Mostrando 6,701 - 6,720 Resultados de 14,132 Para Buscar '"FEDER"', tiempo de consulta: 0.13s Limitar resultados
  1. 6701
    por Lewis, Ted G.
    Publicado 2023
    Tabla de Contenidos: “…-- 1.1.4 Public-Private Cooperation -- 1.1.5 Federalism: Whole of Government -- 1.2 Defining CIKR Risk and Resilience -- 1.2.1 Risk Strategy -- 1.2.2 Resilience Strategy -- 1.2.3 Sustainability Strategy -- 1.2.4 The Four Horsemen -- 1.3 Weather/Climate Change/Global Warming -- 1.3.1 The Carrington Event -- 1.3.2 Black Bodies -- 1.3.3 The Lightening Rod -- 1.4 Consequences -- 1.4.1 Accidents/Aging/Neglect -- 1.4.2 The Report Card -- 1.4.2.1 The Domino Effect -- 1.4.3 Terrorism/Extremists -- 1.4.4 Cyber Exploits/Criminals -- 1.4.4.1 Black Hats -- 1.4.4.2 Cybercrime Pays -- 1.4.5 The Soft War -- 1.4.6 Cyberattacks and CIKR -- 1.5 Discussion -- References -- Chapter 2 What is a Catastrophe? …”
    Libro electrónico
  2. 6702
    por Rittaler, Jan B.
    Publicado 1989
    Tabla de Contenidos: “…The Antitrust Division of the Department of Justice -- b. The Federal Trade Commission -- 3. Antitrust Adjudication -- 4. …”
    Tesis
  3. 6703
    Publicado 2021
    Tabla de Contenidos: “…Common Pitfalls -- Common Cloud Vulnerabilities -- Describe the Secure Software Development Lifecycle Process -- NIST Secure Software Development Framework -- OWASP Software Assurance Security Model -- Business Requirements -- Phases and Methodologies -- Apply the Secure Software Development Lifecycle -- Avoid Common Vulnerabilities During Development -- Cloud-Specific Risks -- Quality Assurance -- Threat Modeling -- Software Configuration Management and Versioning -- Apply Cloud Software Assurance and Validation -- Functional Testing -- Security Testing Methodologies -- Use Verified Secure Software -- Approved Application Programming Interfaces -- Supply-Chain Management -- Third-Party Software Management -- Validated Open-Source Software -- Comprehend the Specifics of Cloud Application Architecture -- Supplemental Security Components -- Cryptography -- Sandboxing -- Application Virtualization and Orchestration -- Design Appropriate Identity and Access Management Solutions -- Federated Identity -- Identity Providers -- Single Sign-On -- Multifactor Authentication -- Cloud Access Security Broker -- Summary -- Domain 5 Cloud Security Operations -- Implement and Build Physical and Logical Infrastructure for Cloud Environment -- Hardware-Specific Security Configuration Requirements -- Installation and Configuration of Virtualization Management Tools -- Virtual Hardware-Specific Security Configuration Requirements -- Installation of Guest Operating System Virtualization Toolsets -- Operate Physical and Logical Infrastructure for Cloud Environment -- Configure Access Control for Local and Remote Access -- Secure Network Configuration -- Operating System Hardening through the Application of Baselines -- Availability of Stand-Alone Hosts -- Availability of Clustered Hosts -- Availability of Guest Operating Systems…”
    Libro electrónico
  4. 6704
    Publicado 2023
    Tabla de Contenidos: “…Chapter 11 Cybercrime Task Force -- The Cryptocurrency Intelligence Program -- Cyber Fraud Task Force -- The DOJ's Cryptocurrency Enforcement Framework -- Joint Cybercrime Action Taskforce -- The EU's Proposed Digital Asset Legislation -- Notes -- Chapter 12 Money Laundering -- Shuttering of Bulgaria-Based BTC-e Bitcoin Exchange-FinCEN's First Action Against a Foreign-Located MSB and Second-Highest Penalty of 110 Million -- Suex, 2021 -- BitMEX -- Tian Yinyin and Li Jiadong -- Helix13 -- Notes -- Chapter 13 Theft Hacking and Ransom Payments -- Notes -- Chapter 14 Cryptocurrency Bribes -- Notes -- Chapter 15 Corruption -- Notes -- Chapter 16 US Tax Evasion -- Bob Brockman -- John McAfee -- Notes -- Chapter 17 Intellectual Property Espionage and Cryptocurrency -- Notes -- Chapter 18 The US Government Implements Blockchain Programs to Improve Transparency and Efficiency -- The General Services Administration (GSA) -- Department of the Treasury -- US State Department -- Department of Defense (DOD) -- Department of Homeland Security (DHS) -- National Aeronautics and Space Administration (NASA) -- Notes -- Chapter 19 Supply Chain Management with Blockchain Amid the COVID Pandemic -- Blockchain Adoption by US Federal Food and Disease Regulators -- Blockchain Adoption to Track Meat Supply Chain in Australia -- Operation Carne Fraca and Other Violations in the Meat Industry -- Blockchain for Tracking Corruption in Government Funds and Grants -- Tracing Fishy Risks with Blockchain Tech Amid the COVID-19 Pandemic -- Seafood Industry-Related Malpractices -- COVID-19-Related Risks in Seafood Supply Chains -- Seafood Safety in the United States -- Seafood Fraud in the United States -- Mislabeling, Fraud, and Tax Evasion -- Price Fixing and Collusion -- Notes -- Chapter 20 Are NFTs Here to Stay? …”
    Libro electrónico
  5. 6705
    Publicado 2022
    Tabla de Contenidos: “…Business Requirements -- Phases and Methodologies -- Apply the Secure Software Development Life Cycle -- Cloud-Specific Risks -- Threat Modeling -- Avoid Common Vulnerabilities during Development -- Secure Coding -- Software Configuration Management and Versioning -- Apply Cloud Software Assurance and Validation -- Functional and Non-functional Testing -- Security Testing Methodologies -- Quality Assurance -- Abuse Case Testing -- Use Verified Secure Software -- Securing Application Programming Interfaces -- Supply-Chain Management -- Third-Party Software Management -- Validated Open-Source Software -- Comprehend the Specifics of Cloud Application Architecture -- Supplemental Security Components -- Cryptography -- Sandboxing -- Application Virtualization and Orchestration -- Design Appropriate Identity and Access Management Solutions -- Federated Identity -- Identity Providers -- Single Sign-on -- Multifactor Authentication -- Cloud Access Security Broker -- Summary -- Chapter 5 Cloud Security Operations -- Build and Implement Physical and Logical Infrastructure for Cloud Environment -- Hardware-Specific Security Configuration Requirements -- Installation and Configuration of Virtualization Management Tools -- Virtual Hardware-Specific Security Configuration Requirements -- Installation of Guest Operating System Virtualization Toolsets -- Operate Physical and Logical Infrastructure for Cloud Environment -- Configure Access Control for Local and Remote Access -- Secure Network Configuration -- Operating System Hardening through the Application of Baselines -- Availability of Stand-Alone Hosts -- Availability of Clustered Hosts -- Availability of Guest Operating Systems -- Manage Physical and Logical Infrastructure for Cloud Environment -- Access Controls for Remote Access -- Operating System Baseline Compliance Monitoring and Remediation…”
    Libro electrónico
  6. 6706
    Tabla de Contenidos: “…Capacité de financement des administrations publiques -- Tableau 7. Budget fédéral -- Les résultats du budget 2000 : endiguer le déficit -- Encadré 1. …”
    Libro electrónico
  7. 6707
    Publicado 2022
    Tabla de Contenidos:
    Libro electrónico
  8. 6708
    Publicado 1987
    Tabla de Contenidos:
    Libro electrónico
  9. 6709
    Publicado 2022
    Tabla de Contenidos: “…Private Service Connect for Google APIs with Consumer HTTP(S) -- Private Google Access -- Private Google Access for On-Premises Hosts -- Private Service Connect for Published Services -- Private Service Access -- Serverless VPC Access -- Load Balancing -- Regional Load Balancing -- Global Load Balancing -- Additional Network Services -- Service Directory -- Cloud CDN -- Cloud DNS -- Summary -- Exam Essentials -- Review Questions -- Chapter 7 Designing for Security and Legal Compliance -- Identity and Access Management and Related Access Control Services -- Identities and Groups -- Resources -- Permissions -- Roles -- Policies -- Cloud IAM Conditions -- IAM Best Practices -- Identity-Aware Proxy -- Workload Identity Federation -- Organization Constraints -- Data Security -- Encryption -- Key Management -- Cloud Storage Data Access -- Security Evaluation -- Penetration Testing -- Auditing -- Security Design Principles -- Separation of Duties -- Least Privilege -- Defense in Depth -- Major Regulations -- HIPAA/HITECH -- General Data Protection Regulation -- Sarbanes-Oxley Act -- Children's Online Privacy Protection Act -- ITIL Framework -- Summary -- Exam Essentials -- Review Questions -- Chapter 8 Designing for Reliability -- Improving Reliability with Cloud Operations Suite -- Monitoring with Cloud Monitoring -- Alerting with Cloud Monitoring -- Logging with Cloud Logging -- Open Source Observability Tools -- Release Management -- Continuous Delivery -- Continuous Integration -- Systems Reliability Engineering -- Overload -- Cascading Failures -- Testing for Reliability -- Incident Management and Post-Mortem Analysis -- Summary -- Exam Essentials -- Review Questions -- Chapter 9 Analyzing and Defining Technical Processes -- Software Development Lifecycle Plan -- Analysis -- Design -- Continuous Integration/Continuous Delivery…”
    Libro electrónico
  10. 6710
    por Institute of Medicine (U.S.).
    Publicado 1990
    Tabla de Contenidos: “…Dram Shop or Server Liability -- Context and Setting as Environmental Influences -- Server Intervention -- Drinking Establishments -- The Workplace as a Drinking Setting -- FACTORS THAT AFFECT THE RISK OR SEVERITY OF THE NEGATIVE CONSEQUENCES OF DRINKING -- References -- 5 Community Approaches and Perspectives from Other Health Fields -- LIMITATIONS OF ALCOHOL PREVENTION RESEARCH -- COMMUNITY-BASED CARDIOVASCULAR DISEASE PREVENTION STUDIES -- Lessons from the Three-Community-Study and the Five-City Project -- Results from Other Comprehensive CVD Prevention Programs -- RESULTS FROM PRIMARY PREVENTION PROGRAMS IN OTHER HEALTH FIELDS -- Promoting Seat Belt Use -- Cancer Prevention through Mass Media Advertising -- Smoking Prevention and Cessation -- Preventing Adolescent Pregnancy through School-Based Clinics -- SUMMARY OF LESSONS LEARNED FROM OTHER FIELDS -- IMPLICATIONS FOR ALCOHOL PROBLEM PREVENTION -- References -- 6 Methodological Issues in Alcohol Prevention Research: Conclusions and Recommendations -- RESEARCH DESIGN FOR FUTURE ALCOHOL PREVENTION RESEARCH PROGRAMS -- The Importance of Theory -- Need for Both Laboratory and Field Prevention Research -- The Practical Significance of Prevention Research -- DIRECTION AND DESIGN OF FUTURE ALCOHOL PREVENTION RESEARCH PROGRAMS: CONCLUSIONS AND RECOMMENDATIONS -- References -- II RESEARCH OPPORTUNITIES IN THE TREATMENT OF ALCOHOL-RELATED PROBLEMS -- Introduction -- 7 The Social and Historical Context of Alcohol Treatment Research -- FEDERAL INVOLVEMENT IN ALCOHOL TREATMENT -- EMERGING TRENDS IN TREATMENT SERVICES -- DEMOGRAPHY, EPIDEMIOLOGY, AND THE DELIVERY OF TREATMENT SERVICES -- POPULAR TRENDS IN TREATMENT AND REFERRAL -- POLICY-ORIENTED SERVICES RESEARCH -- References -- 8 Issues of Assessment, Methodology, and Research Design -- RECENT DEVELOPMENTS IN CONCEPTUALIZATION…”
    Libro electrónico
  11. 6711
    por Institute of Medicine (U.S.).
    Publicado 1989
    Tabla de Contenidos: “…-- Prior Review -- High-Cost Case Management -- Retrospective Utilization Review -- Other Cost-Containment Methods -- TWO NOTES OF CAUTION -- Obstacles To Evaluation -- Intrinsic Conceptual and Methodological Problems -- Common Behavioral Biases Against Evaluation -- Competition and Evaluation -- Forces Behind Rising Health Care Costs -- REFERENCES -- 2 Origins of Utilization Management -- THE GROWTH OF THIRD-PARTY FINANCING OF HEALTH CARE -- EARLY COST-MANAGEMENT EFFORTS BY THIRD PARTIES -- Management of the Risk Pool -- Design of the Benefit Plan -- Controls On Payments To Providers -- Constraints On Supply -- Utilization Review -- GOVERNMENT AND EMPLOYER INVOLVEMENT -- Federal Government Initiatives -- Private Purchasers Become an Force -- OTHER FACTORS GIVING RISE TO UTILIZATION MANAGEMENT -- Inappropriate Utilization as an Cost-Containment Target -- Variations in Utilization -- Inappropriate Utilization -- Linking Cost and Quality -- Improving the Tools and Structures for Utilization Management -- Information Resources -- Assessment and Education Strategies -- New Organizations -- CONCLUSION -- REFERENCES…”
    Libro electrónico
  12. 6712
    por Herzog, Thomas, 1941-
    Publicado 2004
    Tabla de Contenidos: “…Museum of prehistory and ancient history (Frankfurt am Main, Germany) / Josef Paul Kleihues with Mirko Baum. Office of the Federal President (Berlin, Germany) / Gruber + Kleine-Kraneburg. …”
    Libro
  13. 6713
    por Pérez Chávez, José
    Publicado 2019
    Tabla de Contenidos: “…Motivos que tuvo el Ejecutivo Federal para proponer este régimen fiscal -- 2. Quiénes pueden optar por tributar en este régimen fiscal -- 3. …”
    Libro electrónico
  14. 6714
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: DevSecOps Drivers and Challenges -- Security compliance -- ISO 27001 -- Cloud Security Alliance (CSA) -- Federal Information Processing Standards (FIPS) -- Center for Internet Security (CIS) and OpenSCAP - securing your infrastructure -- National Checklist Program (NCP) repository -- OpenSCAP tools -- Legal and security compliance -- New technology (third-party, cloud, containers, and virtualization) -- Virtualization -- Dockers -- Infrastructure as Code (IaC) -- Cloud services hacks/abuse -- Case study - products on sale -- What do hackers do? …”
    Libro electrónico
  15. 6715
    por Rao, M. B. 1927-
    Publicado 2007
    Tabla de Contenidos: “…Cover -- Contents -- Preface -- Introduction -- Chapter 1: Biotechnology -- Introduction -- Definition -- Transformation into New Products -- Agricultural Biotechnology -- Evolution of New Technologies -- Benefits Arising Out of Biotechnology -- Genetic Manipulation -- DNA -- New Food Products -- Genetic Engineering -- Recombinant DNA Technology (rDNA) -- Biotechnology and Medicine -- Research and Stem Cells -- Biotechnology and Vaccines -- Plant Biotechnology -- Commercialization of Biotechnology -- Patenting of New Inventions -- Safety Concerns About (GM) Products -- Ethical Concerns -- Biotechnology: Janus-Faced -- Developments in India -- GM Products in the USA -- Bio Products in EC -- Chapter 2: Biotechnology Laws and Practices in Some Countries -- The United States of America (USA) -- The Federal Food, Drug and Cosmetic Act (FFDCA) -- Consumer Concerns -- Labelling of GM Products -- Environmental Concerns -- Commercialization in the USA -- European Union (EU) -- Labelling Requirements in the EUA -- Japan -- China -- The United Kingdom (UK) -- Canada -- Australia -- India -- The Recombinant DNA Advisory Committee (RDAC) -- The Instutional Bio Safety Committee (IBSC) -- The Review Committee on Genetic Manipulation (RCGM) -- The Genetic Engineering Approval Committee (GEAC) -- Agricultural Research and Biotechnology Research in India -- GM Crops in India -- Safety Concerns and Release of GMOs -- Chapter 3: Biotechnology and Patent Law -- Patenting of Substances Found in Nature -- Patent Law Requirements Blurred by the Advent of Biotechnology -- Patent Law in the USA -- United States Supreme Court's Decision in Chakraborty's Case -- Patenting 'the Harvard Mouse' -- The Utility Requirement -- Obviousness -- Case Law -- Sufficient Disclosure/Written Description -- Case Law -- Conception of a DNA Molecule and Sufficiency of a Written Description…”
    Libro electrónico
  16. 6716
    por OECD
    Publicado 2019
    Tabla de Contenidos: “…Répartition des recettes fiscales par sous-secteurs d'administration publique -- Sous-secteurs des administrations publiques à identifier -- Administration centrale -- Administration d'un État fédéré, d'une province ou d'une région -- Collectivités locales -- Caisses de sécurité sociale -- Autorités supranationales -- Critères à utiliser pour l'attribution des recettes fiscales -- Versements effectués par les États membres de l'Union européenne -- A13. …”
    Libro electrónico
  17. 6717
    por International Energy Agency
    Publicado 2016
    Tabla de Contenidos: “…ABBREVIATIONS AND CONVERSION FACTORS -- PART II - WORLD AND OECD COAL OVERVIEW -- WORLD COAL MARKET REVIEW -- Overview -- Production -- Trade -- Consumption -- Uses of coal -- CO2 emissions -- Coal resources andreserves -- World energy balance in 2014 -- OECD energy balance in 2014 -- PART III - DETAILED OECD COAL DATA -- DIRECTORY OF PART III FIGURES AND TABLES -- OECD TOTAL -- OECD AMERICAS -- OECD ASIA OCEANIA -- OECD EUROPE -- IEA TOTAL -- AUSTRALIA -- AUSTRIA -- BELGIUM -- CANADA -- CHILE -- CZECH REPUBLIC -- DENMARK -- ESTONIA -- FINLAND -- FRANCE -- GERMANY -- GREECE -- HUNGARY -- ICELAND -- IRELAND -- ISRAEL -- ITALY -- JAPAN -- KOREA -- LUXEMBOURG -- MEXICO -- NETHERLANDS -- NEW ZEALAND -- NORWAY -- POLAND -- PORTUGAL -- SLOVAK REPUBLIC -- SLOVENIA -- SPAIN -- SWEDEN -- SWITZERLAND -- TURKEY -- UNITED KINGDOM -- UNITED STATES -- COUNTRY NOTES -- PART IV - NON-OECD COAL DATA -- GENERAL NOTES -- BRAZIL -- BULGARIA -- PEOPLE'S REPUBLIC OF CHINA -- COLOMBIA -- HONG KONG (CHINA) -- INDIA -- INDONESIA -- KAZAKHSTAN -- PEOPLE'S DEMOCRATIC REPUBLIC OF KOREA -- MALAYSIA -- MONGOLIA -- MOZAMBIQUE -- PHILIPPINES -- ROMANIA -- RUSSIAN FEDERATION -- SERBIA -- SOUTH AFRICA -- CHINESE TAIPEI -- THAILAND -- UKRAINE -- BOLIVARIAN REPUBLIC OF VENEZUELA -- VIET NAM -- AFRICA -- ASIA EXCLUDING CHINA -- EUROPEAN UNION - 28 -- NON-OECD AMERICAS -- NON-OECD EUROPE AND EURASIA -- NON-OECD TOTAL -- WORLD -- COUNTRY NOTES AND SOURCES…”
    Libro electrónico
  18. 6718
    por OECD
    Publicado 2018
    Tabla de Contenidos: “…Biens et services des administrations publiques, n.i.a. -- Fédération de Russie -- Tableau 1. Total services -- Tableau 2. …”
    Libro electrónico
  19. 6719
    por Abbas, Hoveyda
    Publicado 2012
    Tabla de Contenidos: “…Chapter 5: Concept of Sovereignty in Political Theory -- Introduction to the Concept of Sovereignty -- Historical Perspective on the Concept of Sovereignty -- Rationalization of Natural Law and the Concept of Sovereignty -- Jean Bodin -- Johannes Althusius -- Hugo Grotius -- Contractualists and the Concept of Sovereignty -- Thomas Hobbes -- John Locke -- Jean Jacques Rousseau -- Legalists and the Concept of Sovereignty -- Jeremy Bentham -- John Austin and the Monist Theory of Sovereignty -- Critical evaluation of Monist theory -- Characteristics of Sovereignty -- Absoluteness or Illimitability of Sovereignty -- Indivisibility of Sovereignty -- Inalienability of Sovereignty -- Permanence or Perpetuity of Sovereignty -- Universality or All-Comprehensiveness of Sovereignty -- Aspects or Types of Sovereignty -- Titular Sovereignty -- Legal Sovereignty -- Political Sovereignty -- Popular Sovereignty -- National Sovereignty -- De Jure and De Facto Sovereignty -- Internal versus External Sovereignty -- 'Instituted Sovereignty' versus 'Acquired Sovereignty' -- Sovereignty and the Indian Constitution -- Review Questions -- Endnotes -- Chapter 6: Concept of Sovereignty Challenged -- Critics of Sovereignty -- Political Pluralism and Pluralist Critiques of Sovereignty -- A Brief Introduction to Political Pluralism -- Sovereignty, Power and Authority -- Possible Reasons for Emergence of Doctrine of Political Pluralism -- Features of Political Pluralism and Its Underlying Principles -- Doctrine of real or juristic/corporate personality of groups -- Society not the state as the source of law -- Characteristic of the State: Not power or sovereignty but the purpose or end it serves -- State as coordinator of interests in society -- Prominence to political federalism and decentralization of authority -- International law and internationalism limits sovereignty…”
    Libro electrónico
  20. 6720
    Publicado 2017
    Tabla de Contenidos: “…STANDARDS -- COMMON INFORMATION MODEL (CIM, CIM V2) -- CLOUD AUDITING DATA FEDERATION -- WEB-SERVICES MANAGEMENT SPECIFICATION -- OPEN VIRTUALIZATION FORMAT -- MANAGING WITH ASL-BISL FOUNDATION STANDARDS -- APPLICATION SERVICES LIBRARY -- MANAGING WITH ISO/IEC STANDARDS -- ISO/IEC 16350 FOR APPLICATION MANAGEMENT -- ISO/IEC 17203: 2011 -- OPEN STANDARDS -- APPLICATIONS RESPONSE MEASUREMENT -- CLOUD APPLICATION MANAGEMENT FOR PLATFORMS -- SUMMARY -- KEY TAKEAWAYS -- 17 - LOOKING AHEAD -- INTRODUCTION -- CLOUD COMPUTING INNOVATIONS -- THE CHANGING FACE OF APPLICATIONS -- SOFTWARE-DEFINED EVERYTHING -- ADVANCED PREDICTIVE ANALYTICS FOR PERFORMANCE MANAGEMENT -- DYNAMIC POLICY RULES -- AUTONOMICS AND COGNITIVE COMPUTING -- HEIGHTENED SECURITY NEEDS -- NORMALIZING DEVOPS -- CLOUD MANAGEMENT STANDARDS -- CHANGING OF THE GUARD…”
    Libro electrónico