Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Terrorismo 334
- Terrorism 301
- Historia 218
- Prevention 129
- History 107
- Política y gobierno 78
- Cuentos de terror 61
- Politics and government 56
- Història 52
- Terrorisme 51
- Cine de terror 46
- National security 46
- Islam 43
- Política 42
- Security measures 42
- Psychological aspects 41
- Political aspects 39
- Social aspects 36
- Violence 36
- Violencia política 36
- Government policy 35
- Political Science 35
- Derecho internacional 34
- War on Terrorism, 2001-2009 34
- Historia y crítica 33
- Guerra 32
- Foreign relations 31
- Aspectos religiosos 30
- Derechos humanos 30
- International relations 30
-
3441por Druta, GianinaTabla de Contenidos: “…Preliminary considerations -- 1.2.1 At the crossroads of history -- 1.2.2 Territorial fluidity -- 1.2.3 Cultural influences -- 1.3 Previous research on Henrik Ibsen's presence on the Romanian stage -- 1.4 Dataset -- 1.5 Periodization and patterns revealed by the data -- 1.5.1 Periodization -- 1.5.2 Patterns -- Part Two -- 2.1 The appropriation of foreign cultural models in the reception to Henrik Ibsen in Romania -- 2.2 The French model -- 2.2.1 French Ibsen tours in Romania -- 2.2.1.1 Andre Antoine, 1894 -- 2.2.1.2 Gabrielle Rejane, 1897 -- 2.2.1.3 Suzanne Despres and Aurelien‐Marie Lugne‐Poe, 1906-1912 -- 2.2.1.3.1 Lugne‐Poe and the Romanian‐French theatrical "chemistry" -- 2.2.2 Final remarks -- 2.3 The Italian model -- 2.3.1 A realist overlapping: Ermete Zacconi and Alfredo de Sanctis as Osvald -- 2.3.1.1 The Italian intertwining of acting practices -- 2.3.1.2 Ermete Zacconi and the Ibsen "terror" -- 2.3.1.3 Alfredo de Sanctis and his Ibsenian family -- 2.3.2 Emma Gramatica. …”
Publicado 2024
Libro electrónico -
3442Publicado 2015Tabla de Contenidos: “…Security Monitoring -- Policy Whitelisting -- Application Whitelisting -- Common Misperceptions About Industrial Network Security -- Assumptions Made in This Book -- Summary -- Chapter 3 - Industrial Cyber Security History and Trends -- Information in this Chapter -- Importance of Securing Industrial Networks -- The Evolution of the Cyber Threat -- APTs and Weaponized Malware -- Night Dragon -- Stuxnet -- Advanced Persistent Threats and Cyber Warfare -- Still to Come -- Defending Against Modern Cyber Threats -- The Insider -- Hacktivism, Cyber Crime, Cyber Terrorism, and Cyber War -- Summary -- Chapter 4 - Introduction to Industrial Control Systems and Operations -- Information in this Chapter -- System Assets -- Programmable Logic Controller -- Ladder Diagrams -- Sequential Function Charts -- Remote Terminal Unit -- Intelligent Electronic Device -- Human-Machine Interface -- Supervisory Workstations -- Data Historian -- Business Information Consoles and Dashboards -- Other Assets -- System Operations -- Control Loops -- Control Processes -- Feedback Loops -- Production Information Management -- Business Information Management -- Process Management -- Safety Instrumented Systems -- The Smart Grid -- Network Architectures -- Summary -- Chapter 5 - Industrial Network Design and Architecture -- Information in this Chapter -- Introduction to Industrial Networking -- Common Topologies -- Network Segmentation -- Higher Layer Segmentation -- Physical vs. …”
Libro electrónico -
3443Publicado 2019Tabla de Contenidos: “…Part III Informing Models with Theory and Data -- Chapter 13 Integrating Computational Modeling and Experiments: Toward a More Unified Theory of Social Influence -- Introduction -- Social Influence Research -- Opinion Network Modeling -- Integrated Empirical and Computational Investigation of Group Polarization -- Group Polarization Theory -- Frame‐Induced Polarization Theory -- Accept‐Shift‐Constrict Model of Opinion Dynamics -- Experiment and Results -- Integrated Approach -- Conclusion -- Acknowledgments -- References -- Chapter 14 Combining Data‐Driven and Theory‐Driven Models for Causality Analysis in Sociocultural Systems -- Introduction -- Understanding Causality -- Ensembles of Causal Models -- Case Studies: Integrating Data‐Driven and Theory‐Driven Ensembles -- Letting the Data Speak: Additive Noise Ensembles -- Choosing Data‐Driven Approaches Using Theory -- Parameterizing Theory‐Driven Models Using Data -- Theory and Data Dialogue -- Conclusions -- References -- Chapter 15 Theory‐Interpretable, Data‐Driven Agent‐Based Modeling -- The Beauty and Challenge of Big Data -- A Proposed Unifying Principle for Big Data and Social Science -- Data‐Driven Agent‐Based Modeling -- Parameter Optimization -- News Consumption -- Urgent Diffusion -- Rule Induction -- Commuting Patterns -- Social Media Activity -- Conclusion and the Vision -- Acknowledgments -- References -- Chapter 16 Bringing the Real World into the Experimental Lab: Technology‐Enabling Transformative Designs -- Understanding, Predicting, and Changing Behavior -- Social Domains of Interest -- Preventing Disease -- Harm Mitigation in Crises -- Terrorism Reduction and Lone Actors -- The SOLVE Approach -- Overview of SOLVE -- Shame Reduction as a Key Intervention -- Intelligent Agents in Games -- Generalizing Approach: Understanding and Changing Behavior Across Domains…”
Libro electrónico -
3444Publicado 2022Tabla de Contenidos: “…10.3.3 Fear and Avoidance Strategies -- 10.3.4 Indifferentism and Renunciation Strategies -- 10.4 Contextual Factors -- 10.4.1 Historical Factors -- 10.4.2 Trigger Factors -- 10.4.3 Public Opinion -- 10.4.4 Mainstream Christian Churches -- 10.4.5 Media -- 10.4.5.1 Portrayal of Jews and Muslims -- 10.4.5.2 Media and the Case of the 'Third Gaza War' -- 10.4.6 National and Local Governments -- 10.4.6.1 Support for Jewish-Muslim Dialogue and Cooperation -- 10.4.6.2 Equal and Unequal Treatment -- 10.4.6.3 The Treatment of Muslims in Anti-radicalisation and Anti-terrorism Policy -- Notes -- References -- Media Articles -- Publications -- Internet sources -- 11. …”
Libro electrónico -
3445por Flora, S. J. S.Tabla de Contenidos: “…Fish toxin -- Tetrodotoxin -- Plant toxins -- Abrin -- Ricin -- Conclusion -- References -- Further Reading -- Chapter 4: Viral agents including threat from emerging viral infections -- Introduction -- Biological warfare agents as a means of terrorism -- Viruses as biological warfare agents -- Historical perspectives -- Viral biological warfare agents -- Variola virus -- Influenza virus -- Filoviruses -- Flaviviruses -- Hantaviruses -- Nipah virus -- Identification of signs of viral attack -- Detection techniques for viral biological warfare agents -- Impact of viral bioterrorism -- Future perspectives -- Conclusion -- References -- Further Reading -- Chapter 5: Advance detection technologies for select biothreat agents -- Introduction -- Bio-detection technologies -- Culture -- Immunological assays -- Immunochromatographic test (ICT) -- Lateral flow rapid strip test -- Flow through spot test -- Molecular assays -- Polymerase chain reaction (PCR) -- Real-time RT-PCR -- Isothermal gene amplification assays -- Next-generation sequencing (NGS) technology -- Biomonitoring -- Aerosol detection technologies -- Sensor technologies -- Nanomaterials biosensors -- Instrumental technologies -- Mass spectrometry -- Raman chemical imaging -- Biodetectors -- Commercially available biodetectors -- Conclusion -- References -- Chapter 6: Microfluidics application for detection of biological warfare agents -- Introduction -- Biological weapons -- Pathogens involved in bioterrorism -- Planning and response -- Preparedness -- Available systems for bioterrorism -- Immunoassays -- Proteomic approaches -- Nucleic acid amplification and detection methods -- Bio-warfare agents monitoring -- Civilian biodefense -- Microfluidic applications in biodefense -- Military biodefense -- Microfluidics -- Types of microfluidics -- Continuous flow microfluidics -- Mixing -- Separation…”
Publicado 2020
Libro electrónico -
3446por Arlt, RobertoTabla de Contenidos: “…(19 de noviembre) -- Feliz historia de un fabricante de aplausos (23 de noviembre) -- Allí vive el crustáceo lunar (28 de noviembre) -- "Señores: soy el 'doble' de Hitler" (4 de diciembre) -- Copetudos del nazismo en el destierro (6 de diciembre) -- Terror nazi entre los morochos de Liberia (9 de diciembre) -- Ciudades debajo del mar (15 de diciembre) -- Vida de galeotes (20 de diciembre) -- Eróstrato visita a un irresponsable (24 de diciembre) -- Dos personajes de Noel Coward (26 de diciembre) -- 1940 -- Se necesita un par de verdugos (3 de enero) -- No por amor visitará Macdonald a Modjadji (5 de enero) -- ¿Volverá a ser reelegido el dinámico petiso? …”
Publicado 2023
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
3447Publicado 2024Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Dedication Page -- Contents -- Section I Cyber Operations Introduction -- I.1 Phases of Cyber Operations -- I.1.1 1980s-2002 -- I.1.2 2003-2012 -- I.1.3 2013-present -- Chapter 1 Cyber Operations -- 1.1 Cyber Operations Introduction -- 1.1.1 Cyber - A 21st-Century Collection Channel -- 1.1.2 Hackers - Pre-Cyber Operations -- 1.1.3 Cyber and Counter-Terror/Insurgency -- 1.2 Early Internet and Cyber Operations -- 1.2.1 Maturing of Cyber Operations - ISIS and Russia -- 1.2.2 ISIS Cyber Operations -- 1.2.3 Russian Cyber Operations -- 1.3 Cyber Operations' Stage Descriptions -- 1.3.1 Stage I (late 1990s-~2010)(Community Development) -- 1.3.2 Stage II (~2010-~2015)(Tactical) -- 1.3.3 Stage III (~2015 to present)(Tactical and Strategic) -- 1.4 Cyber Operations Wrap-up -- Bibliography -- Chapter 2 ISIS and Web-Based Insurgency -- 2.1 Introduction -- 2.1.1 Terrorist Development of the Internet for Messaging -- 2.1.2 ISIS Adaptation of the Internet for Coordination, Command and Control (C2) -- 2.1.3 ISIS "Emergence" from Cyberspace to form a State -- 2.2 Cyber-Based Irregular Operations -- 2.2.1 Three-Phase Insurgency Model with Cyber - ISIS Example -- 2.2.2 ISIS Insurgency Phases -- 2.2.3 Counter-ISIS Operations in Cyber -- 2.3 ISIS and Web-Based Insurgency Wrap-up -- Bibliography -- Chapter 3 Cyber and Crime -- 3.1 Cyber and Crime -- 3.1.1 Cybercrime Definitions -- 3.1.2 Crimes Against Individuals -- 3.1.2.1 Cyber-Fraud Reporting -- 3.1.2.2 Spam -- 3.1.2.3 Phishing -- 3.1.3 Crimes Against Organizations -- 3.1.3.1 Telephony Phishing -- 3.1.3.2 Ransomware Introduction -- 3.1.3.3 Ransomware Tools Background -- 3.1.3.4 Ransomware as a Service -- 3.1.3.5 Cryptocurrency -- 3.1.4 Cyber Gangs - Membership Analogy to Organized Crime -- 3.1.5 Cybercrime Wrap-Up -- Bibliography -- Chapter 4 Nation-State Cyber Operations…”
Libro electrónico -
3448por Bobbio, NorbertoTabla de Contenidos: “…La paz: el concepto, el problema, el ideal -- El problema de la definición -- Paz negativa y positiva -- La paz como valor -- El ideal de la paz perpetua -- Pacifismo institucional y pacifismo ético -- El equilibrio del terror -- El Tercero para la paz -- II. Relaciones internacionales y marxismo -- III. …”
Publicado 2003
Libro electrónico -
3449por Varma, SumatiTabla de Contenidos: “…Cover -- About the Author -- Brief Contents -- Contents -- Preface -- The Development of this Book -- Unit I: Foundations -- Chapter 1: Globalization and International Business -- Introduction -- Elements of Globalization -- Economic Globalization -- Cultural Globalization -- Political Globalization -- Drivers of Globalization -- Political Forces -- Economic Forces -- Technological Forces -- Industry Focus: Social Networking -- Emergence of Global Governance -- Competitive Forces -- Region Focus: Civets -- International Orientations -- Ethnocentric Orientation -- Polycentric Orientation -- International Business in Action: Multi-Latinas -- Regiocentric Orientation -- Geocentric Orientation -- International Versus Domestic Business -- Motives for Internationalization -- Two Decades of Shifting Wealth -- The Globalization Debate -- Arguments in Support of Globalization -- Concerns with Respect to Globalization -- Managerial Implications: Managing a Global Enterprise -- Terrorism -- Corruption -- Cultural Adjustment -- Closing Case: The Japanese Road to Success -- Summary -- Key Terms -- Discussion Questions -- Mini Projects -- Endnotes -- Chapter 2: Globalization of Business Structures: The Transnational Corporation -- Introduction -- Transnational Corporations -- TNCs from Developed and Developing Countries -- Non-Equity Modes of International Production -- Transnationality of Firms -- Changing Face of TNCs -- Evolution of TNCs -- Dragon TNCs -- Born Globals -- Industry Focus: Accelerated Internationalization of the White Goods Sector -- Global Niche Players -- Micro TNCs -- State-owned TNCs -- International Business in Action: Changing Face of the Family Business in the Middle East -- Theories of Firm Internationalization -- Closing Case: Globalization of the Brazilian Enterprise -- Summary -- Key Terms -- Discussion Questions -- Mini Projects…”
Publicado 2012
Libro electrónico -
3450Publicado 2022Tabla de Contenidos: “…Sources -- Literature -- Websites -- 4 The Democratic Republic of Congo's Chairmanship of the African Union -- 1 A Particular Political Context -- 2 The DRC and the African Union -- 3 Covid-19 Response and Controversy -- 4 Chairmanship Theme and Initiatives -- 5 Other Key Issues and Dynamics -- 5.1 Terrorism in Africa -- 5.2 Israel-Africa Relationship -- 5.3 Grand Ethiopian Renaissance Dam Mediation and Wider Horn of Africa Dynamics -- 5.4 Climate: COP26 -- 6 Representation and Diplomacy -- 7 Regional Focus -- 8 Conclusions -- Sources -- Literature -- Part 2 African Union Policy Fields -- 5 Education, Science and Technology -- 1 Introduction -- 2 Fact and Figures about EST in Africa -- 3 AU Coordination of EST Policies -- 4 EST Policy Initiatives -- 4.1 Continental Education Strategy for Africa (2016-2025), CESA 16-25 -- 4.2 Science, Technology and Innovation Strategy for Africa (STISA 2024) -- 4.3 Continental Strategy for Technical and Vocational Education and Training (TVET) -- 4.4 Pan African University (PAU) -- 4.5 Digital Transformation Strategy for Africa (DTS 2020-2030) -- 4.6 African Space Policy and Space Strategy -- 4.7 Ratification of Legal EST Instruments -- 5 Outlook: EST in Context - Arts, Culture and Heritage -- Sources -- Literature -- Websites -- 6 Governance -- 1 Africa's Regional Governance Initiative: The African Governance Architecture -- 2 Dominant Actors in the Governance Realm -- 3 Key Developments -- 4 Covid-19 Setbacks -- 4.1 Postponement of Elections -- 4.2 Linking Governance with Security -- 5 AU/REC s Division of Labour in Governance -- 6 Gender and Governance -- 7 Youth and Governance -- 8 Cooperation and Partnerships for Enhancing Governance -- 9 Governance Outlook in 2022 -- Sources -- Literature -- Websites -- 7 Health -- 1 Introduction -- 2 2021 Africa Health Facts and Figures…”
Libro electrónico -
3451por Oehmer-Pedrazzi, FranziskaTabla de Contenidos: “…Content Analysis in the Research Field of Political Coverage -- 1 Introduction -- 2 Trends in the Field -- 3 Common Research Designs and Results -- 4 Political News Content -- 5 Effects of Political (News) Content -- 6 Limitations of the Method & -- Future Direction of the Field -- References -- Content Analysis in the Research Field of Transnational Public Spheres -- 1 Introduction -- 2 Research Designs -- 3 Main Constructs -- 4 Desiderata -- References -- Content Analysis in the Research Field of Election (Campaign) Coverage -- 1 Introduction -- 2 Frequent Research Designs -- 3 Main Constructs -- 4 Research Desiderata -- References -- Content Analysis in the Research Field of War Coverage -- 1 Introduction -- 2 Theoretical Approaches and Frequent Research Questions in Content Analyses on War Coverage -- 3 Common Research Designs and Combinations of Methods -- 4 Main Results for Relevant Variables and Constructs in War Coverage -- 5 Research Desiderata -- References -- Content Analysis in the Research Field of Terrorism Coverage -- 1 Introduction -- 2 Common Research Designs and Combinations of Methods -- 3 Main Constructs -- 4 Research Desiderata -- References -- Die Inhaltsanalyse im Forschungsfeld der Justiz- und Kriminalitätsberichterstattung -- 1 Einleitung -- 2 Trends inhaltanalytischer Studien zur Justizberichterstattung -- 3 Zentrale Konstrukte inhaltanalytischer Studien zur Justizberichterstattung -- 3.1 Wissen über Justiz & -- Stil der Berichterstattung -- 3.2 Merkmale der berichteten Gerichtsprozesse. -- 3.3 Darstellung der Prozessbeteiligten -- 4 Forschungsdesiderata -- Literatur -- Content Analysis in the Research Field of Economic News Coverage -- 1 Introduction -- 2 Frequent Research Designs and Combination of Methods -- 3 Constructs and Main Results -- 4 Research Desiderata -- References…”
Publicado 2022
Libro electrónico -
3452por Ramos Ramos, PalomaTabla de Contenidos: “….) -- EL MIEDO EN LA INFANCIA -- LAS FOBIAS INFANTILES -- LOS TERRORES NOCTURNOS EN LA INFANCIA -- CLASIFICACIÓN DE LOS TRASTORNOS DE ANSIEDAD (...) -- EVALUACIÓN DE LOS TRASTORNOS DE ANSIEDAD (...) -- TRATAMIENTO DE LOS TRASTORNOS DE ANSIEDAD (...) -- LO QUE HEMOS APRENDIDO -- TEST…”
Publicado 2018
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
3453Publicado 2016Tabla de Contenidos: “…4.7.2 - Decongestants -- 4.7.3 - Weight loss pills -- 4.7.4 - Nicotine -- 4.7.5 - Alcohol -- 4.8 - Sleeping environment -- 4.9 - Pain -- 4.10 - Diet -- 4.11 - Naps -- 4.12 - Body posture -- 4.13 - Exercise -- 4.14 - Age -- References -- Chapter 5 - Sleep disorders -- 5.1 - Sleep apnea -- 5.2 - Insomnia -- 5.3 - Narcolepsy -- 5.4 - Restless leg syndrome (RLS)/Willis-Ekbom disease (WED) -- 5.5 - Shift work disorder -- 5.6 - Sleep-wake phase disorders -- 5.6.1 - Advanced sleep-wake phase disorder (ASWPD) -- 5.6.2 - Delayed sleep-wake phase disorder (DSWPD) -- 5.7 - Parasomnias -- 5.7.1 - Non-REM parasomnias: sleepwalking, sleep-related eating, sleep violence, sleep sex, night terrors -- 5.7.2 - REM behavior disorder -- 5.8 - Fatal familial insomnia -- 5.9 - Hypersomnias -- References -- Chapter 6 - Fatigue and human performance -- 6.1 - Fatigue and human error -- 6.2 - Fatigue and hand-eye coordination -- 6.3 - Fatigue and mood -- 6.4 - Fatigue and memory -- 6.5 - Fatigue and reaction time -- 6.6 - Fatigue and attention -- 6.7 - Fatigue and cognitive tunneling -- 6.8 - Fatigue and decision making -- 6.9 - Fatigue and working with others -- 6.10 - Fatigue and marital life -- References -- Chapter 7 - Fatigue and accidents -- 7.1 - Bhopal-fatigue and poor abnormal situation response -- 7.2 - American Airlines 1420-fatigue and decline in situation awareness -- 7.3 - NASA space shuttle-fatigue and decision making -- 7.4 - Exxon Valdez-fatigue and work schedules -- 7.5 - Three Mile Island and cognitive tunneling -- 7.6 - Metro-North train derailment fatigue caused by circadian rhythms and sleep apnea -- 7.7 - Fatigue's role in accidents -- References -- Chapter 8 - Fatigue-related regulations and guidelines -- 8.1 - OSHA and fatigue risk -- 8.2 - NIOSH sleep-related publications -- 8.3 - UK and EU regulations -- 8.4 - Transportation fatigue regulations…”
Libro electrónico -
3454Publicado 2015Tabla de Contenidos: “…Customs and Trade Partnership Against Terrorism (C-TPAT) -- Chapter 5. Export Controls and Licenses -- A. …”
Libro electrónico -
3455por Ríos Sierra, Jerónimo“…This book offers a comprehensive analysis of the impact of ETA terrorism on its victims, exploring various perspectives including the direct violence inflicted on society and the mechanisms of mobilization and protest by citizens to combat terrorism. …”
Publicado 2024
Libro electrónico -
3456
-
3457por Broder, James F.“…With an awareness of the growing threat of global terrorism, the third edition of RISK ANALYSIS AND THE SECURITY SURVEY…”
Publicado 2006
Libro electrónico -
3458Publicado 2021Tabla de Contenidos: “…7.11 Donors' Creations -- 7.12 Charity Auctions -- 7.13 Services -- 7.14 Unreimbursed Expenses -- 7.15 Limitation on Deduction for Expenses Due to Pleasure -- 7.16 Automobile Expenses -- 7.17 Use of Property -- 7.18 Bargain Sales -- 7.19 Property Subject to Debt -- 7.20 Future Interests in Tangible Personal Property -- 7.21 Contributions by Trusts -- 7.22 Taxidermy -- 7.23 Clothing and Household Items -- 7.24 Vehicles -- 7.25 Intellectual Property -- 7.26 Foreign Tax Credit -- 7.27 Subsistence Whaling Expenses -- 7.28 Virtual Currency Transactions -- Chapter 8 Additional Aspects of Deductible Giving -- 8.1 Contributions by Means of an Agent -- 8.2 Contributions for the Use of Charity -- 8.3 Conditional Contributions -- 8.4 Earmarking of Contributions for Individuals -- 8.5 Interrelationship with Business Expense Deduction -- 8.6 Denial of Deduction for Lobbying Activities -- 8.7 Deductible Contributions to Noncharitable Organizations -- 8.8 Reallocation of Deductions -- 8.9 Funding of Terrorism -- 8.10 Statute of Limitations -- 8.11 Concept of Trust Income -- 8.12 Unrelated Business Income Charitable Deduction -- 8.13 Charitable Family Limited Partnerships -- 8.14 Abusive Tax Transactions -- 8.15 Public Policy Considerations -- Part 3 Planned Giving -- Chapter 9 Planned Giving and Valuation -- 9.1 Planned Giving Fundamentals -- 9.2 Partial Interests Law -- 9.3 Overview of Valuation Law -- 9.4 Standard Actuarial Factors -- 9.5 General Actuarial Valuations -- 9.6 Nonstandard Actuarial Factors -- 9.7 Securities Laws -- Chapter 10 Charitable Remainder Trusts -- 10.1 Definitions -- 10.2 Charitable Remainder Annuity Trust Law -- 10.3 Charitable Remainder Unitrust Law -- 10.4 Issues -- 10.5 Tax Treatment of Distributions…”
Libro electrónico -
3459Publicado 2015Tabla de Contenidos: “…16.4 Leveraging knowledge systems to reduce time and costs -- 16.5 4Projects knowledge solution -- 16.6 Case studies and discussions -- 16.7 Concluding remarks -- References -- Chapter 17 Sustainable Design Economics and Property Valuation: An Industry Perspective -- 17.1 Introduction -- 17.2 Sustainable design economics and property valuation -- 17.3 Data collection -- 17.4 UK government impact -- 17.5 The valuation process -- 17.6 Conclusion -- References -- Chapter 18 Cost Planning of Construction Projects: An Industry Perspective -- 18.1 Introduction -- 18.2 Concept and format of a cost plan -- 18.3 How a cost plan is put together -- 18.4 How the cost plan evolves through the riba design stages -- 18.5 Main factors that affect the overall cost of a building -- 18.6 Impact of sustainability on cost plans -- 18.7 Recent developments in BIM and the implications for cost planning -- 18.8 Conclusion -- References -- Chapter 19 Life Cycle Costing and Sustainability Assessments: An Industry Perspective with Case Studies -- 19.1 Introduction -- 19.2 Sustainability considerations in design -- 19.3 Using the life cycle costing standards -- 19.4 Case study 1 - whole building -- 19.5 Case study 2 - lighting -- 19.6 Concluding remarks -- References -- Chapter 20 Designing Super-Tall Buildings for Increased Resilience: New Measures and Cost Considerations -- 20.1 Introduction -- 20.2 Challenges of tall buildings and the need for increased resilience -- 20.3 Factors influencing design and cost of tall buildings -- 20.4 Design of counter-terrorism measures -- 20.5 Cost of new measures and design -- 20.6 Concluding remarks -- References -- Chapter 21 Building Information Modelling: A New Approach to Design, Quantification, Costing, and Schedule Management with Case Studies -- 21.1 Introduction -- 21.2 Concept of Bim -- 21.3 Integration and dataflow…”
Libro electrónico -
3460por Bok, KennethTabla de Contenidos: “…Chapter 3 Activities and Applications -- 3.1 Trading / DEXs -- 3.1.1 Automated Market Makers (AMMs) -- 3.1.2 Aggregators -- 3.2 Overcollateralized Lending / Borrowing -- 3.3 Governance / DAOs -- 3.4 Undercollateralized Lending -- 3.4.1 Uncollateralized Lending to Real-world Borrowers -- 3.4.2 Uncollateralized Lending to Crypto Institutions -- 3.4.3 Real World Assets -- 3.4.4 Centrifuge -- 3.4.5 MakerDAO and RWA -- 3.4.6 SocGen Pilots and MakerDAO Collaboration -- 3.4.7 Smart Bonds -- 3.4.8 Credit Scoring -- 3.5 Investing -- 3.5.1 Index Products - Spot -- 3.5.2 Index Products - Perpetual Futures -- 3.5.3 Dashboards -- 3.6 Payments -- 3.6.1 Crypto Payment Gateways -- 3.6.2 Big Payments and Crypto -- 3.6.3 Crypto Debit / Credit Cards -- 3.6.4 On-off Ramps -- 3.6.5 Solana Pay and Circle -- 3.6.6 Bitcoin Payments -- 3.7 Insurance -- 3.8 Prediction Markets -- 3.9 Chapter Summary -- Notes -- Chapter 4 Risks and Mitigation -- 4.1 Types of Losses -- 4.2 Basic Terminology -- 4.3 Endogenous DeFi Risks -- 4.3.1 Smart Contract Risks: Code Exploit Example: The DAO Hack -- 4.3.2 Economic Exploit Example: Mango Markets -- 4.3.3 Operational Exploit Example: Ronin Bridge Hack -- 4.3.4 CeFi Contagion / Systemic Risk -- 4.4 Exogenous DeFi Risks -- 4.4.1 Financial Stability -- 4.4.2 Pronounced Risks in Developing Countries -- 4.4.3 Banking-to-Crypto Concentration Risks -- 4.4.4 Stablecoins -- 4.4.5 Market Integrity -- 4.4.6 Frontrunning -- 4.4.7 Market Manipulation -- 4.4.8 Money Laundering, Funding of Illicit Activity and Terrorism -- 4.4.9 Consumer Protection -- 4.4.10 Disclosure, or the Lack Thereof -- 4.4.11 Data Protection -- 4.5 Chapter Summary -- Notes -- Chapter 5 Regulation -- 5.1 Introduction -- 5.2 Global Nature of Crypto and DeFi -- 5.2.1 How this Chapter Is Organized -- 5.3 What Regulators Want -- 5.4 Are Tokens Securities? …”
Publicado 2023
Libro electrónico