Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Organización industrial 1,512
- Management 1,296
- Industrial management 976
- Historia 888
- Industria 815
- Psicología industrial 803
- Mecánica 774
- Seguridad industrial 727
- History 698
- Technological innovations 618
- Psychology, Industrial 613
- Economía 571
- Business & Economics 562
- Artificial intelligence 514
- Calor y frio industrial 513
- Engineering & Applied Sciences 512
- Work 499
- Psicología 481
- Data processing 480
- Industries 480
- Development 465
- Salud ocupacional 460
- Sociología industrial 459
- Política industrial 458
- Economic conditions 448
- Història 422
- Química industrial 419
- Economic aspects 409
- Computer networks 399
- Information technology 395
-
50721por Praetorius, BarbaraTabla de Contenidos: “…Chemische Industrie -- 8.1.4. Fazit -- 8.2. Strukturelle Hemmnisse in der Elektrizitätswirtschaft -- 8.2.1. …”
Publicado 2021
Libro electrónico -
50722Publicado 1995Tabla de Contenidos: “…BLOOD AND BLOOD PRODUCT REGULATION -- Statutory Background -- Biologics Act -- Public Health Service Act -- Blood Shield Laws -- Federal Licensure of Blood Collection Organizations -- Establishment Licensure and Registration -- Product Licensure -- Other Required Licensure -- REGULATORY AUTHORITY OF THE FDA -- Compliance with Regulations -- Recall Policy -- SUMMARY -- REFERENCES -- 3 History of the Controversy -- INTRODUCTION -- THE RISK OF AIDS -- Kaposi's Sarcoma and PCP in Homosexual Men -- Opportunistic Infections Among Heterosexual Intravenous (IV) Drug Users and Haitian Immigrants -- Increased Risk Among Individuals with Hemophilia and a Similarity to Hepatitis B -- Further Evidence of Sexual and Blood-Borne Transmission of AIDS -- Summary -- IMMEDIATE RESPONSES TO EVIDENCE OF BLOOD-BORNE AIDS TRANSMISSION -- The CDC's Public Meeting -- The Blood Bank Community's Statement -- Position of the National Hemophilia Foundation -- Position of the Plasma Fractionation Industry -- Federal Recommendations on the Prevention of AIDS -- Summary and Comment -- RECONSIDERING THE EVIDENCE: FURTHER ATTEMPTS TO FORMULATE POLICIES -- Summary and Comment -- RESEARCH ACTIVITIES -- The Public Health Service Effort -- Isolation of the Virus and Development of a Screening Test -- Summary and Comment -- REFERENCES -- 4 Product Treatment -- INTRODUCTION -- CRITICAL TIME PERIOD: 1970-1983 -- Hepatitis -- Viral Inactivation of AHF Concentrate -- Early Methods -- Studies by U.S. …”
Libro electrónico -
50723por Institute of Medicine (U.S.).Tabla de Contenidos: “…3 The Utilization Management Industry: Structure and Process -- INDUSTRY OVERVIEW -- THE REALITIES OF PRIOR REVIEW: HOW IS IT ACTUALLY DONE? …”
Publicado 1989
Libro electrónico -
50724Publicado 2024Tabla de Contenidos: “…The role of effective communication in cybersecurity success -- Strategies for successful collaboration between technical and non-technical stakeholders -- Translating technical concepts for non-technical stakeholders -- Simplifying complex cybersecurity terminology -- Contextualizing cybersecurity in business terms -- Effective visualization and presentation of cybersecurity data -- Strategies for successful collaboration -- Building cross-functional cybersecurity teams -- Establishing regular cybersecurity workshops and training sessions -- Implementing collaborative cybersecurity decision-making processes -- Summary -- Chapter 11: Building a Cybersecurity-Aware Organizational Culture -- The importance of a cybersecurity-aware organizational culture -- Understanding cybersecurity as a business imperative -- Assessing the risks and costs of cyber threats -- The role of leadership in shaping cybersecurity culture -- Roles and responsibilities of different stakeholders -- Defining stakeholder roles in cybersecurity -- Interdepartmental collaboration in cybersecurity -- Engaging external stakeholders in cybersecurity efforts -- Promoting shared responsibility for cybersecurity -- Creating a culture of cybersecurity awareness -- Building cross-functional cybersecurity teams -- Measuring and reinforcing cybersecurity culture -- Summary -- Chapter 12: Collaborating with Industry Partners and Sharing Threat Intelligence -- The importance of collaboration and threat intelligence sharing -- The imperative for collaborative defense -- Mechanisms of threat intelligence sharing -- Best practices in collaboration and sharing -- Building trust and maintaining confidentiality in information sharing -- Establishing trust among partners -- Maintaining confidentiality in information sharing -- Balancing transparency and confidentiality…”
Libro electrónico -
50725por Abreu, J.
Publicado 2012Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
50726Publicado 2018“…It provides a comprehensive analysis of the lithium value chain, its global business patterns, and implications for South American industrial development. The intended audience includes researchers, policymakers, and industry professionals interested in strategic minerals and regional economic integration…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
50727Publicado 2020“…En un país que se encontraba en pleno desarrollo industrial, aprender dibujo se vinculó con la capacitación de futuros trabajadores, aprendices u obreros. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
50728por Pozo García, JesúsTabla de Contenidos: “…Costes directos, indirectos, gastos generales, beneficio industrial e impuestos -- 7. Presupuestos de ejecución, contratación y licitación -- 8. …”
Publicado 2018
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
50729por Vecino, Carlos
Publicado 2006Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
50730por Jiménez Padilla, BernabéTabla de Contenidos: “…Dibujo en edificación e industrial -- 3. Simbología normalizada en las instalaciones eléctricas -- 4. …”
Publicado 2023
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
50731por ajías de la Vega, Fernando C“…Investigadores Asociados" y contó con el auspicio del Centro Cultural Portales con sede en esa ciudad, así como con el apoyo de las siguientes instituciones: Facultad de Humanidades de la Universidad Mayor de San Andrés de La Paz, Plural Editores, Anden Silver Corporation, Embajada de México, Lloyl Aéreo Boliviano, Compañía Industrial de Tabacos S.A., Banco Mercantil y La Estrella. …”
Publicado 2015
Electrónico -
50732por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…ProChile: Promoting Chilean products abroad -- Build and improve the infrastructure necessary to value chains, and improve industrial/economic zone policies -- Help improve existing value chains and facilitate the building of new chains -- Box 2.3. …”
Publicado 2016
Libro electrónico -
50733Publicado 2015Tabla de Contenidos: “…Cyber Warfare and Targeted Attacks -- Espionage and Sabotage in Cyberspace -- Industrial Espionage -- Operation Aurora -- Watering Hole Attack -- Breaching the Trusted Third Party -- Casting the Lures -- Spear Phishing -- Pharming -- Cross-Site Scripting -- Search Engine Poisoning -- Drive-by Downloads and the Invisible iframe -- Tangled Malvertising Networks -- Malware Delivery Networks -- Fast-Flux Networks -- Explosion of Domain Names -- Abandoned Sites and Domain Names -- Antivirus Software and End-Point Solutions - The Losing Battle -- Summary -- Chapter 5 Malnet Detection Techniques -- Automated URL Reputation System -- Creating URL Training Sets -- Extracting URL Feature Sets -- Classifier Training -- Dynamic Webpage Content Rating -- Keyword Extraction for Category Construction -- Keyword Categorization -- Detecting Malicious Web Infrastructure -- Detecting Exploit Servers through Content Analysis -- Topology-Based Detection of Dedicated Malicious Hosts -- Detecting C2 Servers -- Detection Based on Download Similarities -- Crawlers -- Detecting Malicious Servers with a Honeyclient -- High Interaction versus Low Interaction -- Capture-HPC: A High-Interaction Honeyclient -- Thug: A Low-Interaction Honeyclient -- Evading Honeyclients -- Summary -- Chapter 6 Writing Policies -- Overview of the ProxySG Policy Language -- Scenarios and Policy Implementation -- Web Access -- Access Logging -- User Authentication -- Safe Content Retrieval -- SSL Proxy -- Reverse Proxy Deployment -- DNS Proxy -- Data Loss Prevention -- E-mail Filtering -- A Primer on SMTP -- E-mail Filtering Techniques -- Summary -- Chapter 7 The Art of Application Classification -- A Brief History of Classification Technology -- Signature Based Pattern Matching Classification -- Extracting Matching Terms - Aho-Corasick Algorithm -- Prefi x-Tree Signature Representation…”
Libro electrónico -
50734Publicado 2022“…Diaris, partits polítics i llengües, 1875-1939 estudia el sorgiment del periodisme industrial a Catalunya des del final del Sexenni Democràtic fins a la Guerra Civil. …”
991009670139806719 -
50735Publicado 2005“…Authors El-Ghazawi, Carlson, and Sterling are among the developers of UPC, with close links with the industrial members of the UPC consortium. Their text covers background material on parallel architectures and algorithms, and includes UPC programming case studies. …”
Libro electrónico -
50736por Vernier, Marie-FranceTabla de Contenidos: “…Disasters of economic activity accelerated by the First Industrial Revolution -- 1.1.2. Questions about the capitalist system -- 1.2. …”
Publicado 2024
Libro electrónico -
50737Publicado 2007“…Object-Oriented Design with Applications has long been the essential reference to object-oriented technology, which, in turn, has evolved to join the mainstream of industrial-strength software development. In this third edition--the first revision in 13 years--readers can learn to apply object-oriented methods using new paradigms such as Java, the Unified Modeling Language (UML) 2.0, and .NET. …”
Libro electrónico -
50738por Judd, Mike“…Managers, engineers and technicians will use this book during industrial construction of electronics assemblies, whilst students can use the book to get a grasp of the variety of methods available, together with a discussion of technical concerns. …”
Publicado 1999
Libro electrónico -
50739Publicado 1999“…This book is an essential reference work for the academic and industrial chemists and will provide up-to-date material at the cutting edge of chemistry research.This widely-acclaimed serial contains authoritative reviews that address all aspects of organometallic chemistry, a field which has expanded enormously since the publication of Volume 1 in 1964. …”
Libro electrónico -
50740Publicado 2020“…Engineers, researchers, and students from biomedical engineering and health sciences, as well as industrial professionals, can benefit from this compendium of knowledge about biomechanics applied to the human body…”
Libro electrónico