Search Results - "Business"

Refine Results
  1. 15681

    China's changing political landscape prospects for democracy /

    Published 2008
    Table of Contents: “…Miller -- Institutionalization of political succession in China : progress and implications / Jing Huang -- Will China's "lost generation" find a path to democracy? / Cheng Li -- Business interest groups in Chinese politics : the case of the oil companies / Erica S. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  2. 15682
  3. 15683

    Handbook of real-world applications in modeling and simulation

    Published 2012
    Table of Contents: “…Currie -- Chapter 6. Business Process Modeling / Rafael Diaz, Joshua G. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  4. 15684
  5. 15685

    Handbook of real-world applications in modeling and simulation

    Published 2012
    Table of Contents: “…Currie -- Chapter 6. Business Process Modeling / Rafael Diaz, Joshua G. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  6. 15686

    Information assurance handbook : effective computer security and risk management strategies / by Schou, Corey

    Published 2015
    Table of Contents: “…Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.…”
    Book
  7. 15687

    Information assurance handbook : effective computer security and risk management strategies / by Schou, Corey

    Published 2015
    Table of Contents: “…Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.…”
    Book
  8. 15688
  9. 15689

    China's changing political landscape prospects for democracy /

    Published 2008
    Table of Contents: “…Miller -- Institutionalization of political succession in China : progress and implications / Jing Huang -- Will China's "lost generation" find a path to democracy? / Cheng Li -- Business interest groups in Chinese politics : the case of the oil companies / Erica S. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  10. 15690
  11. 15691

    Intellectual Property Rights in Kenya by Wekesa, Moni, Shihanya, Ben

    Published 2019
    “…In these hard and trying times for the world economy, the need for rule of law reforms that encourage entrepreneurship and business development cannot be gainsaid. Respect for the rule of law not only creates favourable conditions that foster business development, but also provides essential assurance and confidence for investors. …”
    Get full text
    Book
  12. 15692
  13. 15693
  14. 15694
  15. 15695
  16. 15696
  17. 15697
  18. 15698
  19. 15699
  20. 15700