Listing 1 - 6 of 6 |
Sort by
|
Choose an application
Foreign trade policy --- EU --- handel --- vrijetijdsbesteding --- #ECO:01.07:economie handel nationaal internationaal --- AA / International- internationaal --- 341.13 --- 382.50 --- 382.33 --- 334.81 --- 339.54 --- 061.2 --- Internationale conferenties en topbijeenkomsten. --- Internationale handelsbetrekkingen: algemeenheden. --- Vrijhandel. --- Wereldhandelsorganisatie (WHO). Algemene overeenkomst voor handel en tarieven (GATT). --- Buitenlandse economische politiek. Buitenlandse handelspolitiek. Instrumentarium van de buitenlandse handel --- Niet-gouvernementele organisaties. Semi-officiële instellingen. Particuliere instellingen en verenigingen --- 061.2 Niet-gouvernementele organisaties. Semi-officiële instellingen. Particuliere instellingen en verenigingen --- 339.54 Buitenlandse economische politiek. Buitenlandse handelspolitiek. Instrumentarium van de buitenlandse handel --- Internationale conferenties en topbijeenkomsten --- Internationale handelsbetrekkingen: algemeenheden --- Vrijhandel --- Wereldhandelsorganisatie (WHO). Algemene overeenkomst voor handel en tarieven (GATT) --- COMMERCE INTERNATIONAL --- LIBRE ECHANGE
Choose an application
Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first c
Computer security. --- Web site development -- Computer programs. --- Computer networks --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Security measures --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security
Choose an application
GPS receivers. --- Navigation receivers --- Global Positioning System --- Radio --- Receivers and reception
Choose an application
Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first chapter introduces the background for the work; the second covers uses of social media; the third covers relevant security threats; the fourth chapter concerns the security controls applied to the participation-collaboration pattern; the fifth chapter then considers acceptable use practices; the sixth chapter covers participation-collaboration in the context of schools; the seventh chapter shows an alternative way of classifying controls to that given in the fourth chapter; and the final chapter offers a conclusion. Focuses on the security issues of social media, specifically in the public sectorWritten by a leading researcher and practitionerShows best practices for mitigating risk in the use of social media.
Choose an application
Choose an application
Listing 1 - 6 of 6 |
Sort by
|