Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 74
- Information technology 39
- Computer networks 26
- Security measures 26
- Computer security 24
- Contracting out 21
- Strategic planning 21
- Engineering & Applied Sciences 20
- Business & Economics 19
- Data processing 19
- Subcontratación 19
- Business logistics 18
- Computer Science 18
- Computer software 17
- Development 17
- Business 16
- Business enterprises 15
- Project management 14
- New business enterprises 13
- Management information systems 12
- Marketing 12
- Entrepreneurship 11
- Software engineering 11
- Cloud computing 10
- Economics 10
- Electronic commerce 10
- Examinations 10
- Personnel management 10
- Certification 9
- Commerce 9
-
481por Brown, JasonTabla de Contenidos: “…Applying NIST NICE framework to your organization -- Exploring cybersecurity roles -- Cybersecurity analysts -- Cybersecurity engineers -- Cybersecurity architects -- Cybersecurity compliance specialists -- Head of security -- Exploring cybersecurity architectural frameworks -- SABSA -- TOGAF -- OSA -- Staffing - insourcing versus outsourcing -- Structuring the cybersecurity team -- Summary -- References -- Chapter 6: Risk Management -- Why do we need risk management? …”
Publicado 2023
Libro electrónico -
482por Dudiuk, PedroTabla de Contenidos: “…I Breve descripción de las funciones y opciones de la Solución STRAT-PROI.1 El menú principal; I.2 Las funciones para dar inicio a la definición de un modelo; I.3 Cómo se usan las funciones y opciones del sistema para crear su modelo; I.4 Carga de la información; II La información del bloque de las restricciones; II.1 Las restricciones de capacidad productiva; II.2 Las restricciones estratégicas; II.2.1 El outsourcing; II.2.2 El insourcing; II.2.3 Integración industrial al partner; II.2.4 Políticas comerciales; II.2.4.1 Definición de objetivos comerciales: límites mínimos…”
Publicado 2000
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
483por Paz, Hugo RodolfoTabla de Contenidos: “…7.3 LA NECESIDAD DE INTEGRACIÓN Y LOS COSTOS DE LAS FUNCIONES LOGÍSTICAS7.4 ACTIVIDADES INCLUIDAS EN EL MANAGEMENT DE LA LOGISTICA EMPRESARIA; 7.5 ESTRATEGIA LOGÍSTICA; 7.6 PLANEAMIENTO LOGÍSTICO; 7.7 RELACIÓN ENTRE COSTOS LOGÍSTICOS Y SERVICIO AL CLIENTE; 7.8 SUPPLY CHAIN MANAGEMENT; 7.9 OUTSOURCING: NIVELES DE PRESTACIÓN DE SERVICIOS; CAPÍTULO VIII; 8.1 CONSIDERACIONES GENERALES; 8.2 COSTOS DE LA OPERACIÓN DE INVENTARIOS; 8.3 ADMINISTRACIÓN DE INVENTARIOS; 8.4 MODELOS DETERMINISTICOS DE INVENTARIOS; 8.6 CÁLCULO DEL Q DE SEGURIDAD…”
Publicado 2008
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
484Publicado 2017Tabla de Contenidos: “…/ chapter 9 Protection of personal information: The state’s obligation to guarantee the right to privacy in Indonesia / chapter 10 The enforcement of payment of restitution in criminal proceedings as the base for filing of tort charges / chapter 11 Repeat offence as aggravating circumstances in a criminal case: Differences in the definitions under the Criminal Code (KUHP) and the anti-corruption law / chapter 12 A new paradigm of the justice of outsourcing in Indonesia / chapter 13 Role of fiscal measures in financing responses to the financial crisis in Indonesia and their effects on fiscal sustainability / chapter 14 Abuse of substance, restorative justice and diversion / chapter 15 Waqf shares to create equitable economic distribution in Islam in relation to the Law Number 41 of 2004 on Waqf / chapter 16 Paradox of groundwater tax collection / chapter 17 The concept of a regulation of collateral under the mudharabah financing contract according to the Law No. 21 of 2008 on sharia banking in Indonesia / chapter 18 Mediation as a means to provide ishlah (peace and harmony) in the resolution of sharia banking disputes in Indonesia / chapter 19 Waqf banks under the Indonesian legal system / chapter 20 Presentation of suspects: The paradox of presumption of innocence / chapter 21 The risk of joining the Trans-Pacific partnership for Indonesia: An investment perspective / chapter 22 The establishment of small claims court in Indonesia: Expectation and challenge in encountering the globalisation era / chapter 23 Causation in the context of environmental pollution crime / chapter 24 Public official recruitment system: Towards creation of a rule of law based on Pancasila / chapter 25 A waqf and musyarakah implementation model in takaful ijtima’i as an alternative sharia insurance system: An experiment to maximise the realisation of the social justice principle in sharia insurance in Indonesia / chapter 26 The implementation of Indonesia’s penal sanctions to the increased illegal trade of endangered species / chapter 27 Analysis of the water resource regulation under the ordinance of the Greater Jakarta area / chapter 28 Review of the implementation of murabahah financing in sharia banks in the Greater Jakarta area / chapter 29 Environmental damage and liability in Indonesia: Fancy words under conventional wisdom / chapter 30 Review of the principles of the criminal law on the ancient archipelago law book: The study of the Book of Kutara Manawa Darma Sastra of the Majapahit Kingdom and the Laws on Simbur Tjahaja of the Sultanate of Palembang in the context of criminal law development and condemnation in Indonesia / chapter 31 The existence of arbitration principles in commercial agreements: Lessons learned from an Indonesian court / chapter 32 Cross-border child adoption: Protection and challenges in Indonesia / chapter 33 Electronic identity management in ensuring national cyber security and resilience: Legal aspects of online identity and its secured transaction / chapter 34 The legal impact of the signing of the multilateral competent authority agreement on automatic exchange of financial account information: A banking law perspective / chapter 35 The unfair rules of intellectual property rights section of the trans-pacific partnership agreement…”
Libro electrónico -
485por Sahoo, UmakantaTabla de Contenidos: “…2.1 Background and history2.2 Clinical research industry in Japan; 2.3 The regulatory environment in Japan; 2.4 Evolution of Japanese good clinical practice; 2.5 Global clinical trials in Japan; 2.6 Emerging outsourcing models in Japan; 2.7 Japan's international strategic outlook; 2.8 Future outlook; 3 Clinical research in India; 3.1 Pharmaceutical industry background; 3.2 History of clinical research in India; 3.3 Evolution of clinical research in India; 3.4 Regulatory environment in India; 3.5 Clinical trial approval; 3.6 Difference between ICH-GCP and Indian GCP…”
Publicado 2012
Libro electrónico -
486Publicado 2015Tabla de Contenidos: “…; 2.2 Regulations, legislations, standards and good practice; 2.3 The ISO22301 BCMS family of standards; 2.4 The Business Continuity Institute's good practice guidelines. 2.5 Small and medium size enterprise considerations2.6 Quality assurance; Chapter 3: Business continuity begins at home; Chapter 4: Defining your exercise programme; 4.1 Securing an exercise programme budget; 4.2 Planning your exercises; 4.3 Executing your exercises; 4.4 Post exercise activity; 4.5 Validating outsourced products and services; 4.6 Running unannounced exercises; 4.7 Assessing the costs and risks; Chapter 5: Selected Scenarios; 5.1 Media communications; 5.2 ICT disaster recovery; 5.3 Terrorism; 5.4 Scenario summary; Chapter 6: Live rehearsal case studies. 6.1 From a full dress rehearsal to the real thing inside four months6.2 Guildhall filled with smoke for training exercise; 6.3 Airport simulates runway aircraft collision; 6.4 Rehearsing a 9/11 type scenario 16 years before it happened; 6.5 Sorry, you cannot evacuate the building before lunch is finished!…”
Libro electrónico -
487Publicado 2014Tabla de Contenidos: “…7.1.1 Licensing versus FDI: Rent Dissipation7.1.2 Outsourcing versus FDI: Hold Up Inefficiencies; 7.2 The Property-Rights Approach; 7.3 Empirical Evidence; 8 Conclusion; References; 3 Gravity Equations: Workhorse,Toolkit, and Cookbook; 1 Introduction; 1.1 Gravity Features of Trade Data; 1.2 A Brief History of Gravity in Trade; 2 Micro-Foundations for Gravity Equations; 2.1 Three Definitions of the Gravity Equation; 2.2 Assumptions Underlying Structural Gravity; 2.3 Main Variants of Gravity for Trade; 2.3.1 Demand-Side Derivations; 2.3.2 Supply-Side Derivations…”
Libro electrónico -
488por R M HarrisonTabla de Contenidos: “…2.3 The Kyoto Protocol2.4 Post-Kyoto Protocol; 2.5 Unilateral and Bilateral Initiatives; 2.6 Mobilizing Climate Finance; 3 GHG Emissions Data: Measurement, Reporting and Verification; 3.1 Role of Emissions Inventories; 3.2 Policy and Inventories; 3.3 Sub-national and City Inventories; 3.4 Inventory Verification; 4 Science and Policy Challenges; 4.1 Benchmarks; 4.2 Growth; 4.3 Short-lived Climate Forcing Agents; 4.4 Credibility; 4.5 Political Economy; 4.6 Outsourcing Emissions; 5 The Energy Sector and Technology; 5.1 Technology Types; 5.2 Market Potential and Challenges…”
Publicado 2015
Libro electrónico -
489Publicado 2021Tabla de Contenidos: “…-- Setting up and creating incoming Webhooks -- Sending messages using Webhooks -- Interacting with your Webhooks -- How to use Block Kit -- Building blocks -- Block elements -- Button elements -- Checkbox groups -- Date picker elements -- Image element -- Time pickers -- Types of blocks -- Configuring a Slack API sandbox -- Enter sandbox -- Setting up your sandbox -- Installing Simple IdP -- Summary -- Section 3: How to Build Your Own Bots -- Chapter 10: Building Your Own Bot -- Slackbot versus regular bots -- Creating a bot user -- Building your bot user -- Setting up Events API access -- Bringing the bot to your workspace -- Creating an app -- Building and hosting your bot -- Setting up bot tokens -- Finding the right scope(s) -- Authorizing OAuth permissions -- Putting your bot into action -- Scheduled messages -- Slash commands -- Using existing frameworks -- Block Kit -- The Bolt framework -- Testing and pushing your bot live -- Testing -- Updating -- Summary -- Chapter 11: Building Your Own BotBuying, Building, and Outsourcing Your Bot -- Benefits of building your own Slack bot -- Using external and paid frameworks -- Botkit -- Microsoft Bot Framework -- Amazon Lex -- Benefits of buying your own Slack bot -- Brilliant bots for your workspace -- Understanding the cost and time to outsource a bot -- Finding freelancers -- Using Upwork to hire Slack professionals -- Cost for hiring a Slack professional -- Summary -- Chapter 12: Distributing Your App in the Slack App Directory…”
Libro electrónico -
490Publicado 2022Tabla de Contenidos: “…Near outsourcing -- 4.14.3. Geographically distant outsourcing -- Chapter 5. …”
Libro electrónico -
491Publicado 2013Tabla de Contenidos: “…Chapter 5: The Threat Ecosystem -- The Threat Ecosystem -- The Technical Element -- The Human Element -- The Evolution of the Threat Ecosystem -- Advanced Persistent Threat -- The Attack Method -- The Attack Profitability -- Malware Economy -- Malware Outsourcing -- We've Covered -- Chapter 6: The Malware Factory -- The Need to Evade Antivirus -- Malware Incident Handling Process -- Malware Detection -- Circumventing the Antivirus Product -- The Need for an Army of Malware -- Next-Generation Malware Kits -- Stand-Alone Armoring Tools -- The Impact of an Armored Army of Malware -- The Malware Factory -- The Malware Assembly Line -- The Proliferation of Attacker Tools -- Malware Population Explosion -- We've Covered -- Chapter 7: Infection Vectors -- Infection Vectors -- Physical Media -- E-mail -- Instant Messaging and Chat -- Social Networking -- URL Links -- File Shares -- Software Vulnerabilities -- The Potential of Becoming an Infection Vector -- We've Covered -- Chapter 8: The Compromised System -- The Malware Infection Process -- Installation of Malware Files -- Setting Up Malware Persistency -- Removing Evidence of the Malware Installer -- Passing Control to the Malware -- The Active Malware -- Maintaining the Foothold -- Communicating with the Attacker -- Executing the Payload -- We've Covered -- Part III: The Enterprise Strikes Back -- Chapter 9: Protecting the Organization -- The Threat Incident Responders -- Understanding the Value of the System -- Value to the Organization -- Value to the Attacker -- Understanding the Characteristics of the System -- System Type -- Operational Impact -- Sensitivity of Hosted Data -- Users of the System -- Network Location -- Accessibility to the Asset -- Asset Access Rights -- Recovery -- System Status -- Prioritizing the Systems -- The Organization's Security Posture…”
Libro electrónico -
492Publicado 2014Tabla de Contenidos: “…2.1 La sociedad del conocimiento2.2 Seis sigma; 2.3 Las normas ISO 9000; 2.4 Outsourcing (Tercerizar); 2.5 Benchmarking (Comparación); 2.6 Lean manufacturing (Adelgazamiento); 2.7 El cuadro de mando integral (Balanced scorecard); 2.8 El uso de las tecnologías de información; 2.9 La reingeniería de procesos; 2.10 La administración de procesos de negocios; 2.11 Mapeo y modelado de procesos; 2.12 La cadena de suministros; Capítulo 3. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
493Publicado 2019Tabla de Contenidos: “…Proceeding of The 13th International Conference on Malaysia-Indonesia Relations (PAHMI) -- Frontmatter -- Preface -- TABLE OF CONTENT -- HUMANITIES -- Archeological Study About Burial Tradition of Toraja Ethnic, South Sulawesi, Indonesia -- The Problem of Slogan "Think Globally, Act Locally" -- Oral Literature Iko-Iko: The Remains of the Oral Tradition of Bajo Ethnic in South Sulawesi -- From Inward Looking to Outward Looking: Dynamics of Indonesian Economic Policy during the New Order Era -- 'I am insulted with what you say': Illocutionary Forces behind the Verbal Violence toward Women -- Astro-Linguistics' Tanuang Language: The Formulation of The New Study of Macro Linguistics -- Aizuchi: Politeness Strategy in Japanese Conversation -- Lexicons Classic of Hunting in Minangkabau -- The use of Minangkabau Language between Politeness and Efficiency in Kamang Magek District, Agam Regency -- 'Being Polite when Being Violated': The Analysis of Perlocutionary Act of The Victims of Domestic Violence -- The Use of Slangs in Instagram Among Malaysian Youths -- The Error Analysis on the Usage of Jisei in Sakubun: Case Study of Japanese Language Students of Andalas University -- The Application of Bourdieu's Social Space in Analyzing Literary Works -- Current ICT in Japanese Language Education in Indonesia and its Future Direction -- Politeness in Fuman Hyoumei Speech Act of Japanese in Informal Situation -- Revitalization of Kadang XII Cemetery Decoration Into Achehnese Batik -- The Strategy of Agent of Change in the Diffusion of Storytelling Innovation among Indonesian Youths -- The Learning Strategy for Male and Female Student Based on the Function of Brain Hemisphere -- Endangered Language In Padangpariaman - West Sumatera -- The Discourse Tactics of the Service Companies to Local Outsourcing Workers in West Sumatra Indonesia -- The Event of Arab Islamic American Summit and Trump's Political Discourse -- The Coming of Islam to Minangkabau before the Eyes of the Minangkabause: A Historiographic Study -- Challenges in Handling Stunting for Sustainable Development -- Japanese Gestures and Languages Used in Japan Restaurant Services in West Sumatera -- Beyond The Shady Oil Palm Plantations: Study on the Impacts of Expansion of Oil Palm Plantation on the Culture of Talang Mamak Ethnic Community in Indragiri Hulu Riau -- Adaptation Novel to Film: Contribution Malay Literary -- Inyiak and Marvin Harris Keepers of Tradition Oral And Ecology: Challenges in the Era of Oil Palm Plantation Expansion in West Sumatra -- Self-Concept of Women In Novel Entitled Hanaoka Seishu no Tsuma: A Study of Symbolic Interactionism -- An Ecological Analysis of Indonesian and American Novels: The Representation of Anarchism and Moral Violence -- Children's Revenge on the Bullying Adults in Roald Dahl's Children's Literature -- Indonesian Women's Voices as Seen in Women Author's Novels in 2000s -- Migration and Problem of Identity in Diasporic Novels: And The Mountains Echoed by Khaled Hosseini and Trail of Broken Wings by Sejal Badani -- The Unique Chat of the Multilingual Indonesian Community on Facebook -- Cultural Identity of Ainu In Shizukana Daichi Written By Ikezawa Natsuki -- Fandom Culture in White Raven Community -- Ninik Mamak Role In Reducing Land Conflict Between P.T. …”
Libro electrónico -
494Publicado 2012Tabla de Contenidos: “…Part 3 Current and Continuing Issues In Public Relations -- Chapter 27 Sustainability for Business: A New Global Challenge -- Chapter 28 Environmental Communication: A Matter of Relationships, Trust and Planning -- Chapter 29 Relationship Transformation: Shifting Media Boundaries -- Chapter 30 Reputation Management: Building and Maintaining Reputation through Communications -- Part 4 Industries and Organizations -- Chapter 31 The Automotive Industry: A Race to the Future -- Chapter 32 The Aviation Industry and Civil Aviation: Flying High for Business -- Chapter 33 The Insurance Industry: Reputation Management in Good Hands -- Chapter 34 The Hospitality Industry: Communicating with Our Guests -- Chapter 35 Sports Marketing: Champion Communicators -- Chapter 36 Effective Technology Communications: Innovation that Matters -- Chapter 37 The Entertainment Business: Lights, Cameras, Promotion -- Chapter 38 Health Care: Harmonizing the Healthcare Message -- Chapter 39 The Global Restaurant Industry: Communications Strategies -- Chapter 40 The Retail Industry: Not Your Father's Drugstore -- Chapter 41 The Pharmaceutical Industry: From Promotion to Constituency Relations -- Chapter 42 Consulting, Technology Services and Outsourcing: An Integrated Approach to Marketing and Communications -- Chapter 43 The Financial and Banking Industry: Investing in Our Stakeholders -- Chapter 44 The Food and Beverage Industry: Catering to People's Palates -- Chapter 45 The Oil and Natural Gas Industry: Communicating in a Challenging Environment -- Chapter 46 Internal and External Communications in a Law Firm -- Part 5 Practical Skills And Knowledge -- Chapter 47 Changing Your Own Behavior to Enhance Behavioral Results -- Chapter 48 Creativity: Powering Integrated Marketing Communications Ideas -- Chapter 49 Writing for the Ear: The Challenge of Effective Speechwriting…”
Libro electrónico -
495Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Acronyms & -- Symbols -- Foreword by Tom Glover -- Preface -- Acknowledgements -- Aboutthe Authors -- Chapter 1 Introduction -- Chapter 2 What Drives the Need and the Various Types of Data Centres -- Data Demand versus Compute Efficiency -- Workload Placement -- The Core Components of a Data Centre -- Types of Data Centres -- Entreprise Data Centre -- Colocation -- Public Cloud -- Urban or Edge -- Chapter 3 Site Selection -- Climate -- Access Roads and Airports -- Air Quality -- Likelihood of Natural Disasters -- Ground Conditions -- Communications Infrastructure -- Latency -- Proximity to Subsea Cable Landing Sites -- Density of Fibre Telecommunication Networks Near the Data Centre -- Geopolitical Risks, Laws, and Regulations -- Availability and Cost of Electrical Power -- Natural Resources -- Airport Flight Paths -- Electromagnetic Interference -- Taxes, Regulations, and Incentives -- Incentives -- Know the Stakeholders -- Expect the Unexpected -- Traditional Due Diligence -- Retrofitting Commercial Buildings for Data Centres -- Clusters -- Qualitative Analysis -- Quantitative Analysis -- Chapter 4 IT Operations and the Evolution of the Data Centre -- Beginning of IT Infrastructure -- Bringing Enterprise IT to Maturity -- IT Applications as Standalone Products - The Digital Economy -- Second Iteration of the Internet -- Key Ingredients for Digital Products -- Difference Between Enterprise IT Infrastructure and Hosting Infrastructure -- Commoditisation of IT Infrastructure -- Virtualisation: Servers and Data Centres as Generators for Digital Resources -- Software-as-a-Service: Digital Natives Entering the Enterprise -- Great Outsourcing of Enterprise IT and the Growth of the Colocation Model -- When Digital Products Scale - or the Invention of Hyperscale…”
Libro electrónico -
496Publicado 2019Tabla de Contenidos: “…Ksiazek & Nina Springer -- Theorizing digital journalism: the limits of linearity and the rise of relationships / Jane B. Singer -- Outsourcing censorship and surveillance: the privatization of governance as an information control strategy in the case of Turkey / Aras Coskuntuncel -- Epilogue: situating journalism in the digital: a plea for studying news flows, users, and materiality / Marcel Broersma…”
Libro -
497Tabla de Contenidos: “…Incident Response Plan -- Purpose and Scope -- Strategies, Goals, and Approach to Incident Response -- Internal and External Communication Plan -- Plan for the Incident Response Capability 2 -- Measurement of Incident Response Capability and its Effectiveness -- Integration with the Other Plans of the Organization -- Incident Response Processes -- Incident Response Teams -- Incident Response Team structuring based on distribution of the Responsibilities -- Centralized Incident Response Teams 2 -- Distributed Incident Response Teams 2 -- Hybrid Incident Response Teams -- Incident Response Team Structuring Based on who Constitutes the Teams -- Fully Employee Constituted Incident Response Teams -- Fully Outsourced Incident Response Teams -- Hybrid Teams: Partially Constituted by Employees and Partially Constituted by Outsourced Contractors -- Ensuring Effectiveness of Incident Response -- Preparation 2 -- Incident Detection 2 -- Precursors and Indicators of Incidents 2 -- Sources of Precursors and Indicators -- Analysis of the Incidents: 2 -- Incident Im pact Analysis and Prioritization of the Actions 2 -- Incident Documentation and Incident Notification 2 -- Incident Containment, Eradication, and Recovery 2 -- Containment Strategy 2 -- Evidence Gathering and Handling 2 -- Eradication and Recovery 2 -- Post Incident Analysis and Activities 2 -- Analysis of Learnings -- Use of Incident Data 2 -- Disaster Recovery and Business Continuity -- How to Approach Business Continuity Plan -- Assign Clear Roles and Responsibilities -- Sponsor -- Project Manager -- Business Continuity Planning Team -- Life Cycle of Business Continuity Planning -- Scoping -- Plan for Formulation of Business Continuity Plan -- Business Continuity Plan Kick-Off Meeting -- Business Impact Analysis (BIA) -- Business Continuity Plan Preparation…”
Libro electrónico -
498Publicado 2024Tabla de Contenidos: “…-- Key components of effective implementation patterns -- Choosing the right pattern -- Understanding transformation implementation patterns -- Dedicated platform team -- Embedded teams -- Outsourced teams…”
Libro electrónico -
499por Pérez Chávez, JoséTabla de Contenidos: “…Obligaciones de los contribuyentes que expiden CFDI -- a) Contar con un certificado de e.firma vigente -- b) Tramitar ante el SAT el certificado para el uso de los sellos digitales -- Generación del CSD -- c) Requisitos que deben reunir los CFDI -- Arrendamiento (renta de casas, terrenos, oficinas o locales comerciales) -- Contribuyentes autorizados por el SAT a recibir donativos o donatarias por disposición legal -- Servicios de outsourcing -- Panaderías -- Servicios profesionales -- Veterinarios -- Servicios hospitalarios -- Servicios de consulta médica, general y especialidades -- Instituciones educativas, colegiaturas y servicios de impartición de clases -- Generación de CFDI -- d) Remisión del CFDI al SAT -- Opción para contratar servicios de uno o más proveedores de certificación de CFDI -- e) Entrega o envío de CFDI a clientes -- Requisitos de las representaciones impresas de los CFDI -- Almacenamiento de CFDI -- f) Cumplir con especificaciones en materia de informática -- 2. …”
Publicado 2019
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
500Publicado 2021Tabla de Contenidos: “…Data Custodian/Processor -- Regulatory Transparency Requirements -- Risk Treatment -- Risk Frameworks -- Metrics for Risk Management -- Assessment of Risk Environment -- Understanding Outsourcing and Cloud Contract Design -- Business Requirements -- Vendor Management -- Contract Management -- Supply Chain Management -- Summary -- Index -- EULA…”
Libro electrónico