Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
E-procurement in Emerging Economies: Theory and Cases
E-procurement in Emerging Economies: Theory and Cases
"Information systems are shaped by the environment in which they operate, and e-Procurement in Emerging Economies: Theory and Cases explains how e-procurement is shaped in emerging economies. Contributors from Italy, China, India, Turkey, Slovenia, Australia, and UK have submitted case studies and theoretical insights on e-procurement and its...
Jihadism, Foreign Fighters and Radicalization in the EU: Legal, Functional and Psychosocial Responses (Contemporary Terrorism Studies)
Jihadism, Foreign Fighters and Radicalization in the EU: Legal, Functional and Psychosocial Responses (Contemporary Terrorism Studies)

Jihadism, Foreign Fighters and Radicalization in the EU addresses the organizational and strategic changes in terrorism in Europe as a result of urban jihadism and the influx of foreign fighters of European nationality or residence.

Examining the different types of responses to the treatment of radicalization...

Investigating Computer-Related Crime
Investigating Computer-Related Crime
Written by an experienced information security specialist, Investigating Computer-Related Crime is tailored to the needs of corporate information professionals and investigators. It gives a step-by-step approach to understanding and investigating security problems, and offers the technical information, legal information, and computer forensic...
A Manager's Guide to IT Law
A Manager's Guide to IT Law
Since the 1940s, when the computer first made its appearance, there has been a tremendous change in both the power and the extent of IT technology. It has evolved from mainframes through personal computers with packaged applications and client–server architectures, to the explosion of networking in the 1990s which led to...
Foreign Investor Misconduct in International Investment Law (European Yearbook of International Economic Law, 11)
Foreign Investor Misconduct in International Investment Law (European Yearbook of International Economic Law, 11)

This book examines the issue of foreign investor misconduct in modern international investment law, focusing on the approach that international investment law as it currently operates has developed towards foreign investor misconduct. The term ‘misconduct’ is not a legal notion, but is used to describe a certain...

The History of Information Security: A Comprehensive Handbook
The History of Information Security: A Comprehensive Handbook

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.

...

Computable Models of the Law: Languages, Dialogues, Games, Ontologies (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Computable Models of the Law: Languages, Dialogues, Games, Ontologies (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Information technology has now pervaded the legal sector, and the very modern concepts of e-law and e-justice show that automation processes are ubiquitous. European policies on transparency and information society, in particular, require the use of technology and its steady improvement.

Some of the revised papers presented in this book...

Going to Extremes: How Like Minds Unite and Divide
Going to Extremes: How Like Minds Unite and Divide
Why do people become extremists? What makes people become so dismissive of opposing views? Why is political and cultural polarization so pervasive in America? Why do groups of teenagers, investors, and corporations take unnecessary risks? What leads groups to engage in such destructive acts as terrorism and ethic cleansing?

In
...
Operational Risk with Excel and VBA: Applied Statistical Methods for Risk Management (Wiley Finance)
Operational Risk with Excel and VBA: Applied Statistical Methods for Risk Management (Wiley Finance)

Praise For Operational Risk with Excel and VBA

"Dr. Nigel Da Costa Lewis has produced the most exciting volume ever on operational risk modeling. It is a must for students, practitioners, risk managers, and senior executives. . . I feel this work is the first step in revolutionizing the discipline. Other books in this field tell...

Land, Conflict, and Justice: A Political Theory of Territory
Land, Conflict, and Justice: A Political Theory of Territory
'Avery Kolers has written a terrific book on the idea of land and territory in political disputes. This is an incredibly important subject that has been largely ignored in political philosophy and legal theory. Kolers' book is the best writing of its kind: plausibly argued, lucidly written, and richly informed with empirical material. I learned an...
Wild West 2.0: How to Protect and Restore Your Reputation on the Untamed Social Frontier
Wild West 2.0: How to Protect and Restore Your Reputation on the Untamed Social Frontier

The Internet is like the Old West a frontier rich with opportunity and hope, but also a rough-and-tumble land of questionable characters, dubious legal jurisdictions, and hidden dangers. And just like the Old West, if you want to stake out your territory, you have to get there first and fend for yourself. On the web, that means defending your...

Corporate Records Handbook, The: Meetings, Minutes & Resolutions (book with CD-Rom)
Corporate Records Handbook, The: Meetings, Minutes & Resolutions (book with CD-Rom)

All the forms you need to keep your corporation valid in the eyes of the IRS and courts.

If you've taken the time to turn your business into a corporation, chances are you'd like to see it stay that way. Your business card may say "incorporated," but if the courts and the IRS think differently, it's
...

unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy