Mostrando 381 - 400 Resultados de 438 Para Buscar 'Human Rights Foundation', tiempo de consulta: 0.26s Limitar resultados
  1. 381
    por OECD
    Publicado 2021
    Tabla de Contenidos: “…. -- 1.1.2. ...and in spite of historic foundations favourable to science and innovation... -- 1.1.3. ...the transition is yet to commence -- 1.2. …”
    Libro electrónico
  2. 382
    por Kaltmeier, Olaf
    Publicado 2024
    Tabla de Contenidos: “…Environmental Apocalypse, Mexican Revolution, and Conservation Policies -- Conservation Efforts in Central America -- Conclusions -- References -- Biodiversity in the Caribbean from the Mid‐Nineteenth Century to 1950 -- Logging -- Agroecosystems: Between Plantations and Smallholdings -- Livestock and Animals -- Protection of Flora and Fauna -- References -- From 1950 to the Present -- Introduction: Biodiversity and the Anthropocene in Latin America from 1950 to the Present -- References -- Biodiversity in the Southern Cone from 1950 to the Present -- The Southern Cone as Biocultural Mosaic -- "The Republic of Soy" -- Foreign Forests and Indigenous Rights -- Maritime Monocultures: Salmon Farms and Social Conflict -- Conserving Biodiversity -- The Anthropocene and the Unforeseen -- References -- Biodiversity in the Andes from 1950 to the Present -- Biodiversity's Axes -- Agrobiodiversity -- Trends of the Great Acceleration -- Extinction -- Conclusions -- References -- Biodiversity in the Amazon from 1950 to the Present -- Humans and Nonhumans in the Amazon since the Great Acceleration -- Threats to Flora and Fauna from 1950 onward -- Predation: Capture, Commerce, and Consumption -- Introduction of Exotic Species -- Sociobiodiversity and Biocultural Diversity in Amazonia -- Final Considerations -- References -- Biodiversity in Mesoamerica from 1950 to the Present -- Biodiversity: the Theoretical‐Historical Reflection on a Fragile Wealth -- Biodiversity: the Difficulty of Conservation in National and International Policies -- Status of Mesoamerican Biodiversity -- Central America -- Mexico -- Experiences of Community Biodiversity Management in Mesoamerica -- The Indigenous Peasant Coordinator of Community Agroforestry in Central America (ACICAFOC) -- Cuetzalan, Mexico: Biodiversity, Culture, and Defense of the Territory…”
    Libro electrónico
  3. 383
    Publicado 2011
    “…Throughout history, migrants have fueled the engine of human progress. Their movement has sparked innovation, spread ideas, relieved poverty, and laid the foundations for a global economy. …”
    Libro electrónico
  4. 384
    Publicado 2022
    Tabla de Contenidos: “…-- The ecosystem of transformers -- Industry 4.0 -- Foundation models -- Is programming becoming a sub-domain of NLP? …”
    Libro electrónico
  5. 385
  6. 386
    Publicado 2009
    Tabla de Contenidos: “…Is "intelligent design" science? or, What enables human beings to be intelligent designers? / Elia M. …”
    Click para texto completo desde fuera UPSA
    Click para texto completo desde UPSA
    Libro electrónico
  7. 387
    Publicado 2017
    Libro electrónico
  8. 388
    por Zuckerman, Phil
    Publicado 2008
    “…”Most Americans are convinced that faith in God is the foundation of civil society. Society Without God reveals this to be nothing more than a well-subscribed, and strangely American, delusion. …”
    Libro
  9. 389
    Publicado 2017
    Tabla de Contenidos: “…-- As Andy Greenawalt Says, "You Are Misusing Your Humans -- Do Not Let Sacred Geese Live -- Market Your Market -- Purpose Can Drive Change, Too -- Shift to a Digital Community -- Price Is Only a Concern in the Absence of Value -- Overcoming the Challenges of the Digital Branch Starts with You -- Welcome to Digital Community Banking -- Move over Millennials -- Make Way for iGen -- Beware the Culture Danger -- Understand Your Technology -- Your Foundation Could Be a Bit Shaky -- And So, the Story Goes, "Free Your Data -- A Reliance on Professional Services Means You Get to Focus While Your End Users Get Best-of-Breed Offerings -- It's Not about Having Access to "Data," It's about Focused Direction -- Partner, Don't Incubate -- Skip the Writhing, Pleading, Grasping at Straws Thing -- Be Interested, Not Desperate -- Some Thoughts about Working with Fintech Startups -- Get More Efficient and More Proficient with Partners -- Scale Delivers Results -- For about Fifty Years, the Most Convenient Bank in the United States Was the US Postal Savings System -- Brand Power -- The Average Consumer Cares Very Little about Your Customer Service -- Which Takes Us Back to the Scale of Brands…”
    Libro electrónico
  10. 390
    Publicado 2023
    Tabla de Contenidos: “…-- How Do We Start Down the Right Path? -- How Do We Do This Right? How Do We Resolve These Issues? …”
    Libro electrónico
  11. 391
    Publicado 2013
    Tabla de Contenidos: “…Chapter 5: The Threat Ecosystem -- The Threat Ecosystem -- The Technical Element -- The Human Element -- The Evolution of the Threat Ecosystem -- Advanced Persistent Threat -- The Attack Method -- The Attack Profitability -- Malware Economy -- Malware Outsourcing -- We've Covered -- Chapter 6: The Malware Factory -- The Need to Evade Antivirus -- Malware Incident Handling Process -- Malware Detection -- Circumventing the Antivirus Product -- The Need for an Army of Malware -- Next-Generation Malware Kits -- Stand-Alone Armoring Tools -- The Impact of an Armored Army of Malware -- The Malware Factory -- The Malware Assembly Line -- The Proliferation of Attacker Tools -- Malware Population Explosion -- We've Covered -- Chapter 7: Infection Vectors -- Infection Vectors -- Physical Media -- E-mail -- Instant Messaging and Chat -- Social Networking -- URL Links -- File Shares -- Software Vulnerabilities -- The Potential of Becoming an Infection Vector -- We've Covered -- Chapter 8: The Compromised System -- The Malware Infection Process -- Installation of Malware Files -- Setting Up Malware Persistency -- Removing Evidence of the Malware Installer -- Passing Control to the Malware -- The Active Malware -- Maintaining the Foothold -- Communicating with the Attacker -- Executing the Payload -- We've Covered -- Part III: The Enterprise Strikes Back -- Chapter 9: Protecting the Organization -- The Threat Incident Responders -- Understanding the Value of the System -- Value to the Organization -- Value to the Attacker -- Understanding the Characteristics of the System -- System Type -- Operational Impact -- Sensitivity of Hosted Data -- Users of the System -- Network Location -- Accessibility to the Asset -- Asset Access Rights -- Recovery -- System Status -- Prioritizing the Systems -- The Organization's Security Posture…”
    Libro electrónico
  12. 392
    Publicado 2019
    Libro electrónico
  13. 393
    Publicado 2024
    Libro electrónico
  14. 394
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Introduction -- Chapter 1 How Customer Education Transforms Prospects to Champions -- The Evolution of Customer Education -- The Business Benefits of Education Across the Lifecycle -- Pre-sale -- Post-sale -- Advocacy -- Crossing the Chasm: When Is the Right Time to Invest in Customer Education? -- Chapter 2 Customer Education as a Catalyst for Business Growth -- The Importance of a Centralized Strategy for Customer Education -- What Else Is Customer Education? …”
    Libro electrónico
  15. 395
    Publicado 2013
    “…In Moral Intelligence 2.0, Lennick and Kiel extensively identify the moral components at the heart of the recent financial crisis, and illuminate the monetary and human costs of failed moral leadership in global finance, business and government. …”
    Libro electrónico
  16. 396
    Publicado 2023
    Libro electrónico
  17. 397
    Publicado 2016
    Tabla de Contenidos: “…Privacy -- Financial Regulations -- E-Discovery -- Expanding Scope of Regulation -- The Rapid Proliferation of Information, Devices, and Things -- The Changing Threat Landscape -- Stealthy Malware -- Nine Irrefutable Laws of Information Risk -- A New Approach to Managing Risk -- Chapter 2: The Misperception of Risk -- The Subjectivity of Risk Perception -- How Employees Misperceive Risk -- The Lure of the Shiny Bauble -- How Security Professionals Misperceive Risk -- Security and Privacy -- How Decision Makers Misperceive Risk -- How to Mitigate the Misperception of Risk -- Uncovering New Perspectives During Risk Assessments -- Communication Is Essential -- Building Credibility -- Chapter 3: Governance and Internal Partnerships: How to Sense, Interpret, and Act on Risk -- Information Risk Governance -- Finding the Right Governance Structure -- Building Internal Partnerships -- Legal -- Privacy -- Litigation -- Intellectual Property -- Contracts -- Financial Compliance -- Legal Specialists Within Business Groups -- Human Resources -- Setting Employee Expectations in Security Policies -- Employee Communications -- Investigations -- Finance -- Sarbanes-Oxley Compliance -- Working with Business Groups -- Internal Audit -- Corporate Risk Management -- Privacy -- Corporate Security -- Business Group Managers -- Conclusion -- Chapter 4: External Partnerships: The Power of Sharing Information -- The Value of External Partnerships -- External Partnerships: Types and Tiers -- 1:1 Partnerships…”
    Libro electrónico
  18. 398
    Publicado 2024
    Tabla de Contenidos: “…Understanding ABAC -- Other access control models for multi-account environments -- Choosing the right access control model -- Managing IAM identities -- Managing both human and non-human identities -- Types of credentials and their use cases -- IAM users, groups, and roles -- External identities and federation in AWS -- Comparing IAM identity types -- Managing IAM policies -- Understanding IAM policies -- Creating and managing IAM policies -- Advanced IAM policy use cases -- IAM in multi-account deployments -- Challenges with managing large-scale IAM deployments -- Centralized IAM management -- Cross-account access -- Sharing resources at scale -- Automating IAM implementation in a DevOps world -- Best practices for multi-account IAM -- Summary -- Questions -- Answers -- Further reading -- Chapter 4: Data Protection - Encryption, Key Management, and Data Storage Best Practices -- AWS encryption mechanisms and services -- AWS approach to encryption -- Types of encryption supported by AWS -- The AWS Encryption SDK -- Key features -- Managing cryptographic keys -- Key management services in AWS -- KMS in-depth overview -- CloudHSM integration and use cases -- Compliance in AWS key management -- Data protection in key AWS services -- S3 buckets -- EBS volumes -- EFS filesystems -- RDS databases -- DynamoDB tables -- Data protection in other AWS services -- Unified data protection strategy -- Summary -- Questions -- Answers -- Further reading -- Chapter 5: Introduction to AWS Security Services -- Unpacking threat and vulnerability detection -- GuardDuty-your AWS security sentinel -- Detective-your AWS security analyst -- Inspector-your AWS security auditor -- CloudTrail Lake and Security Lake-your AWS analytics powerhouses -- Best practices for threat and vulnerability detection -- Managing security governance and compliance…”
    Libro electrónico
  19. 399
    Publicado 2017
    “…Next, he presents the foundational knowledge you need to start creating real bots and CUIs. …”
    Libro electrónico
  20. 400
    Publicado 2017
    “…You will understand how to solve various ambiguities in processing human language and will come across various scenarios while performing text analysis. …”
    Libro electrónico