Mostrando 10,001 - 10,020 Resultados de 13,276 Para Buscar '"Risk"', tiempo de consulta: 0.13s Limitar resultados
  1. 10001
    Publicado 2023
    Tabla de Contenidos: “…Do Bad Things -- Elements of a Typical Security Program -- Risk Management -- Security Governance and Management -- Security Controls -- Professional Ethics -- Chapter Review -- Quick Review -- Questions -- Questions and Answers -- Chapter 2 Access Controls Concepts -- Access Control Fundamentals -- Access Control Concepts -- Access Control Practices -- Identification, Authentication, Authorization, and Accountability -- Identity and Access Management -- Identity and Access Management Lifecycle -- Privileged Accounts -- Logical Access Controls -- Access Control Models -- Identity Management Technologies -- Monitoring Logical Access -- Physical Access Control -- Preventing and Controlling Physical Access -- Monitoring Physical Access -- Chapter Review -- Quick Review -- Questions -- Questions and Answers -- Chapter 3 Network Security -- Network Fundamentals -- Network Types -- Wired and Wireless Networks -- System Addresses -- Network Devices and Terminology -- Networking in Action -- Protocols -- Ports -- OSI Model -- TCP/IP -- IP Addressing -- Network Threats and Attacks -- Conducting Research -- Identifying Targets -- Exploiting Targets -- Doing Bad Things -- Network Defenses -- Firewalls -- Network Security Architecture Elements -- Network Access Control -- E-mail and Web Application Filtering -- Network Operations Elements -- Wireless Security -- Internet of Things Security -- Security Assessments and Testing…”
    Libro electrónico
  2. 10002
    por Bharadwaj, Ashish
    Publicado 2023
    Tabla de Contenidos: “…-- 3 Standard Setting Organizations -- 4 Importance of SSOs in Setting Essential Patents -- 4.1 Standard Setting Process in SSOs -- 4.2 Advantages and Risk of Standard Setting by SSOs -- 4.3 IPR Policies of SSOs: Understanding Disclosure and Licensing of Essential Patents -- 5 Disclosure and Licensing of Essential Patents -- 5.1 Disclosure and Licensing Requirements ETSI -- 5.2 Disclosure and Licensing Requirement of TSDSI -- 5.3 Disclosure and Licensing Requirement IEEE -- 6 FRAND Commitment and Injunction -- 3 Jurisprudence Evolved in Cases Involving Standard Essential Patents -- 1 Introduction -- 2 Disclosure Requirement -- 3 Non-disclosure at the Time of Standard Development -- 3.1 Non-disclosure Amounting to Equitable Doctrine of Implied Waiver -- 4 Injunctive Relief -- 4.1 Pre-Huawei Jurisprudence -- 4.2 Huawei v ZTE -- 4.3 Post Huawei -- 5 Developments in India -- 6 Antisuit Injunction -- 7 Conclusion -- Annexure I: Membership Application Form for TSDSI -- Annexure II: IPR Licensing Declaration Form for TSDSI -- Annexure III: IPR Information Statement and Licensing Declaration for TSDSI -- Annexure IV: IPR Information Statement for TSDSI -- Annexure V: IPR Licensing Declaration for TSDSI -- Annexure VI: Application for ETSI Membership -- Annexure VII: IPR Licensing Declaration Form for ETSI -- Annexure VIII: Statement and Licensing Declaration Form for ETSI -- Annexure IX: ETSI - IPR Information Statement Annex -- Annexure X: Optional Written Explanation of Reasons for Not Making the IPR Licensing Declaration -- Annexure XI: Letter of Assurance for Essential Patent Claims for IEEE…”
    Libro electrónico
  3. 10003
    Publicado 2022
    “…The challenges of EGS are multiple in terms of investment costs, the testing of novel reservoir exploitation approaches with an inherent risk of induced seismicity, and the presence of aggressive geothermal brines, damaging infrastructures. …”
    Libro electrónico
  4. 10004
    por Richardson, Robert Dale, 1934-
    Publicado 2006
    “…James was a beloved teacher who taught courage and risk-taking, and served as mentor to W.E.B. Du Bois, Gertrude Stein, and many other Harvard outsiders. …”
    Libro
  5. 10005
    Publicado 2018
    Tabla de Contenidos: “…10.2 Defending Against Buffer Overflows -- 10.3 Other forms of Overflow Attacks -- 10.4 Key Terms, Review Questions, and Problems -- Chapter 11 Software Security -- 11.1 Software Security Issues -- 11.2 Handling Program Input -- 11.3 Writing Safe Program Code -- 11.4 Interacting with the Operating System and Other Programs -- 11.5 Handling Program Output -- 11.6 Key Terms, Review Questions, and Problems -- Chapter 12 Operating System Security -- 12.1 Introduction to Operating System Security -- 12.2 System Security Planning -- 12.3 Operating Systems Hardening -- 12.4 Application Security -- 12.5 Security Maintenance -- 12.6 Linux/Unix Security -- 12.7 Windows Security -- 12.8 Virtualization Security -- 12.9 Key Terms, Review Questions, and Problems -- Chapter 13 Cloud and IoT Security -- 13.1 Cloud Computing -- 13.2 Cloud Security Concepts -- 13.3 Cloud Security Approaches -- 13.4 The Internet of Things -- 13.5 IoT Security -- 13.6 Key Terms and Review Questions -- Part Three Management Issues -- Chapter 14 IT Security Management and Risk Assessment -- 14.1 IT Security Management -- 14.2 Organizational Context and Security Policy -- 14.3 Security Risk Assessment -- 14.4 Detailed Security Risk Analysis -- 14.5 Case Study: Silver Star Mines -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 IT Security Controls, Plans, and Procedures -- 15.1 IT Security Management Implementation -- 15.2 Security Controls or Safeguards -- 15.3 IT Security Plan -- 15.4 Implementation of Controls -- 15.5 Monitoring Risks -- 15.6 Case Study: Silver Star Mines -- 15.7 Key Terms, Review Questions, and Problems -- Chapter 16 Physical and Infrastructure Security -- 16.1 Overview -- 16.2 Physical Security Threats -- 16.3 Physical Security Prevention and Mitigation Measures -- 16.4 Recovery from Physical Security Breaches…”
    Libro electrónico
  6. 10006
    Publicado 2015
    Tabla de Contenidos: “…6.2 Overview of the Dutch housing market and land use planning -- 6.3 Eco-costs/value ratio and the EVR model -- 6.4 Applying the EVR model to housing -- 6.5 EVR and tall buildings -- 6.6 Embedding EVR in other sustainable ranking methods -- 6.7 Conclusion -- References -- Chapter 7 Productivity in Construction Projects -- 7.1 Introduction -- 7.2 Concept and measurement of productivity -- 7.3 Previous literature on factors affecting site productivity -- 7.4 Productivity survey -- 7.5 Proposed framework for site productivity -- 7.6 Conclusion and further research -- References -- Chapter 8 Design Variables and Whole-Life Cost Modelling -- 8.1 Introduction -- 8.2 Whole-life cost modelling -- 8.3 Steps in LCC modelling -- 8.4 Design principles to optimise lcc -- 8.5 A worked example of an office façade -- 8.6 Inclusion of carbon emissions into wlc modelling -- 8.7 Limitations of wlc -- 8.8 Concluding remarks -- References -- Chapter 9 Procurement and Contract Strategy: Risks Allocation and Construction Cost -- 9.1 Introduction -- 9.2 Procurement strategy and contract selection -- 9.3 Wembley stadium case study -- 9.4 Allocation of risks and forms of contract -- 9.5 Risks and construction costs -- 9.6 Procurement systems and contract issues -- 9.7 Alternative forms of procurement -- 9.8 Concluding remarks -- References -- Chapter 10 Sustainable Design, Investment and Value -- 10.1 Introduction -- 10.2 Formulation of project goals -- 10.3 Identifying value-related characteristics -- 10.4 The performance approach -- 10.5 Use of sustainability assessment systems -- 10.6 Relationship between sustainable credentials and value -- 10.7 Concluding remarks -- References -- Chapter 11 Carbon Reduction and Fiscal Incentives for Sustainable Design -- 11.1 Introduction -- 11.2 Key drivers of owners and occupiers -- 11.3 Reducing demand for energy in buildings…”
    Libro electrónico
  7. 10007
    Publicado 2011
    Tabla de Contenidos: “…/ Timo Koivurova -- The law of the sea and human rights / Sophie Cacciaguidi-Fahy -- Moral knowledge's potential for reducing the restraint of law : the risk of moral education -- Catherine lotrionte -- Babysitting terrorists : should states be strictly liable for failing to prevent transborder attacks? …”
    Enlace del recurso
    Libro electrónico
  8. 10008
    Publicado 2008
    Tabla de Contenidos: “…USING HYPOTHETICALS TO ENRICH APPRECIATION FOR STYLES OF FOLLOWERSHIPTHE LIMITS OF HYPOTHETICAL SITUATIONS; RISK AND COURAGE; FEAR; HIGH-PROFILE LEADERSHIP FAILURES AS CAUTIONARY TALES; SKILL; APPLICATIONS; THE COURAGE TO TAKE MORAL ACTION; CONCLUDING ON A RIGHT NOTE; Chapter Seven: Rethinking Leadership and Followership; Chapter Eight: The Hero's Journey to Effective Followership and Leadership; SETTING THE CONTEXT; LEADERSHIP AND FOLLOWERSHIP ARE TWO SIDES OF THE SAME COIN; LEADERSHIP AND FOLLOWERSHIP DEVELOPMENT AT NASA GODDARD SPACE FLIGHT CENTER; THE LEADERSHIP ALCHEMY PROMISE…”
    Libro electrónico
  9. 10009
    por Fingret, Ann, 1933-
    Publicado 1995
    Tabla de Contenidos: “…; Reasons for developing a policy; Contents of the policy; Avoiding the risk; HIV antibody testing; Insurance; Legal considerations; Recruitment of individuals with HIV/AIDS…”
    Libro electrónico
  10. 10010
    Publicado 2013
    Tabla de Contenidos: “…Loss and GriefAggression; Physical Health; Parenting; Coping; Suggestions for Intervention; Individual Level; Community Level; References; Types of Violence; Childhood Sexual Abuse in the Lives of Black Women: Risk and Resilience in a Longitudinal Study; The Women's Study; Participants; Procedures; Review of the Research; Consequences of Child Sexual Abuse; Re-Victimization; Resilience; Suggestions for Intervention; References; Grounding Our Feet and Hearts: Black Women's Coping Strategies in Psychologically Abusive Dating Relationships; Dating Violence Among Black Couples…”
    Libro electrónico
  11. 10011
    Publicado 2013
    Tabla de Contenidos: “…3 Guidelines for the Assessment of Intimate Partner ViolenceGeneral IPV Assessment Recommendations; Dimensions of IPV Assessment; Assessment of the Violence; Generalized Power and Control Dynamics; Assessment of the Perpetrator; Assessment of the Victim; Assessment of Relationship Functioning; Assessment of Other Relevant Characteristics; Conclusion; 4 Treatment for Battering; Therapy with Battering Victims; Creating a Context of Support; Sample Relevant Ethical Standards; Safety Planning and Risk Assessment; Intervention Approaches…”
    Libro electrónico
  12. 10012
    por Hollin, Clive R.
    Publicado 1992
    Tabla de Contenidos: “…; Mental Disorder and Criminal Behaviour: Theory and Practice; Chapter 7: Preventing Criminal Behaviour: Punishment, Deterrence and Retribution; Punishment and Retribution; Capital Punishment; Punishment and Deterrence; Special deterrence; General deterrence; Situational Crime Prevention; Reducing Opportunity; Hardening the target; Removing the target; Increasing the Risk of Detection; Formal surveillance; Informal surveillance; Environmental design; Personal skills; Problems and Objections; Displacement…”
    Libro electrónico
  13. 10013
    Publicado 2015
    Tabla de Contenidos: “…Symptoms of Sleep Problems Risk Factors for Sleep Problems in the Post-Deployment Period; Stable Demographic Factors; Operational and Military Support Factors; Correlates and Consequences of Sleep Problems in the Post-Deployment Period; Mental Health Problems; Physical Health Problems; Operational Readiness; Discussion; Unaddressed Gaps in the Literature; Future Directions for Military Sleep Studies; CHAPTER THREE: Assessing Sleep Disturbances and Consequences Among Post-Deployed Servicemembers; Sleep Survey Development and Administration to Servicemembers in the Deployment Life Study…”
    Libro electrónico
  14. 10014
    por Tanner, Murray Scot
    Publicado 2007
    Tabla de Contenidos: “…Major Findings: Obstacles to Beijing's Political LeverageTurning Economic Influence into Political Leverage: Beijing's Strategies; Seeking Conduits of Influence in Taiwan; Beijing's Efforts to Leverage the Taishang; Beijing's Counterproductive Strategy Toward the Taishang; The Impact of Economic Pressure on Mainland Chinese Politics; Chapter Six - China's Economic Leverage: A Powerful Weapon, but Tricky to Use; Taiwan's Rising "Asymmetric Interdependence" with Mainland China; Mainland Economic Vulnerabilities; Potential Risks for U.S. Interests:Beijing's Frustrations and Taipei's Fears…”
    Libro electrónico
  15. 10015
    Publicado 2004
    Tabla de Contenidos: “…CGI in the Classroom The Nature of the Professional Development; How Change Occurs; Teacher and Student Outcomes; Challenges; Scaling Up; Conclusions; Making It Work; References; Chapter Three - The National Writing Project: Scaling Up and Scaling Down; The NWP Design; A Culture of Risk-Taking; Practices of Scaling Down; Conclusions; References; Chapter Four - Impediments to Scaling Up Effective Comprehensive School Reform Models; Assumptions About the Context and Nature of Scaling Up Comprehensive School Reform Models; Problems in Scaling Up as a Function of the Demands of the Model…”
    Libro electrónico
  16. 10016
    Publicado 2013
    Tabla de Contenidos: “…Work and retirement: challenges at the end of working life -- 7 Low employment among the 50+ population in Hungary: the role of incentives, health and cognitive capacities / 8 Unemployed 50+: exploring risk factors for depression in Europe / 9 Economic crisis and pathways to retirement / 10 Economic downturns at the beginning and at the end of working life / 11 Pension coverage today and in the future / 12 Financial and subjective well-being of older Europeans / Part III. …”
    Libro electrónico
  17. 10017
    por Altman, Russ
    Publicado 2010
    Tabla de Contenidos: “…MOLECULAR DYNAMICS SIMULATIONS OF THE FULL TRIPLE HELICALREGION OF COLLAGEN TYPE I PROVIDE AN ATOMIC SCALE VIEW OF THEPROTEIN'S REGIONAL HETEROGENEITYSTRUCTURAL INSIGHTS INTO PRE-TRANSLOCATION RIBOSOME MOTIONS; NEW CONFORMATIONAL SEARCH METHOD USING GENETICALGORITHM AND KNOT THEORY FOR PROTEINS; PERSONAL GENOMICS; THE REFERENCE HUMAN GENOME DEMONSTRATES HIGH RISK OF TYPE 1DIABETES AND OTHER DISORDERS; MATCHING CANCER GENOMES TO ESTABLISHED CELL LINESFOR PERSONALIZED ONCOLOGY…”
    Libro electrónico
  18. 10018
    por Allen, Adriana
    Publicado 2015
    Tabla de Contenidos: “…Decoupling assistance from citizenship: the changing fractal in social protectionFrom social risk management to social floors in Colombia; The case study; Demographic data; Concluding reflections: The need for a renewed debate on agency and social protection; Note; Bibliography; Chapter 7: Potentials of the urban poor in shaping a sustainable Lagos metropolis; Introduction; The agency of the poor: literature overview; The agency of the urban poor of Lagos metropolis; Conclusion; References…”
    Libro electrónico
  19. 10019
    Publicado 2019
    Tabla de Contenidos: “…Scenario-Building for Marine Spatial Planning; Lynne McGowan, Stephen Jay, and Sue Kidd -- Chapter 15. MSP as a form of risk governance; Roland Cormier and Andreas Kannen -- Chapter 16. …”
    Libro electrónico
  20. 10020
    por Funk, Tom. author
    Publicado 2013
    Tabla de Contenidos: “…; ""Setting Goals and Tactics""; ""Customer Service 2.0""; ""How to Calculate Social Media ROI""; ""The Other ROI: Risk of Ignoring""; ""Summary""; ""Best Practices""; ""Whatâ€?…”
    Libro electrónico