Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Society & social sciences 285
- Historia 267
- History 187
- Humanities 152
- Literatura: historia y crítica 144
- Management 139
- Economics, finance, business & management 131
- Educación pedagogía 125
- Social aspects 125
- Leadership 110
- Filosofía 103
- Development 97
- Lenguas indoeuropeas 95
- Research 91
- Historia del arte / estilos de arte y diseño 90
- United States 90
- Engineering & Applied Sciences 89
- Prevention 86
- Government policy 79
- Finance 77
- Economic aspects 72
- Business & Economics 71
- Security measures 67
- Application software 65
- Computer networks 65
- Law and legislation 64
- Computer security 63
- Technological innovations 62
- Data processing 60
- Política y gobierno 60
-
6641
-
6642por International Conference on Restorative Justice
Publicado 2005Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
6643Publicado 2017Libro electrónico
-
6644Publicado 2013Tabla de Contenidos: “…A Warning -- Chapter 4 Financial Markets I -- 4-1 The Demand for Money -- Deriving the Demand for Money -- 4-2 Determining the Interest Rate: I -- Money Demand, Money Supply, and the Equilibrium Interest Rate -- Monetary Policy and Open Market Operations -- Choosing Money or Choosing the Interest Rate?…”
Libro electrónico -
6645
-
6646por Tucker, William H.“…It makes an empirical argument about the vast economic inequality that Murray and others say is inevitable and natural but is, in reality, the result of political and social choices. …”
Publicado 2024
Libro electrónico -
6647Publicado 2022Libro electrónico
-
6648
-
6649
-
6650
-
6651Publicado 2016“…The double impulse, triple impulse and multiple impulses enable us to describe directly the critical timing of impulses (resonant frequency) which is not easy for the sinusoidal and other inputs without a repetitive procedure. …”
Libro electrónico -
6652Publicado 2018Libro electrónico
-
6653Publicado 2014“…This book will be a most valuable resource for neurochemists and other scientists alike. In addition, it will contribute to the training of current and future neurochemists and, hopefully, will lead us on the path to curing some of the biggest challenges in human health…”
Libro electrónico -
6654Publicado 2019“…This book is a valuable resource for neurochemists and other scientists alike. In addition, it contributes to the training of current and future neurochemists and, hopefully, will lead us on the path to curing some of the biggest challenges in human health…”
Libro electrónico -
6655
-
6656Publicado 2022Tabla de Contenidos: “…-- 1.2.1 Approach Taken at the ASSP -- 1.2.2 ASSP Risk Assessment Committee -- 1.2.3 The Goals -- 1.2.4 Core Risk-Related Competencies -- 1.2.5 Risk Assessment Education -- 1.3 Risk Assessment Methods -- 1.4 The ANSI/ASSP Z690 - 2011 Series -- 1.5 ANSI B11.0 - 2020: Safety of Machinery -- 1.6 Risk Scoring Systems -- 1.7 European Union - Risk Assessment -- 1.8 OSHA Requirements -- 1.9 EPA Requirements -- 1.10 The Chemical Industry - The Extensive Body of Information -- 1.11 Conclusion -- References -- Chapter 2 Risk Assessment Standards and Definitions -- 2.1 Introduction -- 2.2 Risk Assessments and the Safety Professional -- 2.3 Key Standards Requiring Risk Assessments -- 2.4 OSHA Compliance and Risk Assessments -- 2.4.1 1910.132, Personal Protective Equipment Standard -- 2.4.2 1910.119, Process Safety Management Standard -- 2.4.3 Other OSHA Standards -- 2.5 Consensus Standards Requiring Risk Assessment -- 2.6 ANSI Z10.0 -- 2.7 ISO 45001 -- 2.8 ISO 31000 and ISO 31010 -- 2.9 ANSI/ASSP Z590.3, Prevention Through Design -- 2.10 ANSI B11.0 Machine Safety -- 2.11 NFPA 70E -- 2.12 MIL-STD-882E, 11 May 2012, Department of Defense Standard Practice, System Safety -- 2.13 Key Terms and Definitions -- 2.14 Summary -- Review Questions -- References -- Chapter 3 Risk Assessment Fundamentals -- 3.1 Introduction -- 3.2 Risk Assessment Within the Risk Management Process -- 3.3 Risk Assessments and Operational Risk Management Systems -- 3.4 The Purpose of Assessing Risk -- 3.5 The Risk Assessment Process -- 3.6 Risk Criteria -- 3.7 Establishing Context -- 3.8 The Risk Assessment Team -- 3.9 Risk Identification -- 3.10 Risk Analysis -- 3.10.1 Consequence Analysis -- 3.10.2 Likelihood Analysis…”
Libro electrónico -
6657Publicado 2023Tabla de Contenidos: “…Security in serverless architectures -- Security observability -- Compliance auditing -- Threat modeling and risk assessment -- Incident response -- Security training and culture -- Continuous learning and improvement - the DevSecOps mindset -- The role of automation in DevSecOps -- The importance of collaboration in DevSecOps -- The power of open source in DevSecOps -- Future trends - the evolution of DevSecOps -- Summary -- Quiz -- Further readings -- Part 3: Legal, Compliance, and Vendor Management -- Chapter 9: Legal and Compliance -- Overview -- Comprehending privacy in the cloud -- The importance of privacy in the cloud-native landscape -- The CCPA and its implications for cloud-native -- Other significant US privacy laws and their implications for cloud-native -- Audit processes, methodologies, and cloud-native adoption -- Importance of audit processes and methodologies in cloud-native adoption -- Common audit processes and methodologies -- Laws, regulations, and standards -- The CFAA and its implications for cloud-native software security -- The FTCA and its implications for cloud-native software security -- Overview of compliance standards and their implications for cloud-native software security -- Case studies - incidents related to standards and their implications for security engineers -- Summary -- Quiz -- Further readings -- Chapter 10: Cloud Native Vendor Management and Security Certifications -- Security policy framework -- Understanding cloud vendor risks -- Understanding security policy frameworks -- Implementing security policy frameworks with cloud vendors -- Effective security policy framework in a cloud environment -- Best practices for implementing a security policy framework with cloud vendors -- Government cloud standards and vendor certifications -- Industry cloud standards…”
Libro electrónico -
6658
-
6659
-
6660