LEADER 04107nam 2200709 450 001 9910787201703321 005 20200520144314.0 010 $a3-11-039910-5 010 $a3-486-85916-1 024 7 $a10.1515/9783486859164 035 $a(CKB)3710000000323487 035 $a(EBL)1867185 035 $a(SSID)ssj0001434356 035 $a(PQKBManifestationID)11902043 035 $a(PQKBTitleCode)TC0001434356 035 $a(PQKBWorkID)11437303 035 $a(PQKB)11296700 035 $a(DE-B1597)242655 035 $a(OCoLC)979887451 035 $a(DE-B1597)9783486859164 035 $a(Au-PeEL)EBL1867185 035 $a(CaPaEBR)ebr11004458 035 $a(CaONFJC)MIL783370 035 $a(OCoLC)898770210 035 $a(CaSebORM)9783110399103 035 $a(MiAaPQ)EBC1867185 035 $a(EXLCZ)993710000000323487 100 $a20150123h20142014 uy 0 101 0 $ager 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aIT-sicherheit $eKonzepte - Verfahren - protokolle /$fClaudia Eckert ; Lektorat, Angelika Sperlich ; Herstellung, Tina Bonertz 205 $a9. Auflage. 210 1$aMunich, Germany :$cDe Gruyter Oldenbourg,$d2014. 210 4$d©2014 215 $a1 online resource (1004 p.) 300 $aDescription based upon print version of record. 311 $a3-486-77848-X 320 $aIncludes bibliographical references and index. 327 $t Frontmatter -- $tVorwort -- $tInhaltsverzeichnis -- $t1. Einführung -- $t2. Spezielle Bedrohungen -- $t3. Internet-(Un-)Sicherheit -- $t4. Security Engineering -- $t5. Bewertungskriterien -- $t6. Sicherheitsmodelle -- $t7. Kryptografische Verfahren -- $t8. Hashfunktionen und elektronische Signaturen -- $t9. Schlüsselmanagement -- $t10. Authentifikation -- $t11. Digitale Identität -- $t12. Zugriffskontrolle -- $t13. Sicherheit in Netzen -- $t14. Sichere mobile und drahtlose Kommunikation -- $tLiteraturverzeichnis -- $tAbkürzungsverzeichnis -- $tIndex 330 $aGesundheit, Mobilität, Handel oder Finanzen: moderne IT-Systeme sind heute in nahezu allen Bereichen von zentraler Bedeutung und mögliche Sicherheitsrisiken dieser Systeme von unmittelbarer Brisanz.Claudia Eckert stellt in diesem Standardwerk die zur Umsetzung der Sicherheitsanforderungen benötigten Verfahren und Protokolle detailliert vor und erläutert sie anschaulich anhand von Fallbeispielen. Im Vordergrund steht dabei, die Ursachen für Probleme heutiger IT-Systeme zu verdeutlichen und die grundlegenden Sicherheitskonzepte mit ihren jeweiligen Vor- und Nachteilen zu präsentieren. Der Leser entwickelt nicht nur ein Bewusstsein für IT-Sicherheitsrisiken, sondern erwirbt auch ein breites und grundlegendes Wissen zu deren Behebung. - Sicherheitsbedrohungen durch unsichere Programmierung, Schadcode, Apps - Internet- (Un)Sicherheit- Security Engineering Vorgehen mit Bedrohungs- und Risiko-Analysen, Bewertungskriterien und Sicherheitsmodellen - Kryptografische Verfahren und Schlüsselmanagement - Authentifikation und digitale Identität - Zugriffskontrolle in zentralen und serviceorientierten (SOA) Systemen - Kommunikationssicherheit mit SSL/TLS, IPSec und sicherer Mail- Sichere mobile und drahtlose Kommunikation mit GSM/UMTS/LTE sowie, WLAN und Bluetooth Ein Muss für jeden, der sich mit dieser hochaktuellen Problematik beschäftigt! 606 $aCloud computing$xSecurity measures 606 $aInformation technology 606 $aInformation technology$xSecurity measures 610 $aInternet, security models, network security, protocols, IT systems. 615 0$aCloud computing$xSecurity measures. 615 0$aInformation technology. 615 0$aInformation technology$xSecurity measures. 676 $a005.8 686 $aST 276$2rvk 700 $aEckert$b Claudia$01472061 702 $aSperlich$b Angelika 702 $aBonertz$b Tina 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910787201703321 996 $aIT-sicherheit$93684668 997 $aUNINA LEADER 06180oam 2200745I 450 001 9910778907703321 005 20230126202900.0 010 $a1-136-49712-9 010 $a1-136-49713-7 010 $a0-203-14170-9 035 $a(CKB)2550000000096540 035 $a(EBL)957376 035 $a(OCoLC)798533057 035 $a(SSID)ssj0000622800 035 $a(PQKBManifestationID)11435047 035 $a(PQKBTitleCode)TC0000622800 035 $a(PQKBWorkID)10646846 035 $a(PQKB)11298908 035 $a(MiAaPQ)EBC957376 035 $a(Au-PeEL)EBL957376 035 $a(CaPaEBR)ebr10545700 035 $a(CaONFJC)MIL500525 035 $a(OCoLC)741355052 035 $a(OCoLC)801445587 035 $a(FINmELB)ELB140357 035 $a(EXLCZ)992550000000096540 100 $a20180727h20132011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 04$aThe economics of ecosystems and biodiversity in business and enterprise /$fedited by Joshua Bishop 205 $aFirst edition. 210 1$aBoca Raton, FL :$cRoutledge, an imprint of Taylor and Francis,$d[2013]. 210 4$d©2011. 215 $a1 online resource (297 p.) 225 1 $aTEEB - The Economics of Ecosystems and Biodiversity 300 $a"An output of TEEB: The Economics of Ecosystems and Biodiversity". 311 $a1-138-32792-1 311 $a1-84971-251-4 320 $aIncludes bibliographical references and index. 327 $aThe Economics of Ecosytems and Biodiversity in Business and Enterprise; Copyright; Contents; Foreword from H.R.H. The Prince of Wales; List of Figures, Tables and Boxes; List of Contributors; Acknowledgements; Preface; List of Acronyms and Abbreviations; Chapter 1 Introduction to Biodiversity and Ecosystems for Business; Background to this book; Approach, structure and contents; Biodiversity and ecosystems in a changing world; From major trends to business values; Chapter 2 Business Impacts and Dependence on Biodiversity and Ecosystem Services; Introduction 327 $aBiodiversity, ecosystems and ecosystem servicesImpacts and dependence on biodiversity and ecosystem services across sectors; Biodiversity and ecosystem risks and opportunities for business; Conclusion; Annex 2.1: Case studies: cotton and the Aral Sea and timber in China; Chapter 3 Measuring and Reporting Biodiversity and Ecosystem Impacts and Dependence; Introduction; Designing BES information management and accounting systems; Incorporating BES in capital investment decisions; Collecting and using information at the product level; Collecting and using information at the group level 327 $aConclusions and recommendationsChapter 4 Scaling Down Biodiversity and Ecosystem Risks to Business; Introduction: Biodiversity as business risk; Integrating biodiversity and ecosystem services into corporate risk management; Tools for managing biodiversity and ecosystem risks; Strategies for scaling down biodiversity and ecosystem risk; Conclusion; Chapter 5 Increasing Biodiversity Business Opportunities; Introduction: biodiversity as a business opportunity; Biodiversity and ecosystem services as a value proposition; Emerging markets for biodiversity and ecosystem services 327 $aTools to support markets for biodiversity and ecosystem servicesChallenges to building biodiversity business; What is to be done?; Chapter 6 Business, Biodiversity and Development; Introduction; The business contribution to development; Biodiversity and ecosystem services and the business role in development; Linking biodiversity, ecosystem services and development; Risks and challenges; Enablers and recommendations; Chapter 7 Summary and Conclusion; Summary of findings; An agenda for action by business and other stakeholders 327 $aAnnex 7.1: Comparison of selected business, biodiversity and ecosystem declarations, initiatives, guidelines and toolsIndex 330 3 $aThis book is a product of the TEEB study (The Economics of Ecosystems and Biodiversity) It provides important evidence of growing corporate concern about biodiversity loss and offers examples of how leading companies are taking action to conserve biodiversity and to restore ecosystems. The authors review a range of practical tools to manage biodiversity risks in business, with examples of how companies are using these tools to reduce costs, protect their brands and deliver real business value. The book also explores the emergence of new business models that deliver biodiversity benefits and ecosystem services on a commercial basis, the policy enabling frameworks needed to stimulate investment and entrepreneurship to realize such opportunities, and the obstacles that must be overcome. The book further examines how businesses can align their actions in relation to biodiversity and ecosystem services with other corporate responsibility initiatives, including community engagement and poverty reduction. Finally, the book concludes with a summary and recommendations for action.This book reviews indicators and drivers of biodiversity loss and ecosystem decline, and shows how these present both risks and opportunities to all businesses. It examines the changing preferences of consumers for nature-friendly products and services, and offers examples of how companies are responding. The book also describes recent initiatives to enable businesses to measure, value and report their impacts and dependencies on biodiversity and ecosystem services. 410 0$aTEEB - The Economics of Ecosystems and Biodiversity 606 $aEnvironmental economics 606 $aSocial responsibility of business 606 $aBiodiversity 615 0$aEnvironmental economics. 615 0$aSocial responsibility of business. 615 0$aBiodiversity. 676 $a658.4/083 676 $a658.4083 686 $aSCI026000$2bisacsh 702 $aBishop$b Joshua 801 0$bFlBoTFG 801 1$bFlBoTFG 906 $aBOOK 912 $a9910778907703321 996 $aThe economics of ecosystems and biodiversity in business and enterprise$93821247 997 $aUNINA LEADER 01153nas 2200397- 450 001 996510046103316 005 20240117213019.0 011 $a2465-891X 035 $a(DE-599)ZDB3148673-3 035 $a(OCoLC)1391829558 035 $a(CKB)3340000000002861 035 $a(CONSER)--2022243635 035 $a(EXLCZ)993340000000002861 100 $a20230412a20179999 o-- a 101 0 $aeng 135 $aurunu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe nerve 210 1$aCheonan-Si, South Korea :$cKorean Society of Peripherial Nervous System,$d2015- 215 $a1 online resource 531 $aNERVE 606 $aNervous system$vPeriodicals 606 $aNerves, Peripheral$vPeriodicals 606 $aNeurosciences$vPeriodicals 608 $aSerial publications.$2lcgft 608 $aPeriodicals.$2lcgft 615 0$aNervous system 615 0$aNerves, Peripheral 615 0$aNeurosciences 712 02$aKorean Society of Peripheral Nervous System, 906 $aJOURNAL 912 $a996510046103316 996 $aThe Nerve$91990646 997 $aUNISA LEADER 02221nam0-2200289 --450 001 9910863597703321 005 20240621091600.0 010 $a978-88-6548-456-2 100 $a20240621d2023----kmuy0itay5050 ba 101 0 $aita$cita 102 $aIT 105 $ay 001yy 200 1 $aMarzo 1973$ebandiere rosse a Mirafiori$fChicco Galmozzi 210 $aBologna$cDeriveApprodi$d2023 215 $a127 p.$d23 cm 225 1 $aDeriveApprodi$v168 330 $aL?occupazione dello stabilimento Fiat di Mirafiori del marzo 1973 rappresenta il punto più alto di un ciclo di lotte operaie che ha inizio nella seconda metà degli anni Sessanta. Soggetto protagonista di quel ciclo di lotte è l?«operaio massa», cioè l?operaio dequalificato, emigrato dalle campagne del Sud e obbligato al massacrante lavoro della catena di montaggio delle grandi fabbriche. Questo soggetto, privo di qualsiasi talento di «mestiere», all?interno di quelle fabbriche e soprattutto alla Fiat, riesce a controvertire la drammatica sconfitta operaia subita nel corso degli anni Cinquanta. Il susseguirsi ininterrotto delle sue pratiche di lotta culmina nell?occupazione degli stabilimenti di Mirafiori nel marzo 1973, assumendo caratteri «militari» a opera di centinaia di avanguardie, i cosiddetti «fazzoletti rossi», che demoliscono in poche settimane quel che era stato per due decenni un dispotismo aziendale assoluto. Il libro propone una ricostruzione storica di quelle vicende e di quanto sarebbe accaduto negli anni successivi, quando le organizzazioni rivoluzionarie della sinistra radicale ritennero automatico passare all?attacco del «cuore dello Stato». Il testo, che esce in occasione del cinquantenario degli eventi, si avvale di una preziosa appendice: il diario quotidiano dell?occupazione stilata dai protagonisti di quello straordinario evento. 610 0 $aFIAT$a1973$aOfficine Mirafiori$aVertenze sindacali 676 $a331.89094512$v22$zita 700 1$aGalmozzi,$bChicco$0787176 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910863597703321 952 $aCOLLEZ. 2222 (168)$b2188/2024$fFSPBC 959 $aFSPBC 996 $aMarzo 1973$94169679 997 $aUNINA