Mostrando 81 - 100 Resultados de 124 Para Buscar 'Private Media Group', tiempo de consulta: 0.12s Limitar resultados
  1. 81
    Publicado 1990
    Tabla de Contenidos: “…Nutrition -- HUNGER -- SPECIFIC NUTRITIONAL RISK FACTORS -- Hypertension -- Cholesterol -- Obesity -- Anorexia and Bulimia -- Anemia -- SPECIAL TARGET GROUPS -- Pregnant Women -- Infants and Children…”
    Libro electrónico
  2. 82
  3. 83
    Publicado 2023
    Libro electrónico
  4. 84
    Publicado 2021
    Tabla de Contenidos: “…-- Marketing and Sustainability -- Viral Marketing and Its Influence on Customer's Purchasing Decisions: A Quantitative Study in Lebanon -- The Importance of Tools Specific Mobile Networks and Social Online Networks for Start-Ups in Bucharest -- Some Considerations on Integrating Corporate Social Responsibility in the Marketing Strategy of Banking Institutions -- Awareness of the Endogenous Factors Influence Purchasing and Consumption Decisions -- Global Challenges for Agri-Food Systems and Sustainable Development -- Local Action Groups Implications in Rural Romania -- Sustainable Development of a PDO or PGI form the Voluntary Scheme "Traditional Product" -- Romania's Agro-Food Sector: Issues of Cluster Development and Competitive Positioning -- The Role of Innovation in Public and Private Organizations in Context of Digital Transformation -- The Perspective of the Development of the Industry of the Future in Romania in the Context of Big Data and Digitalization -- The Art of Product Management - a Practical Guide for Product Value Maximization -- Applied Economics and Statistics and Data Science -- Comparative Analysis of Different Methods to Measure Welfare Beyond GDP for Romania -- The Evolution of Inflation in the Context of the COVID-19 Pandemic -- Bertrand Competition Under Incomplete Information -- The Role of Accounting in Sustainable Development -- Digitalization in Accounting: A Structured Literature Review -- Business Law and Sustainable Development -- Personal Data between Individual Protection and the General Interest -- The New Direction of the EU: the Creation of a Digital Europe…”
    Libro electrónico
  5. 85
    Publicado 2020
    “…Indeed, this must-read book shows how contesting artists subvert the increasing privatization, consumerization and electronic monitoring of public space and its virtualization in the new media in our own time period…”
    Libro electrónico
  6. 86
    Publicado 2022
    Tabla de Contenidos: “…Introduction . xvi -- 1.1 The State of the Research3 -- 1.2 The Analytical Framework 11 -- 1.3 The Aims, Methods and Justification 14 -- 1.4 The Research Questions . 17 -- 1.5 Limitations to this Research . 19 -- 1.6 Overview of the Structure 21 -- 2 Theoretical Framework 27 -- 2.1 Accountability as a Concept 27 -- 2.1.1 Understanding accountability 28 -- 2.1.2 Subjects of the relation 31 -- 2.1.3 Issues with translation 35 -- 2.2 The Rights-Based Approach 37 -- 2.2.1 Understanding this rights-based perspective . 37 -- 2.2.2 Goals and operations 38 -- 2.3 The Right to Adequate Housing 40 -- 2.3.1 Understanding the right to adequate housing 41 -- 2.3.2 Legal guarantees to the most marginalized groups . 46 -- 2.3.3 Social housing programs as a mechanism to combat human rights violations 49 -- 2.3.4 Economic growth and costs . 50 -- 2.4 Accountability Relations in Social Housing Programs . 52 -- 2.4.1 Responsibility 52 -- 2.4.2 Answerability . 53 -- 2.4.3 Enforcement . 54 -- 2.5 Summary 62 -- 3 A Review: historical, political, socio-economic, legal and policy backgrounds 63 -- 3.1 Historical, Political and Socio-economic Background 63 -- 3.1.1 A historical look. 63 -- 3.1.2 Latest political developments 64 -- 3.1.3 Socio-economic trends . 67 -- 3.2 Administrative Law Review 70 -- 3.2.1 Administrative and public procurement procedures 70 -- 3.2.2 Principles of Administrative Law in Brazil and Chile 72 -- 3.2.3 Rights-based principles 75 -- 3.2.4 Theories of responsibility of the State . 77 -- 3.3 Housing Policy Review 80 -- 3.3.1 Chilean Housing Policy Review 82 -- 3.3.2 Brazilian Housing Policy Review 88 -- 3.4 Summary 95 -- 4 Dimension 1: Responsibility in social housing programs 97 -- 4.1 Beneficiaries . 97 -- 4.1.1 Legal definitions 98 -- 4.1.2 Vulnerable categories: FAR, FDS, D.S. 19 and D.S. 49 . 101 -- 4.1.3 Emergent categories: FGTS (1.5, 2 and 3), D.S. 1 and D.S. 19104 -- 4.2 Service Providers . 109 -- 4.2.1 Financial institutions 109 -- 4.2.2 Firms and business enterprises of the private construction sector 114 -- 4.2.3 Supporting entities . 116 -- 4.2.4 Other supporting agents . 122 -- 4.2.5 Frontline professionals . 124 -- 4.3 Government 125 -- 4.3.1 Ministries . 126 -- 4.3.2 Funds 127 -- 4.3.3 Coordination bodies . 130 -- 4.3.4 Local public entities . 133 -- 4.3.5 Decentralization and coordination . 134 -- 4.4 Others . 137 -- 4.4.1 Courts . 137 -- 4.4.2 Internal control organs . 137 -- 4.4.3 Internal participatory mechanisms . 138 -- 4.4.4 External control 139 -- 4.4.5 Quasi-judicial agencies 139 -- 4.4.6 Financial Councils . 140 -- 4.4.7 Ombudspersons 140 -- 4.4.8 Superintendencies 141 -- 4.4.9 National participatory councils 142 -- 4.4.10 Local consultative bodies 144 -- 4.4.11 Grass-root movements . 145 -- 4.4.12 Academy and research institutes . 147 -- 4.4.13 Media . 148 -- 4.5 Summary 148 -- 5 Dimension 2: Answerability in social housing programs 151 -- 5.1 Beneficiaries . 153 -- 5.1.1 Eligibility . 153 -- 5.1.2 Application . 166 -- 5.1.3 Selection . 174 -- 5.1.4 Rights-based critics 183 -- 5.2 Service Providers . 214 -- 5.2.1 Eligibility, Application and Selection . 214 -- 5.2.2 Rights-based critics 229 -- 5.3 Government 255 -- 5.3.1 Informing, responding and justifying 256v 5.4 Summary 259 -- 6 Dimension 3: Enforcement in social housing programs 265 -- 6.1 Beneficiaries . 266 -- 6.1.1 Exit and Sanctions . 266 -- 6.1.2 Access to grievance and redress by vulnerable groups . 277 -- 6.1.3 Control and Remediation . 286 -- 6.2 Service Providers . 303 -- 6.2.1 Exit and Sanctions . 304 -- 6.2.2 Control and Remediation . 309 -- 6.3 Government 316 -- 6.3.1 Exit and Sanctions . 316 -- 6.3.2 Control and Remediation . 320 -- 6.4 Summary 337 -- 7 Synthesis and Discussion . 341 -- 7.1 Responsibility in focus . 343 -- 7.2 Answerability in focus . 352 -- 7.3 Enforcement in focus . 372 -- 8 Conclusion 381 -- References . 387 -- Annexes 429 -- 7 Guiding Rights-based Principles . 518.…”
    Libro electrónico
  7. 87
    por McFedries, Paul
    Publicado 2024
    Tabla de Contenidos: “…Advanced syncing -- Synchronizing Your Media -- Syncing music, music videos, and voice memos -- Syncing movies -- Syncing TV shows -- Syncing audiobooks -- Syncing books -- Syncing photos -- Part 2 The Internet iPad -- Chapter 4 Exploring the Web with Safari -- Introducing the Safari Web Browser -- Exploring the browser -- Blasting off into cyberspace -- Zooming in and out of a page -- Reading clutter-free web pages with reader view -- Finding Your Way around the Web -- Looking at links -- Tabbed browsing -- Wrangling tabs into tab groups -- Revisiting Web Pages -- Bookmarking your favorite sites -- Managing bookmarks -- Saving a page to your reading list -- Clipping a web page to the Home screen -- Letting history repeat itself -- Saving web pictures -- Sharing Your Web Experiences -- Launching a Mobile Search Mission -- Private Browsing -- Smart Safari Settings -- Chapter 5 The Email Must Get Through -- Prep Work: Setting Up Your Accounts -- Getting started -- Setting up an email account with iCloud, Gmail, Yahoo!…”
    Libro electrónico
  8. 88
    Publicado 2017
    Libro electrónico
  9. 89
    por Von Hagen, William
    Publicado 2005
    Tabla de Contenidos: “…Preparing LTSP Client Boot Media; 2.6.5. Booting an LTSP Client; 2.6.6. See Also; 15. …”
    Libro electrónico
  10. 90
    Publicado 2017
    Tabla de Contenidos: “…Toolset Types -- Time to practice -- Summary -- Chapter 5: Implementing Application Content Restrictions -- Introduction to content restrictions -- Practical usage of content restrictions -- The role of membership in content restrictions -- Understanding restriction levels -- User roles-based restrictions -- User groups-based restrictions -- Membership plans-based restrictions -- Unique password-based restrictions -- Implementing content restrictions in posts/pages -- Shortcode-based restrictions -- Individual post/page restrictions -- Creating a meta box for topic restrictions -- Saving topic restriction settings -- Verifying individual post/page restrictions -- Site lockdown -- Enabling restrictions on WordPress core features -- Restrictions on posts -- Restrictions on searches -- Restrictions on menus -- Restrictions on widgets -- Restrictions on archives -- Supplementary content restriction types and techniques -- Restrictions on custom generated content -- Attachment protection -- Social Locker -- E-mail subscription -- Private page -- Useful plugins for content restrictions -- Restrict Content -- WP Private Content Plus -- Membership 2 -- Time to practice -- Summary -- Chapter 6: Developing Pluggable Modules -- A brief introduction to WordPress plugins -- Understanding the WordPress plugin architecture -- WordPress plugins for web development -- Creating reusable libraries with plugins -- Planning the template loader plugin -- Using the template loader plugin -- Handling plugin dependencies -- Extensible plugins -- Extending plugins with WordPress core actions and filters -- Creating the extensible file uploader plugin -- Converting file fields with jQuery -- Integrating the media uploader to buttons -- Extending the file uploader plugin -- Customizing the allowed file types -- Saving and loading topic files…”
    Libro electrónico
  11. 91
    Publicado 2010
    Libro electrónico
  12. 92
    Publicado 2021
    Libro electrónico
  13. 93
  14. 94
    Publicado 2023
    Tabla de Contenidos: “…DOMAIN SETUP -- LOCAL OS FIREWALL SETTINGS -- CLIENT NETWORK CONFIGURATION -- ESTABLISH NETWORK CONNECTIONS -- PROXY SETTINGS -- PUBLIC NETWORK VS. PRIVATE NETWORK -- FILE EXPLORER NAVIGATION - NETWORK PATHS -- METERED CONNECTIONS AND LIMITATIONS -- CHAPTER 7: Application Installation and Configuration -- SYSTEM REQUIREMENTS FOR APPLICATIONS -- OS REQUIREMENTS FOR APPLICATIONS -- DISTRIBUTION METHODS -- PHYSICAL MEDIA VS. …”
    Libro electrónico
  15. 95
    Publicado 2023
    Tabla de Contenidos: “…Generating Traffic and Capturing an Audience -- Search engine optimization -- Link benefits -- Organic growth -- Establishing Yourself as an Expert -- Gaining Online Exposure -- Networking with Other People in Your Niche -- Branching Out Beyond Your Blog -- Chapter 3 Choosing Your Niche -- Determining Your Niche Blogging Goals -- Building your expertise -- Sharing your passion -- Offering your opinion and sharing your knowledge -- Networking and building relationships -- Making money -- Identifying Niches That Might Work for You -- Determining the Audience Potential for a Niche Blog -- Researching existing niche blogs -- Google Alerts -- Social media searches -- Performing keyword searches -- Google search -- Google Trends -- Chapter 4 Writing for Your Niche -- Creating Content -- Writing different types of posts -- Choosing your voice and style -- Linking -- Finding inspiration for new content -- Branding Your Blog -- Networking and Commenting -- Creating Off-Blog Content for Your Niche Blog -- Email campaigns -- Newsletter subscriptions -- E-books and printables -- Social networking and content sharing -- YouTube videos -- Facebook and LinkedIn groups and pages -- SlideShare presentations -- Flickr -- Self-published books -- Book 3 Corporate and Non-Profit Blogging -- Chapter 1 Starting a Business Blog -- Revealing Why Organizations Blog -- Finding Companies That Do It Right -- Southwest Airlines -- Dell -- John Deere -- Disney Parks -- Compassion International -- Benefiting from a Corporate or Non-Profit Organization Blog -- Building an online presence -- Marketing and publicity -- Brand building -- Customer relations versus customer service -- Employee retention -- Employee referrals and new hiring -- Knowledge, experience, and expertise -- Search engine optimization -- Chapter 2 Developing a Blog Plan -- Researching the Competition…”
    Libro electrónico
  16. 96
    Publicado 2016
    Libro electrónico
  17. 97
    Publicado 2018
    Tabla de Contenidos: “…Docker breakout -- Poisoned images -- Database passwords and data theft -- Docker bench security -- Docker vulnerability static analysis with Clair -- Building a penetration testing laboratory -- Summary -- Chapter 6: Exploiting Git and Continuous Integration Servers -- Software development methodologies -- Continuous integration -- Types of tests -- Continuous integration versus continuous delivery -- DevOps -- Continuous integration with GitHub and Jenkins -- Installing Jenkins -- Continuous integration attacks -- Continuous integration server penetration testing -- Rotten Apple project for testing continuous integration or continuous delivery system security -- Continuous security with Zed Attack Proxy -- Summary -- Chapter 7: Metasploit and PowerShell for Post-Exploitation -- Dissecting Metasploit Framework -- Metasploit architecture -- Modules -- Exploits -- Payloads -- Auxiliaries -- Encoders -- NOPs -- Posts -- Starting Metasploit -- Bypassing antivirus with the Veil-Framework -- Writing your own Metasploit module -- Metasploit Persistence scripts -- Weaponized PowerShell with Metasploit -- Interactive PowerShell -- PowerSploit -- Nishang - PowerShell for penetration testing -- Defending against PowerShell attacks -- Summary -- Chapter 8: VLAN Exploitation -- Switching in networking -- LAN switching -- MAC attack -- Media Access Control Security -- DHCP attacks -- DHCP starvation -- Rogue DHCP server -- ARP attacks -- VLAN attacks -- Types of VLANs -- VLAN configuration -- VLAN hopping attacks -- Switch spoofing -- VLAN double tagging -- Private VLAN attacks -- Spanning Tree Protocol attacks -- Attacking STP -- Summary -- Chapter 9: VoIP Exploitation -- VoIP fundamentals -- H.323 -- Skinny Call Control Protocol -- RTP/RTCP -- Secure Real-time Transport Protocol -- H.248 and Media Gateway Control Protocol -- Session Initiation Protocol…”
    Libro electrónico
  18. 98
    Publicado 2018
    Electrónico
  19. 99
    por Clarke, Glen E.
    Publicado 2012
    Tabla de Contenidos: “…Circuit-Switching Networks -- Asynchronous Transfer Mode -- Synchronous Optical Network/Synchronous Digital Hierarchy -- Optical Carrier Level-X -- X.25 and Frame Relay -- Fiber Distributed Data Interface (FDDI) -- Tx/Ex-Carriers -- Internet Access Technologies -- Certification Summary -- Two-Minute Drill -- Self Test -- Self Test Answers -- Chapter 12: Implementing a Network -- Installing a Network -- Exercise 12-1 Confirming Networking Components in Windows -- Creating User Accounts -- Exercise 12-2 Creating Users in Active Directory -- Exercise 12-3 Configuring a Password Policy -- Managing Groups -- Exercise 12-4 Creating Groups in Active Directory -- Securing Files and Folders -- Exercise 12-5 Configuring Permissions in Windows 2003 -- Installing Printers -- Exercise 12-6 Installing a Printer on Windows Server 2003 -- Working with Network Hardware -- Certification Summary -- Two-Minute Drill -- Self Test…”
    Libro electrónico
  20. 100
    Publicado 2015
    Tabla de Contenidos: “…Nurses as Witnesses -- Regulation of Nursing Practice -- Nurse Practice Acts -- Credentialing -- Standards of Care -- Contractual Arrangements in Nursing -- Legal Roles of Nurses -- Collective Bargaining -- Selected Legal Aspects of Nursing Practice -- Informed Consent -- Delegation -- Violence, Abuse, and Neglect -- The Americans with Disabilities Act -- Controlled Substances -- Substance Use Disorder in Nursing -- Sexual Harassment -- Abortions -- Death and Related Issues -- Areas of Potential Liability in Nursing -- Crimes and Torts -- Privacy of Clients' Health Information -- Social Media -- Loss of Client Property -- Unprofessional Conduct -- Legal Protections in Nursing Practice -- Good Samaritan Acts -- Professional Liability Insurance -- Carrying Out a Physician's Orders -- Providing Competent Nursing Care -- Documentation -- The Incident Report -- Reporting Crimes, Torts, and Unsafe Practices -- Legal Responsibilities of Students -- CHAPTER 4 Values, Ethics, and Advocacy -- Introduction -- Values -- Values Transmission -- Values Clarification -- Ethics and Morality -- Moral Development -- Moral Frameworks -- Moral Principles -- Nursing Ethics -- Nursing Codes of Ethics -- Origins of Ethical Problems in Nursing -- Making Ethical Decisions -- Strategies to Enhance Ethical Decisions and Practice -- Specific Ethical Issues -- AIDS -- Abortion -- Organ and Tissue Transplantation -- End-of-Life Issues -- Allocation of Scarce Health Resources -- Management of Personal Health Information -- Advocacy -- The Advocate's Role -- UNIT 2 Contemporary Healthcare -- CHAPTER 5 Healthcare Delivery Systems -- Introduction -- Types of Healthcare Services -- Primary Prevention: Health Promotion and Illness Prevention -- Secondary Prevention: Diagnosis and Treatment -- Tertiary Prevention: Rehabilitation, Health Restoration, and Palliative Care…”
    Libro electrónico