| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910459271203321 |
|
|
Autore |
Andersen Torben Juul |
|
|
Titolo |
Strategic risk management practice : how to deal effectively with major corporate exposures / / Torben Juul Andersen and Peter Winther Schrøder [[electronic resource]] |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cambridge : , : Cambridge University Press, , 2010 |
|
|
|
|
|
|
|
ISBN |
|
0-511-73927-3 |
1-107-20298-1 |
0-521-13215-0 |
0-511-81601-4 |
0-511-68135-6 |
0-511-68333-2 |
0-511-67937-8 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (xxi, 245 pages) : digital, PDF file(s) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Risk management |
Strategic planning |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Title from publisher's bibliographic system (viewed on 05 Oct 2015). |
|
|
|
|
|
|
Nota di contenuto |
|
The strategic nature of corporate risk management -- Economic exposures in corporate risk management -- Managing market-related business exposures -- Extending the risk management perspective -- Integrative risk management perspectives -- Current risk management practice and the rise of ERM -- Strategic risk analyses -- Strategic risk management amendments to the ERM framework -- Strategic risk management. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
At a time when corporate scandals and major financial failures dominate newspaper headlines, the importance of good risk management practices has never been more obvious. The absence or mismanagement of such practices can have devastating effects on exposed organizations and the wider economy (Barings Bank, Enron, Lehmann Brothers, Northern Rock, to name but a few). Today's organizations and corporate leaders must learn the lessons of such failures by developing practices to deal effectively with risk. This book |
|
|
|
|
|
|
|
|
|
|
|
|
|
is an important step towards this end. Written from a European perspective, it brings together ideas, concepts and practices developed in various risk markets and academic fields to provide a much-needed overview of different approaches to risk management. It critiques prevailing enterprise risk management frameworks (ERMs) and proposes a suitable alternative. Combining academic rigour and practical experience, this is an important resource for graduate students and professionals concerned with strategic risk management. |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910724375003321 |
|
|
Autore |
Gherchanoc Florence |
|
|
Titolo |
L'Oïkos en fête : célébrations familiales et sociabilité en Grèce ancienne / / Florence Gherchanoc |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Paris : , : Éditions de la Sorbonne, , 2012 |
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (265 pages) |
|
|
|
|
|
|
Collana |
|
Publications de la Sorbonne ; ; 111 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Festivals - Greece - History |
Families - Greece - History |
Greece Manners and customs |
Greece Social life and customs |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Sommario/riassunto |
|
Comment définir la famille en Grèce ancienne ? Qui invite- t-on chez soi ? Suivant quelles modalités ? Pourquoi ? Longtemps, les historiens ont exclu la famille du champ d'étude de la sociabilité, considérant qu'elle relevait de la sphère privée. L'analyse de célébrations ritualisées et normées, le plus souvent festives (mariage, naissance, décès ; sacrifices, banquets, processions, danses, chants), entre parents, amis et voisins, autrement dit entre familiers (oikeioi), ainsi que des discours qui y font référence (tragédies, comédies, plaidoyers civils, discours philosophiques, lois ... ), conduit cependant à éclairer des formes de |
|
|
|
|
|
|
|
|
|
|
|
|
sociabilité plus ou moins formelle propres à appréhender la composition de la famille grecque dans l'Antiquité, son ouverture, ses limites et à définir ses normes, sa cohésion et son identité par des comportements spécifiques et les liens créés. Elle permet également de situer les individus dans l'oikos en fonction de leur statut, de leur âge et de leur sexe. Les célébrations sont organisées et transformées en spectacle, les relations forgées sont théâtralisées. La famille est ainsi comprise comme un nœud de solidarités organiques et imbriquées, un espace de visibilité sociale aux frontières perméables et floues, plutôt que comme une structure juridique figée et un lieu d'expression du privé à l'intérieur de la cité grecque. Le livre met en lumière les liens qui se nouent et perdurent à l'intérieur de la famille et la manière dont ces relations tissées dans un cadre domestique façonnent des interactions plus larges de la famille à la cité, principalement aux époques archaïque et classique, dans le monde grec. Il pose en définitive la difficile question de la nature de la cité. |
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910144210003321 |
|
|
Titolo |
Security Protocols : 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers / / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2004.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (VIII, 248 p.) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 0302-9743 ; ; 2845 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data encryption (Computer science) |
Computer networks |
Operating systems (Computers) |
Algorithms |
Computers and civilization |
Management information systems |
Computer science |
Cryptology |
Computer Communication Networks |
Operating Systems |
Algorithm Analysis and Problem Complexity |
Computers and Society |
Management of Computing and Information Systems |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
(Transcript) -- Keynote Address -- Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties -- Is Entity Authentication Necessary? -- A Structured Operational Modelling of the Dolev-Yao Threat Model -- On Trust Establishment in Mobile Ad-Hoc Networks -- Legally Authorized and Unauthorized Digital Evidence -- Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing -- Contractual Access Control -- Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks -- Analyzing Delegation Properties -- Combinatorial Optimization of Countermeasures against Illegal Copying -- Protocols with Certified-Transfer Servers -- An Architecture for an Adaptive Intrusion-Tolerant Server -- Supporting Imprecise Delegation in KeyNote -- Modeling Protocols for Secure Group Communications in Ad Hoc Networks -- Delegation of Signalling Rights -- Mobile IPv6 Security -- Concluding Discussion: Accounting for Resources -- Back to the Beginning. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Once again we bring you the proceedings of the International Workshop on Security Protocols. It seems hard to believe that we have reached the tenth event in this annual series. This year our theme was “Discerning the Protocol Participants.” Security protocols are usually described in terms of the active participants – Alice c- putes foo and sends it to Bob. However most security protocols also include o?-line participants, which are not synchronously involved in the exchange of messages: a bank may participate on behalf of a customer, and an arbiter may subsequently be asked to interpret the meaning of a run. These silent partners to the protocol have their own security policies, and assumptionsaboutidentity,authorizationandcapabilityneedtobere-examined when the agenda of a hidden participant may change. We hope that the position papers published here, which have been rewritten and rethought in the light of the discussions at the workshop, will be of interest, not just for the speci?c contributions they make but also for the deeper issues which they expose. In order to identify these issues more clearly, we include transcripts for some of the discussions which took place in Cambridge during the workshop. What would you have liked to add? Do let us know. |
|
|
|
|
|
|
|
| |