount -- 2.2.2 Future Value of a Series of Payments -- 2.2.3 Future Value in Case of Annuities -- 2.2.4 Frequency of Compounding -- 2.3 Computation of Present Value of Cash Flows -- 2.3.1 Present Value of a Single Amount -- 2.3.2 Present Value of a Series of Future Values -- 2.3.3 Present Value in Case of Annuity -- 2.3.4 Special Cases of Annuity -- 2.3.5 Present Value of a Cash Flow with Growth Element -- Summary -- Points to Remember -- Descriptive Questions -- Objective-type Questions -- Numerical Problems -- Solved Numerical Problems -- Select Further Readings -- Chapter 3: Concept of Risk and Return -- 3.1 Basic Concepts of Returns -- 3.1.2 Average Return: Simple and Weighted Average -- 3.1.3 Arithmetic and Geometric Mean -- 3.1.4 The Concept of Probability -- 3.1.5 Expected Return from a Single Investment -- 3.1.6 Expected Returns from International Investment…”
Libro electrónico -
17055Publicado 2019Tabla de Contenidos: “…-- 6.5.5 Maintaining Reputation Is One Motive to Trigger and Sustain Reciprocity -- 6.5.6 Institutional Tit for Tat -- 6.6 Trust and Trustworthiness -- 6.6.1 Building Blocks of Trust and Trustworthiness -- 6.6.2 Innate Triggers for Trust and Trustworthiness: Other‐regarding Preferences -- 6.7 Summary: The Empirical Nature of Fair Choice -- References -- Chapter 7 Behavioral Analysis of Strategic Interactions: Game Theory, Bargaining, and Agency -- 7.1 Behavioral Game Theory -- 7.1.1 Accurate Beliefs -- 7.1.2 Best Responses -- 7.1.3 Strategic Sophistication -- 7.1.4 Coordination Games and Equilibrium Selection -- 7.1.5 Repeated Games -- 7.1.6 Applications in Operations Management -- 7.2 Behavioral Analysis of Principal-Agent Problems -- 7.2.1 Response to Financial Incentives -- 7.2.2 Financial Incentives in Other Settings: Monitoring, Tournaments, and Teams -- 7.2.3 Reciprocity and Gift Exchange -- 7.2.4 Nonmonetary Incentives -- 7.2.5 Applications in Operations Management -- 7.3 Bargaining -- 7.3.1 Theoretical Approaches -- 7.3.2 Economics Experiments: Free‐form Bargaining -- 7.3.3 Economics Experiments: Structured Bargaining -- 7.3.4 Economics Experiments: Multiparty Negotiations -- 7.3.5 Psychology Experiments: Biases in Negotiations -- 7.3.6 Applications in Operations Management -- References -- Chapter 8 Integration of Behavioral and Operational Elements Through System Dynamics…”
Libro electrónico -
17056Publicado 2023Tabla de Contenidos: “…9.4.2 Calculation for Even Numbers -- 9.4.3 Corollaries -- 9.4.4 Code Snippet -- 9.4.5 Output -- 9.5 Conclusion -- References -- Chapter 10 Solution of Matrix Games With Pay.Offs of Single-Valued Neutrosophic Numbers and Its Application to Market Share Problem -- 10.1 Introduction -- 10.2 Preliminaries -- 10.3 Matrix Games With SVNN Pay-Offs and Concept of Solution -- 10.4 Mathematical Model Construction for SVNNMG -- 10.4.1 Algorithm for Solving SVNNMG -- 10.5 Numerical Example -- 10.5.1 A Market Share Problem -- 10.5.2 The Solution Procedure and Result Discussion -- 10.5.3 Analysis and Comparison of Results With Li and Nanfs Approach -- 10.6 Conclusion -- References -- Chapter 11 A Novel Score Function-Based EDAS Method for the Selection of a Vacant Post of a Company with q-Rung Orthopair Fuzzy Data -- 11.1 Introduction -- 11.2 Preliminaries -- 11.3 A Novel Score Function of q-ROFNs -- 11.3.1 Some Existing q-ROF Score Functions -- 11.3.2 A Novel Score Function of q-ROFNs -- 11.4 EDAS Method for q-ROF MADM Problem -- 11.5 Numerical Example -- 11.6 Comparative Analysis -- 11.7 Conclusions -- Acknowledgments -- References -- Chapter 12 Complete Generalized Soft Lattice -- 12.1 Introduction -- 12.2 Soft Sets and Soft Elements.Some Basic Concepts -- 12.3 gs-Posets and gs-Chains -- 12.4 Soft Isomorphism and Duality of gs-Posets -- 12.5 gs-Lattices and Complete gs-Lattices -- 12.6 s-Closure System and s-Moore Family -- 12.7 Complete gs-Lattices From s-Closure Systems -- 12.8 A Representation Theorem of a Complete gs-Lattice as an s-Closure System -- 12.9 gs-Lattices and Fixed Point Theorem -- References -- Chapter 13 Data Representation and Performance in a Prediction Model -- 13.1 Introduction -- 13.1.1 Various Methods for Predictive Modeling -- 13.1.2 Problem Definition -- 13.2 Data Description and Representations -- 13.3 Experiment and Result…”
Libro electrónico -
17057por Assmann, TomTabla de Contenidos: “…14: Planerische Instrumente zur Förderung der Lastenradlogistik -- 14.1 Einführung -- 14.2 Radlogistik als Teil der strategischen Verkehrsplanung -- 14.2.1 Grundlagen städtischer Wirtschaftsverkehrskonzepte -- 14.2.1.1 Ablauf der Erarbeitung -- 14.2.2 Berücksichtigung der Radlogistik in städtischen Wirtschaftsverkehrskonzepten -- 14.2.3 Berücksichtigung in der Quartierslogistik -- 14.3 Maßnahmengruppen zur Förderung der Radlogistik -- 14.3.1 Maßnahmen der materiellen Infrastruktur -- 14.3.1.1 Bauleitplanung und Flächenbevorratung -- 14.3.1.2 Flächenbereitstellung für die Nutzung durch Mikro-Hubs -- 14.3.1.3 Fließender Verkehr -- 14.3.1.4 Ruhender Verkehr -- 14.3.1.5 Berücksichtigung in der Netzgestaltung -- 14.3.2 Maßnahmen der immateriellen Infrastruktur -- 14.3.2.1 Bereitstellung öffentlicher Daten -- 14.3.2.2 Schaffung von Datenplattformen -- 14.3.3 Maßnahmenbereich Governance/Steuerung -- 14.3.3.1 Lastenradförderung für gewerbliche Nutzungen -- 14.3.3.2 Gebietsbezogene Einfahrtsverbote -- 14.3.3.3 Lieferzeitbeschränkungen -- 14.4 Zusammenfassung -- Literatur -- 15: Akteurskreis und Akteursmanagement -- 15.1 Einführung -- 15.2 Überblick Akteure der Urbanen Logistik auf städtischer Ebene -- 15.2.1 Akteure der Logistik -- 15.2.2 Akteure der Politik und Verwaltung -- 15.2.3 Zivilgesellschaft & -- Wirtschaftsakteure -- 15.3 Akteure in der Planung von urbanen Umschlagsknoten -- 15.4 Überblick bundesweiter Interessenvertretungen -- 15.5 Akteursmanagement in der kommunalen Planung -- 15.6 Effektive Einbindung von Logistikakteuren -- 15.6.1 Zielgerichtete, umfängliche Stakeholderbeteiligung -- 15.6.2 Elemente einer mehrstufigen Stakeholderbeteiligung -- 15.6.2.1 Auftaktveranstaltung -- 15.6.2.2 Beteiligungsrunden -- 15.6.2.3 Abschlussveranstaltung -- 15.6.3 Begleitende Erhebungen…”
Publicado 2024
Libro electrónico -
17058Publicado 2013Tabla de Contenidos: “…9.5.1 BPA Alternatives in Thermal Paper Partnership -- 9.5.2 Flame Retardant Alternatives to DecaBDE Partnership -- 9.6 Safer Product Labeling Program Case Study -- 9.6.1 Functional Use Concept Advances Greener Chemistry -- 9.6.2 Ingredient-class Criteria Define 'Safer' Chemicals -- 9.6.3 Partnership Process Fosters Teamwork in Safer Formulation -- 9.6.4 Development of Safer Alternatives -- 9.7 What's Next -- 9.7.1 The Community of Practice is Growing -- 9.7.2 Promoting Harmony in CAAs -- References -- NGO Initiatives in the EU - Identifying Substances of Very High Concern (SVHCs) and Driving Safer Chemical Substitutes in Response to REACH -- 10.1 ChemSec Background -- 10.2 Overview of NGO Initiatives - Putting REACH into Practice and Working with Companies -- 10.2.1 The SIN List -- 10.2.2 Substitution Support Portal - SUBSPORT -- 10.2.3 Transparency -- 10.2.4 Business Initiatives -- 10.2.5 NGO-Business Cooperation - Electronics -- 10.2.6 Engaging Financial Investors -- 10.3 The SIN List in Focus -- 10.3.1 REACH and Substances of Very High Concern -- 10.3.2 General Principles Used for the Compilation of the SIN List -- 10.3.3 How the SIN List Has Been Used and Received -- 10.3.4 Detailed Methodology -- 10.3.5 The First Assessment Process (SIN List 1.0) -- 10.3.6 The Second Assessment Process (SIN List 2.0) -- 10.4 Finding Safer Alternatives Through SUBSPORT -- 10.4.1 Background -- 10.4.2 The Web Portal -- 10.4.3 The Substitution Case Story Database -- 10.5 Conclusion -- References -- Alternatives Assessment in Regulatory Policy: History and Future Directions -- 11.1 Introduction -- 11.2 Rationale for Informed Substitution -- 11.3 Evolution of Alternatives Assessment Elements in Government Chemicals Reduction Policies -- 11.3.1 Chemical Restriction and Phase-out Policy Development -- 11.3.2 Alternatives Assessment Policy Development…”
Libro electrónico -
17059Publicado 2024Tabla de Contenidos: “…-- 7.9 Blockchain IoT Use Cases -- 7.10 The Future of Botnets in the Internet of Things -- 7.10.1 Thingbots: Concept -- 7.10.2 Elements of Typical IRC Bot Attack -- 7.10.3 Malicious Use of Bots and Botnet -- References -- Chapter 8 A Practical Approach to Development of the Internet of Things -- 8.1 Python -- 8.1.1 Introduction to Python -- 8.1.2 Why Use Python in IoT? …”
Libro electrónico -
17060Publicado 1954Libro