Mostrando 1,781 - 1,800 Resultados de 2,801 Para Buscar '"Safed"', tiempo de consulta: 0.07s Limitar resultados
  1. 1781
    Publicado 2022
    “…Leverage the power of pure functional programming to improve collaboration, make concurrency safe and easy, and make large code bases manageable. …”
    Libro electrónico
  2. 1782
    Publicado 2023
    “…Readers will also learn how to calibrate the robot, commission it to the end-user, and design a digital twin to test and monitor the entire workcell in a safe simulated environment. Finally, the book delves into hardware, covering how to select and use electric motors and encoders, how to build servo drives and motion controllers, and how to design your own PCBs. …”
    Libro electrónico
  3. 1783
    Publicado 2017
    Tabla de Contenidos: “…9 1.1.4 FTC June 2015 Guidance on Data Security 11 1.1.5 FTC Protecting Personal Information Guide 14 1.1.6 Lessons from FTC Cybersecurity Complaints 15 1.1.6.1 Failure to Secure Highly Sensitive Information 16 1.1.6.1.1 Use Industry-Standard Encryption for Sensitive Data 16 1.1.6.1.2 Routine Audits and Penetration Testing are Expected 17 1.1.6.1.3 Health-Related Data Requires Especially Strong Safeguards 18 1.1.6.1.4 Data Security Protection Extends to Paper Documents 19 1.1.6.1.5 Business-to-Business Providers also are Accountable to the FTC For Security of Sensitive Data 20 1.1.6.1.6 Companies are Responsible for the Data Security Practices of Their Contractors 22 1.1.6.1.7 Make Sure that Every Employee Receives Regular Data Security Training for Processing Sensitive Data 23 1.1.6.1.8 Privacy Matters, Even in Data Security 23 1.1.6.1.9 Limit the Sensitive Information Provided to Third Parties 24 1.1.6.2 Failure to Secure Payment Card Information 24 1.1.6.2.1 Adhere to Security Claims about Payment Card Data 24 1.1.6.2.2 Always Encrypt Payment Card Data 25 1.1.6.2.3 Payment Card Data Should be Encrypted Both in Storage and at Rest 26 1.1.6.2.4 In-Store Purchases Pose Significant Cybersecurity Risks 26 1.1.6.2.5 Minimize Duration of Storage of Payment Card Data 28 1.1.6.2.6 Monitor Systems and Networks for Unauthorized Software 29 1.1.6.2.7 Apps Should Never Override Default App Store Security Settings 29 1.1.6.3 Failure to Adhere to Security Claims 30 1.1.6.3.1 Companies Must Address Commonly Known Security Vulnerabilities 30 1.1.6.3.2 Ensure that Security Controls are Sufficient to Abide by Promises about Security and Privacy 31 1.1.6.3.3 Omissions about Key Security Flaws can also be Misleading 33 1.1.6.3.4 Companies Must Abide by Promises for Security-Related Consent Choices 33 1.1.6.3.5 Companies that Promise Security Must Ensure Adequate Authentication Procedures 34 1.1.6.3.6 Adhere to Promises about Encryption 35 1.2 State Data Breach Notification Laws 36 1.2.1 When Consumer Notifications are Required 37 1.2.1.1 Definition of Personal Information 37 1.2.1.2 Encrypted Data 38 1.2.1.3 Risk of Harm 39 1.2.1.4 Safe Harbors and Exceptions to Notice Requirement 39 1.2.2 Notice to Individuals 40 1.2.2.1 Timing of Notice 40 1.2.2.2 Form of Notice 40 1.2.2.3 Content of Notice 41 1.2.3 Notice to Regulators and Consumer Reporting Agencies 41 1.2.4 Penalties for Violating State Breach Notification Laws 42 1.3 State Data Security Laws 42 1.3.1 Oregon 43 1.3.2 Rhode Island 45 1.3.3 Nevada 45 1.3.4 Massachusetts 46 1.4 State Data Disposal Laws 49 2 Cybersecurity Litigation 51 2.1 Article III Standing 52 2.1.1 Applicable Supreme Court Rulings on Standing 53 2.1.2 Lower Court Rulings on Standing in Data Breach Cases 57 2.1.2.1 Injury-in-Fact 57 2.1.2.1.1 Broad View of Injury-in-Fact 57 2.1.2.1.2 Narrow View of Injury-in-Fact 60 2.1.2.2 Fairly Traceable 62 2.1.2.3 Redressability 63 2.2 Common Causes of Action Arising from Data Breaches 64 2.2.1 Negligence 64 2.2.1.1 Legal Duty and Breach of Duty 65 2.2.1.2 Cognizable Injury 67 2.2.1.3 Causation 69 2.2.2 Negligent Misrepresentation or Omission 70 2.2.3 Breach of Contract 72 2.2.4 Breach of Implied Warranty 76 2.2.5 Invasion of Privacy by Publication of Private Facts 80 2.2.6 Unjust Enrichment 81 2.2.7 State Consumer Protection Laws 82 2.3 Class Action Certification in Data Breach Litigation 84 2.4 Insurance Coverage for Cybersecurity Incidents 90 2.5 Protecting Cybersecurity Work Product and Communications from Discovery 94 2.5.1 Attorney-Client Privilege 96 2.5.2 Work Product Doctrine 98 2.5.3 Non-Testifying Expert Privilege 101 2.5.4 Applying the Three Privileges to Cybersecurity: Genesco v. …”
    Libro electrónico
  4. 1784
    Publicado 2018
    “…It makes the case that our earliest, infantile notion of 'good' and 'bad' is rather founded on experiences which have been 'safe or 'threatening'. More often than not, this is the basis of our moral judgement of others. …”
    Libro electrónico
  5. 1785
    Publicado 2018
    “…In the following chapters, the authors show that procedures like endotracheal intubation, videolaryngoscopy, pericardial puncture, lumbar puncture and percutaneous cholecystostomy, and intra-abdominal pressure monitoring can be safely performed outside the operating room, at the bed of the patient. …”
    Libro electrónico
  6. 1786
    por Otto, Thomas. author
    Publicado 2021
    “…The use of non-standard technologies such as superconductivity, cryogenics and radiofrequency pose challenges for the safe operation of accelerator facilities that cannot be addressed using only best practice from occupational safety in conventional industry. …”
    Libro electrónico
  7. 1787
    Publicado 2022
    “…Indeed, microwave techniques allow, in principle, for information to be obtained directly regarding the physical parameters of the inspected targets (dielectric properties, shape, etc.) by using safe electromagnetic radiations and cost-effective systems. …”
    Libro electrónico
  8. 1788
    Publicado 2014
    “…Using cutting-edge pedagogy and real-life examples, Environmental Management discusses how organizations can pursue sustainable development while ensuring that the environment remains safe for the future generations. Students and practitioners will find the comprehensive and example-oriented treatment of the subject adopted in this book stimulating and rewarding…”
    Libro electrónico
  9. 1789
    Publicado 2011
    “…In order to enrich the knowledge on beneficial and adverse effects of fungicides this book encompasses various aspects of the fungicides including fungicide resistance, mode of action, management fungal pathogens and defense mechanisms, ill effects of fungicides interfering the endocrine system, combined application of various fungicides and the need of GRAS (generally recognized as safe) fungicides. This volume will be useful source of information on fungicides for post graduate students, researchers, agriculturists, environmentalists and decision makers…”
    Libro electrónico
  10. 1790
    por Nuclear Energy Agency
    Publicado 2018
    “…Thorough preparation and planning is key for the success of global decommissioning and dismantling projects, both to minimise delays and undue costs and to ensure a safe and efficient decommissioning process. The aim of this report is to inform regulatory bodies, policy makers and planners about the relevant aspects and activities that should begin during the last years of operation and following the end of operation. …”
    Libro electrónico
  11. 1791
    “…Materials performance is critical to the safe and economic operation of any nuclear system. …”
    Libro electrónico
  12. 1792
    “…This report combines empirical research on the relationship between road infrastructure, inclusive economic development and traffic safety with an assessment of policies and governance structures to help governments find ways to create effective, safe and inclusive transport infrastructures…”
    Libro electrónico
  13. 1793
    Publicado 2016
    “…Currently, the request for atraumatic, short downtime procedures predominates and demonstrates the importance of hi-tech and safe liposculpture and fat transfer, although they cannot totally replace surgical excision methods…”
    Libro electrónico
  14. 1794
    Publicado 2017
    “…Previously, Matt worked at Google, where he wrote the first version of SafeSearch, Google’s family filter, and led the webspam team, where he protected the quality of Google’s search results and answered questions about search engine optimization and ranking algorithms. …”
    Video
  15. 1795
    “…Limit the routes of attack and safely and completely remove all traces of malware and viruses should an infection take place. …”
    Libro electrónico
  16. 1796
    Publicado 2014
    “…Lastly, all salt commands are recorded via an internal "Twitter-like" posting application.In this webcast led by Craig Sebenik you will learn:Pitfalls for running a large infrastructure with 10s of thousands of minions and hundreds of users spread across multiple departments.We had to implement process for rolling out new modules in a safe and controlled manner. There were more than technical challenges; training was huge, as was dealing with the politics of a large organization…”
    Video
  17. 1797
    Publicado 2015
    “…By analyzing data collected by CICS IA, you can make changes to your environment in a safe and controlled but timely manner to address changing demands on your business applications. …”
    Libro electrónico
  18. 1798
    Publicado 2023
    “…Bitcoin encourages users to use as a transfer method of money in a safe and efficient way. Users have access to use Bitcoin without qualification, except that one uses a computer or device for processing. …”
    Libro electrónico
  19. 1799
    por Al-Kuwari, Shaikha H.
    Publicado 2024
    “…It touches upon identity struggles, the notion of not feeling “safe, understood, accepted,” and its relation to Arab American health. …”
    Libro electrónico
  20. 1800
    por Soto Álvarez, Javier. author
    Publicado 2012
    “…Unfortunately, the resources available in our National Health System to cover all the healthcare needs of our society are ever more limited; therefore, it is absolutely necessary to prioritise the allocation of resources and to use these resources to finance the therapeutic options that are most efficacious, safe and cost-effective (that will achieve the best health results in patients with the monetary investment carried out). …”
    Libro electrónico