Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Society & social sciences 285
- Historia 267
- History 187
- Humanities 152
- Literatura: historia y crítica 144
- Management 139
- Economics, finance, business & management 131
- Educación pedagogía 125
- Social aspects 125
- Leadership 110
- Filosofía 103
- Development 97
- Lenguas indoeuropeas 95
- Research 91
- Historia del arte / estilos de arte y diseño 90
- United States 90
- Engineering & Applied Sciences 89
- Prevention 86
- Government policy 79
- Finance 77
- Economic aspects 72
- Business & Economics 71
- Security measures 67
- Application software 65
- Computer networks 65
- Law and legislation 64
- Computer security 63
- Technological innovations 62
- Data processing 60
- Política y gobierno 60
-
3401Publicado 2013“…What makes us divide the world into 'us' and 'them'? How can we exert social influence over others? …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
3402Publicado 2012Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico
-
3403
-
3404Tabla de Contenidos: “…Contents -- Foreword -- Chapter 1: Introduction and Overview -- Chapter 2: The Three Phases of Global Liquidity -- 2.1: Conceptual and Measurement Issues -- 2.2: First Phase of Global Liquidity -- 2.2.1: Round-trip Bank Flows to the US -- 2.2.2: Banking Sector Flows to the Rest of the World -- 2.2.3: Exchange Rates and Leverage -- 2.3: Second Phase of Global Liquidity -- 2.4: The Case of Emerging Asia -- 2.5: Third Phase and Onward -- 2.6: References -- Chapter 3: Early Warning Indicators for Financial Vulnerabilities -- 3.1: Principles for Selection of Early Warning Indicators -- 3.2: Core and Noncore Liabilities -- 3.3: References -- Chapter 4: Emerging Asia’s Noncore Liabilities and Policy Effectiveness -- 4.1: Bank-led Flows, Noncore Liabilities, and Credit Growth -- 4.2: Reassessing Monetary Policy -- 4.3: Appendix -- 4.4: References -- Chapter 5: Capital Flows and Income Distribution -- 5.1: National Policy Remains Key -- 5.2: How Capital Flows Affect Income Inequality -- 5.3: Prioritization for a Multi-Objective Goal -- 5.4: Appendix -- 5.5: References -- Chapter 6: Policy Implications -- 6.1 Tailoring Policies to Vulnerabilities -- 6.2 Macroprudential Tools -- 6.2.1 Bank Capital-Oriented Tools -- 6.2.1.1 Capital Requirements that Adjust Over the Cycle -- 6.2.1.2 Forward-Looking Provisioning -- 6.2.1.3: Leverage caps -- 6.2.1.4: Loan-To-Value and Debt-Service-To-Income Caps -- 6.2.1.5: Loan-to-Deposit caps -- 6.2.1.6: Levy on Noncore Liabilities -- 6.2.1.7: Unremunerated Reserve Requirements -- 6.2.2: Relative Merits of URR versus Levies/Taxes -- 6.2.3: Relationship with other Stabilization Policies -- 6.3: Financial Integration and Institutional Design -- 6.4: Policy Choices -- 6.5: References…”
Libro electrónico -
3405Publicado 2019Tabla de Contenidos: “…-- It's your time to Stand Out -- Part I So, who is the boss? -- chapter 1 Get clear on what matters -- Let's check the pulse -- They've sold us a lemon -- What if I fail? …”
Libro electrónico -
3406Publicado 2019Libro electrónico
-
3407
-
3408Publicado 2008Libro electrónico
-
3409
-
3410Publicado 1990Tabla de Contenidos: “…-- APPROACHES TO RESEARCH -- REGIONAL REQUIREMENTS -- COMMUNICATION -- CONCLUSION -- REFERENCES -- ARE NEUROTOXINS DRIVING US CRAZY? PLANETARY OBSERVATIONS ON THE CAUSES OF NEURODEGENERATIVE DISEASES OF OLD AGE -- CLINICAL FEATURES OF WESTERN PACIFIC ALS/P-D -- WHAT IS THE CAUSE OF WESTERN PACIFIC ALS/P-D? …”
Libro electrónico -
3411
-
3412Publicado 2015Tabla de Contenidos: “…Front Cover; Business Espionage: Risk, Threats, and Countermeasures; Copyright; Dedication; Contents; Author Biography; Introduction; Business espionage misunderstood; Silo Syndrome; James Bond Syndrome; Exclusive Cyber-Security Focus; Ostrich Syndrome; Objective; How to Use This Book; Part 1: Understanding the Problem of Business Espionage; Chapter 1: Understanding the risks; Introduction; Risk Methodology; Risk Formula; Summary; Chapter 2: Characteristics of business spies; MICE; CRIME; BECCA; Project Slammer; U.S. …”
Libro electrónico -
3413Publicado 2015Tabla de Contenidos: “…; ""About This Book""; ""Conventions Used in This Book""; ""Using Code Examples""; ""Safari® Books Online""; ""How to Contact Us""; ""Acknowledgments""; ""Part I. Building Scrapers""; ""Chapter 1. …”
Libro electrónico -
3414por Mol, Michael J.“…"Succinctly but completely describing 50 of the most important management innovations in the past 150 years, Mol and Birkinshaw educate us on where and how managerial innovations arise. …”
Publicado 2009
Libro electrónico -
3415
-
3416
-
3417Publicado 2021Libro electrónico
-
3418Publicado 2021Libro electrónico
-
3419por Power, Samantha“…In 1993, as a 23-year-old correspondent covering the wars in the Balkans, I was initially comforted by the roar of NATO planes flying overhead. …”
Publicado 2002
Libro -
3420por Iyer, Pico, 1957-“…We all carry other people inside our heads - actors, leaders, writers, people from history or fiction, met or unmet, who sometimes seem closer to us than people we know. …”
Publicado 2012
Libro