Hiển thị các bài đăng có nhãn protection. Hiển thị tất cả bài đăng
Hiển thị các bài đăng có nhãn protection. Hiển thị tất cả bài đăng

Thứ Tư, 11 tháng 2, 2015

An Economic Analysis of Bilateral Investment Treaties

An Economic Analysis of Bilateral Investment Treaties



Bilateral Investment Treaties (BITs) are an important instrument for the protection of foreign direct investment (FDI). However, compared to international trade law, international investment law has so far received only little research attention from an economic point of view. By applying a law and economics approach, Jan Peter Sasse provides a systematic analysis of the way BITs function. He explains why BITs are more than just a signal, how they relate to institutional competition as well as to institutional quality and why transparency in international investment arbitration is hard to achieve and may even be detrimental.




Chủ Nhật, 8 tháng 2, 2015

Thứ Hai, 19 tháng 1, 2015

Nuclear Energy, Seventh Edition

Nuclear Energy, Seventh Edition



Nuclear Energy is one of the most popular texts ever published on basic nuclear physics, systems, and applications of nuclear energy. This newest edition continues the tradition of offering a holistic treatment of everything the undergraduate engineering student needs to know in a clear and accessible way. The book presents a comprehensive overview of radioactivity, radiation protection, nuclear reactors, waste disposal, and nuclear medicine.




Thứ Tư, 14 tháng 1, 2015

Advanced Combustion and Aerothermal Technologies

Advanced Combustion and Aerothermal Technologies



Here readers will find a summary of proceedings at a highly important NATO workshop. The ARW Advanced Combustion and Aerothermal Technologies: Environmental Protection and Pollution Reductions, was held in Kiev, May 2006. The workshop was co-directed by Profs. N. Syred and A.Khalatov, winners of the NATO Scientific Prize 2002, and was organized by the Institute of Thermophysics (Ukraine) and Cardiff University, UK. The primary workshop objective was to assess the existing knowledge on advanced combustion and aerothermal technologies providing reduced environmental impact.




Thứ Bảy, 20 tháng 12, 2014

Microsoft SQL Server 2012 Security Cookbook

Microsoft SQL Server 2012 Security Cookbook



Practical, focused recipes for securing your , , database. Master the latest techniques for data and code encryption, user authentication and authorization, protection against brute force attacks, denial-of-service attacks, and SQL Injection, and more. A learn-by-example recipe-based approach that focuses on key concepts to provide the foundation to solve real world problems.




Microsoft Data Protection Manager 2010

Microsoft Data Protection Manager 2010



A step-by-step guide to backing up your , data using , Data Protection Manager 2010 in this practical book. Discover how to back up and restore Microsoft applications that are critical in many of today’s businesses. Understand the various components and features of Data Protection Manager 2010. Gain valuable insight into using Data Protection Manager through the author’s real world experience. The author, Steve Buchanan has contributed to a Microsoft Data Protection Manager 2010 poster which you can download here.




Thứ Sáu, 19 tháng 12, 2014

Microsoft System Center Data Protection Manager 2012 SP1

Microsoft System Center Data Protection Manager 2012 SP1



Microsoft System Center Data Protection Manager is a centralized data protection solution. DPM is used for data protection and recovery for , workloads.,

Data Protection Manager allows backup and recovery of Microsoft Workloads, including , Server, Exchange, Sharepoint, Client Computers, and Hyper-V. Enabling disk and tape-based backup methods, DPM also allows central management of the system state and Bare-Metal Recovery.,

Microsoft System Center Data Protection Manager 2012 SP1 is a guide for administrators of System Center Data Protection Manager. By the end of this book, users will be able to carry out automated installs, migrate DPM to new hardware, set up custom reporting, use the DPM central console, and implement offsite DPM strategies such as chaining, monitoring, and cyclic protection.