Search Results - "securities"

Refine Results
  1. 3241

    Ethical challenges in the management of health information

    Published 2001
    Table of Contents: “…Neuberger -- Managed care / Ida Critelli Schick -- Electronic patient record / Mary Alice Hanken, Gretchen Murphy -- Information security / Karen Czirr, Karen A. Rosendale -- Software development and implementation / Susan H. …”
    Click Here to View Status and Holdings.
    Book
  2. 3242

    ENTREPRENEURSHIP STARTING & OPERATING A SMALL BUSINESS by Mariotti, Steve 1953-, Glackin, Caroline

    Published 2016
    Table of Contents: “…Unit 1: entrepreneurial pathways -- Entrepreneurs recognize opportunities -- The business plan : road map to success -- Creating business from opportunity -- Unit 1: Case study: spanx -- Unit 2: Integrated marketing -- Exploring your market -- Developing the right marketing mix and plan -- Smart selling and effective customer service -- Unit 2: Case study: kitchen arts & letters, inc -- Unit 3: Show me the money : finding, securing, and managing it -- Understanding and managing start-up, fixed, and variable costs -- Using financial statements to guide a business -- Cash flow and taxes -- Financing strategy: debt, equity, or both? …”
    Click Here to View Status and Holdings.
    Book
  3. 3243

    Translational Bioinformatics in Healthcare and Medicine Advances in ubiquitous sensing applications for healthcare

    Published 2021
    Table of Contents: “…Application, functionality, and security issues of data mining techniques in healthcare informatics - 13. …”
    Click Here to View Status and Holdings.
    Book
  4. 3244

    DISCOVERY THROUGH ACTIVITY IDEAS AND RESOURCES FOR APPLYING RECOVERY THROUGH ACTIVITY IN PRACTICE

    Published 2022
    Table of Contents: “…Adopting recovery through activity across adult community and inpatient mental health services / Amy Mitchell -- Embedding recovery through activity service-wide / Amy Mitchell and Sarah Morecroft -- Applying recovery through activity in community and inpatient services for older adults / Gemma Perrin and Hannah Hazelwood -- Continuing recovery through activity opportunities for older adults in a peer support group / Joan Holland and Alison Butters -- Applying recovery through activity in an inpatient child and adolescent mental health service (CAMHS) / Carly Watson, Isla Garrick and Hazel Watkiss -- Applying recovery through activity in a prison service / Xenia Denson and Charlotte Wise -- Applying recovery through activity in a secure learning disability service / Deborah Haworth -- Applying recovery through activity in a neuropsychiatry service / Kimberley Connell, Nataliya Williams and Jess Powell -- Adapting recovery through activity for one-to-one sessions / Rachael Kirtley and Ashley Lister -- Adapting recovery through activity for virtual groups and one-to-one sessions / Gemma Dorer and Sarah Long -- Adapting recovery through activity for a virtual group using PowerPoint / Niamh Gibney, Una Belton, Hugh Bulfin, Laura Hackett, Bláithín Swinburne and Lucinda Fallon -- Extending the content of recovery through activity sections: Leisure activities, Creative activities, Technological activities, Physical activities , Outdoor activities, Faith activities, Self-care activities, Domestic activities, Caring activities, Vocational activities, Social activities, Community activities.…”
    Click Here to View Status and Holdings.
    Book
  5. 3245

    Database systems models, languages, design, and application programming by Elmasri, Ramez

    Published 2011
    Table of Contents: “…Chapter 1 : Introduction to Databases -- Chapter 2 : Overview of database languages and architectures -- Chapter 3 : The basic ( Flat ) relational model -- Chapter 4 : SQL : data definition, constraints, and basic querie and updates -- SQL : advanced queries, assertions,triggers and views -- Chapter 6 : Formal relational languages : the algebra and calculus -- Chapter 7 : Conceptuaol data modeling using entities and relationships -- Chapter 8 : Mapping a conceptual design into a logical design -- Chapter 9 : Relational Database Design -- Chapter 10 : Object and object-relational databases : concepts,models,languages and standards 341 -- Chapter 11 : XML : Concepts,languages, and standard -- Chapter 12 : SQL application programming using C and Java -- Chapter 13 : SQL Web Programming using C PHP -- Chapter 14 : Database design theory : introduction to normalization using functional and multivalued dependencies -- Chapter 15 : Database design theory : normalization algorithms -- Chapter 16 : Database file organizations : unortders,ordered and hashed files of records -- Chapter 17 : database file indexing techniques,B-trees, and B+-Trees -- Chapter 18 : Introduction to query processing and query optimization techniques -- Chapter 19 : Introduction to databse tuning an dphysical design issues -- Chapter 20 : Foundations of database transaction processing -- Chapter 21 : Introduction to protocols for concurrency control in databases -- Chapter 22 : Introduction to database recovery protocols -- Chapter 23 : Emerging database technologies and applications -- Chapter 24 : Advanced database models and applications -- Chapter 25 : Introduction to database security -- Chapter 26 : Introduction to distributed databases -- Chapter 27 : Introduction to information retrieval…”
    Click Here to View Status and Holdings.
    Unknown
  6. 3246

    Environment 06/07

    Published 2007
    Table of Contents: “…Brown -- Population and consumption : what we know, what we need to know / Robert W. Kates -- A new security paradigm / Gregory D. Foster -- Factory farming in the developing world / Danielle Nierenberg -- Where oil and water do mix: environmental scarcity and future conflict in the Middle East and North Africa / Jason J. …”
    Click Here to View Status and Holdings.
    Unknown
  7. 3247

    DATA AND COMPUTER COMMUNICATIONS by Stallings, William

    Published 2014
    Table of Contents: “…Preface About the Author Chapter 0 Guide for Readers and Instructors 0.1 Outline of the Book 0.2 A Roadmap for Readers and Instructors 0.3 Internet and Web Resources 0.4 Standards UNIT ONE FUNDAMENTALS OF DATA COMMUNICATIONS AND NETWORKING PART ONE OVERVIEW Chapter 1 Data Communications, Data Networks, and the Internet 1.1 Data Communications and Networking for Today's Enterprise 1.2 A Communications Model 1.3 Data Communications 1.4 Networks 1.5 The Internet 1.6 An Example Configuration Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications 2.1 The Need for a Protocol Architecture 2.2 A Simple Protocol Architecture 2.3 The TCP/IP Protocol Architecture 2.4 Standardization within a Protocol Architecture 2.5 Traditional Internet-Based Applications 2.6 Multimedia 2.7 Sockets Programming 2.7 Recommended Reading 2.8 Key Terms, Review Questions, and Problems Appendix 2A The Trivial File Transfer Protocol PART TWO DATA COMMUNICATIONS Chapter 3 Data Transmission 3.1 Concepts and Terminology 3.2 Analog and Digital Data Transmission 3.3 Transmission Impairments 3.4 Channel Capacity 3.5 Recommended Reading 3.6 Key Terms, Review Questions, and Problems Appendix 3A Decibels and Signal Strength Chapter 4 Transmission Media 4.1 Guided Transmission Media 4.2 Wireless Transmission 4.3 Wireless Propagation 4.4 Line-of-Sight Transmission 4.5 Recommended Reading 4.6 Key Terms, Review Questions, and Problems Chapter 5 Signal Encoding Techniques 5.1 Digital Data, Digital Signals 5.2 Digital Data, Analog Signals 5.3 Analog Data, Digital Signals 5.4 Recommended Reading 5.5 Key Terms, Review Questions, and Problems Chapter 6 Error Detection and Correction 6.1 Types of Errors 6.2 Error Detection 6.3 Parity Check 6.4 The Internet Checksum 6.5 Cyclic Redundancy Check (CRC) 6.6 Forward Error Correction 6.7 Recommended Reading 6.8 Key Terms, Review Questions, and Problems Chapter 7 Data Link Control Protocols 7.1 Flow Control 7.2 Error Control 7.3 High-Level Data Link Control (HDLC) 7.4 Recommended Reading 7.5 Key Terms, Review Questions, and Problems Appendix 7A Performance Issues Chapter 8 Multiplexing 8.1 Frequency-Division Multiplexing 8.2 Synchronous Time-Division Multiplexing 8.3 Cable Modems 8.4 Asymmetric Digital Subscriber Line 8.5 xDSL 8.6 Multiple Channel Access 8.7 Recommended Reading 8.8 Key Terms, Review Questions, and Problems PART THREE WIDE AREA NETWORKS Chapter 9 WAN Technology and Protocols 9.1 Switched Communications Networks 9.2 Circuit Switching Networks 9.3 Circuit Switching Concepts 9.4 Softswitch Architecture 9.5 Packet-Switching Principles 9.6 Asynchronous Transfer Mode 9.7 Recommended Reading 9.8 Key Terms, Review Questions, and Problems Chapter 10 Cellular Wireless Networks 10.1 Principles of Cellular Networks 10.2 Cellular Network Generations 10.3 LTE-Advanced 10.4 Recommended Reading 10.5 Key Terms, Review Questions, and Problems PART FOUR LOCAL AREA NETWORKS Chapter 11 Local Area Network Overview 11.1 Bus and Tree Topologies 11.2 LAN Protocol Architecture 11.3 Bridges 11.4 Hubs and Switches 11.5 Virtual LANs 11.6 Recommended Reading 11.7 Key Terms, Review Questions, and Problems Chapter 12 Ethernet 12.1 Traditional Ethernet 12.2 High-Speed Ethernet 12.3 IEEE 802.1Q VLAN Standard 12.4 Recommended Reading 12.5 Key Terms, Review Questions, and Problems Appendix 12A Digital Signal Encoding for LANs Appendix 12B Scrambling Chapter 13 Wireless LANs 13.1 Overview 13.2 IEEE 802.11 Architecture and Services 13.3 IEEE 802.11 Medium Access Control 13.4 IEEE 802.11Physical Layer 13.5 Gigabit Wi-Fi 13.6 IEEE 802.11 Security Considerations 13.7 Recommended Reading 13.8 Key Terms, Review Questions, and Problems PART FIVE INTERNET AND TRANSPORT LAYERS Chapter 14 The Internet Protocol 14.1 Principles of Internetworking 14.2 Internet Protocol Operation 14.3 Internet Protocol 14.4 IPv6 14.5 Virtual Private Networks and IP Security 14.6 Recommended Reading 14.7 Key Terms, Review Questions, and Problems Chapter 15 Transport Protocols 15.1 Connection-Oriented Transport Protocol Mechanisms 15.2 TCP 15.3 UDP 15.4 Recommended Reading 15.5 Key Terms, Review Questions, and Problems UNIT TWO ADVANCED TOPICS IN DATA COMMUNICATIONS AND NETWORKING PART SIX DATA COMMUNICATIONS AND WIRELESS NETWORKSChapter 16 Advanced Data Communications Topics 16.1 Analog Data, Analog Signals 16.2 Forward Error Correction Codes 16.3 ARQ Performance Issues 16.4 Recommended Reading 16.5 Key Terms, Review Questions, and Problems Chapter 17 Wireless Transmission Techniques 17.1 MIMO Antennas 17.2 OFDM, OFDMA, and SC-FDMA 17.3 Spread Spectrum 17.4 Direct Sequence Spread Spectrum 17.5 Code-Division Multiple Access 17.6 Recommended Reading 17.7 Key Terms, Review Questions, and Problems Chapter 18 Wireless Networks 18.1 Fixed Broadband Wireless Access 18.2 WiMAX/IEEE 802.16 18.3 Bluetooth Overview 18.4 Bluetooth Radio Specification 18.5 Bluetooth Baseband Specification 18.6 Bluetooth Logical Link Control and Adaptation Protocol 18.7 Recommended Reading 18.8 Key Terms, Review Questions, and Problems PART SEVEN INTERNETWORKING Chapter 19 Routing 19.1 Routing in Packet-Switching Networks 19.2 Examples: Routing in ARPANET 19.3 Internet Routing Protocols 19.4 Least-Cost Algorithms 19.5 Recommended Reading 19.6 Key Terms, Review Questions, and Problems Chapter 20 Congestion Control 20.1 Effects of Congestion 20.2 Congestion Control 20.3 Traffic Management 20.4 Congestion Control in Packet-Switching Networks 20.5 TCP Congestion Control 20.6 Datagram Congestion Control Protocol 20.7 Recommended Reading 20.8 Key Terms, Review Questions, and Problems Chapter 21 Internetwork Operation 21.1 Multicasting 21.2 Software Defined Networks 21.3 OpenFlow 21.4 Mobile IP 21.5 Recommended Reading 21.6 Key Terms, Review Questions, and Problems Chapter 22 Internetwork Quality of Service 22.1 QoS Architectural Framework 22.2 Integrated Services Architecture 22.3 Resource Reservation Protocol 22.4 Differentiated Services 22.5 Service Level Agreements 22.6 IP Performance Metrics 22.7 Recommended Reading 22.8 Key Terms, Review Questions, and Problems Chapter 23 Multiprotocol Label Switching 23.1 The Role of MPLS 23.2 Background 23.3 MPLS Operation 23.4 Labels 23.5 FECs, LSPs, and Labels 23.6 Label Distribution 23.7 Traffic Engineering 23.8 Virtual Private Networks 23.9 Recommended Reading 23.10 Key Terms, Review Questions, and Problems PART EIGHT INTERNET APPLICATIONS Chapter 24 Electronic Mail, DNS, and HTTP 24.1 Electronic Mail: SMTP and MIME 24.2 Internet Directory Service: DNS 24.3 Web Access: HTTP 24.4 Recommended Reading 24.5 Key Terms, Review Questions, and Problems Chapter 25 Internet Multimedia Support 25.1 Real-Time Traffic 25.2 Voice Over IP 25.3 Session Initiation Protocol 25.4 Real-Time Transport Protocol 25.5 Recommended Reading 25.6 Key Terms, Review Questions, and Problems APPENDICES Appendix A Fourier Analysis A.1 Fourier Series Representation of Periodic Signals A.2 Fourier Transform Representation of Aperiodic Signals A.3 Recommended Reading Appendix B Projects and Other Student Exercises for Teaching Data and Computer Communications B.1 Animations and Animation Projects B.2 Practical Exercises B.3 Sockets Projects B.4 Wireshark Projects B.5 Simulation and Modeling Projects B.6 Performance Modeling B.7 Research Projects B.8 Reading/Report Assignments B.9 Writing Assignments B.10 Discussion TopicsReferences Index ONLINE CHAPTERS AND APPENDICES[1] PART NINE NETWORK SECURITY Chapter 26 Computer and Network Security Threats 26.1 Computer Security Concepts 26.2 Threats, Attacks, and Assets 26.3 Intruders 26.4 Malicious Software Overview 26.5 Viruses, Worms, and Bots 26.6 Recommended Reading 26.7 Key Terms, Review Questions, and Problems Chapter 27 Computer and Network Security Techniques 27.1 Virtual Private Networks and IPsec 27.2 SSL and TLS 27.3 Wi-Fi Protected Access 27.4 Intrusion Detection 27.5 Firewalls 27.6 Malware Defense 27.7 Recommended Reading 27.8 Key Terms, Review Questions, and Problems Appendix C Standards Organizations Appendix D Asynchronous and Synchronous TransmissionAppendix E The OSI Model Appendix F The International Reference Alphabet Appendix G Proof of the Sampling Theorem Appendix H Ones Complement Representation and AdditionAppendix I Statistical TDM Appendix J The Spanning Tree AlgorithmAppendix K LAN Performance IssuesAppendix L Matrix Multiplication and Determinants Appendix M Queuing Effects Appendix N Orthogonality, Correlation, and…”
    Click Here to View Status and Holdings.
    Manuscript Book
  8. 3248

    Emergency and Disaster Management Concepts, Methodologies, Tools, and Applications

    Published 2019
    Table of Contents: “…Saraswathi -- Planning for a disaster : effective emergency management in the 21st century / Carmen Cowick, Jeff Cowick -- An overview of disaster and emergency management systems models / Dilshad Sarwar -- Application of mathematical modeling for the secure and intelligent energy infrastructure / Tianxing Cai -- Reliable communication network for emergency response and disaster management in underground mines / S. …”
    Click Here to View Status and Holdings.
    Book
  9. 3249

    School policies

    Published 2008
    Table of Contents: “…Bloomberg ; Metal detectors create a hostile learning environment / Elora Mukherjee ; Surveillance technology keeps schools secure / Rebecca Sausner ; School surveillance technology is totalitarian / Ronnie Casella ; School Internet filters protect children from inappropriate content / Becta (British Educational Communications and Technology Agency) ; School Internet filters are ineffective / T. …”
    Click Here to View Status and Holdings.
    Unknown
  10. 3250

    Herbal Medicines A Boon for Healthy Human Life

    Published 2022
    Table of Contents: “…Traditional Herbal Medicines as Bio resource and Health Security - 12. Traditional Nutritional and Health Practices to Tackle the Lifestyle Diseases - 13. …”
    Click Here to View Status and Holdings.
    Book
  11. 3251

    21st century managemen a reference handboo

    Published 2008
    Table of Contents: “…-- Understanding and overcoming the Green Wall: environmental strategy, leadership, and change management in business -- Environmental supply chain management -- PART V: STRATEGY IN A FAST AND NETWORKED WORLD: Strategic decisions in high-velocity contexts -- Innovations as a strategy in network markets -- Planning effectiveness for Intermet -based intergovernmental systems -- The competitive advantage of interconnected firms -- New product and service development in strategic alliances -- The merger paradox: determinants and effects -- Evolving aspects of outsourcing in India -- Holistic approaches in business planning -- Culture sensitive global strategies -- Co-opetition: promises and challenges -- Business limitation -- PART VI: OPERATIONS MANAGEMENT WITH NEW TECHNOLOGIES IN A GLOBAL CONTEXT: Supply chain management: integration and globalization in the age of e-business -- Mass customization -- Improving supply-chain information velocity, product customization, and cost through extended enterprise applications -- Business process outsourcing management issues -- Place and space strategies for 21st-Century organizations -- Ethical manufacturing -- PART VII: ORGANIZING IN THE POST-0/11 WORLD: Constraints on strategy of an organizational structure -- Global projects as new organizational form -- Artistic methods and business disorganization -- Organizational security -- VOLUME TWO: PART VIII: TEAMING IN AND BEYOND ORGANIZATIONS IN THE KNOWLEDGE ECONOMY: The evolving nature of work teams: changing to meet the requirements of the futu…”
    Click Here to View Status and Holdings.
    Unknown
  12. 3252
  13. 3253
  14. 3254
  15. 3255
  16. 3256
  17. 3257
  18. 3258
  19. 3259
  20. 3260