Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
10001Publicado 2023Tabla de Contenidos: “…Do Bad Things -- Elements of a Typical Security Program -- Risk Management -- Security Governance and Management -- Security Controls -- Professional Ethics -- Chapter Review -- Quick Review -- Questions -- Questions and Answers -- Chapter 2 Access Controls Concepts -- Access Control Fundamentals -- Access Control Concepts -- Access Control Practices -- Identification, Authentication, Authorization, and Accountability -- Identity and Access Management -- Identity and Access Management Lifecycle -- Privileged Accounts -- Logical Access Controls -- Access Control Models -- Identity Management Technologies -- Monitoring Logical Access -- Physical Access Control -- Preventing and Controlling Physical Access -- Monitoring Physical Access -- Chapter Review -- Quick Review -- Questions -- Questions and Answers -- Chapter 3 Network Security -- Network Fundamentals -- Network Types -- Wired and Wireless Networks -- System Addresses -- Network Devices and Terminology -- Networking in Action -- Protocols -- Ports -- OSI Model -- TCP/IP -- IP Addressing -- Network Threats and Attacks -- Conducting Research -- Identifying Targets -- Exploiting Targets -- Doing Bad Things -- Network Defenses -- Firewalls -- Network Security Architecture Elements -- Network Access Control -- E-mail and Web Application Filtering -- Network Operations Elements -- Wireless Security -- Internet of Things Security -- Security Assessments and Testing…”
Libro electrónico -
10002por Bharadwaj, AshishTabla de Contenidos: “…-- 3 Standard Setting Organizations -- 4 Importance of SSOs in Setting Essential Patents -- 4.1 Standard Setting Process in SSOs -- 4.2 Advantages and Risk of Standard Setting by SSOs -- 4.3 IPR Policies of SSOs: Understanding Disclosure and Licensing of Essential Patents -- 5 Disclosure and Licensing of Essential Patents -- 5.1 Disclosure and Licensing Requirements ETSI -- 5.2 Disclosure and Licensing Requirement of TSDSI -- 5.3 Disclosure and Licensing Requirement IEEE -- 6 FRAND Commitment and Injunction -- 3 Jurisprudence Evolved in Cases Involving Standard Essential Patents -- 1 Introduction -- 2 Disclosure Requirement -- 3 Non-disclosure at the Time of Standard Development -- 3.1 Non-disclosure Amounting to Equitable Doctrine of Implied Waiver -- 4 Injunctive Relief -- 4.1 Pre-Huawei Jurisprudence -- 4.2 Huawei v ZTE -- 4.3 Post Huawei -- 5 Developments in India -- 6 Antisuit Injunction -- 7 Conclusion -- Annexure I: Membership Application Form for TSDSI -- Annexure II: IPR Licensing Declaration Form for TSDSI -- Annexure III: IPR Information Statement and Licensing Declaration for TSDSI -- Annexure IV: IPR Information Statement for TSDSI -- Annexure V: IPR Licensing Declaration for TSDSI -- Annexure VI: Application for ETSI Membership -- Annexure VII: IPR Licensing Declaration Form for ETSI -- Annexure VIII: Statement and Licensing Declaration Form for ETSI -- Annexure IX: ETSI - IPR Information Statement Annex -- Annexure X: Optional Written Explanation of Reasons for Not Making the IPR Licensing Declaration -- Annexure XI: Letter of Assurance for Essential Patent Claims for IEEE…”
Publicado 2023
Libro electrónico -
10003Publicado 2022“…The challenges of EGS are multiple in terms of investment costs, the testing of novel reservoir exploitation approaches with an inherent risk of induced seismicity, and the presence of aggressive geothermal brines, damaging infrastructures. …”
Libro electrónico -
10004por Richardson, Robert Dale, 1934-“…James was a beloved teacher who taught courage and risk-taking, and served as mentor to W.E.B. Du Bois, Gertrude Stein, and many other Harvard outsiders. …”
Publicado 2006
Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca Universidad de Deusto)Libro -
10005Publicado 2018Tabla de Contenidos: “…10.2 Defending Against Buffer Overflows -- 10.3 Other forms of Overflow Attacks -- 10.4 Key Terms, Review Questions, and Problems -- Chapter 11 Software Security -- 11.1 Software Security Issues -- 11.2 Handling Program Input -- 11.3 Writing Safe Program Code -- 11.4 Interacting with the Operating System and Other Programs -- 11.5 Handling Program Output -- 11.6 Key Terms, Review Questions, and Problems -- Chapter 12 Operating System Security -- 12.1 Introduction to Operating System Security -- 12.2 System Security Planning -- 12.3 Operating Systems Hardening -- 12.4 Application Security -- 12.5 Security Maintenance -- 12.6 Linux/Unix Security -- 12.7 Windows Security -- 12.8 Virtualization Security -- 12.9 Key Terms, Review Questions, and Problems -- Chapter 13 Cloud and IoT Security -- 13.1 Cloud Computing -- 13.2 Cloud Security Concepts -- 13.3 Cloud Security Approaches -- 13.4 The Internet of Things -- 13.5 IoT Security -- 13.6 Key Terms and Review Questions -- Part Three Management Issues -- Chapter 14 IT Security Management and Risk Assessment -- 14.1 IT Security Management -- 14.2 Organizational Context and Security Policy -- 14.3 Security Risk Assessment -- 14.4 Detailed Security Risk Analysis -- 14.5 Case Study: Silver Star Mines -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 IT Security Controls, Plans, and Procedures -- 15.1 IT Security Management Implementation -- 15.2 Security Controls or Safeguards -- 15.3 IT Security Plan -- 15.4 Implementation of Controls -- 15.5 Monitoring Risks -- 15.6 Case Study: Silver Star Mines -- 15.7 Key Terms, Review Questions, and Problems -- Chapter 16 Physical and Infrastructure Security -- 16.1 Overview -- 16.2 Physical Security Threats -- 16.3 Physical Security Prevention and Mitigation Measures -- 16.4 Recovery from Physical Security Breaches…”
Libro electrónico -
10006Publicado 2015Tabla de Contenidos: “…6.2 Overview of the Dutch housing market and land use planning -- 6.3 Eco-costs/value ratio and the EVR model -- 6.4 Applying the EVR model to housing -- 6.5 EVR and tall buildings -- 6.6 Embedding EVR in other sustainable ranking methods -- 6.7 Conclusion -- References -- Chapter 7 Productivity in Construction Projects -- 7.1 Introduction -- 7.2 Concept and measurement of productivity -- 7.3 Previous literature on factors affecting site productivity -- 7.4 Productivity survey -- 7.5 Proposed framework for site productivity -- 7.6 Conclusion and further research -- References -- Chapter 8 Design Variables and Whole-Life Cost Modelling -- 8.1 Introduction -- 8.2 Whole-life cost modelling -- 8.3 Steps in LCC modelling -- 8.4 Design principles to optimise lcc -- 8.5 A worked example of an office façade -- 8.6 Inclusion of carbon emissions into wlc modelling -- 8.7 Limitations of wlc -- 8.8 Concluding remarks -- References -- Chapter 9 Procurement and Contract Strategy: Risks Allocation and Construction Cost -- 9.1 Introduction -- 9.2 Procurement strategy and contract selection -- 9.3 Wembley stadium case study -- 9.4 Allocation of risks and forms of contract -- 9.5 Risks and construction costs -- 9.6 Procurement systems and contract issues -- 9.7 Alternative forms of procurement -- 9.8 Concluding remarks -- References -- Chapter 10 Sustainable Design, Investment and Value -- 10.1 Introduction -- 10.2 Formulation of project goals -- 10.3 Identifying value-related characteristics -- 10.4 The performance approach -- 10.5 Use of sustainability assessment systems -- 10.6 Relationship between sustainable credentials and value -- 10.7 Concluding remarks -- References -- Chapter 11 Carbon Reduction and Fiscal Incentives for Sustainable Design -- 11.1 Introduction -- 11.2 Key drivers of owners and occupiers -- 11.3 Reducing demand for energy in buildings…”
Libro electrónico -
10007Publicado 2011Tabla de Contenidos: “…/ Timo Koivurova -- The law of the sea and human rights / Sophie Cacciaguidi-Fahy -- Moral knowledge's potential for reducing the restraint of law : the risk of moral education -- Catherine lotrionte -- Babysitting terrorists : should states be strictly liable for failing to prevent transborder attacks? …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
10008Publicado 2008Tabla de Contenidos: “…USING HYPOTHETICALS TO ENRICH APPRECIATION FOR STYLES OF FOLLOWERSHIPTHE LIMITS OF HYPOTHETICAL SITUATIONS; RISK AND COURAGE; FEAR; HIGH-PROFILE LEADERSHIP FAILURES AS CAUTIONARY TALES; SKILL; APPLICATIONS; THE COURAGE TO TAKE MORAL ACTION; CONCLUDING ON A RIGHT NOTE; Chapter Seven: Rethinking Leadership and Followership; Chapter Eight: The Hero's Journey to Effective Followership and Leadership; SETTING THE CONTEXT; LEADERSHIP AND FOLLOWERSHIP ARE TWO SIDES OF THE SAME COIN; LEADERSHIP AND FOLLOWERSHIP DEVELOPMENT AT NASA GODDARD SPACE FLIGHT CENTER; THE LEADERSHIP ALCHEMY PROMISE…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
10009por Fingret, Ann, 1933-Tabla de Contenidos: “…; Reasons for developing a policy; Contents of the policy; Avoiding the risk; HIV antibody testing; Insurance; Legal considerations; Recruitment of individuals with HIV/AIDS…”
Publicado 1995
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
10010Publicado 2013Tabla de Contenidos: “…Loss and GriefAggression; Physical Health; Parenting; Coping; Suggestions for Intervention; Individual Level; Community Level; References; Types of Violence; Childhood Sexual Abuse in the Lives of Black Women: Risk and Resilience in a Longitudinal Study; The Women's Study; Participants; Procedures; Review of the Research; Consequences of Child Sexual Abuse; Re-Victimization; Resilience; Suggestions for Intervention; References; Grounding Our Feet and Hearts: Black Women's Coping Strategies in Psychologically Abusive Dating Relationships; Dating Violence Among Black Couples…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
10011Publicado 2013Tabla de Contenidos: “…3 Guidelines for the Assessment of Intimate Partner ViolenceGeneral IPV Assessment Recommendations; Dimensions of IPV Assessment; Assessment of the Violence; Generalized Power and Control Dynamics; Assessment of the Perpetrator; Assessment of the Victim; Assessment of Relationship Functioning; Assessment of Other Relevant Characteristics; Conclusion; 4 Treatment for Battering; Therapy with Battering Victims; Creating a Context of Support; Sample Relevant Ethical Standards; Safety Planning and Risk Assessment; Intervention Approaches…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
10012por Hollin, Clive R.Tabla de Contenidos: “…; Mental Disorder and Criminal Behaviour: Theory and Practice; Chapter 7: Preventing Criminal Behaviour: Punishment, Deterrence and Retribution; Punishment and Retribution; Capital Punishment; Punishment and Deterrence; Special deterrence; General deterrence; Situational Crime Prevention; Reducing Opportunity; Hardening the target; Removing the target; Increasing the Risk of Detection; Formal surveillance; Informal surveillance; Environmental design; Personal skills; Problems and Objections; Displacement…”
Publicado 1992
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
10013Publicado 2015Tabla de Contenidos: “…Symptoms of Sleep Problems Risk Factors for Sleep Problems in the Post-Deployment Period; Stable Demographic Factors; Operational and Military Support Factors; Correlates and Consequences of Sleep Problems in the Post-Deployment Period; Mental Health Problems; Physical Health Problems; Operational Readiness; Discussion; Unaddressed Gaps in the Literature; Future Directions for Military Sleep Studies; CHAPTER THREE: Assessing Sleep Disturbances and Consequences Among Post-Deployed Servicemembers; Sleep Survey Development and Administration to Servicemembers in the Deployment Life Study…”
Libro electrónico -
10014por Tanner, Murray ScotTabla de Contenidos: “…Major Findings: Obstacles to Beijing's Political LeverageTurning Economic Influence into Political Leverage: Beijing's Strategies; Seeking Conduits of Influence in Taiwan; Beijing's Efforts to Leverage the Taishang; Beijing's Counterproductive Strategy Toward the Taishang; The Impact of Economic Pressure on Mainland Chinese Politics; Chapter Six - China's Economic Leverage: A Powerful Weapon, but Tricky to Use; Taiwan's Rising "Asymmetric Interdependence" with Mainland China; Mainland Economic Vulnerabilities; Potential Risks for U.S. Interests:Beijing's Frustrations and Taipei's Fears…”
Publicado 2007
Libro electrónico -
10015Publicado 2004Tabla de Contenidos: “…CGI in the Classroom The Nature of the Professional Development; How Change Occurs; Teacher and Student Outcomes; Challenges; Scaling Up; Conclusions; Making It Work; References; Chapter Three - The National Writing Project: Scaling Up and Scaling Down; The NWP Design; A Culture of Risk-Taking; Practices of Scaling Down; Conclusions; References; Chapter Four - Impediments to Scaling Up Effective Comprehensive School Reform Models; Assumptions About the Context and Nature of Scaling Up Comprehensive School Reform Models; Problems in Scaling Up as a Function of the Demands of the Model…”
Libro electrónico -
10016Publicado 2013Tabla de Contenidos: “…Work and retirement: challenges at the end of working life -- 7 Low employment among the 50+ population in Hungary: the role of incentives, health and cognitive capacities / 8 Unemployed 50+: exploring risk factors for depression in Europe / 9 Economic crisis and pathways to retirement / 10 Economic downturns at the beginning and at the end of working life / 11 Pension coverage today and in the future / 12 Financial and subjective well-being of older Europeans / Part III. …”
Libro electrónico -
10017por Altman, RussTabla de Contenidos: “…MOLECULAR DYNAMICS SIMULATIONS OF THE FULL TRIPLE HELICALREGION OF COLLAGEN TYPE I PROVIDE AN ATOMIC SCALE VIEW OF THEPROTEIN'S REGIONAL HETEROGENEITYSTRUCTURAL INSIGHTS INTO PRE-TRANSLOCATION RIBOSOME MOTIONS; NEW CONFORMATIONAL SEARCH METHOD USING GENETICALGORITHM AND KNOT THEORY FOR PROTEINS; PERSONAL GENOMICS; THE REFERENCE HUMAN GENOME DEMONSTRATES HIGH RISK OF TYPE 1DIABETES AND OTHER DISORDERS; MATCHING CANCER GENOMES TO ESTABLISHED CELL LINESFOR PERSONALIZED ONCOLOGY…”
Publicado 2010
Libro electrónico -
10018por Allen, AdrianaTabla de Contenidos: “…Decoupling assistance from citizenship: the changing fractal in social protectionFrom social risk management to social floors in Colombia; The case study; Demographic data; Concluding reflections: The need for a renewed debate on agency and social protection; Note; Bibliography; Chapter 7: Potentials of the urban poor in shaping a sustainable Lagos metropolis; Introduction; The agency of the poor: literature overview; The agency of the urban poor of Lagos metropolis; Conclusion; References…”
Publicado 2015
Libro electrónico -
10019Publicado 2019Tabla de Contenidos: “…Scenario-Building for Marine Spatial Planning; Lynne McGowan, Stephen Jay, and Sue Kidd -- Chapter 15. MSP as a form of risk governance; Roland Cormier and Andreas Kannen -- Chapter 16. …”
Libro electrónico -
10020por Funk, Tom. authorTabla de Contenidos: “…; ""Setting Goals and Tactics""; ""Customer Service 2.0""; ""How to Calculate Social Media ROI""; ""The Other ROI: Risk of Ignoring""; ""Summary""; ""Best Practices""; ""Whatâ€?…”
Publicado 2013
Libro electrónico