Listing 1 - 8 of 8 |
Sort by
|
Choose an application
Can we believe that there is no danger of "fascism," or "totalitarianism" here? That there's no corporate stranglehold on the economy; no collusion between Washington and the bankers/businesses; no creeping laws that take private property away from hard-working families and individuals for the benefit of those at the top? This defeat of the individual and the spirit of enterprise began prior to 1862; it was accelerated under Lincoln, a corporate agent. Wilson allowed the creation of the Federal Reserve Bank, Reagan further empowered the corporations, and Bush gave us the Patriot Act.
Banks and banking --- Corporations --- Business corporations --- C corporations --- Corporations, Business --- Corporations, Public --- Limited companies --- Publicly held corporations --- Publicly traded corporations --- Public limited companies --- Stock corporations --- Subchapter C corporations --- Business enterprises --- Corporate power --- Disincorporation --- Stocks --- Trusts, Industrial --- Agricultural banks --- Banking --- Banking industry --- Commercial banks --- Depository institutions --- Finance --- Financial institutions --- Money --- Political aspects --- History. --- Free enterprise --- Globalization --- Political aspects&delete& --- History --- E-books --- Global cities --- Globalisation --- Internationalization --- International relations --- Anti-globalization movement --- Free markets --- Laissez-faire --- Markets, Free --- Private enterprise --- Economic policy
Choose an application
This book presents chapters from diverse range of authors on different aspects of how Blockchain and IoT are converging and the impacts of these developments. The book provides an extensive cross-sectional and multi-disciplinary look into this trend and how it affects artificial intelligence, cyber-physical systems, and robotics with a look at applications in aerospace, agriculture, automotive, critical infrastructures, healthcare, manufacturing, retail, smart transport systems, smart cities, and smart healthcare. Cases include the impact of Blockchain for IoT Security; decentralized access control systems in IoT; Blockchain architecture for scalable access management in IoT; smart and sustainable IoT applications incorporating Blockchain, and more. The book presents contributions from international academics, researchers, and practitioners from diverse perspectives. Presents how Blockchain and IoT are converging and the impacts of these developments on technology and its application; Discusses IoT and Blockchain from cross-sectional and multi-disciplinary perspectives; Includes contributions from researchers, academics, and professionals from around the world.
Internet of things. --- IoT (Computer networks) --- Things, Internet of --- Computer networks --- Embedded Internet devices --- Machine-to-machine communications --- Telecommunication. --- Data protection. --- Computational intelligence. --- Data protection --- Communications Engineering, Networks. --- Data and Information Security. --- Computational Intelligence. --- Privacy. --- Law and legislation. --- Habeas data --- Privacy, Right of --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting
Choose an application
Choose an application
Manage VMware workloads in Azure VMware Solution and enable hybrid connectivity between on-premises datacenters and Azure with this extensive guide focusing on best practices and use cases Key Features Extend or migrate your existing VMware environment to Azure VMware Solution smoothly Discover best practices that are based on real customer experiences Join the cloud revolution by conducting the most suitable migration for your workloads Book Description Organizations over the world are migrating partially or fully to the cloud, but with the whole slew of providers, tools, and platforms available, knowing where to start can be quite challenging. If you know Microsoft Azure VMware Solution, you know it is the quickest way to migrate to the cloud without needing application modernization or rework. You can retain the same VMware tools to manage your environment while moving to Azure. But how does it work? The Ins and Outs of Azure VMware Solution has the answer. This high-level, comprehensive yet concise guide to Azure VMware Solution starts by taking you through the architecture and its applicable use cases. It will help you hit the ground running by getting straight to the important steps: planning, deploying, configuring, and managing your Azure VMware Solution instance. You'll be able to extend your existing knowledge of Azure and VMware by covering advanced topics such as SRM and governance, setting up a hybrid connection to your on-premises datacenter, and scaling up using disk pools. By the end of the VMware book, you'll have gone over everything you need to transition to the cloud with ease using Azure VMware Solution. What you will learn Get to grips with the overall architecture of Azure VMware Solution Discover Enterprise-scale for Azure VMware Solution Deploy an Azure VMware private cloud successfully Deploy and configure HCX in Azure VMware Solution Configure NSX-T network segments with the NSX-T Manager Configure internet access, traffic inspection, and storage for AVS Integrate Azure VMware Solution with Azure-native services Use governance to improve your cloud portfolio Who this book is for This book is for VMware administrators, cloud solutions architects, and anyone interested in learning how to deploy and configure an AVS environment in Azure. Technology leaders who want to get out of the datacenter business or expand their on-premises datacenter into Microsoft Azure will also find this book useful. Familiarity with VMware solutions and a basic understanding of Azure networking is necessary to get started with this book.
Microsoft Azure (Computing platform) --- Virtual computer systems. --- Cloud computing. --- VMware.
Choose an application
In this book each attack vector is dissected with detailed explanations, real-world examples, countermeasures.
Computer security. --- Social engineering. --- Computer fraud. --- Hacking.
Choose an application
Das Buch bietet konkrete Vorschläge zu Unternehmensrichtlinien und zur IT-Sicherheit, zum sicheren IT-Betrieb und zu sicheren IT-Systemen, zum Management und zur Organisation von IT-Sicherheit sowie zum Schutz von Daten. Es ist damit wertvolles Hilfsmittel für Führungskräfte, die IT-Sicherheit in ihrem Unternehmen umfassend verankern möchten. Die Autoren liefern dazu ein Konzept. Es reicht von der Unternehmens-Policy zu IT-Sicherheit auf oberster Ebene bis hinunter zu Hinweisen für operative Arbeitsanweisungen. Ganz konkrete Vorschläge zu Formulierungen solcher Richtlinien werden vorgestellt. Sie dienen als Beispiel und Grundlage für die Erarbeitung einer auf die Bedürfnisse des Unternehmens zugeschnittenen Regelwerkes. Der Inhalt IT-Sicherheit allgemein – Sicherer IT-Betrieb – Sichere IT-Systeme – IT-Sicherheitsmanagement – Schutz von Daten – Organisation von IT-Sicherheit Die Zielgruppen - IT-Entscheider - Datenschutzbeauftragte - Sicherheitsbeauftragte - Geschäftsführung - Führungskräfte mit IT-Bezug Die Autoren Ralf-T. Grünendahl ist Client Industry Executive bei DXC (entstanden aus dem Merger der Servicesparte von Hewlett Packard Enterprise mit CSC) und dort in internationalen Accounts, vorrangig in der Telekommunikationsindustrie, tätig. Andreas F. Steinbacher leitet Beratungsprojekte für die IT Governance Practice der DXC Transformation & Integration Services. Peter H. L. Will ist Branchenverantwortlicher für den Public-Bereich bei kobaltblau Management Consultants. Will war zuvor Division Head des Business Technology Management bei Kienbaum und Managing Consultant der Detecon International. Die Autoren beschäftigen sich seit vielen Jahren mit IT-Strategie, strategischer Ausrichtung von IT-Organisationen und der digitalen Transformation von Unternehmen sowie mit Regulierungsfragen (SOX, Basel II), Risikomanagement und den daraus folgenden Implikationen für die IT und insbesondere für IT-Sicherheit. .
Computer security. --- Data protection. --- Systems and Data Security. --- Security. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
The Social Internet of Things (SIoT) has become a hot topic in academic research. It employs the theory of social networks into the different levels of the Internet of Things (IoTs) and has brought new possibilities for the development of IoTs. Essentially, the SIoT is a subset of IoTs. It uses intelligent hardware and humans as the node, a social network as the organization type, the social relationship between things, things and humans, and between humans, formatting research methods and models with social network characteristics to realize the connection, service, and application of the IoTs. Moreover, SIoT is a form of realization of technology, architecture, and application of the IoTs using social network research methods. It further promotes the integration between real-world and virtual cyberspace, contributes the realization of the IoTs, expands the research scope of the social networking, and provides a new solution for the specific problems of the IoTs. Consequently, there is a tremendous need for researchers to have a comprehensive knowledge of the advances in SIoT. This special issue is soliciting scientiαc research papers that can present a snapshot of the latest research status of SIoT.
Internet of things --- Computer networks --- Social aspects.
Choose an application
Financieel recht - Kredieten & Waarborgen & effecten en regulering - aanbieding van effecten: enige opmerkingen over spanning tussen regelegeving en praktijk - aanbieders van effectenbemiddeling van effecten of (geen) van beide? - beleggersgiro: een effectenrechtelijke kameleon? - circulaire van de Stichting Toezicht Effectenverkeer inzake het begrip besloten kring - wet melding zeggenschap in ter beurze genoteerde vennootschappen 1996: transparantie? (beurs) - de finaliteitsrichtlijn - inkoop van eigen aandelen (aandeel) - voorkenniszaken ( voorkennis / voorwetenschap / insider trading) en 'circumstantial evidence' & effecten en effectenhandel - het Wge - aandeel: een recht op naam van eigen aard - voorwaardelijke overdracht van effecten in zin van Wet giraal effectenverkeer - dematerialisatie van effecten en ontwikkelingen rond de Wge - verificatie van obligaties aan toonder in het faillissement van de uitgevende instelling - girale levering van effecten in het internationaal privaatrecht (ipr / i.p.r.) - clearingmemberstructuur van AEX - effectenclearing: nieuwe waarborgen bij afwikkeling van beurstransacties - wat is een beleggingsfonds in zin van Wet toezicht beleggingsinstellingen? - certificering (certificatie) en beleggingsfondsen - rating agencies en hun aansprakelijkheid & effecten financiering en zekerheden (zekerheid / waarborg) - repo's en repowet: van de regen in de drop? - securitisation (securitisatie) en vermogensafzondering van vorderingsrechten op naam - afspliting van vorderingen - securitisation en bankhypotheek(en) (hypotheek): problemen en mogelijke oplossingen - enkele beschouwingen over zekerheden in collectief verband - opinie-perikelen bij EURO - emissies (emissie / uitgifte) - de positie van de obligatiehouder als kapitaalverschaffer - close-out netting en insolventie - verbonden aandelen - leasing van aandelen & effecten fiscus en jaarrekening - gerechtigd tot het dividend? - verantwoording van effecten (inclusief derivaten) in de jaarrekening
Corporations --- Securities --- Finance --- Law and legislation
Listing 1 - 8 of 8 |
Sort by
|