Mostrando 4,741 - 4,760 Resultados de 4,960 Para Buscar '"Seven"', tiempo de consulta: 0.08s Limitar resultados
  1. 4741
    Publicado 2015
    “…The work includes the texts of the four plenary lectures and three plenary panels and reports of three survey groups, five National presentations, the abstracts of sixty one Regular lectures, reports of thirty seven Topic Study Groups and seventeen Discussion Groups…”
    Libro electrónico
  2. 4742
    por Villareal, Bob
    Publicado 2002
    “…Bob has been developing databases in a large insurance firm for more than 15 years. He has more than seven years' experience of VBA programming in both Access and Excel and has written many tracking and management applications…”
    Libro electrónico
  3. 4743
    Publicado 2023
    “…In this Special Issue, expert researchers in this relevant subject have contributed with seven reviews and eleven original articles to advance our understanding of the CWI pathway by covering different structural, regulatory, and functional aspects in distinct yeasts and filamentous fungi…”
    Libro electrónico
  4. 4744
    Publicado 2022
    “…Chapter four focuses on the analysis of one hundred and twenty-seven LACSP-FPs excerpted from six dictionaries of contemporary Spanish. …”
    Libro electrónico
  5. 4745
    Publicado 2017
    Tabla de Contenidos: “…Visa 102 3 Cybersecurity Requirements for Specific Industries 105 3.1 Financial Institutions: Gramm-Leach-Bliley Act Safeguards Rule 106 3.1.1 Interagency Guidelines 106 3.1.2 Securities and Exchange Commission Regulation S-P 109 3.1.3 FTC Safeguards Rule 110 3.2 Financial Institutions and Creditors: Red Flag Rule 112 3.2.1 Financial Institutions or Creditors 116 3.2.2 Covered Accounts 116 3.2.3 Requirements for a Red Flag Identity Theft Prevention Program 117 3.3 Companies that use Payment and Debit Cards: Payment Card Industry Data Security Standard (PCI DSS) 118 3.4 Health Providers: Health Insurance Portability and Accountability Act (HIPAA) Security Rule 121 3.5 Electric Utilities: Federal Energy Regulatory Commission Critical Infrastructure Protection Reliability Standards 127 3.5.1 CIP-003-6: Cybersecurity - Security Management Controls 127 3.5.2 CIP-004-6: Personnel and Training 128 3.5.3 CIP-006-6: Physical Security of Cyber Systems 128 3.5.4 CIP-007-6: Systems Security Management 128 3.5.5 CIP-009-6: Recovery Plans for Cyber Systems 129 3.5.6 CIP-010-2: Configuration Change Management and Vulnerability Assessments 129 3.5.7 CIP-011-2: Information Protection 130 3.6 Nuclear Regulatory Commission Cybersecurity Regulations 130 4 Cybersecurity and Corporate Governance 133 4.1 Securities and Exchange Commission Cybersecurity Expectations for Publicly Traded Companies 134 4.1.1 10-K Disclosures: Risk Factors 135 4.1.2 10-K Disclosures: Management's Discussion and Analysis of Financial Condition and Results of Operations (MD&A) 137 4.1.3 10-K Disclosures: Description of Business 137 4.1.4 10-K Disclosures: Legal Proceedings 138 4.1.5 10-K Disclosures: Examples 138 4.1.5.1 Wal-Mart 138 4.1.5.2 Berkshire Hathaway 143 4.1.5.3 Target Corp 144 4.1.6 Disclosing Data Breaches to Investors 147 4.2 Fiduciary Duty to Shareholders and Derivative Lawsuits Arising from Data Breaches 150 4.3 Committee on Foreign Investment in the United States and Cybersecurity 152 4.4 Export Controls and the Wassenaar Arrangement 154 5 Anti-Hacking Laws 159 5.1 Computer Fraud and Abuse Act 160 5.1.1 Origins of the CFAA 160 5.1.2 Access without Authorization and Exceeding Authorized Access 161 5.1.2.1 Narrow View of "Exceeds Authorized Access" and "Without Authorization" 163 5.1.2.2 Broader View of "Exceeds Authorized Access" and "Without Authorization" 167 5.1.2.3 Attempts to Find a Middle Ground 169 5.1.3 The Seven Sections of the CFAA 170 5.1.3.1 CFAA Section (a)(1): Hacking to Commit Espionage 172 5.1.3.2 CFAA Section (a)(2): Hacking to Obtain Information 172 5.1.3.3 CFAA Section (a)(3): Hacking a Federal Government Computer 176 5.1.3.4 CFAA Section (a)(4): Hacking to Commit Fraud 178 5.1.3.5 CFAA Section (a)(5): Hacking to Damage a Computer 181 5.1.3.5.1 CFAA Section (a)(5)(A): Knowing Transmission that Intentionally Damages a Computer Without Authorization 181 5.1.3.5.2 CFAA Section (a)(5)(B): Intentional Access Without Authorization that Recklessly Causes Damage 184 5.1.3.5.3 CFAA Section (a)(5)(C): Intentional Access Without Authorization that Causes Damage and Loss 185 5.1.3.5.4 CFAA Section (a)(5): Requirements for Felony and Misdemeanor Cases 186 5.1.3.6 CFAA Section (a)(6): Trafficking in Passwords 188 5.1.3.7 CFAA Section (a)(7): Threatening to Damage or Obtain Information from a Computer 190 5.1.4 Civil Actions under the CFAA 193 5.1.5 Criticisms of the CFAA 195 5.2 State Computer Hacking Laws 198 5.3 Section 1201 of the Digital Millennium Copyright Act 201 5.3.1 Origins of Section 1201 of the DMCA 202 5.3.2 Three Key Provisions of Section 1201 of the DMCA 203 5.3.2.1 DMCA Section 1201(a)(1) 203 5.3.2.2 DMCA Section 1201(a)(2) 208 5.3.2.2.1 Narrow Interpretation of Section (a)(2): Chamberlain Group v. …”
    Libro electrónico
  6. 4746
    Publicado 2018
    “…These papers are complemented by seven additional articles from global authors, providing a comprehensive analysis of the state of the art of Miscanthus research and application…”
    Libro electrónico
  7. 4747
    Publicado 2022
    “…This Special Issue addresses existing knowledge gaps and aids in exploring new approaches, solutions, and applications for opto-electrochemical biosensors in the quantitative detection of disease markers, such as cancer biomarkers proteins and allergens, and pathogenic agents such as viruses. Included are seven peer-reviewed papers that cover a range of subjects and applications related to the strategies developed for early diagnosis…”
    Libro electrónico
  8. 4748
    Publicado 2020
    “…You’ll examine: How a serverless environment enables software architects and programmers to write and use services on the network Basic building blocks of serverless: functions, virtual machines, and elastic runtime environments Seven key elements of serverless platforms, including workflow & orchestration and scaling & reliability The common challenges of building network-based systems that scale well How serverless computing is moving toward additional abstraction and mobility…”
    Libro electrónico
  9. 4749
    Publicado 2021
    “…Jeb Blount, one of the most celebrated trainers and authors of our generation, walks you step-by-step through the seven elements of effective, engaging virtual learning experiences…”
    Grabación musical
  10. 4750
    Publicado 2019
    “…The authors take the complexity and uncertainty of starting a business and distill the critical factors into seven themes: Ideas and Vision, People, Working Effectively, Product, Fundraising, Legal and Structure, and Work and Life Harmony. …”
    Grabación musical
  11. 4751
    Publicado 2023
    “…This award-winning reference is also continually updated on LWW Health Library and VitalSource platforms for the life of the edition.Integrates basic science into individual cancer chapters for more efficient referenceFeatures quarterly updates that include late-breaking developments in oncology such as new drugs and clinical trials, as well as new case studies and interactive algorithmsOffers balanced, multidisciplinary advice from a surgeon, a medical oncologist, and a radiation oncologistProvides updated content on immunotherapy and genetics throughoutIncludes important related topics such as cancer screening and prevention, palliative care, supportive oncology, and quality of life issuesNow available in a convenient single volume, or a seven-multivolume option for portability and ease of use" -- Contracubierta…”
    Libro
  12. 4752
    Publicado 2011
    “…All of these revolutions seemed to converge by the late eighteenth century in Curaçao. The seven contributions in this volume provide new insights in the nature of slave resistance in the Age of Revolutions, the remarkable flows of people and ideas in the late eighteenth-century Caribbean, and the unique local history of Curaçao. …”
    Libro electrónico
  13. 4753
    Publicado 2016
    “…This book is an attempt to highlight recent progresses in the chemical sensors. It is composed of seven chapters and divided into four sections categorized by the working principle of the chemical sensor. …”
    Libro electrónico
  14. 4754
    “…Local Partnerships for Better Governance presents the lessons learnt from the most recent experiences in seven countries: Austria, Belgium, Denmark, Finland, Ireland, Italy and the United States. …”
    Libro electrónico
  15. 4755
    Publicado 2014
    “…He is an AutoCAD Mentor All Star and has been a popular speaker at Autodesk University for more than seven years…”
    Libro electrónico
  16. 4756
    Publicado 2016
    “…A Java expert with nine years of Spring framework experience, Kevin holds a Bachelor's Degree in Information Sciences and Technology from Penn state and is the author of seven O'Reilly titles, including Learning Spring Programming and Spring Data for Java Developers…”
    Video
  17. 4757
    Publicado 2020
    “…After a careful review process, nine articles from six different countries were selected for compilation in this Special Issue: a total of seven full research papers and two reviews. These papers cover a broad range of fundamental and applied research aspects on nanofluid science and development, and reflect the current investigations, knowledge, and challenges encountered in the use of nanofluids for energy applications…”
    Libro electrónico
  18. 4758
    Publicado 2021
    “…This book gathers the contributions to the Special Issue “Layered Double Hydroxides” of Crystals, which includes two review articles and seven research papers…”
    Libro electrónico
  19. 4759
    Publicado 2019
    “…The book explains the seven key principles of category creation, including the importance of creating a community of early adopters who will rally around the problem they all share-especially if someone will lead them…”
    Grabación musical
  20. 4760
    “…The second volume, to be published later this year, expands on the first, considering each of the twenty-seven scenes in depth, providing new insights into not only the frieze, but also South Africa's history…”
    Libro electrónico