Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 151
- History 144
- RELIGION 110
- Leadership 105
- Historia 98
- Development 95
- Application software 66
- Computer networks 63
- Business & Economics 59
- Psychoanalysis 59
- Psychological aspects 58
- Engineering & Applied Sciences 55
- United States 51
- Success in business 50
- Social aspects 49
- Security measures 47
- History and criticism 46
- Computer security 45
- Organizational change 45
- Marketing 44
- Politics and government 44
- Religion 43
- Psychology 42
- Computer software 40
- Strategic planning 39
- Computer Science 38
- Economics 38
- Prevention 38
- Philosophy 37
- Bible 36
-
4741Publicado 2015“…The work includes the texts of the four plenary lectures and three plenary panels and reports of three survey groups, five National presentations, the abstracts of sixty one Regular lectures, reports of thirty seven Topic Study Groups and seventeen Discussion Groups…”
Libro electrónico -
4742por Villareal, Bob“…Bob has been developing databases in a large insurance firm for more than 15 years. He has more than seven years' experience of VBA programming in both Access and Excel and has written many tracking and management applications…”
Publicado 2002
Libro electrónico -
4743Publicado 2023“…In this Special Issue, expert researchers in this relevant subject have contributed with seven reviews and eleven original articles to advance our understanding of the CWI pathway by covering different structural, regulatory, and functional aspects in distinct yeasts and filamentous fungi…”
Libro electrónico -
4744Publicado 2022“…Chapter four focuses on the analysis of one hundred and twenty-seven LACSP-FPs excerpted from six dictionaries of contemporary Spanish. …”
Libro electrónico -
4745Publicado 2017Tabla de Contenidos: “…Visa 102 3 Cybersecurity Requirements for Specific Industries 105 3.1 Financial Institutions: Gramm-Leach-Bliley Act Safeguards Rule 106 3.1.1 Interagency Guidelines 106 3.1.2 Securities and Exchange Commission Regulation S-P 109 3.1.3 FTC Safeguards Rule 110 3.2 Financial Institutions and Creditors: Red Flag Rule 112 3.2.1 Financial Institutions or Creditors 116 3.2.2 Covered Accounts 116 3.2.3 Requirements for a Red Flag Identity Theft Prevention Program 117 3.3 Companies that use Payment and Debit Cards: Payment Card Industry Data Security Standard (PCI DSS) 118 3.4 Health Providers: Health Insurance Portability and Accountability Act (HIPAA) Security Rule 121 3.5 Electric Utilities: Federal Energy Regulatory Commission Critical Infrastructure Protection Reliability Standards 127 3.5.1 CIP-003-6: Cybersecurity - Security Management Controls 127 3.5.2 CIP-004-6: Personnel and Training 128 3.5.3 CIP-006-6: Physical Security of Cyber Systems 128 3.5.4 CIP-007-6: Systems Security Management 128 3.5.5 CIP-009-6: Recovery Plans for Cyber Systems 129 3.5.6 CIP-010-2: Configuration Change Management and Vulnerability Assessments 129 3.5.7 CIP-011-2: Information Protection 130 3.6 Nuclear Regulatory Commission Cybersecurity Regulations 130 4 Cybersecurity and Corporate Governance 133 4.1 Securities and Exchange Commission Cybersecurity Expectations for Publicly Traded Companies 134 4.1.1 10-K Disclosures: Risk Factors 135 4.1.2 10-K Disclosures: Management's Discussion and Analysis of Financial Condition and Results of Operations (MD&A) 137 4.1.3 10-K Disclosures: Description of Business 137 4.1.4 10-K Disclosures: Legal Proceedings 138 4.1.5 10-K Disclosures: Examples 138 4.1.5.1 Wal-Mart 138 4.1.5.2 Berkshire Hathaway 143 4.1.5.3 Target Corp 144 4.1.6 Disclosing Data Breaches to Investors 147 4.2 Fiduciary Duty to Shareholders and Derivative Lawsuits Arising from Data Breaches 150 4.3 Committee on Foreign Investment in the United States and Cybersecurity 152 4.4 Export Controls and the Wassenaar Arrangement 154 5 Anti-Hacking Laws 159 5.1 Computer Fraud and Abuse Act 160 5.1.1 Origins of the CFAA 160 5.1.2 Access without Authorization and Exceeding Authorized Access 161 5.1.2.1 Narrow View of "Exceeds Authorized Access" and "Without Authorization" 163 5.1.2.2 Broader View of "Exceeds Authorized Access" and "Without Authorization" 167 5.1.2.3 Attempts to Find a Middle Ground 169 5.1.3 The Seven Sections of the CFAA 170 5.1.3.1 CFAA Section (a)(1): Hacking to Commit Espionage 172 5.1.3.2 CFAA Section (a)(2): Hacking to Obtain Information 172 5.1.3.3 CFAA Section (a)(3): Hacking a Federal Government Computer 176 5.1.3.4 CFAA Section (a)(4): Hacking to Commit Fraud 178 5.1.3.5 CFAA Section (a)(5): Hacking to Damage a Computer 181 5.1.3.5.1 CFAA Section (a)(5)(A): Knowing Transmission that Intentionally Damages a Computer Without Authorization 181 5.1.3.5.2 CFAA Section (a)(5)(B): Intentional Access Without Authorization that Recklessly Causes Damage 184 5.1.3.5.3 CFAA Section (a)(5)(C): Intentional Access Without Authorization that Causes Damage and Loss 185 5.1.3.5.4 CFAA Section (a)(5): Requirements for Felony and Misdemeanor Cases 186 5.1.3.6 CFAA Section (a)(6): Trafficking in Passwords 188 5.1.3.7 CFAA Section (a)(7): Threatening to Damage or Obtain Information from a Computer 190 5.1.4 Civil Actions under the CFAA 193 5.1.5 Criticisms of the CFAA 195 5.2 State Computer Hacking Laws 198 5.3 Section 1201 of the Digital Millennium Copyright Act 201 5.3.1 Origins of Section 1201 of the DMCA 202 5.3.2 Three Key Provisions of Section 1201 of the DMCA 203 5.3.2.1 DMCA Section 1201(a)(1) 203 5.3.2.2 DMCA Section 1201(a)(2) 208 5.3.2.2.1 Narrow Interpretation of Section (a)(2): Chamberlain Group v. …”
Libro electrónico -
4746Publicado 2018“…These papers are complemented by seven additional articles from global authors, providing a comprehensive analysis of the state of the art of Miscanthus research and application…”
Libro electrónico -
4747Publicado 2022“…This Special Issue addresses existing knowledge gaps and aids in exploring new approaches, solutions, and applications for opto-electrochemical biosensors in the quantitative detection of disease markers, such as cancer biomarkers proteins and allergens, and pathogenic agents such as viruses. Included are seven peer-reviewed papers that cover a range of subjects and applications related to the strategies developed for early diagnosis…”
Libro electrónico -
4748Publicado 2020“…You’ll examine: How a serverless environment enables software architects and programmers to write and use services on the network Basic building blocks of serverless: functions, virtual machines, and elastic runtime environments Seven key elements of serverless platforms, including workflow & orchestration and scaling & reliability The common challenges of building network-based systems that scale well How serverless computing is moving toward additional abstraction and mobility…”
Libro electrónico -
4749Publicado 2021“…Jeb Blount, one of the most celebrated trainers and authors of our generation, walks you step-by-step through the seven elements of effective, engaging virtual learning experiences…”
Grabación musical -
4750Publicado 2019“…The authors take the complexity and uncertainty of starting a business and distill the critical factors into seven themes: Ideas and Vision, People, Working Effectively, Product, Fundraising, Legal and Structure, and Work and Life Harmony. …”
Grabación musical -
4751Publicado 2023“…This award-winning reference is also continually updated on LWW Health Library and VitalSource platforms for the life of the edition.Integrates basic science into individual cancer chapters for more efficient referenceFeatures quarterly updates that include late-breaking developments in oncology such as new drugs and clinical trials, as well as new case studies and interactive algorithmsOffers balanced, multidisciplinary advice from a surgeon, a medical oncologist, and a radiation oncologistProvides updated content on immunotherapy and genetics throughoutIncludes important related topics such as cancer screening and prevention, palliative care, supportive oncology, and quality of life issuesNow available in a convenient single volume, or a seven-multivolume option for portability and ease of use" -- Contracubierta…”
Libro -
4752Publicado 2011“…All of these revolutions seemed to converge by the late eighteenth century in Curaçao. The seven contributions in this volume provide new insights in the nature of slave resistance in the Age of Revolutions, the remarkable flows of people and ideas in the late eighteenth-century Caribbean, and the unique local history of Curaçao. …”
Libro electrónico -
4753Publicado 2016“…This book is an attempt to highlight recent progresses in the chemical sensors. It is composed of seven chapters and divided into four sections categorized by the working principle of the chemical sensor. …”
Libro electrónico -
4754por Organisation for Economic Co-operation and Development.“…Local Partnerships for Better Governance presents the lessons learnt from the most recent experiences in seven countries: Austria, Belgium, Denmark, Finland, Ireland, Italy and the United States. …”
Publicado 2001
Libro electrónico -
4755Publicado 2014“…He is an AutoCAD Mentor All Star and has been a popular speaker at Autodesk University for more than seven years…”
Libro electrónico -
4756Publicado 2016“…A Java expert with nine years of Spring framework experience, Kevin holds a Bachelor's Degree in Information Sciences and Technology from Penn state and is the author of seven O'Reilly titles, including Learning Spring Programming and Spring Data for Java Developers…”
-
4757Publicado 2020“…After a careful review process, nine articles from six different countries were selected for compilation in this Special Issue: a total of seven full research papers and two reviews. These papers cover a broad range of fundamental and applied research aspects on nanofluid science and development, and reflect the current investigations, knowledge, and challenges encountered in the use of nanofluids for energy applications…”
Libro electrónico -
4758Publicado 2021“…This book gathers the contributions to the Special Issue “Layered Double Hydroxides” of Crystals, which includes two review articles and seven research papers…”
Libro electrónico -
4759Publicado 2019“…The book explains the seven key principles of category creation, including the importance of creating a community of early adopters who will rally around the problem they all share-especially if someone will lead them…”
Grabación musical -
4760“…The second volume, to be published later this year, expands on the first, considering each of the twenty-seven scenes in depth, providing new insights into not only the frieze, but also South Africa's history…”
Libro electrónico