Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
11141
-
11142por IARC Working Group on the Evaluation of Carcinogenic Risks to Humans
Publicado 1992Libro electrónico -
11143por IARC Working Group on the Evaluation of Carcinogenic Risks to Humans
Publicado 1994Libro electrónico -
11144Publicado 2013Tabla de Contenidos: “…. -- Cause Related Marketing -- Caux Round Table Principles -- Centre for Corporate Governance (Nairobi) -- CERES -- CH2 Building, Melbourne -- Chapman Report (2006) (Australia) -- Cheating -- Chief Executive Officer -- Chief Sustainability Officer -- Christianity and CSR -- Christine Parker -- Civil Regulation -- Climate Change -- Clinton Global Initiative -- Club of Rome -- Co-determination -- Co-operation -- Co-ownership -- Coalation of Environmentally -- Responsible Economies -- Code of 'best practice' and norms of behavior -- Colin Scott -- Collaborative Advantage -- Collective bargaining/trade unions -- Combined Assurance -- Combined Code (June 2008) -- Command and Control -- Commonwealth Association of CG -- Communicating with Stakeholders -- Communities of Practice -- Community -- Community activism -- Community of practice -- Community outrage -- Community relations -- Company Directors and CSR -- Competition -- Competitive advantage -- Compliance/Legal Compliance -- Compliant Finance -- Comply-or-explain -- Comprehensive Environmental Responses , Compensation and Liability Act -- Confucian Ethics -- Consumer Driven Corporate Responsibility -- Consumerism Consumers' protection -- Core Principles of CSR Approaches Corporate -- Corporate Activism -- Corporate Citizenship -- Corporate codes of conduct -- Corporate giving -- Corporate Governance -- Corporate Governance as a Tool for Alleviating -- Developmental Issues -- Corporate Governance Reporting -- Corporate killing -- Corporate manslaughter -- Corporate Mission, Vision and Values -- Corporate moral agency -- Corporate negligence -- Corporate outrage -- Corporate Political Connection -- Corporate Reputation -- Corporate Responsibility Index -- Corporate Responsibiliy Maturity -- Corporate Secretaries -- Corporate Social Entrepreneurship -- Corporate Social innovation -- Corporate Social -- Irresponsibility -- Corporate Social Marketing -- Corporate Social Opportunity -- Corporate Social Performance -- Corporate Social Performance Measurement -- Corporate social responsibility -- Corporate Social Responsibility Report -- Corporate Social Responsibility Strategy -- Corporate social responsiveness (Carroll, Frederick and Ackerman) -- Corporate Strategy -- Corporate Sustainability -- Corporation as Psychopath -- Corporatism -- Corruption and National Development -- Cost-benefit analysis -- Cradle to cradle -- Cradle to grave -- Critical reflection in corporate management -- Critiques of Corporate Social Responsibility -- Cross-cultural attitudes to CSR -- CSR and Africa -- CSR and Catholic Social Teaching -- CSR and Corruption -- CSR and Poverty -- CSR and Spirituality -- CSR Butterfly effect -- CSR Communication -- CSR Continuum - core business to broader goals -- CSR Europe -- CSR Evolutionary Journey - CSR Journey, CSR Organisational Evolutions -- CSR Frameworks -- CSR Innovation -- CSR Lifecycle -- CSR Measurement -- CSR: Australian Standard AS8003 [world first] -- CSRwire -- Cultural differences in values/ethics and decision-making -- Culture and Organization Performance -- Cultures, businesses, and global CSR -- Customer value creation -- Dame Anita Roddick -- Data protection -- David Henderson -- Decent work -- Definitions of social responsibility -- Deming 14 points model -- Demographic change -- Design for Environment (sep entry Hannover Principles) -- Development -- Dialogue -- Director Competencies and Skills -- Director Interlocks -- Director Role Position Description -- Disability -- Disclosure (CSR reporting) -- Discrimination -- Distributive Justice -- Diversity -- Dividend -- Dow Jones Sustainability Index -- Downsizing -- Due Diligence -- Duties of employees (comlpy with contract, comply with law, respect employers property) -- E-Waste -- Earth Summitt (separate entry on Rio declaration and on Agenda 21) -- Earthscan (publisher) -- EC Non-Discrimination Law -- Eco-Efficiency -- Eco-innovation -- Ecolabel -- Ecological economics -- Ecological footprint -- Ecology (separate entries on human and industrial) -- Econology -- Economic Globalization -- Economic sociology -- Economic Sociology of the CSR Movement -- Ecopreneurship -- Ecosystem -- Ecotoxity -- Education -- Elkington, John -- Embedded CSR -- Emissions trading -- Employability -- Employee participation/'ownership -- Employee Surveillance -- Employee volunteer programmes -- Employers' Forum on Age -- Employers' Forum on Disability -- EMS -- Endemic -- Energy Biofuels -- Energy—renewable -- Energy-solar -- Engagement/Stakeholder Engagement -- Enlightened Self-Interest -- Enron -- Environmental Accounting -- Environmental Audit -- Environmental ethics -- Environmental governance -- Environmental impact assessment -- Environmental law -- Environmental Management System -- Environmental protection agencies (all countries) -- Environmental Report Verification -- Environmental sustainability index (World economic forum) -- Environmental, Social and Governance Factors in Investment -- Environmental, Social and Governance Risk -- Environmentally Sensitive Accounting -- Equal Opportunity -- Equal Pay -- Equator Principles -- Ethic of responsibility to other stakeholders -- Ethical absolutism v. ethical relativism -- Ethical Corporation -- Ethical CSR -- Ethical Egoism & CSR -- Ethical problems in financial markets -- Ethical Theories -- Ethical Trading Initiative -- European Corporate Governance Institute -- European Multistakeholder Forum -- European Union Directive - The 8th Company Law Directive on Disclosure & Transparency -- European Urban Charter 1992 and 1998 -- Evolution of Corporate Governance Reports in the UK and Ireland -- Executive remuneration and CSR -- Externalities -- Externally Driven Business Case (EDBC) -- Extractive Industries Transparency Initiative (EITI) -- Exxon Mobil -- Exxon Valdez -- Factor 4 / Factor 10 -- Fair Pensions -- Fair Trade -- Fair wages -- Family Business and Corporate Social Responsibility -- Fiduciary duty -- Filial Piety & CSR -- Financial Regulations -- Financial Reporting Council (UK) -- Five Capitals Framework (Forum for the Future) -- Forest Stewardship Council -- Fortune at the bottom of the pyramid (Prahalad) -- Franchising Fraud prevention, detection and auditing -- Free range/cage-free/crate free/ethically raised -- Freedom of conscience -- Freedom of speech -- Friedman, Milton -- FTSE4Good Index -- G20.…”
Libro electrónico -
11145Publicado 2019Tabla de Contenidos: “…-- Computer-Related Liability Problems -- System Quality: Data Quality and System Errors -- Quality of Life: Equity, Access, and Boundaries -- Interactive Session: Technology Volkswagen Pollutes Its Reputation with Software to Evade Emissions Testing -- Interactive Session: People Will Automation Kill Jobs? -- Health Risks: RSI, CVS, and Cognitive Decline -- 4-5 How will MIS help my career? …”
Libro electrónico -
11146Publicado 2020Tabla de Contenidos: “…Hlávka</p> <p>10.1 Introduction to digital security and privacy 235</p> <p>10.2 Security and privacy concerns in healthcare artificial intelligence 237</p> <p>10.3 Artificial intelligence's risks and opportunities for data privacy 245</p> <p>10.4 Addressing threats to health systems and data in the artificial</p> <p>intelligence age 253</p> <p>10.5 Defining optimal responses to security, privacy, and information-sharing</p> <p>challenges in healthcare artificial intelligence 255</p> <p>10.6 Conclusions 263</p> <p>Acknowledgements 264</p> <p>References 265</p> <p>11. …”
Libro electrónico -
11147Publicado 2018Tabla de Contenidos: “…Virtual machine backup and restore -- VM-to-VM affinity rules -- Backup and recovery - embedded deployment model -- Backup and recovery - external deployment model -- Migration architecture design -- Migration process flow -- Migration scheduling -- Migration execution -- Migration validation -- Customer business objectives -- Migrated virtual machine framework -- Responsibility matrix -- Design risks -- IaaS migration portal logical design -- VMware CMP physical design -- VMware Converter Linux migration process -- VMware Converter agent -- Network/security changes -- Port requirements -- Operational readiness for migration -- Pre-migration activities -- P2V migration options -- Hot clone - full outage -- Hot clone - post-synchronisation -- V2V migration options -- V2V conversion -- V2V requirements -- CMP migration process -- Timing estimate (P2V/V2V timing) -- Post-migration activities -- Summary -- Chapter 6: Designing Software-Defined Storage Services -- Software-defined storage overview -- Purpose and applicability to the SDDC solution -- Business requirements -- Requirements and dependencies -- Architecture overview -- Conceptual design -- Logical design -- Virtual SAN (vSAN) -- vSAN design workflow -- Design parameters/considerations for vSAN -- Hardware considerations -- Comparing hybrid and all-flash designs -- SSDs -- Magnetic hard disk drives -- I/O controllers -- Host memory requirements -- Host CPU overhead -- Hardware design decisions -- Network design -- vSAN network port group -- Network speed requirements -- Type of virtual switch -- Jumbo frames -- VLANs -- Networking failover, load balancing, and teaming considerations -- Network design decisions -- vSAN cluster and datastore design -- vSAN disk format -- Disk groups -- Failures to tolerate policy -- Fault domains -- Hosts per cluster…”
Libro electrónico -
11148Publicado 2018Tabla de Contenidos: “…Chapter 9: Stream Processing with Apache Flink -- Introduction to streaming execution model -- Data processing using the DataStream API -- Execution environment -- Data sources -- Socket-based -- File-based -- Transformations -- map -- flatMap -- filter -- keyBy -- reduce -- fold -- Aggregations -- window -- Global windows -- Tumbling windows -- Sliding windows -- Session windows -- windowAll -- union -- Window join -- split -- Select -- Project -- Physical partitioning -- Custom partitioning -- Random partitioning -- Rebalancing partitioning -- Rescaling -- Broadcasting -- Event time and watermarks -- Connectors -- Kafka connector -- Twitter connector -- RabbitMQ connector -- Elasticsearch connector -- Cassandra connector -- Summary -- Chapter 10: Visualizing Big Data -- Introduction -- Tableau -- Chart types -- Line charts -- Pie chart -- Bar chart -- Heat map -- Using Python to visualize data -- Using R to visualize data -- Big data visualization tools -- Summary -- Chapter 11: Introduction to Cloud Computing -- Concepts and terminology -- Cloud -- IT resource -- On-premise -- Cloud consumers and Cloud providers -- Scaling -- Types of scaling -- Horizontal scaling -- Vertical scaling -- Cloud service -- Cloud service consumer -- Goals and benefits -- Increased scalability -- Increased availability and reliability -- Risks and challenges -- Increased security vulnerabilities -- Reduced operational governance control -- Limited portability between Cloud providers -- Roles and boundaries -- Cloud provider -- Cloud consumer -- Cloud service owner -- Cloud resource administrator -- Additional roles -- Organizational boundary -- Trust boundary -- Cloud characteristics -- On-demand usage -- Ubiquitous access -- Multi-tenancy (and resource pooling) -- Elasticity -- Measured usage -- Resiliency -- Cloud delivery models -- Infrastructure as a Service…”
Libro electrónico -
11149Cryptocurrency All-in-One For DummiesCryptocurrency All–in–One For DummiesPublicado 2022Tabla de Contenidos: “…-- Beginning with the Basics of Cryptocurrencies -- The definition of money -- Some cryptocurrency history -- Key crypto benefits -- Common crypto and blockchain myths -- Risks -- Gearing Up to Make Transactions -- Wallets -- Exchanges -- Communities -- Making a Plan Before You Jump In -- Chapter 2 How Cryptocurrencies Work -- Explaining Basic Terms in the Cryptocurrency Process -- Cryptography -- Nodes -- Mining -- Proof of work -- Proof of stake -- Proof of importance -- Transactions: Putting it all together -- Cruising through Other Important Crypto Concepts -- Adaptive scaling -- Decentralization -- Harvesting -- Open source -- Public ledger -- Smart contracts -- Stick a Fork in It: Digging into Cryptocurrency Forks -- What is a fork, and why do forks happen? …”
Libro electrónico -
11150por OECDTabla de Contenidos: “…Environmental performance: Trends and policy developments -- Finland aims to become a model country for environmental sustainability -- Finland met its 2020 renewable energy, energy efficiency and climate targets -- Efforts to strengthen climate resilience are relatively advanced -- Air quality is good, but more could be done to reduce particulate pollution in urban areas -- Accelerated action is needed to make Finland a circular economy leader -- Biodiversity remains at risk -- More needs to be done to reduce water pollution -- 2. …”
Publicado 2022
Libro electrónico -
11151por OECDTabla de Contenidos: “…Policies for prevention, early detection, and tackling risk factors are essential to deal effectively with NCDs in the OECS region…”
Publicado 2022
Libro electrónico -
11152Publicado 2018Tabla de Contenidos: “…-- Public versus private blockchains -- Unexpected security risks -- Security starts at the network architecture level -- Importance of the consensus protocol -- Bugs in the blockchain code -- Manage asset security -- Difference between hot and cold wallets -- Software wallets (desktop and mobile) -- Online or web wallets -- Physical or paper wallets -- Hardware wallets -- Access control -- Reversibility of transactions -- Maintaining privacy on the blockchain -- Maintaining today's level of privacy -- Secure multi-party computation -- Zero-knowledge proofs -- Permissioned blockchain -- Making sense of smart contracts -- What is a smart contract? …”
Libro electrónico -
11153Publicado 2017Tabla de Contenidos: “…Chapter Seven - Life Cycle Assessment of Nanotechnology in Batteries for Electric Vehicles -- 1 - Introduction -- 1.1 - Problem setting and environmental concerns related to nanotechnology -- 1.2 - Life cycle assessments and battery nanotechnology -- 1.3 - Life cycle assessment methodology -- 1.3.1 - Goal and scope definition -- 1.3.1.1 - Goal and scope -- 1.3.1.2 - Functional unit -- 1.3.1.3 - System boundaries -- 1.3.2 - Inventory analysis -- 1.3.3 - Impact assessment -- 1.3.4 - Interpretation -- 2 - Case Study: Use of Nanomaterials in Li-Ion Battery Anodes -- 2.1 - Goal and scope of the analysis -- 2.1.1 - Goal -- 2.1.2 - Scope -- 2.2 - Life cycle inventory of Si nanowire-based batteries and conventional graphite anode-based batteries -- 2.2.1 - Battery characterization -- 2.2.2 - Manufacturing stage -- 2.2.3 - Use stage -- 2.2.4 - End of life -- 3 - Life Cycle Impact Assessment -- 3.1 - Climate change -- 3.2 - Cumulative energy demand -- 3.3 - Human toxicity -- 4 - Discussion and Conclusions -- Glossary -- References -- Chapter Eight - Safety of Rechargeable Energy Storage Systems with a focus on Li-ion Technology -- 1 - Introduction -- 2 - Hazards -- 2.1 - Mechanical/physical hazards -- 2.1.1 - Fire -- 2.1.2 - Explosion -- 2.2 - Electrical hazards -- 2.3 - Chemical hazards -- 3 - Failure Scenarios -- 3.1 - Overheating -- 3.2 - Mechanical deformation -- 3.3 - External short circuit -- 3.4 - Overcharge -- 4 - Risk Mitigation -- 4.1 - Materials selection -- 4.1.1 - Electrodes -- 4.1.1.1 - Cathode materials -- 4.1.1.2 - Anode material -- 4.1.2 - Binders -- 4.1.3 - Separators -- 4.1.4 - Electrolytes -- 4.2 - Protective devices -- 4.3 - System-level approaches -- 5 - Safety Tests -- 5.1 - Thermal tests -- 5.2 - Mechanical tests -- 5.3 - Electrical tests -- 5.4 - Chemical hazards monitoring -- 5.5 - Hazards considerations about safety testing…”
Libro electrónico -
11154por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…DAC members' bilateral development finance institutions -- Notes -- 9 In my view: Reinventing official development assistance: From an Arlequin tapestry to a more inspiring Kandinsky-Kasse moment -- References -- Notes -- 10 In focus: Aid effectiveness in Afghanistan, Mali and South Sudan -- Key messages -- Aid did not make extremely fragile contexts more stable, capable or better governed -- Donors overestimate capacity and underestimate resistance by entrenched elites -- Development co-operation providers must mind the opportunity costs -- Rethink, reset and be realistic about what aid can truly achieve in fragile settings -- Note -- 11 In my view: Funding more proximately is not risky but not doing so is -- In ignoring local resources, the aid system disempowers the very communities it targets -- References -- Notes -- 12 In focus: Enablers of locally led development -- Key messages -- Stronger evidence on the benefits and challenges of locally led development is needed -- Long-term core funding is more likely to foster sustainable outcomes and local ownership -- Localisation also calls for support for diverse partnerships tailored to local conditions -- Providers need to reframe risks, shift institutional culture and build internal capacities -- Some providers are starting to progressively redress power imbalances -- Anticipating how localisation may shift local political and economic dynamics can help avoid common pitfalls…”
Publicado 2023
Libro electrónico -
11155Publicado 2023Tabla de Contenidos: “…-- The API design process -- API security risks and their mitigations -- On-premises APIs versus cloud APIs -- API development in C# -- Web API security with OWASP -- Importance of OWASP adherence in C# API development -- Creating an OWASP-compliant API -- Implementing OWASP-compliant two-factor authentication (2FA) -- OpenID Connect (OIDC) and OAuth 2.0 (OAuth2) -- Summary -- Questions -- Further reading -- Chapter 8: Addressing Cross-Cutting Concerns -- A definition of cross-cutting concerns -- Importance and impact on software development -- Common examples of cross-cutting concerns -- Logging -- Error handling and exception management -- Caching -- Performance optimization -- Transaction management -- Validation -- Auditing and compliance -- Localization and internationalization -- Logging and monitoring…”
Libro electrónico -
11156Publicado 2021Tabla de Contenidos: “…-- Worry More About Fat Tail Risks -- Integrate Economics With Ethical and Moral Judgements -- A Tragedy of Horizons -- No Examples Outside Myth, Archaeology, and Ancient History -- Economic Stories Inform Our Personal and Policy Actions -- Climate Change Models - Their Limitations and Uses -- Models Are Apolitical -- Our Inputs are Not -- Rolling the DICE -- The Discount Rate Problem -- The Intergenerational Inequity Problem: We Value Future Generations - Don't We?…”
Libro electrónico -
11157por OECDTabla de Contenidos: “…Developing a more targeted approach to address priority issues and support at-risk student population groups -- Policy Objective 5.3. …”
Publicado 2022
Libro electrónico -
11158Publicado 2010Tabla de Contenidos: “…What's New in Upgrading SQL Server -- Using the SQL Server Upgrade Advisor (UA) -- Destination: SQL Server 2008 or SQL Server 2008 R2 -- Upgrading Using a Configuration File -- Slipstreaming Upgrades -- Upgrading Other SQL Server Components -- Summary -- 10 Client Installation and Configuration -- What's New in Client Installation and Configuration -- Client/Server Networking Considerations -- Client Installation -- Client Configuration -- Client Data Access Technologies -- Summary -- 11 Security and User Administration -- What's New in Security and User Administration -- An Overview of SQL Server Security -- Authentication Methods -- Managing Principals -- Managing Securables -- Managing Permissions -- Managing SQL Server Logins -- Managing SQL Server Users -- Managing Database Roles -- Managing SQL Server Permissions -- The Execution Context -- Summary -- 12 Data Encryption -- What's New in Data Encryption -- An Overview of Data Security -- An Overview of Data Encryption -- SQL Server Key Management -- Column-Level Encryption -- Transparent Data Encryption -- Column-Level Encryption Versus Transparent Data Encryption -- Summary -- 13 Security and Compliance -- Exposure and Risk -- Across the Life Cycle -- The Security Big Picture -- Identity Access Management Components -- Compliance and SQL Server -- SQL Server Auditing -- Setting Up Auditing via T-SQL -- SQL Injection Is Easy to Do -- Summary -- 14 Database Backup and Restore -- What's New in Database Backup and Restore -- Developing a Backup and Restore Plan -- Types of Backups -- Recovery Models -- Backup Devices -- Backing Up a Database -- Backing Up the Transaction Log -- Backup Scenarios -- Restoring Databases and Transaction Logs -- Restore Scenarios -- Additional Backup Considerations -- Summary -- 15 Database Mail -- What's New in Database Mail -- Setting Up Database Mail…”
Libro electrónico -
11159Publicado 2023Tabla de Contenidos: “…-- Product Backlog Grooming (refinement) -- Summary of Key Points -- Discussion Topics -- Notes -- Part 2 Agile Project Management Overview -- Chapter 5 Agile Development, Quality, and Testing Practices -- Agile Software Development Practices -- Code Refactoring -- Continuous Integration -- Pair Programming -- Test-driven Development -- Extreme Programming (XP) -- Agile Quality Management Practices -- Key Differences in Agile Quality Management Practices -- Definition of "Done" -- The Role of Quality Assurance (QA) Testing in an Agile Project -- Agile Testing Practices -- Concurrent Testing -- Acceptance Test-driven Development -- Repeatable Tests and Automated Regression Testing -- Value-Driven and Risk-based Testing -- Summary of Key Points -- Discussion Topics -- Chapter 6 Time-boxing, Kanban, and Theory of Constraints -- The Importance of Flow -- Small Batch Sizes -- Just-in-time Production -- Concurrent Processing -- Time-boxing -- Time-boxing Advantages -- Additional Time-boxing Productivity Advantages -- The Kanban Process -- Push and Pull Processes -- What Is a Kanban Process? …”
Libro electrónico -
11160Publicado 2024Tabla de Contenidos: “…-- Understanding DDD -- Relationships among Bounded Contexts -- Entities -- Entity-level validation in .NET -- DDD entities in .NET -- Value objects -- Aggregates -- Domain events -- Common DDD patterns and architectures -- Classic layers architecture -- Onion architecture -- Repository pattern -- Unit of work pattern -- Classic repository pattern versus DDD aggregates -- Command Query Responsibility Segregation (CQRS) pattern -- Event sourcing -- Command handlers and aggregate events -- Summary -- Questions -- Further reading -- Chapter 8: Understanding DevOps Principles and CI/CD -- Technical requirements -- Describing DevOps -- Understanding DevOps principles -- CI -- CD -- Risks and challenges when using CI/CD -- Disabling continuous production deployment -- Incomplete features -- An unstable solution for testing -- Continuous feedback -- Tools to facilitate DevOps implementation -- Azure DevOps -- GitHub -- Application Insights -- Test and Feedback -- Summary -- Questions -- Chapter 9: Testing Your Enterprise Application -- Technical requirements -- Understanding unit and integration tests -- Automating unit and integration tests -- Writing automated (unit and integration) tests…”
Libro electrónico