LEADER 04448nam 2200649Ia 450 001 9910459673503321 005 20200520144314.0 010 $a1-282-76077-7 010 $a9786612760778 010 $a92-4-068530-8 035 $a(CKB)2670000000067994 035 $a(EBL)579101 035 $a(OCoLC)700687957 035 $a(SSID)ssj0000437502 035 $a(PQKBManifestationID)12211577 035 $a(PQKBTitleCode)TC0000437502 035 $a(PQKBWorkID)10432401 035 $a(PQKB)11345330 035 $a(MiAaPQ)EBC579101 035 $a(Au-PeEL)EBL579101 035 $a(CaPaEBR)ebr10411806 035 $a(CaONFJC)MIL276077 035 $a(EXLCZ)992670000000067994 100 $a20101008d2009 uf 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aQuality practices for regulated non-clinical research and development$b[electronic resource] /$fUNDP/World Bank/WHO Special Programme for Research and Training in Tropical Diseases 205 $a2nd ed. 210 $aGeneva $cWHO on behalf of the Special Programme for Research and Training in Tropical Diseases$dc2009 215 $a1 online resource (327 p.) 300 $aHandbook : Good Laboratory Practice (GLP). 311 $a92-4-154755-3 320 $aIncludes bibliographical references. 327 $aCONTENTS; 1. INTRODUCTION TO THE WHO/TDR HANDBOOK ON GLP; GENERAL INTRODUCTION; INTRODUCTION TO GLP AND ITS APPLICATION; 2. GOOD LABORATORY PRACTICE TRAINING; INTRODUCTION; THE FUNDAMENTAL POINTS OF GLP; RESOURCES; CHARACTERISATION; RULES FOR PERFORMING STUDIES; RESULTS - RAW DATA AND DATA COLLECTION; QUALITY ASSURANCE UNIT; 3. STEPWISE IMPLEMENTATION OF GLP; INTRODUCTION; IMPLEMENTATION AS A PROJECT; STEPWISE IMPLEMENTATION OF GLP REQUIREMENTS; ANNEXES: OECD SERIES ON PRINCIPLES OF GOOD LABORATORY PRACTICE AND COMPLIANCE MONITORING; I. OECD PRINCIPLES ON GOOD LABORATORY PRACTICE 327 $aII. GUIDANCE FOR GLP MONITORING AUTHORITIES: REVISED GUIDES FOR COMPLIANCE MONITORING PROCEDURES FOR GOOD LABORATORY PRACTICEIII. GUIDANCE FOR GLP MONITORING AUTHORITIES: REVISED GUIDANCE FOR THE CONDUCT OF LABORATORY INSPECTIONS AND STUDY AUDITS; IV . QUALITY ASSURANCE AND GLP; V . COMPLIANCE OF LABORATORY SUPPLIERS WITH GLP PRINCIPLES; VI . THE APPLICATION OF THE GLP PRINCIPLES TO FIELD STUDIES; VII . THE APPLICATION OF THE GLP PRINCIPLES TO SHORT TERM STUDIES; VIII . THE ROLE AND RESPONSIBILITIES OF THE STUDY DIRECTOR IN GLP STUDIES 327 $aIX . GUIDANCE FOR GLP MONITORING AUTHORITIES: GUIDANCE FOR THE PREPARATION OF GLP INSPECTION REPORTSX . THE APPLICATION OF THE PRINCIPLES OF GLP TO COMPUTERISED SYSTEMS; XI . THE ROLE AND RESPONSIBILITIES OF THE SPONSOR IN THE APPLICATION OF THE PRINCIPLES OF GLP; XII . REQUESTING AND CARRYING OUT INSPECTIONS AND STUDY AUDITS IN ANOTHER COUNTRY; XIII . THE APPLICATION OF THE OECD PRINCIPLES OF GLP TO THE ORGANISATION AND MANAGEMENT OF MULTI-SITE STUDIES; XIV . THE APPLICATION OF THE PRINCIPLES OF GLP TO IN-VITRO STUDIES 327 $aXV . ESTABLISHMENT AND CONTROL OF ARCHIVES THAT OPERATE IN COMPLIANCE WITH THE PRINCIPLES OF GLP 330 $aGood laboratory practices (GLP) are the recognized rules governing the conduct of non-clinical safety studies. They ensure the quality, integrity and reliability of the study data. This handbook is designed as an aid for those countries wishing to upgrade their laboratories to GLP status. Based on the Organisation for Economic Cooperation and Development (OECD) principles of GLP, the handbook provides laboratories and trainers in disease endemic countries with the necessary technical information for implementing GLP programs. The material in the handbook is presented in a clear and informative 517 3 $aGood Laboratory Practice (GLP) 606 $aLaboratories$xStandards$vHandbooks, manuals, etc 606 $aLaboratories$xTechnique$vHandbooks, manuals, etc 608 $aElectronic books. 615 0$aLaboratories$xStandards 615 0$aLaboratories$xTechnique 676 $a344.7304 712 02$aSpecial Programme for Research and Training in Tropical Diseases. 712 02$aWorld Health Organization. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910459673503321 996 $aQuality practices for regulated non-clinical research and development$92099284 997 $aUNINA LEADER 04148nam 22004693u 450 001 9910163025203321 005 20210113161257.0 010 $a9782806253064 010 $a2806253063 035 $a(CKB)3790000000017770 035 $a(EBL)2072670 035 $a(OCoLC)912233579 035 $a(MiAaPQ)EBC2072670 035 $a(Au-PeEL)EBL2072670 035 $a(PPN)249696576 035 $a(Perlego)3573210 035 $a(EXLCZ)993790000000017770 100 $a20151005d2014|||| u|| | 101 0 $afre 135 $aur|n|---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComme une be?te de Joy Sorman (Fiche de lecture) $eRe?sume? complet et analyse de?taille?e de l'oeuvre 205 $a1st ed. 210 $cPrimento Digital$d2014 215 $a1 online resource (28 p.) 225 1 $aFiche de Lecture Series 300 $aDescription based upon print version of record. 311 08$a9782806253125 311 08$a2806253128 327 $aIntro -- Page de titre -- Joy Sorman -- Comme une be?te -- Re?sume? -- Le « chevalier viandard » -- Une visite cauchemardesque -- En bout de parcours -- Le grand saut -- E?tude des personnages -- Le personnage central : Pim le boucher -- Les personnages secondaires -- Morel, le maitre d'apprentissage -- La fille aux espadrilles -- L'e?leveur de la ferme de Caux -- Les animaux-hommes -- Rene? le cochon -- Les vaches Culotte et Culotte Junior -- Cle?s de lecture -- La description minutieuse d'un univers -- Entre documentaire et fable : une ?uvre a? la croise?e des genres -- Du jeune apprenti au « boucher originel » : la me?tamorphose d'un he?ros -- Une dimension anthropologique et philosophique -- Pistes de re?flexion -- Quelques questions pour approfondir sa re?flexion... -- Pour aller plus loin -- E?dition de re?fe?rence -- E?tudes de re?fe?rence -- Copyright. 330 $aDe?cryptez Comme une be?te de Joy Sorman avec l'analyse du PetitLitteraire.fr !Que faut-il retenir de Comme une be?te, le roman original de la litte?rature franc?aise contemporaine ? Retrouvez tout ce que vous devez savoir sur cette ?uvre dans une fiche de lecture comple?te et de?taille?e.Vous trouverez notamment dans cette fiche : Un re?sume? complet Une pre?sentation des personnages principaux tels que Pim le boucher, Morel le mai?tre d'apprentissage et la fille aux espadrilles Une analyse des spe?cificite?s de l'?uvre : la description minutieuse d'un univers, entre le documentaire et la fable, la me?tamorphose d'un he?ros et les dimensions anthropologiques et philosophiques de l'oeuvreUne analyse de re?fe?rence pour comprendre rapidement le sens de l'?uvre.LE MOT DE L'E?DITEUR :« Dans cette nouvelle e?dition de notre analyse de Comme une be?te (2014), avec Sce?ona Poroli-Duwez, nous fournissons des pistes pour de?coder ce roman singulier sur un boucher passionne? par son me?tier. Notre analyse permet de faire rapidement le tour de l'?uvre et d'aller au-dela? des cliche?s. » Ste?phanie FELTENA? propos de la collection LePetitLitteraire.fr :Ple?biscite? tant par les passionne?s de litte?rature que par les lyce?ens, LePetitLitte?raire.fr est conside?re? comme une re?fe?rence en matie?re d'analyse d'?uvres classiques et contemporaines. Nos analyses, disponibles au format papier et nume?rique, ont e?te? conc?ues pour guider les lecteurs a? travers la litte?rature. Nos auteurs combinent the?ories, citations, anecdotes et commentaires pour vous faire de?couvrir et rede?couvrir les plus grandes ?uvres litte?raires. LePetitLitte?raire.fr est reconnu d'inte?re?t pe?dagogique par le ministe?re de l'E?ducation. Plus d'informations sur http://www.lepetitlitteraire.fr. 410 0$aFiche de Lecture Series 700 $aPoroli-Duwez$b Sce?ona$01234375 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a9910163025203321 996 $aComme une be?te de Joy Sorman (Fiche de lecture)$92867303 997 $aUNINA LEADER 04588nam 22007575 450 001 9910983297403321 005 20250626165153.0 010 $a9783031804199$b(electronic bk.) 010 $z9783031804182 024 7 $a10.1007/978-3-031-80419-9 035 $a(MiAaPQ)EBC31882483 035 $a(Au-PeEL)EBL31882483 035 $a(CKB)37248676400041 035 $a(DE-He213)978-3-031-80419-9 035 $a(OCoLC)1498457380 035 $a(EXLCZ)9937248676400041 100 $a20250117d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aEmerging Information Security and Applications $e5th International Conference, EISA 2024, Changzhou, China, October 18?19, 2024, Proceedings /$fedited by Wenjuan Li, Liqun Chen, Javier Lopez 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (382 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v2266 311 08$aPrint version: Li, Wenjuan Emerging Information Security and Applications Cham : Springer,c2025 9783031804182 327 $a -- High-Efficiency Phase-Index Correlation Delay Shift Keying Modulation. -- Federated Learning Poison Attack Detection Scheme Based on Gradient Similarity. -- A Privacy-Preserving and Fault-Tolerant Data Aggregation Scheme in Smart Grids. -- Local Differential Privacy for Key-Value Data Collection and Analysis Based on Privacy Preference and Adaptive Sampling. -- Comparative Study of Machine Learning Approaches for Phishing Website Detection. -- Exploring Interpretability in Backdoor Attacks on Image. -- Attribute-Based Secret Key Signature Scheme. -- Digital token transaction tracing method. -- GPT-based WebAssembly Instruction Analysis for Program Language Processing. -- Research on Key Technologies of Fair Deep Learning. -- Adaptive Differential Privacy Based Optimization Scheme for Federated Learning. -- Cascading failures model with noise interference in supply chain networks. -- DefMPA: Defending Model Poisoning Attacks in Federated Learning via Model Update Prediction. -- SDDRM: An Optimization Algorithm for Localized Differential Privacy Based on Data Sensitivity Differences. -- Blockchain-based key management scheme in Internet of Things. -- Privacy Optimization of Deep Recommendation Algorithm in Federated Framework. -- Delegated Proof of Stake Consensus Mechanism Based on the Overall Perspective of Voting. -- A Distributed Privacy-preserving Data Aggregation Scheme for MaaS Data Sharing. 330 $aThis book constitutes the refereed proceedings of the 5th International Conference on EISA--Emerging Information Security and Applications, EISA 2024, held in Changzhou, China, during October 18?19, 2024. The 15 full papers and 3 short papers included in this book were carefully reviewed and selected from 52 submissions. The topics covered adversarial techniques, intrusions that may threaten the security of various assets, including information and applications, have become more complex. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v2266 606 $aComputer engineering 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aArtificial intelligence 606 $aData protection 606 $aComputer networks$xSecurity measures 606 $aComputer Engineering and Networks 606 $aCryptology 606 $aArtificial Intelligence 606 $aData and Information Security 606 $aMobile and Network Security 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aArtificial intelligence. 615 0$aData protection. 615 0$aComputer networks$xSecurity measures. 615 14$aComputer Engineering and Networks. 615 24$aCryptology. 615 24$aArtificial Intelligence. 615 24$aData and Information Security. 615 24$aMobile and Network Security. 676 $a621.39 676 $a004.6 700 $aLi$b Wenjuan$01246287 701 $aChen$b Liqun$0720720 701 $aLopez$b Javier$01096793 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910983297403321 996 $aEmerging Information Security and Applications$94317393 997 $aUNINA LEADER 00919nam 2200265 450 001 996640772803316 005 20250130123406.0 100 $a20250130d1946----km y0itay5003 ba 101 0 $afre 102 $aFR 105 $ay 00 y 200 1 $aJournal des Etats généraux et du début de l'Assemblée nationale$e18 mai-29 juillet 1789$fJacques-Antoine Creuzé-Latouche$gpublié par Jean Marchand 210 $aParis$cDidier$d1946 215 $aLIV, 315 p.$d24 cm 606 0 $aRivoluzione francese$xFonti$2BNCF 676 $a944.04 700 1$aCREUZE-LATOUCHE,$bJacques-Antoine$f<1749-1800>$01783287 702 1$aMARCHAND,$bJean$f<1894-1988> 801 0$aIT$bcba$gREICAT 912 $a996640772803316 951 $aX.2.A. 379 (IV D 105)$b34427 L.M.$cX.2.$d00029845 959 $aBK 969 $aUMA 996 $aJournal des Etats généraux et du début de l'Assemblée nationale$94310680 997 $aUNISA