Search Results - "IT security"

Refine Results
  1. 7061

    Smart Water

    Open Access
    Electronic Journal
  2. 7062

    Flourishing Thought : Democracy in an Age of Data Hoards / by Miller, Ruth Austin, 1975-

    Published 2016
    Full text available:
    Electronic eBook
  3. 7063
  4. 7064

    Blindside how to anticipate forcing events and wild cards in global politics /

    Published 2007
    Table of Contents: “…In search of energy security / Gal Luft and Anne Korin -- Emerging infectious diseases: are we prepared? …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  5. 7065

    Microsoft Word 2007 bible by Tyson, Herbert L.

    Published 2007
    Table of Contents: “…Collaboration: getting along with others -- Security, tracking, and comments -- Comparing and combining collaborative documents -- SharePoint -- Groove -- Integration with other office applications -- Appendix A: Guide to Word 2003 menu commands in Word 2007 -- Appendix B: Word 2007 default key assignments.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  6. 7066

    Global supply chain management by Drake, Matt

    Published 2012
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  7. 7067

    Flourishing Thought : Democracy in an Age of Data Hoards / by Miller, Ruth Austin, 1975-

    Published 2016
    Full text available:
    Electronic eBook
  8. 7068
  9. 7069

    COVID-19 and World Order : The Future of Conflict, Competition, and Cooperation /

    Published 2020
    Table of Contents: “…Global climate and energy policy after the COVID-19 pandemic: The tug-of-war between markets and politics / Johannes Urpelainen ; No food security, no world order / Jessica Fanzo ; Flat no longer: Technology in the post-COVID world / Christine Fox and Thayer Scott -- Part IV: The future of the global economy. …”
    Full text available:
    Electronic eBook
  10. 7070

    COVID-19 and World Order : The Future of Conflict, Competition, and Cooperation /

    Published 2020
    Table of Contents: “…Global climate and energy policy after the COVID-19 pandemic: The tug-of-war between markets and politics / Johannes Urpelainen ; No food security, no world order / Jessica Fanzo ; Flat no longer: Technology in the post-COVID world / Christine Fox and Thayer Scott -- Part IV: The future of the global economy. …”
    Full text available:
    Electronic eBook
  11. 7071

    Regulatory breakdown the crisis of confidence in U.S. regulation /

    Published 2012
    Table of Contents: “…Moffitt -- Reforming securities law enforcement : politics and money at the public, [and] private divide / William W. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  12. 7072

    The ten-minute inservice 40 quick training sessions that build teacher effectiveness / by Whitaker, Todd, 1959-

    Published 2013
    Table of Contents: “…Securing students' attention -- Establishing rules and procedures -- Effective ways to address misbehavior -- Sharing classroom management tips -- A scream to blow off steam -- The biggest mistake teachers make -- Learn to ignore more -- Simple ways to defuse anger -- Effective teaching, part 1 -- Effective teaching, part 2 -- Bell-to-bell teaching -- Teaching with enthusiasm -- Teaching like a great coach -- Be here, there, and everywhere -- Making lessons meaningful -- Fifty ways to make learning fun -- Getting parents involved -- Greeting students daily -- A kind reminder -- Twenty-five reasons to be proud of our school -- Student appreciation week -- Dealing with negative co-workers -- The ten-minute classroom makeover -- The teachers? …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  13. 7073

    Computer forensics an essential guide for accountants, lawyers, and managers / by Sheetz, Michael

    Published 2007
    Table of Contents: “…-- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  14. 7074

    Regulatory breakdown the crisis of confidence in U.S. regulation /

    Published 2012
    Table of Contents: “…Moffitt -- Reforming securities law enforcement : politics and money at the public, [and] private divide / William W. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  15. 7075

    The ten-minute inservice 40 quick training sessions that build teacher effectiveness / by Whitaker, Todd, 1959-

    Published 2013
    Table of Contents: “…Securing students' attention -- Establishing rules and procedures -- Effective ways to address misbehavior -- Sharing classroom management tips -- A scream to blow off steam -- The biggest mistake teachers make -- Learn to ignore more -- Simple ways to defuse anger -- Effective teaching, part 1 -- Effective teaching, part 2 -- Bell-to-bell teaching -- Teaching with enthusiasm -- Teaching like a great coach -- Be here, there, and everywhere -- Making lessons meaningful -- Fifty ways to make learning fun -- Getting parents involved -- Greeting students daily -- A kind reminder -- Twenty-five reasons to be proud of our school -- Student appreciation week -- Dealing with negative co-workers -- The ten-minute classroom makeover -- The teachers? …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  16. 7076

    Computer forensics an essential guide for accountants, lawyers, and managers / by Sheetz, Michael

    Published 2007
    Table of Contents: “…-- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  17. 7077

    American spies : espionage against the US from the Cold War to the present / by Sulick, Michael J.

    Published 2013
    Table of Contents: “…The Cold War: 1950-1970 -- The KGB rebuilds -- Spies in the enlisted ranks -- Vietnam and the 1960s -- Decade of turmoil: the 1970s -- Espionage and the 1970s -- Soviet science and technology espionage -- James Angleton and the spy hunt in the CIA -- The decade of the spy: Soviet spies of the 1980s -- Espionage in the 1980s -- Evil spy for the evil empire: John Walker -- The spy in the National Security Agency: Ronald Pelton -- A spy in the CIA: Edward Lee Howard -- The spy in the US Marine Corps: Clayton Lonetree -- The decade of the spy: other spies of the 1980s -- An illegal in the CIA: Karl Koecher -- The Army's John Walker: Clyde Conrad -- Spies for East Germany: James Michael Hall and Jeffrey Carney -- The spy for China: Larry Wu-Tai Chin -- The spy for Israel: Jonathan Pollard -- Espionage and the new world order: the 1990s -- The end of the Cold War and US counterespionage -- Aldrich Ames and his impact on the CIA -- The spy in the FBI: Robert Hanssen -- The last vestiges of Cold War espionage -- Espionage in the new millennium -- New threats, old threats -- Chinese nuclear espionage and Wen Ho Lee -- Spies for China -- Spies for Cuba I: Ana Belen Montes -- Spies for Cuba II: Kendall and Gwendolyn Myers -- Espionage and the war on terrorism -- Cyberespionage.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  18. 7078

    American spies : espionage against the US from the Cold War to the present / by Sulick, Michael J.

    Published 2013
    Table of Contents: “…The Cold War: 1950-1970 -- The KGB rebuilds -- Spies in the enlisted ranks -- Vietnam and the 1960s -- Decade of turmoil: the 1970s -- Espionage and the 1970s -- Soviet science and technology espionage -- James Angleton and the spy hunt in the CIA -- The decade of the spy: Soviet spies of the 1980s -- Espionage in the 1980s -- Evil spy for the evil empire: John Walker -- The spy in the National Security Agency: Ronald Pelton -- A spy in the CIA: Edward Lee Howard -- The spy in the US Marine Corps: Clayton Lonetree -- The decade of the spy: other spies of the 1980s -- An illegal in the CIA: Karl Koecher -- The Army's John Walker: Clyde Conrad -- Spies for East Germany: James Michael Hall and Jeffrey Carney -- The spy for China: Larry Wu-Tai Chin -- The spy for Israel: Jonathan Pollard -- Espionage and the new world order: the 1990s -- The end of the Cold War and US counterespionage -- Aldrich Ames and his impact on the CIA -- The spy in the FBI: Robert Hanssen -- The last vestiges of Cold War espionage -- Espionage in the new millennium -- New threats, old threats -- Chinese nuclear espionage and Wen Ho Lee -- Spies for China -- Spies for Cuba I: Ana Belen Montes -- Spies for Cuba II: Kendall and Gwendolyn Myers -- Espionage and the war on terrorism -- Cyberespionage.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  19. 7079

    Geographies of developing areas : the global south in a changing world / by Williams, Glyn

    Published 2014
    Book
  20. 7080

    Annual World Bank Conference on Development Economics, 2000

    Published 2001
    An electronic book accessible through the World Wide Web; click to view
    Electronic Conference Proceeding eBook