Mostrando 2,461 - 2,480 Resultados de 3,562 Para Buscar 'Uberach~', tiempo de consulta: 1.48s Limitar resultados
  1. 2461
    por Bridge, M. G.
    Publicado 2009
    Tabla de Contenidos: “…Introduction and conclusion of the contract -- Definition and subject matter of the sale of goods contract -- The passing of property -- Risk, mistake, and frustration -- The seller's duty and power to transfer title -- Delivery, acceptance, and payment -- The implied terms of description, fitness, and quality -- Other liabilities of the seller and liabilities of third parties -- Unfair contract terms -- Termination of the contract for breach -- The remedies of the seller and the buyer I -- The remedies of the seller and the buyer II…”
    Libro
  2. 2462
    Publicado 2015
    Tabla de Contenidos: “…Intro -- Foreword -- Preface -- About the Author -- Acknowledgements -- Contents -- Introduction -- Part 1 - General -- Chapter 1: Why Risk does Not Depend on Company Size -- Risk effect -- Propagation of damage (downstream effects) -- Culture -- Information security staff -- Cash reserves / cash at hand -- Ability to improvise / make quick decisions -- Preparedness -- Contacts with authority -- Chapter 2: Getting your Risk Profile Right -- Intuitive risk analysis -- Formal risk analysis -- Step 1 - Identifying threats -- Step 2 - Assigning damage and likelihood -- Step 3 - Defining acceptable loss -- Step 4 - Defining mitigation priorities (business priorities) -- Residual risks -- Chapter 3: What is a Breach? -- Confidentiality breach -- Availability breach -- Integrity breach -- Impact -- Source -- External vs. internal -- Unintentional vs. intentional -- Manual vs. automatic -- Human vs. nature -- General treatment options -- Chapter 4: General Avoidance and Mitigation Strategies -- Introduction - general aspects, avoidance and related ISO27001 controls -- People -- A.7.1.1 - Screening -- Methods of screening -- A.7.1.2 - Terms and conditions of employment -- A.7.2.1 - Management responsibilities -- A.7.2.2 - Information security awareness, education and training -- A.7.2.3 - Disciplinary process -- A.7.3.1 - Termination or change of employment -- A.8.1.4 - Return of assets -- A.9.2.6 - Removal or adjustment of access rights -- Processes -- Technology -- ISO27001 Controls helpful for treatment of breaches -- A.6.1.3 - Contact with authorities -- A.7.2.2 - Information security awareness, education and training -- A.7.2.3 - Disciplinary process A.8.1.4 - Return of assets A.9.2.6 - Removal or adjustment of access rights -- A.12.2.1 - Controls against malware -- A.12.4.1 - Event logging and -- A.12.4.2 - Protection of log information…”
    Libro electrónico
  3. 2463
    Publicado 2008
    Tabla de Contenidos: “…-- Domestication : reaching a glass ceiling -- Transgenic tools for regaining biodiversity : breaching the ceiling -- Biosafety considerations with further domesticated crops -- Introduction to case studies : where the ceiling needs to be breached -- Evil weevils or us : who gets to eat the grain? …”
    Libro electrónico
  4. 2464
    por Kliczkowski, Guillermo
    Publicado 2020
    Tabla de Contenidos: “…CASAS INTERNACIONAL 181- SAN MARTÍN, LONNE, SAN MARTÍN / ARQUITECTOS -- PÁGINA LEGAL -- INTRODUCCION / INTRODUCTION -- BEACH HOUSE LAS GARZAS / LAS GARZAS BEACH HOUSE -- CASA AMAMBAY / AMAMBAY HOUSE -- CASA BLANCA / WHITE HOUSE -- CASA EN BARRIO LOS CASTORES / HOUSE IN LOS CASTORES -- CASA EN EL EMIR / HOUSE IN EL EMIR -- CENTRO DE CONVENCIONES LE DOME / LE DOME CONVENTION CENTER -- COMPLEJO JUAN FELIPE IBARRA / JUAN FELIPE IBARRA COMPLEX -- CASA EN TORTUGAS / HOUSE IN TORTUGAS -- HOTEL SOFITEL CARDALES / SOFITEL CARDALES HOTEL -- AMPLIACIÓN MNBA / MNBA EXTENSION -- OFICINAS PARQUE DEL BUEN AYRE / PARQUE DEL BUEN AYRE OFFICES -- CASA SAN JORGE / SAN JORGE HOUSE…”
    Libro electrónico
  5. 2465
    Publicado 1956
    Tabla de Contenidos: “…Va hondo y sigiloso / por Edward L. Beach. En torno al viejo ídolo / por Augusta Walker. …”
    Libro
  6. 2466
    por Eley, Geoff, 1949-
    Publicado 2013
    Tabla de Contenidos: “…Origins, post-conservatism, and 1933 : Nazism as a breach -- Driving for rule, extracting consent : bases of political order under fascism -- The return of ideology : everyday life, the Volksgemeinschaft, and the Nazi appeal -- Missionaries of the Volksgemeinschaft : ordinary women, Nazification, and the social -- Empire, ideology, and the east : thoughts on Nazism's spatial imaginary -- Putting the holocaust into history : genocide, imperial hubris, and the racial state -- Where are we now with theories of fascism?…”
    Enlace del recurso
    Libro electrónico
  7. 2467
    por Haunts, Stephen. author
    Publicado 2019
    Tabla de Contenidos: “…1. What are Data Breaches? -- 2. Brief History of Cryptography -- 3. …”
    Libro electrónico
  8. 2468
    Publicado 2021
    Tabla de Contenidos: “…The Challenge to Sovereignty, Democracy and Citizenship 5. Breaching the Public-Private Boundary 6. Politics Goes Personal 7. …”
    Libro
  9. 2469
    Publicado 1974
    Tabla de Contenidos: “…Regimiento de fusileros -- Cara B: Washington Post. Mannhattan Beach. La campaña de la libertad. El picador. Hands acroos the sea…”
    Disco musical
  10. 2470
    por Blumenberg, Hans, 1920-1996
    Publicado 1982
    Libro
  11. 2471
    Publicado 1980
    Revista digital
  12. 2472
    Publicado 1983
    Revista digital
  13. 2473
    Publicado 1971
    Revista digital
  14. 2474
    por Wahrig, Gerhard
    Publicado 1986
    Libro
  15. 2475
  16. 2476
    por Köhler, Ludwig, 1880-1956
    Publicado 1966
    Libro
  17. 2477
  18. 2478
    por Ceram, C. W., 1915-1972
    Publicado 1992
    Libro
  19. 2479
    Publicado 2008
    Revista digital
  20. 2480
    Publicado 2012
    Libro electrónico