Mostrando 3,681 - 3,700 Resultados de 54,385 Para Buscar 'Trimen~', tiempo de consulta: 2.12s Limitar resultados
  1. 3681
    por Boyd, Robert, Ph. D.
    Publicado 2001
    Materias:
    991004618599706719
  2. 3682
    por Teilhard de Chardin, Pierre
    Publicado 1967
    Materias:
    991000534889706719
  3. 3683
    por Kovacich, Gerald L.
    Publicado 2008
    Materias: “…Commercial crimes…”
    Libro electrónico
  4. 3684
    Publicado 2018
    Materias: “…Hate crimes Law and legislation Spain…”
    Libro electrónico
  5. 3685
    por Klein, Richard G.
    Publicado 2009
    Materias: “…Origen del hombre…”
    Libro
  6. 3686
    por Piveteau, Jean, 1899-1991
    Publicado 1983
    Materias:
    Libro
  7. 3687
    por Corte, Nicolás
    Publicado 1957
    Materias:
    Libro
  8. 3688
    Materias:
    Libro
  9. 3689
    Publicado 1973
    Materias: “…Hombre Origen…”
    Libro
  10. 3690
    por Bertranpetit, Jaume
    Publicado 2000
    Materias: “…Origen del hombre…”
    Libro
  11. 3691
    Publicado 1967
    Materias: “…Llenguatge i llengües Origen…”
    Libro
  12. 3692
    Publicado 2000
    Materias: “…Américanos de origen asiático…”
    Publisher description
    Libro
  13. 3693
  14. 3694
    Materias: “…Origen del hombre…”
    Libro
  15. 3695
  16. 3696
    Publicado 2015
    Tabla de Contenidos: “…A.16.1.1 - Responsibilities and procedures -- A.16.1.2 - Reporting information security events -- A.16.1.3 - Reporting security weaknesses -- A.16.1.4 - Assessment of and decision on information security events -- A.16.1.5 - Response to information security incidents -- A.16.1.6 - Learning from information security incidents -- A.16.1.7 - Collection of evidence -- Strategies and tactics for treating breaches -- Tactical advice -- Regular meetings -- Time, time, time -- Rest -- People (number) -- International contacts -- Keep the information flowing -- Keep minutes -- Additional quality feedback -- Dimensions of treatment / mitigation of information security breaches -- None -- Internal investigation -- External investigation -- Joint task force -- Part 2 - Case studies -- Chapter 5: Notes from the Field -- Privacy -- Cost -- The practicalities of surveillance -- People -- Cost -- Speed -- Outreach -- The truth vs. company policy -- Chapter 6: Motives and Reasons -- Greed -- Despair -- Revenge -- Business advantage -- Chapter 7: Case Studies from Small Companies -- Foreword to the case studies -- The stolen backup -- In-depth explanation -- Lessons learned -- Eavesdropping on faxes -- In-depth explanation -- A stolen laptop -- In-depth explanation -- Chapter 8: Case Studies from Medium-sized Companies -- A case of intrigue - the missing contract -- In-depth explanation -- Lessons learned -- The sales manager who changed jobs -- In-depth explanation -- Lessons learned -- The project manager who became a friend, and then an enemy -- In-depth explanation -- The lost customers - how a sales manager cost a company 10% of revenue -- In-depth explanation -- Lessons learned -- The flood - how not to learn about risk management -- In-depth explanation -- Chapter 9: Case Studies from Large Corporations -- Who wants my data? …”
    Libro electrónico
  17. 3697
  18. 3698
    por Kamuli, Raphael
    Publicado 2014
    Materias: “…Tribunal Penal Internacional…”
    Libro
  19. 3699
    Krymskii ̆nauchnyĭ vestnik
    Крымский научный вестник.
    Publicado 2015
    Materias: “…Economics Ukraine Crimea Periodicals…”
    Revista digital
  20. 3700
    Publicado 2015
    Acceso restringido usuarios UPSA
    Libro electrónico