Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 693
- Application software 600
- Engineering & Applied Sciences 492
- Historia 486
- History 440
- Java (Computer program language) 404
- Computer Science 396
- Python (Computer program language) 308
- Computer programming 291
- Classes socials 233
- Web site development 227
- Design 223
- Programming 222
- Història 212
- Microsoft .NET Framework 193
- Education 188
- Management 181
- Web sites 178
- Computer software 177
- Programming languages (Electronic computers) 171
- Clases sociales 170
- Ensenyament 158
- JavaScript (Computer program language) 155
- Computer programs 154
- Object-oriented programming (Computer science) 154
- C# (Computer program language) 151
- Social aspects 138
- C++ (Computer program language) 133
- Social conditions 128
- Software engineering 122
-
12161por Munday, Roderick“…This book explains the Regulations in significant detail and addresses the application of agency principles according to particular classes of commercial agents operating in the major commercial sectors. …”
Publicado 2013
Libro -
12162por Nicholson, Nigel James“…Victory had always involved the use of those in lower classes, such as charioteers, jockeys, and trainers. …”
Publicado 2005
Sumario
Libro -
12163Publicado 2013“…Subsequent chapters address such issues as effective ways of teaching large undergraduate classes, providing support for struggling writers or for students with disabilities, opening up opportunities for students from historically underserved communities, preparing students for the professions, and building bridges between higher education and the wider community. …”
Libro -
12164por Tronto, Joan C. 1952-“…In our society, members of unprivileged groups such as the working classes and people of color also do disproportionate amounts of caring. …”
Publicado 1993
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
12165Publicado 2020“…• Faut-il leur faire sauter une classe ? Entrer au CP avant 6 ans constitue-t-il un bon choix ? …”
Libro -
12166Publicado 2024“…Students across America are disengaged at depressingly high levels; They are continually distracted; and they often see their education as a series of dull and uninspiring classes that they simply must endure. Is there any hope for this bored and distracted generation? …”
Libro -
12167Publicado 2022“…L'ús d'aquest model ha permès estimar i realitzar prediccions de diverses propietats que presenten aquestes estructures, com la probabilitat de mantenir o canviar la seva morfologia durant dues observacions consecutives, l'expectativa d'evolucionar cap a una determinada classe morfològica en algun moment de les seves vides, el temps que romanen a les diferents classes morfològiques a les que evolucionen al llarg de les seves vides, la distribució percentual de grups que moren o s'oculten, i la TOD associada a cada classe morfològica. …”
Accés lliure
Tesis -
12168Publicado 2017Tabla de Contenidos: “…9 1.1.4 FTC June 2015 Guidance on Data Security 11 1.1.5 FTC Protecting Personal Information Guide 14 1.1.6 Lessons from FTC Cybersecurity Complaints 15 1.1.6.1 Failure to Secure Highly Sensitive Information 16 1.1.6.1.1 Use Industry-Standard Encryption for Sensitive Data 16 1.1.6.1.2 Routine Audits and Penetration Testing are Expected 17 1.1.6.1.3 Health-Related Data Requires Especially Strong Safeguards 18 1.1.6.1.4 Data Security Protection Extends to Paper Documents 19 1.1.6.1.5 Business-to-Business Providers also are Accountable to the FTC For Security of Sensitive Data 20 1.1.6.1.6 Companies are Responsible for the Data Security Practices of Their Contractors 22 1.1.6.1.7 Make Sure that Every Employee Receives Regular Data Security Training for Processing Sensitive Data 23 1.1.6.1.8 Privacy Matters, Even in Data Security 23 1.1.6.1.9 Limit the Sensitive Information Provided to Third Parties 24 1.1.6.2 Failure to Secure Payment Card Information 24 1.1.6.2.1 Adhere to Security Claims about Payment Card Data 24 1.1.6.2.2 Always Encrypt Payment Card Data 25 1.1.6.2.3 Payment Card Data Should be Encrypted Both in Storage and at Rest 26 1.1.6.2.4 In-Store Purchases Pose Significant Cybersecurity Risks 26 1.1.6.2.5 Minimize Duration of Storage of Payment Card Data 28 1.1.6.2.6 Monitor Systems and Networks for Unauthorized Software 29 1.1.6.2.7 Apps Should Never Override Default App Store Security Settings 29 1.1.6.3 Failure to Adhere to Security Claims 30 1.1.6.3.1 Companies Must Address Commonly Known Security Vulnerabilities 30 1.1.6.3.2 Ensure that Security Controls are Sufficient to Abide by Promises about Security and Privacy 31 1.1.6.3.3 Omissions about Key Security Flaws can also be Misleading 33 1.1.6.3.4 Companies Must Abide by Promises for Security-Related Consent Choices 33 1.1.6.3.5 Companies that Promise Security Must Ensure Adequate Authentication Procedures 34 1.1.6.3.6 Adhere to Promises about Encryption 35 1.2 State Data Breach Notification Laws 36 1.2.1 When Consumer Notifications are Required 37 1.2.1.1 Definition of Personal Information 37 1.2.1.2 Encrypted Data 38 1.2.1.3 Risk of Harm 39 1.2.1.4 Safe Harbors and Exceptions to Notice Requirement 39 1.2.2 Notice to Individuals 40 1.2.2.1 Timing of Notice 40 1.2.2.2 Form of Notice 40 1.2.2.3 Content of Notice 41 1.2.3 Notice to Regulators and Consumer Reporting Agencies 41 1.2.4 Penalties for Violating State Breach Notification Laws 42 1.3 State Data Security Laws 42 1.3.1 Oregon 43 1.3.2 Rhode Island 45 1.3.3 Nevada 45 1.3.4 Massachusetts 46 1.4 State Data Disposal Laws 49 2 Cybersecurity Litigation 51 2.1 Article III Standing 52 2.1.1 Applicable Supreme Court Rulings on Standing 53 2.1.2 Lower Court Rulings on Standing in Data Breach Cases 57 2.1.2.1 Injury-in-Fact 57 2.1.2.1.1 Broad View of Injury-in-Fact 57 2.1.2.1.2 Narrow View of Injury-in-Fact 60 2.1.2.2 Fairly Traceable 62 2.1.2.3 Redressability 63 2.2 Common Causes of Action Arising from Data Breaches 64 2.2.1 Negligence 64 2.2.1.1 Legal Duty and Breach of Duty 65 2.2.1.2 Cognizable Injury 67 2.2.1.3 Causation 69 2.2.2 Negligent Misrepresentation or Omission 70 2.2.3 Breach of Contract 72 2.2.4 Breach of Implied Warranty 76 2.2.5 Invasion of Privacy by Publication of Private Facts 80 2.2.6 Unjust Enrichment 81 2.2.7 State Consumer Protection Laws 82 2.3 Class Action Certification in Data Breach Litigation 84 2.4 Insurance Coverage for Cybersecurity Incidents 90 2.5 Protecting Cybersecurity Work Product and Communications from Discovery 94 2.5.1 Attorney-Client Privilege 96 2.5.2 Work Product Doctrine 98 2.5.3 Non-Testifying Expert Privilege 101 2.5.4 Applying the Three Privileges to Cybersecurity: Genesco v. …”
Libro electrónico -
12169por Kaufmann, Franz-Xaver“…Hegel’s disciple Lorenz von Stein saw social policy as a means to pacify the capitalist class conflict. After World War II, social policy expanded in an unprecedented way, changing its character in the process. …”
Publicado 2013
Libro electrónico -
12170Publicado 2018“…As with all major paradigm shifts, successful adoption is largely dependent on choosing the right platform and getting to market quickly with a best in class solutions. This book will use Microsoft's Azure Blockchain Workbench to simplify the delivery of world class Blockchain solutions. …”
Libro electrónico -
12171Publicado 2018“…With Google having announced their support for Kotlin as a first-class language for writing Android apps, now's the time learn how to create apps from scratch with Kotlin Kotlin Programming By Example takes you through the building blocks of Kotlin, such as functions and classes. …”
Libro electrónico -
12172por Organisation for Economic Co-operation and Development“…Le PIB par habitant est plus élevé que la moyenne OCDE et le Canada se classe parmi les premiers pays membres de l'Organisation pour ce qui est des compétences des élèves. …”
Publicado 2017
Libro electrónico -
12173Publicado 2017“…Development of applications which use Librados and Distributed computations with shared object classes are also covered. A section on tuning will take you through the process of optimisizing both Ceph and its supporting infrastructure. …”
Libro electrónico -
12174Publicado 2018“…Tips and techniques to build interactive learning into lecture classes Have you ever looked out across your students only to find them staring at their computers or smartphones rather than listening attentively to you? …”
Libro electrónico -
12175Publicado 2017“…Please have a current version of Node.js, the Chrome browser, and Visual Studio Code loaded on your computer before you start the class. Understand how Angular projects are structured Survey TypeScript basics (e.g., classes, interfaces, generics, type definition files, etc.) …”
-
12176Publicado 2019“…Next, you will explore functions and classes - the features that C++ offers to organize a program - and use them to solve more complex problems. …”
Libro electrónico -
12177por Mitchell, Scott“…These features include class support for VBScript, and Regular Expression searching through the use of a COM object. …”
Publicado 2000
Libro electrónico -
12178por Grattan, Nick“…In addition: Build and run applications in Visual C++ 6.0 and eMbedded Visual C++ 3.0 Use the Windows CE API and Microsoft Foundation Classes Communicate via HTTP, TCP/IP, sockets, remote access, and telephony Access standard Windows CE databases and Microsoft SQL Server for Windows CE Interface between desktop systems and Windows CE devices This book is for serious developers with real programming experience. …”
Publicado 2001
Libro electrónico -
12179por McGrath, Sean“…Elegant, easy, powerful and fun, Python helps you build world-class XML applications in less time than you ever imagined. …”
Publicado 2000
Libro electrónico -
12180por Summerfield, Mark“…Coverage includes Developing in Python using procedural, objectoriented, and functional programming paradigms Creating custom packages and modules Writing and reading binary, text, and XML files, including optional compression, random access, and text and XML parsing Leveraging advanced data types, collections, control structures, and functions Spreading program workloads across multiple processes and threads Programming SQL databases and key—value DBM files Debugging techniques–and using Test Driven Development to avoid bugs in the first place Utilizing Python’s regular expression mini-language and module Parsing techniques, including how to use the third-party PyParsing and PLY modules Building usable, efficient, GUI-based applications Advanced programming techniques, including generators, function and class decorators, context managers, descriptors, abstract base classes, metaclasses, coroutines, and more Programming in Python 3, Second Edition, serves as both tutorial and language reference. …”
Publicado 2010
Libro electrónico