Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,168
- Engineering & Applied Sciences 1,077
- Application software 1,005
- Control 955
- Management 817
- Computer networks 801
- Control de calidad 772
- Computer Science 715
- History 702
- Security measures 662
- Historia 613
- Computer security 592
- Control de natalidad 588
- Electrónica 587
- Programming 532
- TFC 500
- Control de qualitat 483
- Automática y control 466
- Data processing 456
- Computer programs 426
- Operating systems (Computers) 422
- Computer software 406
- Quality control 402
- Web site development 393
- Design 386
- Cloud computing 369
- Photography 347
- Web sites 347
- Control ambiental 330
- Digital techniques 325
-
42461por Spiers, Mary V.Tabla de Contenidos: “…Women's Health Psychology -- Contents -- Foreword -- Preface -- Acknowledgments -- List of Contributors -- SECTION 1: Women's Health in Context -- Chapter 1 Historical Roots of Women's Healthcare -- INTRODUCTION -- CHILD AND ADOLESCENT HEALTH -- ADOLESCENT GROWTH AND DEVELOPMENT -- SEXUALITY AND SEX EDUCATION -- THE BIRTH CONTROL MOVEMENT -- THE WOMEN'S HEALTH MOVEMENT -- PREGNANCY AND CHILDBIRTH -- ABORTION, STERILIZATION ABUSE, AND REPRODUCTIVE RIGHTS -- SEXUAL ASSAULT AND THE ANTIRAPE MOVEMENT -- GENDER EQUALITY AND MEDICAL RESEARCH -- REFERENCES -- Chapter 2 Retheorizing Women's Health Through Intersectionality's Prism -- INTERSECTIONALITY: A BRIEF HISTORY OF AN INTENSELY USEFUL BUT UNDERUTILIZED THEORY IN PSYCHOLOGY -- THE INDIVIDUAL AS QUEEN: A REVIEW OF FIVE PSYCHOLOGICAL THEORIES OF HEALTH BEHAVIOR -- The Health Belief Model -- The Theory of Reasoned Action (TRA) and the Theory of Planned Behavior (TPB) -- Social Cognitive Theory (SCT) -- Transtheoretical Model (TTM) and Stages of Change -- FLIPPING THE INDIVIDUALISTIC SCRIPT: CRITIQUES OF PSYCHOSOCIAL HEALTH BEHAVIOR THEORIES -- HIV/AIDS: THE OTHER WEIGHTY ISSUE -- Contextualizing HIV/AIDS Among Women -- Socioeconomic Status: The Dollars and Cents of Women's HIV Risk -- Social Inequality, Women, and HIV Risk -- OPTIMISM RISING AND FALLING: TOWARD AN INTERSECTIONALITY-INFORMED UNDERSTANDING OF WOMEN'S HEALTH -- THE REVERBERATIONS OF "AIN'T I A WOMAN?"…”
Publicado 2013
Libro electrónico -
42462Publicado 2023Tabla de Contenidos: “…Creating and funding an account with MetaMask -- Using MetaMask and Remix IDE to deploy a smart contract -- Adding a custom network to MetaMask and connecting it with Remix IDE -- Importing accounts into MetaMask using keystore files -- Deploying a contract with MetaMask -- Interacting with a contract through MetaMask using Remix IDE -- Summary -- Chapter 11 : Tools, Languages, and Frameworks for Ethereum Developers -- Languages -- The Solidity compiler -- Installing solc -- Experimenting with solc -- Tools, libraries, and frameworks -- Node.js -- Ganache -- ganache-cli -- Ganache UI -- Truffle -- Drizzle -- Other tools -- Contract development and deployment -- Writing smart contracts -- Testing smart contracts -- Deploying smart contracts -- The Solidity language -- Functions -- Variables -- Local variables -- Global variables -- State variables -- Data types -- Value types -- Reference types -- Control structures -- Events -- Inheritance -- Libraries -- Error handling -- Summary -- Chapter 12 : Web3 Development Using Ethereum -- Interacting with contracts using Web3 and Geth -- Deploying contracts -- Using solc to generate ABI and code -- Querying contracts with Geth -- Interacting with Geth using POST requests -- Interacting with contracts via frontends -- Installing the web3.js JavaScript library -- Creating a web3 object -- Creating an app.js JavaScript file -- Creating a frontend webpage -- Calling contract functions -- Creating a frontend webpage -- Deploying and interacting with contracts using Truffle -- Installing and initializing Truffle -- Compiling, testing, and migrating using Truffle -- Interacting with the contract -- Using Truffle to test and deploy smart contracts -- Deployment on decentralized storage using IPFS -- Summary -- Chapter 13 : The Merge and Beyond -- Introduction -- Ethereum after The Merge -- The Beacon Chain…”
Libro electrónico -
42463Publicado 2013Tabla de Contenidos: “…La normativa bancaria sobre gestión de riesgos y control interno; 2.3. Riesgos y solvencia de las entidades de crédito; 2.4. …”
Libro electrónico -
42464Publicado 2024Tabla de Contenidos: “…Chapter 16 Product Strategy -- Principle: Focus -- The Power of an Inspiring Product Vision -- Principle: Powered by Insights -- Principle: Transparency -- Principle: Placing Bets -- Chapter 17 Product Discovery -- Principle: Minimize Waste -- Principle: Assess Product Risks -- Assessing Ethical Risk -- Principle: Embrace Rapid Experimentation -- Principle: Test Ideas Responsibly -- Chapter 18 Product Delivery -- Principle: Small, Frequent, Uncoupled Releases -- High-Integrity Commitments -- Principle: Instrumentation -- Principle: Monitoring -- Principle: Deployment Infrastructure -- Managing Technical Debt -- Chapter 19 Product Culture -- Principle: Principles over Process -- Continuous Process Improvement -- Principle: Trust over Control -- Principle: Innovation over Predictability -- From Projects to Products -- Principle: Learning over Failure -- Chapter 20 Innovation Story: Carmax -- Company Background -- The Problem to Solve -- Discovering the Solution -- The Results -- Part V Transformation Story: Trainline -- Part VI The Product Model in Action -- Chapter 21 Partnering with Customers -- Promises -- Product Discovery -- Product Delivery -- Happy, Referenceable Customers and Business Impact -- Chapter 22 Partnering with Sales -- Chapter 23 Partnering with Product Marketing -- Market Understanding and Competitive Analysis -- Product Go-to-Market -- Key Product Decisions -- Customer Discovery Program -- Messaging and Positioning -- Customer Impact Assessment -- Pricing and Packaging -- Sales Enablement -- Chapter 24 Partnering with Finance -- Testing the Product Model -- Product and Finance Collaboration -- Requests of Finance -- Chapter 25 Partnering with Stakeholders -- Chapter 26 Partnering with Executives -- Decisions -- Outcomes -- Disagreements -- Promises -- Surprises -- Trust -- Chapter 27 Innovation Story: Gympass -- Company Background…”
Libro electrónico -
42465Publicado 2024Tabla de Contenidos: “…5.3 Privacy-Sensitive and Situation-Aware Thing Description -- 5.3.1 Overview -- 5.3.2 Step 1: SituationPrivacy Metamodel Definition -- 5.3.3 Step 2: SituationPrivacyWoTTD Metamodel Definition -- 5.3.4 Step 3: SituationPrivacyWoTTD Model Generation -- 5.4 Implementation -- 5.4.1 Model Transformation -- 5.4.2 Simulation -- 5.4.3 Evaluation -- 5.5 Conclusion -- Appendix 1 -- Notes -- References -- Chapter 6 Protect the Gate: A Literature Review of the Security and Privacy Concerns and Mitigation Strategies Related to IoT Smart Locks -- 6.1 Introduction -- 6.1.1 Background -- 6.1.2 Architecture -- 6.1.3 Capabilities -- 6.1.4 Access Control -- 6.1.5 Authentication and Authorization -- 6.2 The Privacy and Security of Smart Locks -- 6.2.1 Smart Locks Privacy and Security From the Perspective of Researchers -- 6.2.2 Smart Homes Privacy and Security From the Perspective of the End User -- 6.3 Research Gaps -- 6.4 Conclusion -- References -- Chapter 7 A Game-Theoretic Approach to Information Availability in IoT Networks -- 7.1 Introduction -- 7.2 Related Work -- 7.3 System Model -- 7.3.1 Spectrum-Sharing Cognitive Systems -- 7.3.2 Problem Statement -- 7.3.3 Primary Outage Probability -- 7.4 Zero-Determinant Strategies -- 7.5 Game-Theoretic Strategy for IoT Transmission -- 7.5.1 Uncoordinated Transmission Strategy -- 7.5.2 Special Cases -- 7.5.3 Performance Analysis -- 7.6 Extension to Multiple Users -- 7.7 Numerical Results -- 7.8 Discussions and Conclusions -- References -- Chapter 8 Review on Variants of Restricted Boltzmann Machines and Autoencoders for Cyber-Physical Systems -- 8.1 Introduction to RBMs and Autoencoding -- 8.2 Background -- 8.2.1 Targeted Problems Using RBM's and Autoencoders -- 8.2.2 Techniques Used for Cyber-Physical Systems Using RBMs and Autoencoders -- 8.2.3 Detecting Network Intrusions to Ensure the Security of CPS in IoT Devices…”
Libro electrónico -
42466Publicado 2024Tabla de Contenidos: “…Improvisational decision making: Context, antecedents, and outcomes -- Introduction -- Theoretical background -- Theory and hypotheses -- Methods -- Measures -- Dependent variables -- Contextual variables and SDM processes -- Control variables -- Analysis -- Results -- Discussion -- Contributions to theory -- Implications for managers -- Limitations and future work -- Conclusion -- References -- 9. …”
Libro electrónico -
42467Publicado 2024Tabla de Contenidos: “…Digging into the Three Types of Workplace Empathy -- Cognitive empathy -- Emotional empathy -- Compassionate empathy -- Being an empathetic leader -- Figuring Out the Four Domains of Emotional Intelligence -- Self-awareness -- Self-control -- Social awareness -- Relationship management -- Discovering Your Level of Empathy and Emotional Intelligence -- Realizing the Need for Greater Empathy and Emotional Intelligence -- Applying Empathy and Emotional Intelligence in the Workplace -- Chapter 9 Developing Cross-Cultural Competence and Cultural Intelligence -- Defining Culture -- Knowing the Difference between Cultural Competence and Cultural Intelligence -- Discovering Why these Competencies Matter to Leaders -- Mapping the Two Mindsets of Intercultural Competence -- Monocultural mindset -- Intercultural mindset -- Exploring the Five Orientations of Cultural Competence -- Denial -- Polarization -- Minimization -- Acceptance -- Adaptation -- Becoming a Culturally Competent and Culturally Intelligent Leader -- Part 3 Leading Others -- Chapter 10 Assembling and Leading Diverse and Hybrid Teams -- Sourcing Diverse Talent -- Acclimating New Hires to the Team -- Leading Your Team Through Five Stages of Development -- Forming -- Storming -- Norming -- Performing -- Adjourning -- Figuring out what stage your team is at -- Maximizing the Benefits of a Diverse Team -- Creativity and problem solving -- Collaboration -- Increased business performance -- Engagement and retention -- Fostering an Environment of Trust and Belonging -- Leading Across Differences and Distances -- Avoiding Common Pitfalls when Leading a Diverse Team -- Chapter 11 Establishing Trust and Psychological Safety -- Defining Trust and Psychological Safety -- Outlining the Four Stages of Psychological Safety -- Inclusion Safety -- Learner Safety -- Contributor Safety -- Challenger Safety…”
Libro electrónico -
42468por Y Alanis, Alma“…Bio-Inspired Strategies for Modeling and Detection in Diabetes Mellitus Treatment focuses on bio-inspired techniques such as modelling to generate control algorithms for the treatment of diabetes mellitus. …”
Publicado 2024
Libro electrónico -
42469Publicado 2024“…Discover essential real-time rendering techniques that can be extended or applied directly to existing or new rendering engines focusing only on Vulkan Key Features Explore a wide range of advanced 3D graphics programming techniques to leverage the full potential of Vulkan API Learn tips, tricks, and solutions to boost your 3D graphics for a wide range of cross-platform devices Implement geometry projection, texturing, and lighting techniques Purchase of the print or Kindle book includes a free PDF eBook Book Description Vulkan is a graphics API that gives the program total control of the GPU, allowing the GPU to be used to its full potential. …”
Libro electrónico -
42470Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1 - Effective and Efficient Security Management and Operations in Azure -- Chapter 1: Identity Foundations with Azure Active Directory and Microsoft Entra -- Protecting users' identities and securing the value chain - the importance of IAM in decentralized organizations -- Authentication and authorization in Azure -- Engaging and collaborating with employees, partners, and customers -- The significance of digital identities in the modern IT landscape -- Modernizing your IAM with Microsoft Azure AD -- Life cycle management -- Leveraging the Microsoft Cloud Adoption Framework -- Azure AD terminology, explained -- Securing applications with the Microsoft identity platform -- Securing cloud-based workloads with Microsoft Entra's identity-based access control -- Azure AD -- Microsoft Entra Permissions Management -- Microsoft Entra Verified ID -- Microsoft Entra workload identities -- Microsoft Entra Identity Governance -- Microsoft Entra admin center -- Summary -- Chapter 2: Managing Access to Resources Using Azure Active Directory -- Understanding the need for IAM -- Understanding Azure AD (now Microsoft Entra ID) -- Exploring the Microsoft Entra ID editions -- Microsoft Entra ID Premium P2 -- Understanding the capabilities of Microsoft Entra ID -- Task 1 - creating a new Azure AD tenant using the Azure portal -- Task 2 - creating and configuring Azure AD users -- Task 3 - creating an Azure AD group with dynamic membership -- Hybrid identity - integrating your on-premises directories (Azure AD Connect sync and cloud sync) -- Azure AD Connect sync -- Azure AD Connect cloud sync -- Azure AD Application Proxy -- Azure AD Conditional Access -- Azure AD PIM -- Assigning roles in PIM -- Summary…”
Libro electrónico -
42471Publicado 2023Tabla de Contenidos: “…Chapter 7: Implementing Your Gamification -- Decoding your gamification -- Building your implementation team -- Building a prototype -- Building your product -- Writing user stories -- Milestones and iteration testing -- Product and feature launch -- The full product launch -- New feature rollouts -- Setting up tools to track performance -- Making data-driven decisions -- User acquisition -- Activation -- Monetization -- Retention -- A/B testing -- Pivot or persevere -- Creating a process of continual improvement -- Implementing feedback loops -- Summary -- Chapter 8: Challenges and Limitations in Gamification -- Keeping gamification ethical -- Addiction by Design -- Balancing gamification and user privacy -- Anonymization and aggregation of data -- User control and consent -- Accessibility to all users -- Ensuring gamification doesn't harm the user experience -- Avoiding common pitfalls and mistakes -- Behavioral insights -- Another example of mistakes from prominent literature -- Summary -- Further reading -- Chapter 9: Selling Your Gamification Strategy -- Building your business case -- Use case - Kahoot -- Step-by-step guide for creating a compelling business case for gamification -- Leadership buy-in -- Example of utilizing the Pyramid Principle -- Relationship building -- Use case - Atlassian -- Cross-functional teams -- GTM strategy -- Case study - Apple Watch -- Case study - GuruShots -- Case study - Peloton -- Summary -- Further reading -- Chapter 10: Gamifying Your Product Development Processes -- The draft game -- Utilizing design thinking to create gamified activities for product development -- Empathize - understanding your team's needs and motivations -- Define - setting clear goals and objectives for gamified activities -- Ideate - brainstorming creative gamification strategies -- Prototype - designing and testing gamified activities…”
Libro electrónico -
42472Publicado 2023Tabla de Contenidos: “…-- An example of CI/CD pipelines -- Continuously integrating and deploying your infrastructure -- Integration testing -- Deployment -- CI/CD with Atlantis -- Deploying Atlantis to AWS -- Running Terraform using Atlantis -- Summary -- Exercises -- Chapter 14: Avoiding Pitfalls in DevOps -- Technical requirements -- Too much or not enough automation -- Repetitive tasks -- Time-consuming tasks -- Manual and error-prone tasks -- Tasks with version control integration -- Tasks with repeatable patterns -- Tasks with well-defined APIs or interfaces -- Tasks with clear and well-defined requirements -- Not understanding the technology -- Stay curious and proactive -- Start with the basics -- Hands-on learning -- Collaborate and share knowledge -- Stay updated -- Failure to adopt a collaborative culture -- Lack of leadership -- Siloed organizational structure -- Lack of trust and communication -- Tool-centric approach -- Neglecting testing and QA -- Increased software defects -- Deployment failures -- Security vulnerabilities -- Lack of documentation -- Inadequate test coverage -- Lack of continuous improvement -- Poor monitoring and feedback loops -- Real-time -- Comprehensive -- Scalable -- Actionable -- Continuously improving -- Inadequate security and compliance measures -- What are security measures? …”
Libro electrónico -
42473Publicado 2024Tabla de Contenidos: “…Cover -- Title page -- Copyright and credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Understanding Kubernetes Anti-Patterns -- Chapter 1: Introduction to Kubernetes Anti-Patterns -- Understanding Kubernetes anti-patterns -- The deceptive allure of anti-patterns -- Types and forms of Kubernetes anti-patterns -- A call to vigilance -- The significance of identifying anti-patterns -- Guardians of stability -- The butterfly effect in Kubernetes -- Efficiency and resource optimization -- Reliability and performance -- Security and compliance -- Maintainability and scalability -- Cost control and resource allocation -- A competitive advantage -- The impact across the Kubernetes ecosystem -- Performance degradation -- Maintenance complexity -- Developer productivity -- Interoperability challenges -- Long-term technical debt -- Summary -- Chapter 2: Recognizing Common Kubernetes Anti-Patterns -- Ten common anti-patterns in Kubernetes -- 1. …”
Libro electrónico -
42474por Flora, S. J. S.Tabla de Contenidos: “…Front Cover -- Handbook on Biological Warfare Preparedness -- Copyright -- Dedication -- Contents -- Contributors -- Preface -- Acknowledgments -- Chapter 1: Biological warfare agents: History and modern-day relevance -- History of biological warfare agents -- Biological warfare agents -- Characteristics of biological weapons -- Advantages and disadvantages of biological agents -- Characteristics of an ideal biological warfare agent -- Classification of biological warfare agents according to the Center for Disease Control -- Present-day relevance of the agents -- Detection -- Conclusion -- References -- Chapter 2: Bacterial biological warfare agents -- Introduction -- Warfare agents -- Biological warfare agents as a preferred weapon of destruction -- Biological warfare agents -- Bacterial biological warfare agents are unique -- Historical aspects -- Bacterial biological warfare agents -- Lists of bacterial biological warfare agents -- Bacillus anthracis -- Yersinia pestis -- Brucella suis -- Coxiella burnetii -- Francisella tularensis -- Burkholderia pseudomallei -- Burkholderia mallei -- Reason behind rising bacterial bioterrorism -- Identifying the signs of biological attack -- Detection techniques for bacterial biological warfare agents -- Establishment of bacterial biological weapon programs -- Biological warfare program of the USSR -- Japanese biological warfare program -- United States biological warfare program -- Iraq's biological warfare program -- Impact of bacterial bioweaponization for society -- Conclusion -- References -- Chapter 3: Toxins as biological warfare agents -- Introduction -- Dinoflagellate toxins -- Saxitoxin -- Bacterial toxins -- Botulinum neurotoxin -- Staphylococcal enterotoxins -- Staphylococcal enterotoxin B -- Fungal toxins -- Trichothecenes (T-2) toxin -- Diacetoxyscirpenol -- Snail toxins -- Conotoxins…”
Publicado 2020
Libro electrónico -
42475Publicado 2024Tabla de Contenidos: “…-- Basic scheduling -- Handling timer signals -- File monitoring -- Inotify -- fsnotify -- File rotation -- Process management -- Execution and timeouts -- Execute and control process execution time -- Building a distributed lock manager in Go -- Summary -- Chapter 6: Understanding Pipes in Inter-Process Communication -- Technical requirements -- What are pipes in IPC? …”
Libro electrónico -
42476por Institute of Medicine (U.S.).Tabla de Contenidos: “…RESPONSIBILITIES OF FEDERAL AGENCIES -- Public Health Service -- Centers for Disease Control -- Food and Drug Administration -- National Institutes of Health -- Agency for Health Care Policy and Research -- Health Care Financing Administration -- Conditions of Coverage -- State Survey Process -- HSQB and the ESRD Networks -- Bureau of Policy Development -- Office of Research and Demonstrations -- Coordination Within HCFA -- Quality Assessment and Assurance Data Needs -- CONTINUOUS QUALITY IMPROVEMENT -- The Dialysis Facility: Practical Considerations -- Examples of ESRD Quality Assurance -- CONCLUSIONS AND RECOMMENDATIONS -- NOTES -- REFERENCES -- APPENDIX 1 QUALITY OF CARE IN ESRD: AN EXAMPLE OF A PROXIMATE CLINICAL INDICATOR -- Treating Anemia in Dialysis Patients1 -- Potential Use as an Outcome Indicator -- Potential Use as Process Indicators -- NOTE -- References -- APPENDIX 2 EXAMPLES OF ESRD QUALITY ASSURANCE -- Dialysis Clinic, Inc., Cincinnati (DCI-C) -- Greenfield Health Systems -- National Medical Care, Inc. …”
Publicado 1991
Libro electrónico -
42477por National Research Council (U.S.).Tabla de Contenidos: “…Shipping, and Handling of Biological Specimens -- H- LABELING OF SPECIMENS WITHIN THE LABORATORY -- I- PREVENTION OF AEROSOL AND DROPLET GENERATION -- 1- Introduction -- 2- Control of Aerosols and Droplets -- J- CONTAINMENT EQUIPMENT -- 1- Introduction -- 2- Biological Safety Cabinets -- 3- Pipetting Devices -- 4- Sonicators, Homogenizers, and Mixers -- 5- Clothing, Masks, and Face Shields -- K- BIOSAFETY IN LARGE-SCALE PRODUCTION -- 1- Introduction -- 2- Organization and Responsibilities -- 3- Containment -- 4- Inactivation -- 5- Disposal -- 6- Exposure -- 7- Conclusion -- L- BIOSAFETY IN PHYSICIANS' OFFICE LABORATORIES AND OTHER SMALL VOLUME CLINICAL LABORATORIES -- 4 Safe Disposal of Infectious Laboratory Waste -- A- INTRODUCTION -- B- INFECTIOUS POTENTIAL OF LABORATORY WASTE -- 1- Risks to the General Public's Health -- 2- Occupational Risks -- C- CHARACTERISTICS OF INFECTIOUS LABORATORY WASTE -- D- RESPONSIBILITY FOR THE SAFE HANDLING AND DISPOSAL OF INFECTIOUS WASTE -- 1- GENERATORS OF INFECTIOUS WASTE -- 2- Haulers and Waste Treatment Facilities -- E- WASTE HANDLING AND TREATMENT METHODS -- 1- Basic Principles -- 2- Containment -- 3- Personal Protection -- 4- Chemical Decontamination -- 5- Steam Autoclaving -- 6- Incineration -- 7- Validation of Decontamination Methods -- F- INFECTIOUS WASTE REQUIRING SPECIAL CONSIDERATION -- 1- Mixed Waste -- 2- Human Cadavers and Other Anatomical Waste -- 3- Animal Bedding materials -- 4- "Sharps -- 5 Safety Management -- A- ADMINISTRATIVE ORGANIZATION AND RESPONSIBILITIES -- 1- Introduction -- 2- The Laboratory Safety Program -- a- Goals of a Laboratory Safety Program -- b- Responsibility for Laboratory Safety -- c- Safety Plans -- d- Safety Meetings and Safety Committees -- e- Safety Communications -- f- Monitoring Safety -- B- FACILITIES -- 1- Introduction -- 2- Laboratory Design…”
Publicado 1989
Libro electrónico -
42478por Pathak, HarshTabla de Contenidos: “…Managers and Self-renewal System -- Managers and Organisational Learning -- Managers and Stress Management -- Managers and Research -- Motivation as the Soul of a Manager -- Aspects of Role Efficacy -- Manager as Motivator of Employees -- Self-role Integration -- Productivity -- Creativity -- Confrontation -- Centrality -- Influence -- Growth -- Inter-role Linkage -- Helping -- Super-Ordination -- Using Power and Empowering Employees -- Managerial Control -- Coping Behaviour of a Manager -- Managing Frustration and Stress -- Consultant Support During Change -- Manager and Group Dynamics -- Three Uses of Group in Idea Generation -- Managerial Communication -- Obstacles in the Middle of Change and How to Overcome Them -- Classic Skills for an Effective Change Manager -- Summary -- Case Study: "Genesis" A National Scientific Laboratory -- Review Questions -- Learning Orgnisation: The Ultimate Objective of Management of Change -- Introduction -- What is a Learning Orgnisation? …”
Publicado 1900
Libro electrónico -
42479por Varma, SumatiTabla de Contenidos: “…National Competitive Advantage -- Theory Assessment -- DEVELOPMENTS IN WORLD TRADE -- Volume of Trade -- Composition of World Trade -- Direction of World Trade -- Service Trade -- Key Terms -- Discussion Questions -- Chapter 5 COMMERCIAL POLICY INSTRUMENTS -- Introduction -- Government intervention in trade -- Economic Rationale -- Non-economic Rationale -- INSTRUMENTS OF TRADE CONTROL -- Tariff Barriers -- Non-tariff Barriers -- ANALYSIS OF INDIA'S FOREIGN TRADE -- Volume of India's Foreign Trade -- Composition of India's Foreign Trade -- Direction of India's Foreign Trade -- Key Terms -- Discussion Questions -- Chapter 6 MULTILATERAL REGULATION OF TRADE -- Introduction -- General Agreement on Tariffs and Trade (GATT ) -- Objectives and Principles -- Uruguay Round -- GATT : An Evaluation -- World Trade Organization (WTO ) -- WTO AGREEMENTS -- General Agreement on Tariffs and Trade (GATT ) -- General Agreement on Trade in Services (GATS ) -- Agreement on Trade-related Aspects of IntellectualProperty Rights (TRIPS) -- Agreement on Trade-related Investment Measures (TRIMS) -- ORGANIZATIONAL STRUCTURE OF WTO -- Principles of WTO -- Most-Favored-Nation (MFN) -- National Treatment -- FUNCTIONS OF WTO -- WTO : AN EVALUATION -- Developing Country Issues -- Dispute Resolution Mechanism -- Subsidies in Agriculture -- FUTURE CHALLENGES FOR WTO -- UNITED NATIONS CONFERENCE ON TRADE AND DEVELOPMENT (UNCTAD ) -- Functions of UNCTAD -- UNCTAD : An Assessment -- KEY TERMS -- DISCUSSION QUESTIONS -- Chapter 7 INTERNATIONAL TRADE FINANCE AND PROMOTION -- INTRODUCTION -- INTERNATIONAL TRADE PAYMENT -- Cash in Advance -- Letter of Credit (L/C) -- Documentary Collection -- Open Account -- TERMS OF TRADE -- Free on board -- Free alongside Ship -- Cost, Insurance and Freight -- Cost and freight -- INTERNATIONAL TRADE FINANCE -- Private Sources -- Governmental Sources…”
Publicado 2015
Libro electrónico -
42480por Saleem, ShaikhTabla de Contenidos: “…Price Movement During the 1980s -- Price Situation During the 1990s -- Objectives of Price Policy -- Prices of Industrial Products -- Control of Expenditure -- International Prices of Select Commodities -- Challenges and Outlook -- Key Words -- Questions -- References -- Chapter 6: Stock Exchanges in India -- Concept and Meaning of Stock Exchange -- List of Stock Exchanges in India -- Types of Financial Markets -- SEBI and Its Role in the Secondary Market -- Security Exchange Board of India (SEBI) -- Role of SEBI in Regulating Trading in the Secondary Market -- Products Available in the Secondary Market -- Regulatory Requirements Specified by SEBI for Corporate Debt Securities -- Broker and Sub-broker in the Secondary Market -- Broker -- Sub-broker -- Agreement with the Broker or Sub-broker -- Risk Disclosure Document -- Placing Orders with the Broker or Sub-broker -- Brokerage that a Broker or Sub-broker Can Charge -- Charges Levied on the Investor by a Stockbroker/Sub-broker -- Securities Transaction Tax (STT) -- Rolling Settlement -- SEBI Risk Management System -- Redressing Investor Grievances -- Investor Protection Fund (IPF)/Customer Protection Fund (CPF) at Stock Exchanges -- The Securities Contracts (Regulation) Act of 1956 -- The Securities and Exchange Board of India Act of 1992 -- Foreign Institutional Investors (FIIs) -- Functions of Security Exchange Board of India -- Powers of Security Exchange Board of India -- Investigation -- Cease and Desist Proceedings -- Consolidate Market Regulation Under SEBI -- Reduce Costs -- Regulatory Overlaps -- Growth of Stock Market in India -- Stock Market in India and China Underperforms -- India's Premium over Other EMs Plunges -- Where to Invest Now -- Key Words -- Questions -- References -- Chapter 7: National Income -- Meaning and Definition of National Income -- Concepts of National Income…”
Publicado 2011
Libro electrónico