Mostrando 42,461 - 42,480 Resultados de 51,016 Para Buscar 'Nontron~', tiempo de consulta: 1.46s Limitar resultados
  1. 42461
    por Spiers, Mary V.
    Publicado 2013
    Tabla de Contenidos: “…Women's Health Psychology -- Contents -- Foreword -- Preface -- Acknowledgments -- List of Contributors -- SECTION 1: Women's Health in Context -- Chapter 1 Historical Roots of Women's Healthcare -- INTRODUCTION -- CHILD AND ADOLESCENT HEALTH -- ADOLESCENT GROWTH AND DEVELOPMENT -- SEXUALITY AND SEX EDUCATION -- THE BIRTH CONTROL MOVEMENT -- THE WOMEN'S HEALTH MOVEMENT -- PREGNANCY AND CHILDBIRTH -- ABORTION, STERILIZATION ABUSE, AND REPRODUCTIVE RIGHTS -- SEXUAL ASSAULT AND THE ANTIRAPE MOVEMENT -- GENDER EQUALITY AND MEDICAL RESEARCH -- REFERENCES -- Chapter 2 Retheorizing Women's Health Through Intersectionality's Prism -- INTERSECTIONALITY: A BRIEF HISTORY OF AN INTENSELY USEFUL BUT UNDERUTILIZED THEORY IN PSYCHOLOGY -- THE INDIVIDUAL AS QUEEN: A REVIEW OF FIVE PSYCHOLOGICAL THEORIES OF HEALTH BEHAVIOR -- The Health Belief Model -- The Theory of Reasoned Action (TRA) and the Theory of Planned Behavior (TPB) -- Social Cognitive Theory (SCT) -- Transtheoretical Model (TTM) and Stages of Change -- FLIPPING THE INDIVIDUALISTIC SCRIPT: CRITIQUES OF PSYCHOSOCIAL HEALTH BEHAVIOR THEORIES -- HIV/AIDS: THE OTHER WEIGHTY ISSUE -- Contextualizing HIV/AIDS Among Women -- Socioeconomic Status: The Dollars and Cents of Women's HIV Risk -- Social Inequality, Women, and HIV Risk -- OPTIMISM RISING AND FALLING: TOWARD AN INTERSECTIONALITY-INFORMED UNDERSTANDING OF WOMEN'S HEALTH -- THE REVERBERATIONS OF "AIN'T I A WOMAN?"…”
    Libro electrónico
  2. 42462
    Publicado 2023
    Tabla de Contenidos: “…Creating and funding an account with MetaMask -- Using MetaMask and Remix IDE to deploy a smart contract -- Adding a custom network to MetaMask and connecting it with Remix IDE -- Importing accounts into MetaMask using keystore files -- Deploying a contract with MetaMask -- Interacting with a contract through MetaMask using Remix IDE -- Summary -- Chapter 11 : Tools, Languages, and Frameworks for Ethereum Developers -- Languages -- The Solidity compiler -- Installing solc -- Experimenting with solc -- Tools, libraries, and frameworks -- Node.js -- Ganache -- ganache-cli -- Ganache UI -- Truffle -- Drizzle -- Other tools -- Contract development and deployment -- Writing smart contracts -- Testing smart contracts -- Deploying smart contracts -- The Solidity language -- Functions -- Variables -- Local variables -- Global variables -- State variables -- Data types -- Value types -- Reference types -- Control structures -- Events -- Inheritance -- Libraries -- Error handling -- Summary -- Chapter 12 : Web3 Development Using Ethereum -- Interacting with contracts using Web3 and Geth -- Deploying contracts -- Using solc to generate ABI and code -- Querying contracts with Geth -- Interacting with Geth using POST requests -- Interacting with contracts via frontends -- Installing the web3.js JavaScript library -- Creating a web3 object -- Creating an app.js JavaScript file -- Creating a frontend webpage -- Calling contract functions -- Creating a frontend webpage -- Deploying and interacting with contracts using Truffle -- Installing and initializing Truffle -- Compiling, testing, and migrating using Truffle -- Interacting with the contract -- Using Truffle to test and deploy smart contracts -- Deployment on decentralized storage using IPFS -- Summary -- Chapter 13 : The Merge and Beyond -- Introduction -- Ethereum after The Merge -- The Beacon Chain…”
    Libro electrónico
  3. 42463
    Publicado 2013
    Tabla de Contenidos: “…La normativa bancaria sobre gestión de riesgos y control interno; 2.3. Riesgos y solvencia de las entidades de crédito; 2.4. …”
    Libro electrónico
  4. 42464
    Publicado 2024
    Tabla de Contenidos: “…Chapter 16 Product Strategy -- Principle: Focus -- The Power of an Inspiring Product Vision -- Principle: Powered by Insights -- Principle: Transparency -- Principle: Placing Bets -- Chapter 17 Product Discovery -- Principle: Minimize Waste -- Principle: Assess Product Risks -- Assessing Ethical Risk -- Principle: Embrace Rapid Experimentation -- Principle: Test Ideas Responsibly -- Chapter 18 Product Delivery -- Principle: Small, Frequent, Uncoupled Releases -- High-Integrity Commitments -- Principle: Instrumentation -- Principle: Monitoring -- Principle: Deployment Infrastructure -- Managing Technical Debt -- Chapter 19 Product Culture -- Principle: Principles over Process -- Continuous Process Improvement -- Principle: Trust over Control -- Principle: Innovation over Predictability -- From Projects to Products -- Principle: Learning over Failure -- Chapter 20 Innovation Story: Carmax -- Company Background -- The Problem to Solve -- Discovering the Solution -- The Results -- Part V Transformation Story: Trainline -- Part VI The Product Model in Action -- Chapter 21 Partnering with Customers -- Promises -- Product Discovery -- Product Delivery -- Happy, Referenceable Customers and Business Impact -- Chapter 22 Partnering with Sales -- Chapter 23 Partnering with Product Marketing -- Market Understanding and Competitive Analysis -- Product Go-to-Market -- Key Product Decisions -- Customer Discovery Program -- Messaging and Positioning -- Customer Impact Assessment -- Pricing and Packaging -- Sales Enablement -- Chapter 24 Partnering with Finance -- Testing the Product Model -- Product and Finance Collaboration -- Requests of Finance -- Chapter 25 Partnering with Stakeholders -- Chapter 26 Partnering with Executives -- Decisions -- Outcomes -- Disagreements -- Promises -- Surprises -- Trust -- Chapter 27 Innovation Story: Gympass -- Company Background…”
    Libro electrónico
  5. 42465
    Publicado 2024
    Tabla de Contenidos: “…5.3 Privacy-Sensitive and Situation-Aware Thing Description -- 5.3.1 Overview -- 5.3.2 Step 1: SituationPrivacy Metamodel Definition -- 5.3.3 Step 2: SituationPrivacyWoTTD Metamodel Definition -- 5.3.4 Step 3: SituationPrivacyWoTTD Model Generation -- 5.4 Implementation -- 5.4.1 Model Transformation -- 5.4.2 Simulation -- 5.4.3 Evaluation -- 5.5 Conclusion -- Appendix 1 -- Notes -- References -- Chapter 6 Protect the Gate: A Literature Review of the Security and Privacy Concerns and Mitigation Strategies Related to IoT Smart Locks -- 6.1 Introduction -- 6.1.1 Background -- 6.1.2 Architecture -- 6.1.3 Capabilities -- 6.1.4 Access Control -- 6.1.5 Authentication and Authorization -- 6.2 The Privacy and Security of Smart Locks -- 6.2.1 Smart Locks Privacy and Security From the Perspective of Researchers -- 6.2.2 Smart Homes Privacy and Security From the Perspective of the End User -- 6.3 Research Gaps -- 6.4 Conclusion -- References -- Chapter 7 A Game-Theoretic Approach to Information Availability in IoT Networks -- 7.1 Introduction -- 7.2 Related Work -- 7.3 System Model -- 7.3.1 Spectrum-Sharing Cognitive Systems -- 7.3.2 Problem Statement -- 7.3.3 Primary Outage Probability -- 7.4 Zero-Determinant Strategies -- 7.5 Game-Theoretic Strategy for IoT Transmission -- 7.5.1 Uncoordinated Transmission Strategy -- 7.5.2 Special Cases -- 7.5.3 Performance Analysis -- 7.6 Extension to Multiple Users -- 7.7 Numerical Results -- 7.8 Discussions and Conclusions -- References -- Chapter 8 Review on Variants of Restricted Boltzmann Machines and Autoencoders for Cyber-Physical Systems -- 8.1 Introduction to RBMs and Autoencoding -- 8.2 Background -- 8.2.1 Targeted Problems Using RBM's and Autoencoders -- 8.2.2 Techniques Used for Cyber-Physical Systems Using RBMs and Autoencoders -- 8.2.3 Detecting Network Intrusions to Ensure the Security of CPS in IoT Devices…”
    Libro electrónico
  6. 42466
    Publicado 2024
    Tabla de Contenidos: “…Improvisational decision making: Context, antecedents, and outcomes -- Introduction -- Theoretical background -- Theory and hypotheses -- Methods -- Measures -- Dependent variables -- Contextual variables and SDM processes -- Control variables -- Analysis -- Results -- Discussion -- Contributions to theory -- Implications for managers -- Limitations and future work -- Conclusion -- References -- 9. …”
    Libro electrónico
  7. 42467
    Publicado 2024
    Tabla de Contenidos: “…Digging into the Three Types of Workplace Empathy -- Cognitive empathy -- Emotional empathy -- Compassionate empathy -- Being an empathetic leader -- Figuring Out the Four Domains of Emotional Intelligence -- Self-awareness -- Self-control -- Social awareness -- Relationship management -- Discovering Your Level of Empathy and Emotional Intelligence -- Realizing the Need for Greater Empathy and Emotional Intelligence -- Applying Empathy and Emotional Intelligence in the Workplace -- Chapter 9 Developing Cross-Cultural Competence and Cultural Intelligence -- Defining Culture -- Knowing the Difference between Cultural Competence and Cultural Intelligence -- Discovering Why these Competencies Matter to Leaders -- Mapping the Two Mindsets of Intercultural Competence -- Monocultural mindset -- Intercultural mindset -- Exploring the Five Orientations of Cultural Competence -- Denial -- Polarization -- Minimization -- Acceptance -- Adaptation -- Becoming a Culturally Competent and Culturally Intelligent Leader -- Part 3 Leading Others -- Chapter 10 Assembling and Leading Diverse and Hybrid Teams -- Sourcing Diverse Talent -- Acclimating New Hires to the Team -- Leading Your Team Through Five Stages of Development -- Forming -- Storming -- Norming -- Performing -- Adjourning -- Figuring out what stage your team is at -- Maximizing the Benefits of a Diverse Team -- Creativity and problem solving -- Collaboration -- Increased business performance -- Engagement and retention -- Fostering an Environment of Trust and Belonging -- Leading Across Differences and Distances -- Avoiding Common Pitfalls when Leading a Diverse Team -- Chapter 11 Establishing Trust and Psychological Safety -- Defining Trust and Psychological Safety -- Outlining the Four Stages of Psychological Safety -- Inclusion Safety -- Learner Safety -- Contributor Safety -- Challenger Safety…”
    Libro electrónico
  8. 42468
    por Y Alanis, Alma
    Publicado 2024
    “…Bio-Inspired Strategies for Modeling and Detection in Diabetes Mellitus Treatment focuses on bio-inspired techniques such as modelling to generate control algorithms for the treatment of diabetes mellitus. …”
    Libro electrónico
  9. 42469
    Publicado 2024
    “…Discover essential real-time rendering techniques that can be extended or applied directly to existing or new rendering engines focusing only on Vulkan Key Features Explore a wide range of advanced 3D graphics programming techniques to leverage the full potential of Vulkan API Learn tips, tricks, and solutions to boost your 3D graphics for a wide range of cross-platform devices Implement geometry projection, texturing, and lighting techniques Purchase of the print or Kindle book includes a free PDF eBook Book Description Vulkan is a graphics API that gives the program total control of the GPU, allowing the GPU to be used to its full potential. …”
    Libro electrónico
  10. 42470
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1 - Effective and Efficient Security Management and Operations in Azure -- Chapter 1: Identity Foundations with Azure Active Directory and Microsoft Entra -- Protecting users' identities and securing the value chain - the importance of IAM in decentralized organizations -- Authentication and authorization in Azure -- Engaging and collaborating with employees, partners, and customers -- The significance of digital identities in the modern IT landscape -- Modernizing your IAM with Microsoft Azure AD -- Life cycle management -- Leveraging the Microsoft Cloud Adoption Framework -- Azure AD terminology, explained -- Securing applications with the Microsoft identity platform -- Securing cloud-based workloads with Microsoft Entra's identity-based access control -- Azure AD -- Microsoft Entra Permissions Management -- Microsoft Entra Verified ID -- Microsoft Entra workload identities -- Microsoft Entra Identity Governance -- Microsoft Entra admin center -- Summary -- Chapter 2: Managing Access to Resources Using Azure Active Directory -- Understanding the need for IAM -- Understanding Azure AD (now Microsoft Entra ID) -- Exploring the Microsoft Entra ID editions -- Microsoft Entra ID Premium P2 -- Understanding the capabilities of Microsoft Entra ID -- Task 1 - creating a new Azure AD tenant using the Azure portal -- Task 2 - creating and configuring Azure AD users -- Task 3 - creating an Azure AD group with dynamic membership -- Hybrid identity - integrating your on-premises directories (Azure AD Connect sync and cloud sync) -- Azure AD Connect sync -- Azure AD Connect cloud sync -- Azure AD Application Proxy -- Azure AD Conditional Access -- Azure AD PIM -- Assigning roles in PIM -- Summary…”
    Libro electrónico
  11. 42471
    Publicado 2023
    Tabla de Contenidos: “…Chapter 7: Implementing Your Gamification -- Decoding your gamification -- Building your implementation team -- Building a prototype -- Building your product -- Writing user stories -- Milestones and iteration testing -- Product and feature launch -- The full product launch -- New feature rollouts -- Setting up tools to track performance -- Making data-driven decisions -- User acquisition -- Activation -- Monetization -- Retention -- A/B testing -- Pivot or persevere -- Creating a process of continual improvement -- Implementing feedback loops -- Summary -- Chapter 8: Challenges and Limitations in Gamification -- Keeping gamification ethical -- Addiction by Design -- Balancing gamification and user privacy -- Anonymization and aggregation of data -- User control and consent -- Accessibility to all users -- Ensuring gamification doesn't harm the user experience -- Avoiding common pitfalls and mistakes -- Behavioral insights -- Another example of mistakes from prominent literature -- Summary -- Further reading -- Chapter 9: Selling Your Gamification Strategy -- Building your business case -- Use case - Kahoot -- Step-by-step guide for creating a compelling business case for gamification -- Leadership buy-in -- Example of utilizing the Pyramid Principle -- Relationship building -- Use case - Atlassian -- Cross-functional teams -- GTM strategy -- Case study - Apple Watch -- Case study - GuruShots -- Case study - Peloton -- Summary -- Further reading -- Chapter 10: Gamifying Your Product Development Processes -- The draft game -- Utilizing design thinking to create gamified activities for product development -- Empathize - understanding your team's needs and motivations -- Define - setting clear goals and objectives for gamified activities -- Ideate - brainstorming creative gamification strategies -- Prototype - designing and testing gamified activities…”
    Libro electrónico
  12. 42472
    Publicado 2023
    Tabla de Contenidos: “…-- An example of CI/CD pipelines -- Continuously integrating and deploying your infrastructure -- Integration testing -- Deployment -- CI/CD with Atlantis -- Deploying Atlantis to AWS -- Running Terraform using Atlantis -- Summary -- Exercises -- Chapter 14: Avoiding Pitfalls in DevOps -- Technical requirements -- Too much or not enough automation -- Repetitive tasks -- Time-consuming tasks -- Manual and error-prone tasks -- Tasks with version control integration -- Tasks with repeatable patterns -- Tasks with well-defined APIs or interfaces -- Tasks with clear and well-defined requirements -- Not understanding the technology -- Stay curious and proactive -- Start with the basics -- Hands-on learning -- Collaborate and share knowledge -- Stay updated -- Failure to adopt a collaborative culture -- Lack of leadership -- Siloed organizational structure -- Lack of trust and communication -- Tool-centric approach -- Neglecting testing and QA -- Increased software defects -- Deployment failures -- Security vulnerabilities -- Lack of documentation -- Inadequate test coverage -- Lack of continuous improvement -- Poor monitoring and feedback loops -- Real-time -- Comprehensive -- Scalable -- Actionable -- Continuously improving -- Inadequate security and compliance measures -- What are security measures? …”
    Libro electrónico
  13. 42473
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title page -- Copyright and credits -- Dedication -- Contributors -- Table of Contents -- Preface -- Part 1: Understanding Kubernetes Anti-Patterns -- Chapter 1: Introduction to Kubernetes Anti-Patterns -- Understanding Kubernetes anti-patterns -- The deceptive allure of anti-patterns -- Types and forms of Kubernetes anti-patterns -- A call to vigilance -- The significance of identifying anti-patterns -- Guardians of stability -- The butterfly effect in Kubernetes -- Efficiency and resource optimization -- Reliability and performance -- Security and compliance -- Maintainability and scalability -- Cost control and resource allocation -- A competitive advantage -- The impact across the Kubernetes ecosystem -- Performance degradation -- Maintenance complexity -- Developer productivity -- Interoperability challenges -- Long-term technical debt -- Summary -- Chapter 2: Recognizing Common Kubernetes Anti-Patterns -- Ten common anti-patterns in Kubernetes -- 1. …”
    Libro electrónico
  14. 42474
    por Flora, S. J. S.
    Publicado 2020
    Tabla de Contenidos: “…Front Cover -- Handbook on Biological Warfare Preparedness -- Copyright -- Dedication -- Contents -- Contributors -- Preface -- Acknowledgments -- Chapter 1: Biological warfare agents: History and modern-day relevance -- History of biological warfare agents -- Biological warfare agents -- Characteristics of biological weapons -- Advantages and disadvantages of biological agents -- Characteristics of an ideal biological warfare agent -- Classification of biological warfare agents according to the Center for Disease Control -- Present-day relevance of the agents -- Detection -- Conclusion -- References -- Chapter 2: Bacterial biological warfare agents -- Introduction -- Warfare agents -- Biological warfare agents as a preferred weapon of destruction -- Biological warfare agents -- Bacterial biological warfare agents are unique -- Historical aspects -- Bacterial biological warfare agents -- Lists of bacterial biological warfare agents -- Bacillus anthracis -- Yersinia pestis -- Brucella suis -- Coxiella burnetii -- Francisella tularensis -- Burkholderia pseudomallei -- Burkholderia mallei -- Reason behind rising bacterial bioterrorism -- Identifying the signs of biological attack -- Detection techniques for bacterial biological warfare agents -- Establishment of bacterial biological weapon programs -- Biological warfare program of the USSR -- Japanese biological warfare program -- United States biological warfare program -- Iraq's biological warfare program -- Impact of bacterial bioweaponization for society -- Conclusion -- References -- Chapter 3: Toxins as biological warfare agents -- Introduction -- Dinoflagellate toxins -- Saxitoxin -- Bacterial toxins -- Botulinum neurotoxin -- Staphylococcal enterotoxins -- Staphylococcal enterotoxin B -- Fungal toxins -- Trichothecenes (T-2) toxin -- Diacetoxyscirpenol -- Snail toxins -- Conotoxins…”
    Libro electrónico
  15. 42475
    Publicado 2024
    Tabla de Contenidos: “…-- Basic scheduling -- Handling timer signals -- File monitoring -- Inotify -- fsnotify -- File rotation -- Process management -- Execution and timeouts -- Execute and control process execution time -- Building a distributed lock manager in Go -- Summary -- Chapter 6: Understanding Pipes in Inter-Process Communication -- Technical requirements -- What are pipes in IPC? …”
    Libro electrónico
  16. 42476
    por Institute of Medicine (U.S.).
    Publicado 1991
    Tabla de Contenidos: “…RESPONSIBILITIES OF FEDERAL AGENCIES -- Public Health Service -- Centers for Disease Control -- Food and Drug Administration -- National Institutes of Health -- Agency for Health Care Policy and Research -- Health Care Financing Administration -- Conditions of Coverage -- State Survey Process -- HSQB and the ESRD Networks -- Bureau of Policy Development -- Office of Research and Demonstrations -- Coordination Within HCFA -- Quality Assessment and Assurance Data Needs -- CONTINUOUS QUALITY IMPROVEMENT -- The Dialysis Facility: Practical Considerations -- Examples of ESRD Quality Assurance -- CONCLUSIONS AND RECOMMENDATIONS -- NOTES -- REFERENCES -- APPENDIX 1 QUALITY OF CARE IN ESRD: AN EXAMPLE OF A PROXIMATE CLINICAL INDICATOR -- Treating Anemia in Dialysis Patients1 -- Potential Use as an Outcome Indicator -- Potential Use as Process Indicators -- NOTE -- References -- APPENDIX 2 EXAMPLES OF ESRD QUALITY ASSURANCE -- Dialysis Clinic, Inc., Cincinnati (DCI-C) -- Greenfield Health Systems -- National Medical Care, Inc. …”
    Libro electrónico
  17. 42477
    Tabla de Contenidos: “…Shipping, and Handling of Biological Specimens -- H- LABELING OF SPECIMENS WITHIN THE LABORATORY -- I- PREVENTION OF AEROSOL AND DROPLET GENERATION -- 1- Introduction -- 2- Control of Aerosols and Droplets -- J- CONTAINMENT EQUIPMENT -- 1- Introduction -- 2- Biological Safety Cabinets -- 3- Pipetting Devices -- 4- Sonicators, Homogenizers, and Mixers -- 5- Clothing, Masks, and Face Shields -- K- BIOSAFETY IN LARGE-SCALE PRODUCTION -- 1- Introduction -- 2- Organization and Responsibilities -- 3- Containment -- 4- Inactivation -- 5- Disposal -- 6- Exposure -- 7- Conclusion -- L- BIOSAFETY IN PHYSICIANS' OFFICE LABORATORIES AND OTHER SMALL VOLUME CLINICAL LABORATORIES -- 4 Safe Disposal of Infectious Laboratory Waste -- A- INTRODUCTION -- B- INFECTIOUS POTENTIAL OF LABORATORY WASTE -- 1- Risks to the General Public's Health -- 2- Occupational Risks -- C- CHARACTERISTICS OF INFECTIOUS LABORATORY WASTE -- D- RESPONSIBILITY FOR THE SAFE HANDLING AND DISPOSAL OF INFECTIOUS WASTE -- 1- GENERATORS OF INFECTIOUS WASTE -- 2- Haulers and Waste Treatment Facilities -- E- WASTE HANDLING AND TREATMENT METHODS -- 1- Basic Principles -- 2- Containment -- 3- Personal Protection -- 4- Chemical Decontamination -- 5- Steam Autoclaving -- 6- Incineration -- 7- Validation of Decontamination Methods -- F- INFECTIOUS WASTE REQUIRING SPECIAL CONSIDERATION -- 1- Mixed Waste -- 2- Human Cadavers and Other Anatomical Waste -- 3- Animal Bedding materials -- 4- "Sharps -- 5 Safety Management -- A- ADMINISTRATIVE ORGANIZATION AND RESPONSIBILITIES -- 1- Introduction -- 2- The Laboratory Safety Program -- a- Goals of a Laboratory Safety Program -- b- Responsibility for Laboratory Safety -- c- Safety Plans -- d- Safety Meetings and Safety Committees -- e- Safety Communications -- f- Monitoring Safety -- B- FACILITIES -- 1- Introduction -- 2- Laboratory Design…”
    Libro electrónico
  18. 42478
    por Pathak, Harsh
    Publicado 1900
    Tabla de Contenidos: “…Managers and Self-renewal System -- Managers and Organisational Learning -- Managers and Stress Management -- Managers and Research -- Motivation as the Soul of a Manager -- Aspects of Role Efficacy -- Manager as Motivator of Employees -- Self-role Integration -- Productivity -- Creativity -- Confrontation -- Centrality -- Influence -- Growth -- Inter-role Linkage -- Helping -- Super-Ordination -- Using Power and Empowering Employees -- Managerial Control -- Coping Behaviour of a Manager -- Managing Frustration and Stress -- Consultant Support During Change -- Manager and Group Dynamics -- Three Uses of Group in Idea Generation -- Managerial Communication -- Obstacles in the Middle of Change and How to Overcome Them -- Classic Skills for an Effective Change Manager -- Summary -- Case Study: "Genesis" A National Scientific Laboratory -- Review Questions -- Learning Orgnisation: The Ultimate Objective of Management of Change -- Introduction -- What is a Learning Orgnisation? …”
    Libro electrónico
  19. 42479
    por Varma, Sumati
    Publicado 2015
    Tabla de Contenidos: “…National Competitive Advantage -- Theory Assessment -- DEVELOPMENTS IN WORLD TRADE -- Volume of Trade -- Composition of World Trade -- Direction of World Trade -- Service Trade -- Key Terms -- Discussion Questions -- Chapter 5 COMMERCIAL POLICY INSTRUMENTS -- Introduction -- Government intervention in trade -- Economic Rationale -- Non-economic Rationale -- INSTRUMENTS OF TRADE CONTROL -- Tariff Barriers -- Non-tariff Barriers -- ANALYSIS OF INDIA'S FOREIGN TRADE -- Volume of India's Foreign Trade -- Composition of India's Foreign Trade -- Direction of India's Foreign Trade -- Key Terms -- Discussion Questions -- Chapter 6 MULTILATERAL REGULATION OF TRADE -- Introduction -- General Agreement on Tariffs and Trade (GATT ) -- Objectives and Principles -- Uruguay Round -- GATT : An Evaluation -- World Trade Organization (WTO ) -- WTO AGREEMENTS -- General Agreement on Tariffs and Trade (GATT ) -- General Agreement on Trade in Services (GATS ) -- Agreement on Trade-related Aspects of IntellectualProperty Rights (TRIPS) -- Agreement on Trade-related Investment Measures (TRIMS) -- ORGANIZATIONAL STRUCTURE OF WTO -- Principles of WTO -- Most-Favored-Nation (MFN) -- National Treatment -- FUNCTIONS OF WTO -- WTO : AN EVALUATION -- Developing Country Issues -- Dispute Resolution Mechanism -- Subsidies in Agriculture -- FUTURE CHALLENGES FOR WTO -- UNITED NATIONS CONFERENCE ON TRADE AND DEVELOPMENT (UNCTAD ) -- Functions of UNCTAD -- UNCTAD : An Assessment -- KEY TERMS -- DISCUSSION QUESTIONS -- Chapter 7 INTERNATIONAL TRADE FINANCE AND PROMOTION -- INTRODUCTION -- INTERNATIONAL TRADE PAYMENT -- Cash in Advance -- Letter of Credit (L/C) -- Documentary Collection -- Open Account -- TERMS OF TRADE -- Free on board -- Free alongside Ship -- Cost, Insurance and Freight -- Cost and freight -- INTERNATIONAL TRADE FINANCE -- Private Sources -- Governmental Sources…”
    Libro electrónico
  20. 42480
    por Saleem, Shaikh
    Publicado 2011
    Tabla de Contenidos: “…Price Movement During the 1980s -- Price Situation During the 1990s -- Objectives of Price Policy -- Prices of Industrial Products -- Control of Expenditure -- International Prices of Select Commodities -- Challenges and Outlook -- Key Words -- Questions -- References -- Chapter 6: Stock Exchanges in India -- Concept and Meaning of Stock Exchange -- List of Stock Exchanges in India -- Types of Financial Markets -- SEBI and Its Role in the Secondary Market -- Security Exchange Board of India (SEBI) -- Role of SEBI in Regulating Trading in the Secondary Market -- Products Available in the Secondary Market -- Regulatory Requirements Specified by SEBI for Corporate Debt Securities -- Broker and Sub-broker in the Secondary Market -- Broker -- Sub-broker -- Agreement with the Broker or Sub-broker -- Risk Disclosure Document -- Placing Orders with the Broker or Sub-broker -- Brokerage that a Broker or Sub-broker Can Charge -- Charges Levied on the Investor by a Stockbroker/Sub-broker -- Securities Transaction Tax (STT) -- Rolling Settlement -- SEBI Risk Management System -- Redressing Investor Grievances -- Investor Protection Fund (IPF)/Customer Protection Fund (CPF) at Stock Exchanges -- The Securities Contracts (Regulation) Act of 1956 -- The Securities and Exchange Board of India Act of 1992 -- Foreign Institutional Investors (FIIs) -- Functions of Security Exchange Board of India -- Powers of Security Exchange Board of India -- Investigation -- Cease and Desist Proceedings -- Consolidate Market Regulation Under SEBI -- Reduce Costs -- Regulatory Overlaps -- Growth of Stock Market in India -- Stock Market in India and China Underperforms -- India's Premium over Other EMs Plunges -- Where to Invest Now -- Key Words -- Questions -- References -- Chapter 7: National Income -- Meaning and Definition of National Income -- Concepts of National Income…”
    Libro electrónico