Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
11201por Dance, BeverlyTabla de Contenidos: “…Training and Development -- Career Development -- Developing Leaders -- Functional Area 5: Total Rewards -- Key Concepts -- Total Rewards and Organizational Strategy -- Compensation Structure -- Compensation Systems -- Benefits and Perquisites -- Legislation Affecting Compensation and Benefits -- Chapter Review -- Questions -- Answers -- References -- Chapter 5 Organization -- Functional Area 6: Structure of the HR Function -- Key Concepts -- The Strategic Role of HR -- Understanding the Organization -- The HR Organization and Function -- Measuring and Demonstrating HR Value -- HR's Role in Organizational Strategy -- Functional Area 7: Organizational Effectiveness & -- Development -- Key Concepts -- Overview of Organizational Effectiveness and Development (OED) -- Organizational Gap Development -- Implementing OED Initiatives -- Measuring Organizational Effectiveness and Development -- Functional Area 8: Workforce Management -- Key Concepts -- Organizational Workforce Requirements -- Workforce Planning -- The Staffing Plan -- Employee Development -- Succession Planning -- Knowledge Management -- Functional Area 9: Employee & -- Labor Relations -- Key Concepts -- The Employment Relationship -- Third-Party Influences on Employee Relations -- When the Employee Relationship Falters -- Functional Area 10: Technology Management -- Key Concepts -- HR and Technology -- HR in the Era of Big Data -- HR Information Systems -- Policies for Technology Use in the Workplace -- Chapter Review -- Questions -- Answers -- References -- Chapter 6 Workplace -- Functional Area 11: Managing a Global Workforce -- Key Concepts -- The Global Context -- Defining the Global Organization -- Creating a Global Strategy -- Becoming a Multicultural Organization -- Managing Global Assignments -- Navigating the Global Legal Environment -- Functional Area 12: Risk Management…”
Publicado 2023
Libro electrónico -
11202por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…High physical and mental health risks and difficult working hours -- 1.2.2. Low wages, especially for personal care workers -- 1.2.3. …”
Publicado 2023
Libro electrónico -
11203Publicado 2024Tabla de Contenidos: “…4 Conclusion -- References -- Distance learning in the perspective of Sadd al-Żarāi'during the Covid-19 pandemic -- 1 Introduction -- 2 Literature Review -- 3 Methods -- 4 Findings -- 5 Conclusion -- References -- Educational model in Tzu Chi school in terms of multicultural education dimensions -- 1 Introduction -- 2 Methods -- 3 Results -- 4 Discussions -- 5 Conclusion -- References -- Innovative diffusion and social penetration in education: WhatsApp as a medium of communication for thesis guidance between lecturers and students -- 1 Introduction -- 1.1 Diffusion of innovation theory -- 1.2 Social penetration theory -- 2 Methods -- 3 Results and Discussion -- 3.1 Why professors and students should use WhatsApp as a guidance tool -- 3.2 Lecturers and students use WhatsApp as a medium for exchanging information -- 4 Conclusion -- References -- Integration and interconnection between Al-afidah and neurosciences in the human learning process -- 1 Introduction -- 2 Methods -- 3 Findings -- 4 Discussions -- 5 Conclusions -- References -- Shifting education and technology through the lens of constructivism -- 1 Introduction -- 2 Methods -- 3 Results and Discussion -- 4 Conclusion -- References -- A scoping review: Nonsuicidal self-injury during emerging adulthood for a more empathetic understanding -- 1 Introduction -- 2 Research Methods -- 3 Research Findings and Discussion -- 3.1 Factors associated with NSSI and the reasons/motivations for EA engaged in NSSI -- 3.1.1 Risk factors and protective factors of NSSI on emerging adulthood -- 3.2 Implications for the more empathetic support for NSSI on EA based on evidence -- 4 Conclusion -- References -- "The school does not belong to me:" Involving parents in an Islamic boarding school in Indonesia -- 1 Introduction -- 1.1 Islamic boarding school in Indonesia -- 1.2 Parental involvement and Epstein&…”
Libro electrónico -
11204Publicado 2024Tabla de Contenidos: “…Countries have four broad policy levers to finance more resilient health systems -- Policy lever 1: Increase government spending and allocate part of these additional funds to health -- Dependent on the state of public finance, more feasible in countries with low tax burdens and debt levels -- Policy lever 2: Increase allocation to health within existing government budgets -- Dependent on political priorities, but more viable in countries with relatively low allocations to health -- Policy lever 3: Reassess the boundaries between public and private spending -- While this option can free up government resources, it also entails major risks -- Policy lever 4: Find greater efficiency gains -- Can be a politically appealing solution, but requires bold reforms to deliver substantial cost-savings -- These four policy levers are not mutually exclusive -- 1.4. …”
Libro electrónico -
11205Publicado 2024Tabla de Contenidos: “…Mitigating the Downside Risks of a Persona -- Examples -- Bloom Continued -- SensAble Technologies -- Mechanical Water Filtration Systems Persona (B2B) -- Worksheet -- Summary -- Step 6 Full Life Cycle Use Case -- In This Step, You Will: -- Why This Step, and Why Now? …”
Libro electrónico -
11206Publicado 2022Tabla de Contenidos: “…IT Consulting (Internal): Company 1 -- Software Development: (Internal) (No Percentages Provided) -- Telecommunications: Company 1 -- Telecommunications: Company 2 (No Percentages Provided) -- New Product Development -- Automotive Suppliers -- Global Consulting: Company 1 (Not Industry Specific and No Weights) -- Global Consulting: Company 2 (Not Industry specific and No Weights) -- 5.16 USE OF CRISIS DASHBOARDS FOR OUT-OFRANGE VALUE ATTRIBUTES -- 5.17 ESTABLISHING A METRICS MANAGEMENT PROGRAM -- 5.18 USING VALUE METRICS FOR FORECASTING -- 5.19 METRICS AND JOB DESCRIPTIONS -- 5.20 GRAPHICAL REPRESENTATION OF METRICS -- 5.21 CREATING A PROJECT VALUE BASELINE -- The Performance Measurement Baseline -- Project Value Management -- The Value Management Baseline -- Selecting the Value Baseline Attributes -- Overachievement Trends -- Risks of Overachievement -- 6 DASHBOARDS -- CHAPTER OVERVIEW -- 6.0 INTRODUCTION -- 6.1 DOES EVERYONE KNOW WHAT A DASHBOARD REALLY IS? …”
Libro electrónico -
11207Publicado 2017Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
Libro electrónico -
11208por Organization for Economic Cooperation & DevelopmentTabla de Contenidos: “…Decarbonising transport is essential to meet national climate mitigation goals and improve quality of life -- Costa Rica's heavy reliance on road transport has led to rising environmental pressures -- Decarbonising transport requires changes in mobility patterns and land-use planning -- Efforts to electrify transport are welcome, but they should prioritise public transport to help reduce car dependence and avoid regressive impacts -- A large part of the population is exposed to air pollution, posing risks to human health -- Waste management needs to be improved to move towards a circular economy -- Waste infrastructure and services are inadequate to address rising waste flows -- Despite recent progress, barriers to increasing waste recovery remain -- More investment in water infrastructure is urgently needed to deliver access to services and improve water quality -- Improving water quality and reducing high water losses are major challenges -- Investment in water infrastructure lags far behind, and new approaches to financing are needed -- 2. …”
Publicado 2023
Libro electrónico -
11209
-
11210
-
11211por Organisation for Economic Co-operation and Development.“…This Best Practices Guidance addresses compliance and enforcement issues as they relate to pesticides and associated health and environmental risks. The objective of this document is to provide guidance for promoting and monitoring compliance and for assessing and mitigating risks of non-compliance. …”
Publicado 2014
Libro electrónico -
11212
-
11213por National Academies Press“…This report identifies critical climate change risks, research needed to support decision-making relevant to managing these risks, and opportunities for the USGCRP's participating agencies and other partners to advance these research priorities over the next decade…”
Publicado 2021
Libro electrónico -
11214por Kaldor, Mary“…Embraces a broad definition of security that extends beyond the threat of foreign military attack to cover new risks for violence Offers comprehensive coverage framed around key security concepts, risks, policy tools, and global security actors Discusses pressing contemporary issues including terrorism, disarmament, genocide, sustainability, international peacekeeping, state-building, natural disasters, energy and food security, climate change, and cyber warfare Includes insightful and accessible contributions from around the world aimed at a broad base of scholars, students, practitioners, and policymakers…”
Publicado 2014
Libro electrónico -
11215
-
11216por IARC Working Group on the Evaluation of Carcinogenic Risks to Humans.
Publicado 2010Libro electrónico -
11217
-
11218
Libro electrónico -
11219por Itrich-Drabarek, Jolanta“…With thorough analysis of different results and impacts of governmental policies, the authors examine the direction of the global economy after the pandemic ends.The volume:Analyzes the risks and effectiveness of the policy strategies taken by political regimes within states of central Europe;Probes into the changes in the functioning of post-pandemic society, especially the limitations of human rights due to state coercion and corruption risks;Understands issues related to the law-making process, healthcare policy, digitisation of state institutions and key processes carried out by entities of the system of public authority, and the establishment of principles and mechanisms of cooperation between the state and the business environment;Distinguishes the approaches of central and local administrations and of public authorities and citizens to the pandemic phenomenon;Assesses the actions taken by NATO and the national armed forces in the fight against the COVID-19 pandemic, with particular emphasis on the situation in the Visegrad Group countries.A timely study, this will be of great interest to scholars and researchers of political theory, sociology, public health and social care, governance, public policy, security studies and public administration…”
Publicado 2022
Libro electrónico -
11220