Mostrando 6,141 - 6,160 Resultados de 9,082 Para Buscar 'Syfy~', tiempo de consulta: 0.58s Limitar resultados
  1. 6141
    Publicado 2021
    “…Suggesting that Beckett's work sticks with and witnesses catastrophe rather than crisis, the chapter uses The Lost Ones to explore Beckett's commitment to staying with a disaster that cannot be overcome, alongside the articulation of a giving up that is not a decision but part of a drive to go on. …”
    Seriada digital
  2. 6142
    Publicado 2023
    “…. * Write efficient and safe Rust code * Leverage Rust libraries and tools in your projects * Combine Rust with Python for improved application performance Additional Popular Resources 52 Weeks of AWS-The Complete Series Microsoft Azure Fundamentals (AZ-900) Certification Rust Bootcamp Python Bootcamp Google Professional Machine Learning Engineer Course 2023 (Rough Draft) Rust Data Engineering Building with the GitHub EcoSystem: Copilot, CodeSpaces, and GitHub Actions Microsoft Azure Fundamentals (AZ-900) Certification Google Professional Cloud Architect Certification Course 2023 (Rough Draft) AWS Solutions Architect Professional (SAP-C02) 2023.…”
    Video
  3. 6143
    Publicado 2024
    “…In this lesson, we'll walk you through the problem and provide a solution that ensures your Excel file stays up-to-date seamlessly. We'll guide you through an alternative approach using OneDrive to create your form. …”
    Video
  4. 6144
    Publicado 2022
    “…Any good company's leadership knows that competitiveness and innovation are necessary to stay relevant. Learning Objectives Learn the three key elements to being an intrapreneur Learn about some of the most successful innovative intrapreneurs in history…”
    Grabación no musical
  5. 6145
    Publicado 2012
    “…Can we be sure that products NGOs label as child-labor free are in fact so, that the coffee labeled as 'fair trade' is farmed in sustainable ways, or that the working conditions monitored by NGOs are safe and that the wages are reasonable? Can we know that humanitarian organizations are, in fact, using our donations to alleviate human suffering rather than pursuing other goals? …”
    Libro
  6. 6146
    Publicado 2021
    “…Occidente sufre los devastadores efectos de un virus espiritual que quiere eliminar a Dios de la vida de los hombres y de la sociedad. …”
    Libro
  7. 6147
    por Woods, John
    Publicado 2003
    “…In a world plagued by disagreement and conflict one might expect that the exact sciences of logic and mathematics would provide a safe harbor. In fact these disciplines are rife with internal divisions between different, often incompatible, systems. …”
    Sumario
    Libro
  8. 6148
    Publicado 2024
    “…Tuck traces our current representative view of democracy to Sieyès and contrasts him with Rousseau, a theorist of active self-rule by the people. …”
    Libro
  9. 6149
    Publicado 2017
    Tabla de Contenidos: “…9 1.1.4 FTC June 2015 Guidance on Data Security 11 1.1.5 FTC Protecting Personal Information Guide 14 1.1.6 Lessons from FTC Cybersecurity Complaints 15 1.1.6.1 Failure to Secure Highly Sensitive Information 16 1.1.6.1.1 Use Industry-Standard Encryption for Sensitive Data 16 1.1.6.1.2 Routine Audits and Penetration Testing are Expected 17 1.1.6.1.3 Health-Related Data Requires Especially Strong Safeguards 18 1.1.6.1.4 Data Security Protection Extends to Paper Documents 19 1.1.6.1.5 Business-to-Business Providers also are Accountable to the FTC For Security of Sensitive Data 20 1.1.6.1.6 Companies are Responsible for the Data Security Practices of Their Contractors 22 1.1.6.1.7 Make Sure that Every Employee Receives Regular Data Security Training for Processing Sensitive Data 23 1.1.6.1.8 Privacy Matters, Even in Data Security 23 1.1.6.1.9 Limit the Sensitive Information Provided to Third Parties 24 1.1.6.2 Failure to Secure Payment Card Information 24 1.1.6.2.1 Adhere to Security Claims about Payment Card Data 24 1.1.6.2.2 Always Encrypt Payment Card Data 25 1.1.6.2.3 Payment Card Data Should be Encrypted Both in Storage and at Rest 26 1.1.6.2.4 In-Store Purchases Pose Significant Cybersecurity Risks 26 1.1.6.2.5 Minimize Duration of Storage of Payment Card Data 28 1.1.6.2.6 Monitor Systems and Networks for Unauthorized Software 29 1.1.6.2.7 Apps Should Never Override Default App Store Security Settings 29 1.1.6.3 Failure to Adhere to Security Claims 30 1.1.6.3.1 Companies Must Address Commonly Known Security Vulnerabilities 30 1.1.6.3.2 Ensure that Security Controls are Sufficient to Abide by Promises about Security and Privacy 31 1.1.6.3.3 Omissions about Key Security Flaws can also be Misleading 33 1.1.6.3.4 Companies Must Abide by Promises for Security-Related Consent Choices 33 1.1.6.3.5 Companies that Promise Security Must Ensure Adequate Authentication Procedures 34 1.1.6.3.6 Adhere to Promises about Encryption 35 1.2 State Data Breach Notification Laws 36 1.2.1 When Consumer Notifications are Required 37 1.2.1.1 Definition of Personal Information 37 1.2.1.2 Encrypted Data 38 1.2.1.3 Risk of Harm 39 1.2.1.4 Safe Harbors and Exceptions to Notice Requirement 39 1.2.2 Notice to Individuals 40 1.2.2.1 Timing of Notice 40 1.2.2.2 Form of Notice 40 1.2.2.3 Content of Notice 41 1.2.3 Notice to Regulators and Consumer Reporting Agencies 41 1.2.4 Penalties for Violating State Breach Notification Laws 42 1.3 State Data Security Laws 42 1.3.1 Oregon 43 1.3.2 Rhode Island 45 1.3.3 Nevada 45 1.3.4 Massachusetts 46 1.4 State Data Disposal Laws 49 2 Cybersecurity Litigation 51 2.1 Article III Standing 52 2.1.1 Applicable Supreme Court Rulings on Standing 53 2.1.2 Lower Court Rulings on Standing in Data Breach Cases 57 2.1.2.1 Injury-in-Fact 57 2.1.2.1.1 Broad View of Injury-in-Fact 57 2.1.2.1.2 Narrow View of Injury-in-Fact 60 2.1.2.2 Fairly Traceable 62 2.1.2.3 Redressability 63 2.2 Common Causes of Action Arising from Data Breaches 64 2.2.1 Negligence 64 2.2.1.1 Legal Duty and Breach of Duty 65 2.2.1.2 Cognizable Injury 67 2.2.1.3 Causation 69 2.2.2 Negligent Misrepresentation or Omission 70 2.2.3 Breach of Contract 72 2.2.4 Breach of Implied Warranty 76 2.2.5 Invasion of Privacy by Publication of Private Facts 80 2.2.6 Unjust Enrichment 81 2.2.7 State Consumer Protection Laws 82 2.3 Class Action Certification in Data Breach Litigation 84 2.4 Insurance Coverage for Cybersecurity Incidents 90 2.5 Protecting Cybersecurity Work Product and Communications from Discovery 94 2.5.1 Attorney-Client Privilege 96 2.5.2 Work Product Doctrine 98 2.5.3 Non-Testifying Expert Privilege 101 2.5.4 Applying the Three Privileges to Cybersecurity: Genesco v. …”
    Libro electrónico
  10. 6150
  11. 6151
    Majallat al-ʻimārah wa-al-funūn wa-al-ʻulūm al-insānīyah
    مجلة العمارة والفنون والعلوم الانسانية /
    Publicado 2016
    Revista digital
  12. 6152
    por Sánchez, Ángel, 1727-1803
    Publicado 1793
    Libro
  13. 6153
    por Saito, Nagayuki
    Publicado 2015
    “…The project formulated an Internet Literacy Assessment Indicator for Students (ILAS), which targeted 15-year-old students to measure their ability to utilise the Internet safely and securely. In 2011, a formative evaluation was conducted for a sample of 569 first-year high-school students from 14 high schools. …”
    Capítulo de libro electrónico
  14. 6154
    por Ruiz, Nicolas
    Publicado 2011
    “…Masking methods for the safe dissemination of microdata consist of distorting the original data while preserving a pre-defined set of statistical properties in the microdata. …”
    Capítulo de libro electrónico
  15. 6155
    Publicado 2016
    “…Topics covered include: delivering successful story pitches, location scouting, navigating foreign work documentation and visa requirements, confronting press freedom restrictions, leveraging digital media opportunities, and the new challenges of reporting from conflict zones safely. As newspapers and networks are forced to close their overseas bureaus, news organizations are relying more than ever before on freelancers to fill the gap. …”
    Libro electrónico
  16. 6156
    Publicado 2023
    “…The book analyses case studies of effective sanitation programmes as well as experiments with innovative ideas in different regional contexts by CSOs to meet the contextual needs of the community and to ensure access to safe sanitation, especially among the urban poor. …”
    Libro electrónico
  17. 6157
    Publicado 2015
    “…Obfuscation will teach users to push back, software developers to keep their user data safe, and policy makers to gather data without misusing it.Brunton and Nissenbaum present a guide to the forms and formats that obfuscation has taken and explain how to craft its implementation to suit the goal and the adversary. …”
    Grabación musical
  18. 6158
    Publicado 2019
    “…Companies are investing an unprecedented amount of money to keep their data and assets safe, yet cyberattacks are on the rise-and the problem is worsening. …”
    Grabación de sonido
  19. 6159
    Publicado 2019
    “…Sollmann shines a bright light on the ever-widening world of flexwork-where women can find many interesting and exciting ways to tuck all generations of their families into a future that is financially secure and safe.WORK ENDS AT AGE SIXTY-FIVE. Women who leave the workforce and want to return in their forties, fifties, or sixties will be in good company as the ranks of older workers rise…”
    Grabación musical
  20. 6160
    Publicado 2022
    “…Within this system of care, healthcare professionals, including audiologists, can only practice safely and effectively if they possess an appreciation of the complexities and challenges that exist in that context. …”
    Libro electrónico