| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910455748603321 |
|
|
Autore |
Bok Derek Curtis |
|
|
Titolo |
Beyond the ivory tower [[electronic resource] ] : social responsibilities of the modern university / / Derek Bok |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cambridge, MA, : Harvard University Press, 1982 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Education, Higher - Aims and objectives - United States |
Academic freedom - United States |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Frontmatter -- Contents -- Acknowledgments -- Introduction -- Part I. Basic Academic Values -- 1. Academic Freedom -- 2. Institutional Autonomy and the Demands of the State -- 3. The Purposes of the University and Its Responsibilities to Society -- Part II. Academic Responses to Social Problems -- 4. Access to the University and the Problem of Racial Inequality -- 5. The Moral Development of Students -- 6. Academic Science and the Quest for Technological Innovation -- 7. The Social Responsibilities of Research -- 8. Technical Assistance Abroad -- Part III. Addressing Social Problems by Nonacademic Means -- 9. The University and the Local Community -- 10. Taking Political Positions -- 11. Accepting Gifts -- 12. Boycotts and Other Efforts to Avoid Outside Relationships -- Conclusion -- Index |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Derek Bok examines the complex ethical and social issues facing modern universities today, and suggests approaches that will allow the academic institution both to serve society and to continue its primary mission of teaching and research. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910140578003321 |
|
|
Titolo |
The audit committee handbook [[electronic resource] /] / Louis Braiotta, Jr. ... [et al.] |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Hoboken, NJ, : Wiley, 2010 |
|
|
|
|
|
|
|
ISBN |
|
1-119-19981-6 |
1-282-54778-X |
9786612547782 |
0-470-61605-9 |
|
|
|
|
|
|
|
|
Edizione |
[5th ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (403 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Audit committees |
Auditing |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
The Audit Committee Handbook, Fifth Edition; Contents; Preface; Part One: Getting Acquainted with Your Responsibilities; Chapter 1: Corporate Accountability: Focus on the Audit Committee; Chapter 2: Audit Committees: Basic Roles and Responsibilities; Chapter 3: The External Users of Financial Reporting Information; Chapter 4: The Legal Environment of the Audit Committee; Chapter 5: Rules of the Road: Financial Reports and Their Audits; Part Two: The Planning Function of the Audit Committee; Chapter 6: Planning the External Audit |
Appendix 6A: Qualitative Factors That May Influence the Determination of MaterialityAppendix 6B: Example Audit Planning Schedule; Chapter 7: Planning the Internal Audit; Part Three: The Monitoring and Reviewing Functions of the Audit Committee; Chapter 8: Monitoring the System of Internal Control; Chapter 9: Evaluating the Internal and External Audit Function; Chapter 10: Communications between Auditors and Audit Committees; Chapter 11: A Perspective on Fraud and the Auditor; Chapter 12: The Audit Committee, Corporate Culture, and Tone at the Top |
Part Four: The Reporting Function and the Audit CommitteeChapter 13: Independent Auditors' Reports; Chapter 14: The Audit Committee's |
|
|
|
|
|
|
|
|
|
|
|
|
|
Report and Concluding Observations; Appendix: Appendix Professional Accounting Associations, Business Organizations, Boards, Commissions, and Directors Publications; About the Authors; Index |
|
|
|
|
|
|
Sommario/riassunto |
|
The classic handbook to audit committee responsibilities-completely updated to cover the latest guidance with practical insights on the new functions of the audit committee. Now containing the newest regulatory guidance impacting audit committees, including new chapters on audit oversight and updated discussions on fraud risk, the Fifth Edition helps your audit committee plan its agenda and achieve its mission in corporate governance. The Audit Committee Handbook, Fifth Edition guides you to: Understand the role and responsibilities of the audit committee with a gen |
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910959294603321 |
|
|
Autore |
Niederehe Hans-Josef <1937-> |
|
|
Titolo |
Bibliografia cronologica de la linguistica, la gramatica y la lexicografia del espanol (BICRES) : desde los principios hasta el ano 1600 / / Hans-Josef Niederehe |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Philadelphia, Pa., : John Benjamins Pub. Co., 1994 |
|
|
|
|
|
|
|
ISBN |
|
1-283-12193-X |
9786613121936 |
90-272-8495-4 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Collana |
|
Amsterdam studies in the theory and history of the linguistic science. Series III, Studies in the history of the language sciences, , 0304-0720 ; ; v. 76 |
|
|
|
|
|
|
|
|
Soggetti |
|
Spanish language - Early works to 1800 |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
BIBLIOGRAFÌA CRONOLOGICA DE LA LINGÜÍSTICA , LA GRAMÁTIC A Y LA LEXICOGRAFÍA DEL ESPAÑOL (BICRES) -- Editorial page -- Title page -- Copyright page -- Table of contents -- Introducción -- 1. Finalidad de la bibliografía -- 2. El artículo bibliográfico -- 3. Informaciones técnicas -- Agradecimientos -- Bibliografía I: La lingüística española |
|
|
|
|
|
|
|
|
|
|
|
hasta 1600 -- Bibliografía II: Fuentes bibliográficas y estudios -- Indice de títulos -- Índice de lugares de publicación -- Índice de escribanos e impresores -- Índice de paraderos -- Índice de autores. |
|
|
|
|
|
|
Sommario/riassunto |
|
Since the publication of the still very valuable Biblioteca histórica de la filología castellana by Cipriano Muñoz y Manzano, conde de la Viñaza, (Madrid, 1893), our knowledge of the history of the study of the Spanish language has grown considerably. It is the purpose of the present bibliography to bring already available bibliographical information together with the more recent research findings, scattered in many places, books and articles, published during the past one hundred years. More importantly still, many years of work in the major libraries of Spain and other European countries have gone into this new bibliography in order to offer an as exhaustive as possible description of all Spanish grammars and dictionaries, histories of the Spanish language as well studies devoted to particular facets of its evolution, from the early glosses in Latin and Arabic texts in the 10th century to the beginning of the more autonomous approach to vernacular studies in the Renaissance period - which is not only represented by the grammatical and lexicographical work of the great Spanish humanist Elio Antonio de Nebrija. Bibliografía cronológica de la lingüística, la gramática y la lexicografía del español (BICRES) brings together, in chronological order, close to 1,000 titles. Access to the bibliographical information is facilitated by several detailed indexes, such as author index, short title index, place of production index, index of printers and publishers, and a location index of the books described. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
4. |
Record Nr. |
UNINA9910299942903321 |
|
|
Titolo |
Information Technology - New Generations : 15th International Conference on Information Technology / / edited by Shahram Latifi |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2018.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (774 pages) |
|
|
|
|
|
|
Collana |
|
Advances in Intelligent Systems and Computing, , 2194-5365 ; ; 738 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Application software |
Data protection |
Data structures (Computer science) |
Information theory |
Computer and Information Systems Applications |
Data and Information Security |
Data Structures and Information Theory |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Part I Cybersecurity -- Safeguarding Personal Health Information: Case Study -- Cybersecurity as People Powered Perpetual Innovation -- Performance Study of the Impact of Security on 802.11ac Networks -- Training Neural Tensor Networks with the Never Ending Language Learner -- PERIA-Framework: A Prediction Extension Revision Image Annotation Framework -- The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan -- Evaluating Cyber Threats to the United Kingdom’s National Health Service (NHS) Spine Network -- A Virtual Animated Commentator Architecture for Cybersecurity Competitions -- Malicious Software Classification using VGG16 Deep Neural Network’s Bottleneck Features -- Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach) -- A Self Proxy Signature Scheme over NTRU Lattices -- Towards an Ontology of Security Assessment: a core model proposal -- Integration of Mobile Forensic Tool Capabilities -- Deep Packet Inspection: A Key Issue for Network Security -- What Petya/NotPetya |
|
|
|
|
|
|
|
|
|
Ransomware is and What its Remidiations are -- Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform -- New Techniques for Public Key Encryption with Sender Recovery -- Cloud Intrusion Detection and Prevention system for M-voting application in South Africa -- Protecting Personal Data with Blockchain Technology -- The Role of CAE-CDE in Cybersecurity Education for Workforce Development -- Software Optimizations for DES -- Part II Networking and Wireless Communications -- Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment -- End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks -- Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges -- A Dual canister medicine IoT Dispenser -- Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks -- Denial of service attacks inwireless sensor networks with proposed countermeasures -- Part III Education and Technology -- Internet-Based Education: A New Milestone for Formal Language and Automata Courses -- Teaching Communication Management in Software Projects through Serious Educational Games -- Gamification applied in the teaching of agile Scrum methodology -- An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework -- Part IV Agile Software Testing and Development -- Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects -- Alignment of Requirements and Testing in Agile: an Industrial Experience -- Health Care Information Systems: A Crisis Approach -- Using Correct-by-Construction Software Agile Development -- Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services -- Improving Agile Software Development with Domain Ontologies -- A Stratified Sampling Algorithmfor Artificial Neural Networks -- Part V Data Mining/Machine Learning -- Mining ENADE Data from the Ulbra Network Institution -- Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA) -- Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise -- Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets -- Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series -- DeRis: Information system supporting the prediction of default risk in companies -- Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm -- Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics -- A model for hour-wise prediction of mobile device energy availability -- Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model -- A Traffic Light Recognition Device -- An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment -- Reproducible Research in Document Analysis and Recognition -- Music Genre Classification using Data Mining and Machine Learning -- Improving word representations using Paraphrase dataset -- A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions -- Dual Long Short-Term Memory Networks for Sub-Character Representation Learning -- Business Intelligence Dashboard Application for Insurance Cross Selling -- Speech Features Analysis for Tone Language Speaker Discrimination Systems -- Selection of Transformations of Continuous Predictors in Logistic Regression -- Part VI Software Engineering -- A Generic Approach to Efficiently Parallelize |
|
|
|
|
|
|
|
Legacy Sequential Software -- Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications -- A Timed Petri NetModel to Specify Scenarios of Video Games -- Survey of Biometric Techniques for Automotive Applications -- A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations -- Budget and User Feedback Control Strategy-based PRMS Scenario Web Application -- A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules -- An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games -- A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies -- Increasing the prediction quality of software defective modules with automatic feature engineering -- Part VII High Performance Computing Architectures -- NSF Noyce Recruitment and Mentorship -- Mining Associations between Two Categories using Unstructured Text Data in Cloud -- A Note on Computational Science Curriculum -- Development of a Local Cloud-Based Bioinformatics Architecture -- Part VIII Computer Vision, Image Processing/Analysis -- AComputer Vision Based Algorithm for Obstacle Avoidance -- The ST-Vis tool for SpatioTemporal Visualization -- Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima -- Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network -- Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation -- Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC Countries -- Part IX Health, Bioinformatics, Pattern Detection and Optimization -- Benefits of Establishing Makerspaces in Distributed Development Environment -- Semantic Description of Healthcare Devices to Enable Data Integration -- Applying transfer learning to QSAR regression models -- Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine -- A Complete Diabetes Management and Care System -- On the use of van der PauwTechnique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim Monitoring -- Part X Potpourri -- Smart Lighting Controlling System: Case Study of Yarmouk University Museum -- Incremental Topology Generated for ANN A Case Study on a Helicopter’s Flight Simulation -- Degree Aware Triangulation of Annular Regions -- Heuristic Approaches for the Open-Shop Scheduling Problem -- Continuous State Power-down Systems for Renewable Energy Management -- Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded Systems -- Part XI Short Papers -- Customer services management and satisfaction of Internet-related banking of First National Bank -- BIG IoT – Interconnecting IoT Platforms from different domains - First success story -- Cross-Cultural Perspective of E-Commerce -- Website Usability Requirements: Through the Lens of Individual’s Perception -- Methods of Ensuring the Reliability and Fault Tolerance of Information Systems -- Applying a Method for Credit Limit Reviews in a Brazilian Retail Enterprise -- Application of an Effective Methodology for Analysis of Fragility and Its Components in the Elderly -- A Classifier Evaluation for Payments’ Default Predictions in a Brazilian Retail Company -- Confidentiality, Integrity & Availability in Electronic Health Records:An Integrative Review -- Operating System Security Management and Ease of Implementation (Passwords, Firewalls and Antivirus) -- Method of Processing Big Data -- Software Architecture for In-House Development of a Student Web Portal for Higher Education Institution in Kazakhstan -- Modified Human Code for Bandwidth Optimization |
|
|
|
|
|
|
|
|
|
through Lossless Compression -- Index. |
|
|
|
|
|
|
Sommario/riassunto |
|
This volume presents a collection of peer-reviewed, scientific articles from the 15th International Conference on Information Technology – New Generations, held at Las Vegas. The collection addresses critical areas of Machine Learning, Networking and Wireless Communications, Cybersecurity, Data Mining, Software Engineering, High Performance Computing Architectures, Computer Vision, Health, Bioinformatics, and Education. Features the most recent advances in information technology; Presents early work and novel results from research laboratories around the world; Facilitates managers making business decisions, academics shaping research work, and educators keeping abreast of recent advances in learning technologies. |
|
|
|
|
|
|
|
| |