Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Security Suite.

Bücher zum Thema „Security Suite“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-29 Bücher für die Forschung zum Thema "Security Suite" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Bücher für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Designing an IAM framework with Oracle Identity and access management suite. New York: McGraw-Hill, 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Ghébali, Victor Yves. Le bilan de la reunion de Vienne sur les suites de la CSCE. Geneva: GIPRI, 1989.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

National Workshop on Social Security Protection (1996 Pasig City, Manila, Philippines). Social security protection in the Philippines: Proceedings of the National Workshop on Social Security Protection, Manila Galleria Suites, Pasig City, Philippines, 30-31 July 1996. [Manila]: Institute for Labor Studies with technical assistance from the United Nations Development Programme and the International Labour Organisation, 1996.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Oracle E-Business Suite Security (Oracle). McGraw-Hill Osborne Media, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Abel, John. Oracle E-Business Suite Security (Oracle). McGraw-Hill Osborne Media, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Team, Citrix Engineering. Citrix® Access Suite Security for IT Administrators. McGraw-Hill Osborne Media, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Team, Citrix Engineering. Citrix® Access Suite Security for IT Administrators. McGraw-Hill Osborne Media, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

1972-, Ng Tinny, Hrsg. Understanding IBM SOA foundation suite: Learning visually with examples. Upper Saddle River, NJ: IBM Press/Pearson, 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

1972-, Ng Tinny, Hrsg. Understanding IBM SOA foundation suite: Learning visually with examples. Upper Saddle River, NJ: IBM Press/Pearson, 2010.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

1972-, Ng Tinny, Hrsg. Understanding IBM SOA foundation suite: Learning visually with examples. Indianapolis, Ind: IBM Press, 2009.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Gilbert, Jeff, und Yuri Diogenes. Enterprise Mobility Suite - Managing BYOD and Company-Owned Devices. Pearson Education, 2015.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Friedberg, Robert D., und Micaela A. Thordarson. Suite Lessons: Pointers for Private Practitioners. Herausgegeben von Thomas H. Ollendick, Susan W. White und Bradley A. White. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780190634841.013.45.

Der volle Inhalt der Quelle
Annotation:
Electing to enter private practice as a clinical child psychologist poses a variety of unique challenges. Private practice clinicians (PPCs) are mental health care providers as well as small business owners and must thus cultivate success in both roles in order to remain relevant. In a saturated marketplace, PPCs must distinguish themselves. Clinically, PPCs who deliver evidence-based care and who monitor progress with clear, objective measures are able to gain a competitive marketplace edge. Membership in professional organizations provides easy connections to cutting edge research as well as a broad referral network. Diversification of revenue streams allows PPCs flexibility in practice and affords increased financial security. Establishing a marketing plan sets up PPCs for success and creates an explicit framework from which to launch business efforts. Although it stretches PPCs’ comfort zones, clinicians are compelled to become business savvy in order to thrive.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Information Systems Audit and Control Association., Hrsg. Security, audit and control features Oracle e-business suite: A technical and risk management reference guide. 2. Aufl. Rolling Meadows, IL: ISACA, $c c2006., 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Security, Audit & Control Features Oracle E-Business Suite: A Technical and Risk Management Reference Guide, 2nd Edition. Isaca, 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

L, Rukhin Andrew, und National Institute of Standards and Technology (U.S.), Hrsg. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

L, Rukhin Andrew, und National Institute of Standards and Technology (U.S.), Hrsg. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

L, Rukhin Andrew, und National Institute of Standards and Technology (U.S.), Hrsg. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Gaithersburg, Md: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Riley, Barry. The Search for Food Security. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190228873.003.0019.

Der volle Inhalt der Quelle
Annotation:
By the 1970s, concern that world hunger was increasing had energized the efforts of scholars, government officials, and those attentive to humanitarian concerns to focus on “food security” as the concept best suited to concert efforts to reduce global hunger. The problem was there was little agreement of what the term meant and how it could be used as an objective of policy; Simon Maxwell and Timothy Frankenberger unearthed two hundred separable definitions of the term. This chapter describes the evolution of food security thinking during the period 1970–90, from concern about the imbalance between existing food stocks and surging demand to concern about the difficulty in identifying the transitory and chronic causes of households being unable to gain secure access to the food they needed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

American Law Institute-American Bar Association Committee on Continuing Legal Education., Hrsg. Securing and enforcing patent rights, November 15-16, 1990, Washington, D.C.: ALI-ABA course of study materials. Philadelphia, Pa. (4025 Chestnut St., Philadelphia, 19104): American Law Institute-American Bar Association Committee on Continuing Professional Education, 1990.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Colin, Bamford. 4 Personal and Property Rights. Oxford University Press, 2015. http://dx.doi.org/10.1093/law/9780198722113.003.0004.

Der volle Inhalt der Quelle
Annotation:
The chapter explores the differences between property rights and rights that can be enforced only by action against a person. It contrasts the position in common law systems with that in civil law countries. The common law system is explained by looking at the development of equity and of the concepts of equitable ownership and of the trust. The chapter then examines the distinction by reference to case law, particularly in relation to the mechanism of charge-backs. It then argues that the approach adopted by the common law is particularly well suited to the needs of financial transactions, in syndicated lending, bond issues project financing fund management and in allowing flexibility in the structuring of complex security arrangements.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Collective enforcement of consumer law: Securing compliance in Europe through private group action and public authority intervention. Groningen: Europa Law Pub., 2007.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

(Editor), Marco Loos, Hrsg. Collective Enforcement of Consumer Law: Securing Compliance in Europe Through Private Group Action and Public Authority Intervention. Europa Law Pub Netherlands, 2007.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Meyers, Diana Tietjens. Victims of Trafficking, Reproductive Rights, and Asylum. Herausgegeben von Leslie Francis. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199981878.013.5.

Der volle Inhalt der Quelle
Annotation:
Sex trafficking is a crime prohibited by international law. Traffickers not only violate victims’ rights to liberty and security of persons; they also violate victims’ reproductive rights with potentially devastating consequences for their health and reproductive capabilities. Nonetheless, international antitrafficking and refugee law presents obstacles to viewing trafficking victims as refugees and granting them asylum. International law spotlights the crime of trafficking in persons and treats the human rights of victims as an ancillary matter, and domestic laws follow suit. However, a number of precedents in international and domestic law support construing trafficking victims as coming under refugee law and private oppression as included within refugee law. The chapter concludes by outlining arguments from reproductive rights to expand asylum rights to sex trafficking victims.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Grow, Nathaniel. An Aborted Trial. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252038198.003.0007.

Der volle Inhalt der Quelle
Annotation:
This chapter examines Federal Baseball Club of Baltimore, Inc. v. National League of Professional Baseball Clubs and its dismissal, focusing on the period between February 1916 and June 1917. In the weeks following the dismissal of the Federal League's antitrust suit, organized baseball worked behind the scenes to resolve its budding dispute with the Baltimore Federals. The American and National Leagues sought to persuade Jack Dunn, owner of the city's International League team, to purchase the BaltFeds's stadium, thereby securing some settlement proceeds for the rival franchise. At the same time that organized baseball was dealing with Baltimore, it was also trying to resolve its own outstanding legal fees from the Federal League case. Baltimore, meanwhile, continued to build its case that federal antitrust law applied to professional baseball. This chapter first considers the BaltFeds's settlement negotiations with organized baseball before discussing the proceedings of its antitrust suit and Judge Oliver B. Dickinson's decision to dismiss the case.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Grare, Frédéric. India’s Look East Policy and Asian Institutional Architecture. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190859336.003.0009.

Der volle Inhalt der Quelle
Annotation:
India’s attempt to join the process of regional integration was marked by ambivalence. India did bypass its own region to seek integration in the adjacent one, ignoring SAARC to seek membership in some of the ASEAN led institutions. Operating by consensus through non-binding agreements, ASEAN-centered regionalism suited India’s needs for recognition and protected it against the negative repercussions of regional tensions while preventing the rise of potential regional hegemonys. Through its participation in a regional security architecture led by ASEAN rules, India established a normative buffer while being able to influence decisions. However, ASEAN’s centrality (i.e.; consensus based and a unanimous position reflecting common strategic vision) is gradually being eroded by US-China proxy struggle for influence, eroding the foundation of India’s relations with ASEAN, as it may draw New Delhi into the zero-sum game situation it has so far tried to avoid.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Morgan, Patrick M. Nuclear Strategy. Oxford University Press, 2018. http://dx.doi.org/10.1093/acrefore/9780190846626.013.410.

Der volle Inhalt der Quelle
Annotation:
Nuclear strategy involves the production of nuclear weapons for political ends as well as the goals, means, and ways in which they are, or are planned to be, used. The roots of nuclear strategy can be traced to World War II, when nuclear scientists, as well as American and British high-level officials, began thinking about how nuclear weapons could be harnessed. Several ideas then emerged that became central to nuclear strategy, but largely ignored in early postwar American military planning. Aside from war-fighting, the United States’s grand strategy and national security policy soon focused on containment as the way to deal with communism around the world. Containment was politically and intellectually well-suited for emphasizing nuclear deterrence as a means of preventing the Cold War from escalating into war. The theory and resulting strategy was dominated by two problems: the stability problem and the credibility problem. As for actually fighting a nuclear war, strategies include demonstration explosions to curb enemy military actions, preventive and preemptive attacks, and retaliation after being attacked. The design and implementation of nuclear postures and strategies have been beset by numerous deficiencies, such as accidents with nuclear weapons and delivery systems. Fortunately, nuclear strategy did not give rise to what many feared—a self-sustaining security dilemma that made insecurity overwhelming and impossible to dispel.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Christine, Gray. International Law and the Use of Force. Oxford University Press, 2018. http://dx.doi.org/10.1093/law/9780198808411.001.0001.

Der volle Inhalt der Quelle
Annotation:
This book explores the use of force in international law. It examines not only the use of force by states but also the role of the UN in peacekeeping and enforcement action, and the increasing role of regional organizations in the maintenance of international peace and security. The UN Charter framework is under challenge: Russia’s invasion of Georgia and intervention in Ukraine, the USA’s military operations in Syria, and Saudi Arabia’s campaign to restore the government of Yemen by force all raise questions about the law on intervention. The ‘war on terror’ that began after the 9/11 terrorist attacks on the USA has not been won. It has spread far beyond Afghanistan, leading to targeted killings in Pakistan, Somalia, and Yemen, and to intervention against ISIS in Iraq and Syria. Is there an expanding right of self-defence against non-state actors? The development of nuclear weapons by North Korea has reignited discussion about the legality of pre-emptive self-defence. The NATO-led operation in Libya increased hopes for the implementation of ‘responsibility to protect’, but it also provoked criticism for exceeding the Security Council’s authorization of force because its outcome was regime change. UN peacekeeping faces new challenges, especially with regard to the protection of civilians, and UN forces have been given revolutionary mandates in several African states, but UN peacekeeping is not suited to counter-terrorism or enforcement operations. The UN now turns to regional organizations as first responders in situations of ongoing armed conflict.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Schandl, Heinz, und Iain Walker, Hrsg. Social Science and Sustainability. CSIRO Publishing, 2017. http://dx.doi.org/10.1071/9781486306411.

Der volle Inhalt der Quelle
Annotation:
Sustainability policies shape the ways that society and the economy interact with the environment, natural resources and ecosystems, and address issues such as water, energy and food security, and climate change. These policies are complex and are, at times, obscured by contestation, uncertainty and sometimes ignorance. Ultimately, sustainability problems are social problems and they need to be addressed through social and policy change. Social Science and Sustainability draws on the wide-ranging experience of CSIRO’s social scientists in the sustainability policy domain. These researchers have extensive experience in addressing complex issues of society–nature relationships, usually in interdisciplinary collaboration with natural scientists. This book describes some of the evidence-based concepts, frameworks and methodologies they have developed, which may guide a transition to sustainability. Contributions range from exploring ways to enhance livelihoods and alleviate poverty, to examining Australians’ responses to climate change, to discussing sociological perspectives on sustainability and how to make policy relevant. Researchers, policy-makers and decision-makers around the globe will find this book a valuable and thought-provoking contribution to the sustainability literature. It is also suited to academics and students in postgraduate-level courses in social sciences and sustainability, or in courses in applied sociology, applied social psychology and other applied social sciences.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Flentø, Johnny, und Leonardo Santos Simao. Donor relations and sovereignty. UNU-WIDER, 2020. http://dx.doi.org/10.35188/unu-wider/2020/892-4.

Der volle Inhalt der Quelle
Annotation:
As a sovereign country, Mozambique initially relied on international solidarity and managed its donor relations well. Donor dependency entailed some loss of agency for the government as it allowed donors to challenge its capacity but never its authority. However, in the last decade, donor countries have expressed disappointment with reforms and challenged the government’s legitimacy. This is not only because of developments in Mozambique. Donor countries have become less enthusiastic about long-term, harmonized development cooperation and less concerned with aid effectiveness for poverty alleviation and inclusive growth. Aid budgets are under pressure and development finance is linked more to other donor countries’ foreign policy concerns, especially security and commerce. Mozambique should expect increasing instrumentalization of aid budgets by donors. It must be able to address its partners’ concerns other than those of poverty alleviation, human rights, and democracy and carefully weigh conflicting interests of its partners against its own long-term interests. The institutions Mozambique developed to deal with donors are not well suited to today’s challenges. They focus on less relevant areas of the relationship with foreign countries, which often serve other agendas. Reforms could start with strengthening Mozambique’s foreign service as a genuine coordinator of foreign relations and the establishment of greater discipline around national plans and strategies. Institutionalizing strong links between the foreign ministry and key economic ministries under the leadership of the prime minister could help.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie