04555nam 2200721 a 450 991013909280332120230803023531.01-283-55060-197866138630581-118-38282-X1-118-38280-31-118-38284-6(CKB)2560000000089735(EBL)918266(OCoLC)808367012(SSID)ssj0000701703(PQKBManifestationID)11426480(PQKBTitleCode)TC0000701703(PQKBWorkID)10675023(PQKB)10279465(MiAaPQ)EBC918266(Au-PeEL)EBL918266(CaPaEBR)ebr10593214(CaONFJC)MIL386305(EXLCZ)99256000000008973520120508d2013 uy 0engurcn|||||||||txtccrPhloem[electronic resource] molecular cell biology, systemic communication, biotic interactions /edited by Gary A. Thompson, Aart J.E. van BelAmes, Iowa Wiley-Blackwell20131 online resource (394 p.)Description based upon print version of record.0-470-95860-X Includes bibliographical references and index.A. Introduction -- Phloem, the integrative avenue / Aart J.E. van Bel and Gary A. Thompson -- Cell biology of sieve element-companion cell complexes / Rosemary G. White -- Fundamentals of phloem transport physiology / John W. Patrick -- B. Functional aspects of structural SE components -- Roles of plasma membrane transporters in phloem functions / Mechthild Tegeder, Yong-Ling Ruan, and John W. Patrick -- Regulation of sucrose carrier activities / Christina Kühn -- Cellular basis of electrical potential waves along the phloem and impact of coincident Ca2+ fluxes / Jens B. Hafke and Aart J.E. van Bel -- Sieve element occlusion / Michael Knoblauch and Daniel Mullendore -- C. Long-distance signaling -- Sieve elements : Puzzling activities deciphered through proteomics studies / Sylvie Dinant and William J. Lucas -- Endogenous RNA constituents of the phloem and their possible roles in long-distance signaling / Julia Kehr and Anja Buhtz -- The effect of long-distance signaling on development / David J. Hannapel -- Plant defense and long-distance signaling in the phloem / Frank Gaupels and A. Corina Vlot -- D. Biotic interactions with the phloem -- Role of phloem metabolites in plant defense / Jillian M. Hagel, Akpevwe Onoyovwi, Edward C. Yeung, and Peter J. Facchini -- Viroids and phloem-limited viruses : Unique molecular probes of phloem biology / Lucy R. Stewart, Biao Ding, and Bryce W. Falk -- Spiroplasmas and phytoplasmas : the phytopathogenic mollicutes of the phloem / Allyson M. MacLean and Saskia A. Hogenhout -- Breaching the sieve element : the role of saliva as the molecular interface between aphids and the phloem / Torsten Will, James C. Carolan, and Thomas L. Wilkinson -- Behavioral and molecular-genetic basis of resistance against phloem feeding insects / Linda Walling and Gary A. Thompson.Phloem: Molecular Cell Biology, Systemic Communication, Biotic Interactions is a timely collection of research on the cellular and molecular biology of this plant vascular tissue. Recent advances in phloem research have revealed the centrality of this plant tissue to whole plant development and physiology. Building on advances made through developments of new analytical technologies, this book will provide readers with a current and comprehensive reference on the role of phloem in plant growth and development. Collecting the work of a global team of leading researchers, Phloem wiPhloemSieve elementsPlant molecular biologyPlant cell interactionPlant-pathogen relationshipsGrowth (Plants)PlantsDevelopmentPhloem.Sieve elements.Plant molecular biology.Plant cell interaction.Plant-pathogen relationships.Growth (Plants)PlantsDevelopment.575.4/52Thompson Gary A(Gary Allen),1955-966963Bel Aart Jan Eeuwe van1943-966964MiAaPQMiAaPQMiAaPQBOOK9910139092803321Phloem2195129UNINA02151nam 2200553Ia 450 991079197430332120230725021346.01-283-08468-697866130846820-7391-5004-9(CKB)2560000000072821(EBL)686272(OCoLC)721194484(SSID)ssj0000535645(PQKBManifestationID)11371172(PQKBTitleCode)TC0000535645(PQKBWorkID)10546667(PQKB)10609204(MiAaPQ)EBC686272(Au-PeEL)EBL686272(CaPaEBR)ebr10465514(CaONFJC)MIL308468(EXLCZ)99256000000007282120101117d2011 uy 0engur|n|---|||||txtccrThe Daily Show and rhetoric[electronic resource] arguments, issues, and strategies /edited by Trischa GoodnowLanham Lexington Books20111 online resource (275 p.)Description based upon print version of record.0-7391-5003-0 0-7391-5002-2 Includes bibliographical references and index.Contents; Acknowledgments; Introduction: The Daily Show and Rhetoric-Arguments, Issues, and Strategies; I: The Nature of the Beast; II: Arguments; III: Strategies; IV: Issues; Index; About the ContributorsThe Daily Show and Rhetoric approaches the popular program from a scholarly, rhetorical perspective to uncover the rhetorical nature of the show. Using a variety of rhetorical methods, the book, taken as a whole, concludes that The Daily Show is more that just a show designed to make the audience laugh; it's designed to make the audience think.Television programsTelevision programs.791.45/75Knapp Trischa Goodnow1490364MiAaPQMiAaPQMiAaPQBOOK9910791974303321The Daily Show and rhetoric3711713UNINA05602nam 2200613 450 991079690190332120230120002159.00-12-420059-10-12-420054-0(CKB)3710000000378866(EBL)1997675(SSID)ssj0001491198(PQKBManifestationID)11892436(PQKBTitleCode)TC0001491198(PQKBWorkID)11507741(PQKB)11579915(Au-PeEL)EBL1997675(CaPaEBR)ebr11035746(CaONFJC)MIL785244(OCoLC)908041044(CaSebORM)9780124200548(MiAaPQ)EBC1997675(EXLCZ)99371000000037886620141212h20152015 uy| 0engur|n|---|||||txtccrBusiness espionage risk, threats, and countermeasures /Bruce WimmerFirst edition.Waltham, Massachusetts :Elsevier,[2015]©20151 online resource (210 p.)Description based upon print version of record.Includes bibliographical references and index.Front Cover; Business Espionage: Risk, Threats, and Countermeasures; Copyright; Dedication; Contents; Author Biography; Introduction; Business espionage misunderstood; Silo Syndrome; James Bond Syndrome; Exclusive Cyber-Security Focus; Ostrich Syndrome; Objective; How to Use This Book; Part 1: Understanding the Problem of Business Espionage; Chapter 1: Understanding the risks; Introduction; Risk Methodology; Risk Formula; Summary; Chapter 2: Characteristics of business spies; MICE; CRIME; BECCA; Project Slammer; U.S. FBI; Summary; Chapter 3: High-Threat Locations for Business EspionageAsia-PacificLatin America; Europe; Africa; Middle East; More Examples; Business Espionage in/from Greater China; Business Espionage in Singapore; Business Espionage in Vietnam; Korea, Japan, and India; Business Espionage in Latin America; United States; Vulnerabilities Identified in Examples; Summary; Chapter 4: Espionage by Electronic Means; Introduction; Cases of Electronic Eavesdropping; Vulnerabilities Identified; Summary; Chapter 5: Espionage by Force: Physical Theft or Other Appropriation; Introduction; Cases of Business Espionage by Physical Theft or Other AppropriationVulnerabilities IdentifiedSummary; Chapter 6: Facing Espionage While Traveling; Introduction; Cases of Travelers Becoming Victims of Business Espionage; Vulnerabilities Identified; Conclusion; Chapter 7: Insider Threat; Introduction; Cases of Insider Espionage; Vulnerabilities Identified; Summary; Part 2: Business Espionage Countermeasures; Chapter 8: Protecting Your Most Critical Resources; Focus on protecting the most critical information and resources; Chapter 9: Physical and Personnel Security Countermeasures; Introduction; Business Espionage Security Awareness TrainingKey Elements of a Good Employee Counterespionage Education and Awareness ProgramBusiness Espionage Reporting Program; Travel Security Program that Includes Business Espionage Threat; Executive Protection; Clear, Demonstrated Senior Leadership Support; Identifying and Properly Classifying Sensitive Information; Include in Business Continuity/Disaster Recovery Plans; Conduct a Holistic Risk Assessment; Well-Constructed, Comprehensive Security Policies and Procedures; Create a Specific and Focused Information Protection TeamDo Comprehensive Due Diligence of Partners, Suppliers, Vendors, and ClientsBe Involved in Office/Site Location Selection; Conduct Background Investigations/Personnel Security; Address Resignations and Terminations; Access controls; Secure Storage and Locks; Importance of Information Security Manager(s) as Program Contacts; Document and Material Destruction/Trash Controls; Control of Office Machines; Pro-Active Prevention Monitoring; Use of Tiger and Red Team Testing; Non-Disclosure, Non-Compete, and Other Legal Agreements; Limiting Where/How Company Information Can Be Worked On or DiscussedDevelop Special Measures for Marketing and Sales Staff Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and weaknesses. The text fully explains the threat landscape, showing not only how spies operate, but how they can be detected. Drawn from the author’s 40 years of experience, this vital resource will give readers a true understanding of the threat of business spying and what businesses can do to protect themselves. It is ideal for use as a tool to educate staff on the seriousness of the threat of business espionage. Shows how to identify a company’s threats, weaknesses, and most critical assets Provides proven and practical countermeasures that any business can employ to protect their most sensitive assets from both internal and external threats Uses real-life case studies and examples to help the reader understand how to apply the tactics discussedBusiness intelligenceBusiness intelligence.658.472Wimmer Bruce1505810MiAaPQMiAaPQMiAaPQBOOK9910796901903321Business espionage3735687UNINA