feed icon rss

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Berlin International  (154)
  • Müncheberg Dt. Entomologisches Institut  (105)
  • SB Zehdenick  (3)
  • 2015-2019  (187)
  • 1950-1954  (75)
Medientyp
Region
Bibliothek
Erscheinungszeitraum
Jahr
  • 1
    UID:
    almahu_BV045336290
    Umfang: 1 Online-Ressource (xxii, 557 Seiten) : , Illustrationen, Diagramme, Karten (überwiegend farbig).
    ISBN: 978-3-319-72026-5
    Serie: Climate risk management, policy and governance
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 978-3-319-72025-8
    Sprache: Englisch
    Fachgebiete: Allgemeines
    RVK:
    RVK:
    Schlagwort(e): Klimaänderung ; Erwärmung ; Umweltschaden ; Klimaschutz ; Risikomanagement ; Migration ; Aufsatzsammlung ; Aufsatzsammlung ; Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Cham : Springer International Publishing
    UID:
    b3kat_BV045501021
    Umfang: 1 Online-Ressource (xv, 216 Seiten)
    ISBN: 9783030031435
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-03142-8
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-03144-2
    Sprache: Englisch
    Fachgebiete: Medizin
    RVK:
    Schlagwort(e): Medizin ; Sepsis ; Intensivpflege ; Notfallmedizin ; Chirurgie ; Aufsatzsammlung ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Mehr zum Autor: Schultz, Marcus J.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Buch
    Buch
    München :C.H. Beck, | [Basel] :Helbing Lichtenhahn, | [Wien] :Manz,
    UID:
    almafu_BV042176794
    Umfang: XIV, 392 Seiten.
    Ausgabe: 2. Auflage
    ISBN: 978-3-406-67465-5 , 3-406-67465-8 , 978-3-7190-3742-0 , 978-3-214-02027-9
    Sprache: Englisch
    Fachgebiete: Rechtswissenschaft , Allgemeines , Anglistik
    RVK:
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Recht ; Englisch ; Recht ; Deutsch ; Mehrsprachiges Wörterbuch ; Wörterbuch 〈mehrsprachig〉 ; Wörterbuch ; Dictionaries ; Multilingual dictionaries ; Wörterbuch ; Wörterbuch ; Mehrsprachiges Wörterbuch ; Wörterbuch 〈mehrsprachig〉 ; Mehrsprachiges Wörterbuch ; Wörterbuch 〈mehrsprachig〉
    Mehr zum Autor: Linhart, Karin 1972-
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    UID:
    almahu_9949602262502882
    Umfang: 1 online resource (515 pages)
    Ausgabe: 1st ed.
    ISBN: 9781484228968
    Anmerkung: Intro -- Table of Contents -- About the Authors -- Acknowledgments -- Foreword -- Introduction -- Chapter 1: Conceptualizing the Secure Internet of Things -- The BadUSB Thumb Drive -- Air-Gap Security -- Stuxnet -- Designing Safe and Secure Cyber-Physical Systems -- Constrained Computing and Moore's Law -- Trusted IoT Networks and the Network Edge -- Conclusion -- Chapter 2: IoT Frameworks and Complexity -- Introduction -- Historical Background to IoT -- IoT Ecosystem -- Connectivity Technology -- Messaging Technology -- Platform Technology -- Elements of an IoT System -- IoT Device -- IoT Device Architectural Goals -- Interoperability -- Security -- IoT Network -- IoT System Management -- Device Lifecycle -- Manufacturing -- Supply Chain -- Deployment -- Normal Operation and Monitoring -- Manage -- Update -- Decommissioning -- IoT Framework -- IoT Framework Design Goals -- IoT Data Model and System Abstractions -- IoT Node -- IoT Operations Abstraction -- Connectivity Elements -- Manageability Elements -- Security Elements -- Consider the Cost of Cryptography -- Summary IoT Framework Considerations -- IoT Framework Architecture -- Data Object Layer -- Node Interaction Layer -- Platform Abstraction Layer -- Platform Layer -- Security Challenges with IoT Frameworks -- Consumer IoT Framework Standards -- Open Connectivity Foundation (OCF) -- OCF Core Framework Layer -- OCF Profiles Framework Layer -- The OCF Device Abstraction -- OCF Security -- AllSeen Alliance/AllJoyn -- AllJoyn Security -- Universal Plug and Play -- UPnP Security -- Lightweight Machine 2 Machine (LWM2M) -- LWM2M Architecture -- LWM2M Device Management -- LWM2M Security -- One Machine to Machine (OneM2M) -- OneM2M Security -- Industrial IoT Framework Standards -- Industrial Internet of Things Consortium (IIC) and OpenFog Consortium. , Open Platform Communications-Unified Architecture (OPC-UA) -- OPC-UA Framework Architecture -- OPC-UA Security -- Data Distribution Service (DDS) -- DDS Framework Architecture -- DDS Security -- Security Enveloping -- Security Tokens -- Security Plugin Modules -- Framework Gateways -- Framework Gateway Architecture -- Type I Framework Gateway -- Type II Framework Gateway -- Type III Framework Gateway -- Type IV Framework Gateway -- Security Considerations for Framework Gateways -- Security Endpoints Within the Gateway -- Security Endpoints in Type I Gateways -- Security Endpoints in Type II Gateways -- Security Endpoints in Type III Gateways -- Security Endpoints in Type IV Gateways -- Security Framework Gateway Architecture -- Summary -- Chapter 3: Base Platform Security Hardware Building Blocks -- Background and Terminology -- Assets, Threats, and Threat Pyramid -- Inverted Threat Pyramid -- Sample IoT Device Lifecycle -- End-to-End (E2E) Security -- Security Essentials -- Device Identity -- Protected Boot -- Protected Storage -- Trusted Execution Environment (TEE) -- Built-In Security -- Base Platform Security Features Overview -- CPU Hosted Crypto Implementations -- Malware Protection (OS Guard) -- OS Guard (SMEP) -- OS Guard (SMAP) -- Encryption/Decryption Using AES-NI -- Sign/Verify Using Intel® SHA Extensions -- Intel® Data Protection Technology with Secure Key (DRNG) -- Converged Security and Manageability Engine (CSME) -- Secure/Verified, Measured Boot and Boot Guard -- Trusted Execution Technology (TXT) -- Platform Trust Technology (PTT) -- Enhanced Privacy ID (EPID) -- Memory Encryption Technologies -- TME -- MKTME -- Dynamic Application Loader (DAL) -- Software Guard Extensions (SGX) - IA CPU Instructions -- Identity Crisis -- Enhanced Privacy Identifier (EPID) -- Anonymity -- PTT/TPM -- Device Boot Integrity - Trust But Verify. , Secure Boot Mechanisms -- Secure Boot Terminology Overview -- Overview of BIOS/UEFI Secure Boot Using Boot Guard Version 1.0 (BtG) -- Data Protection - Securing Keys, Data at Rest and in Transit -- Intel Platform Trust Technology (PTT) -- Windows PTT Architecture -- Linux PTT Software Stack -- Runtime Protection - Ever Vigilant -- Intel Virtualization Technology (Intel VT) -- Software Guard Extensions (SGX) -- Intel CSE/CSME - DAL -- Isolation from Rich Execution Environment -- Authenticity and Security -- Portability -- Intel Trusted Execution Technology (TXT) -- Threats Mitigated -- Zero-Day Attacks -- Other Attacks -- Conclusion -- References -- Chapter 4: IoT Software Security Building Blocks -- Understanding the Fundamentals of Our Architectural Model -- Operating Systems -- Threats to Operating Systems -- Zephyr: Real-Time Operating System for Devices -- Zephyr Execution Separation -- Zephyr Memory Separation -- Zephyr Privilege Levels and System Authorization -- Zephyr Programming Error Protections -- Zephyr's Other Security Features -- Zephyr Summary -- Linux Operating Systems -- Pulsar: Wind River Linux -- Ubuntu IoT Core -- Intel® Clear Linux -- Linux Summary -- Hypervisors and Virtualization -- Threats to Hypervisors -- Intel® ACRN -- Real-Time and Power Management Guarantees in ACRN -- ACRN Summary -- Software Separation and Containment -- Containment Security Principles -- Threats to Extended Application Containment -- Containers -- Kata Containers -- Kata Containers Summary -- Trusted Execution Environments -- Software Guard Extensions -- SGX Security Summary -- Android Trusty -- Trusty TEE Security Summary -- Containment Summary -- Network Stack and Security Management -- Intel Data Plane Development Kit -- Security Management -- Secure Device Onboarding -- Platform Integrity -- Network Defense -- Platform Monitoring. , McAfee Embedded Control -- Network Stack and Security Summary -- Device Management -- Mesh Central -- Wind River Helix Device Cloud -- Device Management Summary -- System Firmware and Root-of-Trust Update Service -- Threats to Firmware and RoT Update -- Turtle Creek System Update and Manageability Service -- System Firmware and RoT Summary -- Application-Level Language Frameworks -- JavaScript and Node.js or Sails -- Java and Android -- EdgeX Foundry -- Application-Level Framework Summary -- Message Orchestration -- Message Queuing Telemetry Transport -- OPC Unified Architecture -- Constrained Application Protocol -- Message Orchestration Summary -- Applications -- Summary -- Chapter 5: Connectivity Technologies for IoT -- Ethernet Time-Sensitive Networking -- Legacy Ethernet-Based Connectivity in Industrial Applications -- Key Benefits of TSN -- TSN Standards -- TSN Profiles -- 802.1AS/AS-Rev -- 802.1Qbv -- 802.1Qbu -- 802.1CB -- 802.1Qcc -- 802.1Qci -- 802.1Qch -- 802.1Qcr -- TSN and Security -- OPC-UA Over TSN -- Overview of Wireless Connectivity Technologies -- Considerations for Choosing Wireless Technologies for IoT -- Spectrum -- Range and Capacity -- Network Topology -- Quality of Service -- Network Management -- Security -- Wi-Fi -- Bluetooth -- Zigbee -- NFC -- GPS/GNSS -- Cellular -- 5G Cellular -- Key Standards, Regulatory, and Industry Bodies Involved in 5G -- New Use Cases Enabled by 5G -- Key Technology Enablers for 5G -- LPWAN - Low-Power Wide Area Networks -- LoRa -- Sigfox -- Weightless -- Comparison of Low-Power LTE and Other LPWAN Technologies -- A Case Study - Smart Homes -- Summary -- References -- Chapter 6: IoT Vertical Applications and Associated Security Requirements -- Common Domain Requirements and the Security MVP -- Some Common Threats -- Retail Solutions -- Security Objectives and Requirements -- Threats. , Standards - Regulatory and Industry -- Transportation Solutions14 -- Connected Vehicle Infrastructure -- Security Objectives and Requirements -- Threats -- Mitigations -- Standards - Regulatory and Industry -- Industrial Control System (ICS) and Industrial IoT (IIoT) -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Digital Surveillance System -- Security Objectives and Requirements -- Threats -- Standards - Regulatory and Industry -- Summary -- Appendix: Conclusion -- Economics of Constrained Roots-of-Trust -- IoT Frameworks - Necessary Complexity -- Hardware Security - More Than a Toolbox -- IOT Software - Building Blocks with Glue -- Ethernet TSN - Everybody's Common Choice? -- Security MVP - The Champion Within a Fractured IoT Ecosystem -- The Way Forward -- Index.
    Weitere Ausg.: Print version: Cheruvu, Sunil Demystifying Internet of Things Security Berkeley, CA : Apress L. P.,c2019 ISBN 9781484228951
    Sprache: Englisch
    Fachgebiete: Informatik , Wirtschaftswissenschaften
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Online-Ressource
    Online-Ressource
    Cham :Springer International Publishing AG,
    UID:
    almahu_9949301199502882
    Umfang: 1 online resource (239 pages)
    ISBN: 9783319120393
    Anmerkung: Intro -- Preface -- Contents -- Contributors -- List of Figures -- List of Tables -- Part I -- The Theory of Rewilding -- Chapter 1 -- Rewilding Abandoned Landscapes in Europe -- 1.1 Introduction -- 1.2 European Landscapes: Examining the Paradigms -- Were Traditional Agricultural Practices Environmentally Friendly? -- Did Traditional Rural Populations Live Well? -- Are Current Efforts to Maintain Traditional Landscapes Likely to Succeed? -- 1.3 The Benefits of Rewilding -- Defining Rewilding -- Benefits of Rewilding for Biodiversity -- Benefits of Rewilding for People: Ecosystem Services -- 1.4 The Challenges of Rewilding -- Conflicts with Wildlife -- Limits to Ecological Resilience -- 1.5 Final Remarks -- References -- Chapter 2 -- European Wilderness in a Time of Farmland Abandonment -- 2.1 The History and Value of Wilderness -- 2.2 Measuring and Mapping Wilderness-A Brief Review of Metrics and Methods -- 2.3 Wilderness Metrics -- 2.4 Wilderness Conservation -- 2.5 Farmland Abandonment as Opportunity for Wilderness Expansion -- 2.6 Conclusions -- References -- Chapter 3 -- Ecosystem Services: The Opportunities of Rewilding in Europe -- 3.1 Introduction -- 3.2 The Spatial Distribution of Ecosystem Services in Europe -- 3.3 Wilderness, Rewilding and Ecosystem Services -- Wilderness -- Methods -- Wilderness and Ecosystem Services -- Ecosystem Services and Scenarios of Rewilding -- 3.4 The Economic Benefits of Rewilding -- Regulating Benefits -- Cultural Benefits -- 3.5 Discussion -- References -- Part II -- Rewilding and Biodiversity -- Chapter 4 -- Bringing Large Mammals Back: Large Carnivores in Europe -- 4.1 Introduction -- 4.2 Trends in Large Carnivores in Europe -- To the Edge of Extinction -- Multiple Causes of Recovery -- The Current Status of Populations -- Bears -- Wolves -- Eurasian Lynx -- 4.3 How Far Can We Take the Recovery Process?. , What are the Characteristics of "Natural Predation Processes"? -- The Pervasive Impact of Humans -- The Social Tolerance of Humans for Large Carnivores and Large Herbivores -- The Problem of Natural Processes as a Goal -- From Wilderness and Natural Processes to a Future Orientated Coexistence -- 4.4 Conclusions -- References -- Chapter 5 -- Top Scavengers in a Wilder Europe -- 5.1 Introduction: Rewilding Ecosystem Services, Not Only Vertebrate Populations -- 5.2 The Role of Carcasses Within Ecosystems -- 5.3 Vultures and Humans: An Unstable Alliance -- 5.4 Vulture Restaurants and the Loss of a Pulsed Resource -- 5.5 How do Vultures Fit into a Rewilding Continent? -- 5.6 New Services Provided by Vultures -- 5.7 Discussion and Conclusion -- References -- Chapter 6 -- Rewilding: Pitfalls and Opportunities for Moths and Butterflies -- 6.1 Rewilding Small-Sized Biodiversity Too -- 6.2 European Lepidoptera: Numbers and Trends -- 6.3 Lepidoptera: Diurnal and Nocturnal Life-Styles -- 6.4 Conservation Objectives: Semi-Natural Biotopes Versus Rewilding -- 6.5 Controlled Rewilding: Reconciling the Objectives -- 6.6 What About Fertile Agricultural Regions? -- 6.7 A Case Study: Farmland Abandonment in Peneda and Its Effects on Macro-moths -- 6.8 Habitat Resource Heterogeneity at Multiple Spatial Scales is Key -- 6.9 Wrapping It Up and the Way Forward -- References -- Chapter 7 -- Vegetation Restoration and Other Actions to Enhance Wildlife in European Agricultural Landscapes -- 7.1 Introduction -- 7.2 The Agriculture and Conservation Paradox -- 7.3 Designing Restoration on Agricultural Land by Strategic Revegetation -- Strategic Revegetation in Farmed Fields -- Other Options for Strategic Revegetation in Agricultural Landscapes -- 7.4 Restoring or Creating Other Specific Elements to Benefit Wildlife and Particular Services -- 7.5 A Practitioner's Perspective. , 7.6 Forest Restoration by Land Separation -- 7.7 Conclusions -- References -- Chapter 8 -- Maintaining Disturbance-Dependent Habitats -- 8.1 Introduction -- 8.2 A Picture of Historical European Landscapes -- An Ongoing Debate… -- Temporal Evolution of the European Landscape -- 8.3 The Role of Natural Disturbances -- The Pre-Neolithic Ecosystem Engineers -- Fire Dynamics -- 8.4 Disturbances and Diversity -- Diversity and Intermediate Disturbance -- Effects of Land-Use Change on Disturbance Regimes -- 8.5 Maintaining Disturbance-Dependent Habitats -- Wild Herbivores: Natural (Re)colonization or (Re)introduction? -- Prescribed Burning -- 8.6 Concluding Remarks -- References -- Part III -- Rewillding in Practice -- Chapter 9 -- Rewilding Europe: A New Strategy for an Old Continent -- 9.1 The Opportunity of Change -- 9.2 A New Vision for an Old Continent -- The Initiative -- Nominations from all over Europe -- Main Objectives -- The Operating Model -- 9.3 Applying the Model to the Rewilding Areas -- General -- Rewilding -- Communication -- Enterprise Development -- 9.4 First Results in the Rewilding Areas -- Western Iberia: Ancient Dehesa and Montado Landscapes -- Velebit Mountains: The Wild West of the Adriatic Coast -- Eastern Carpathians: One of Europe's Top Wildlife Areas -- Southern Carpathians: A Wilderness Arc at the Heart of Europe -- Danube Delta: Europe's Unrivalled Wetland -- 9.5 A Future Outlook for Rewilding Europe -- References -- Chapter 10 -- Preparing a New Generation of Wilderness Entrepreneurs -- 10.1 Introduction -- 10.2 Entrepreneurship in Conservation Education -- 10.3 Case Study: The Erasmus Intensive Programme on European Wilderness Entrepreneurship -- 10.4 Designing a Wilderness Entrepreneurship Curriculum -- Wilderness Entrepreneurship Competences -- Learning Strategies for Wilderness Entrepreneurship Education. , Learning Environments for Wilderness Entrepreneurship Education -- 10.5 Lessons Learned for Wilderness Entrepreneurship Education -- References -- Chapter 11 -- Towards a European Policy for Rewilding -- 11.1 Introduction: A Historical Perspective -- 11.2 Current Conservation Policies in the EU -- Nationally Designated Protected Areas -- Birds and Habitats Directives -- Overall Picture of Protected Areas in the EU -- 11.3 Agriculture and Conservation -- 11.4 Opportunities for Wilderness and Rewilding -- 11.5 Global and European Conservation Targets -- 11.6 Recommendations for Rewilding -- References -- Index.
    Weitere Ausg.: Print version: Pereira, Henrique M. Rewilding European Landscapes Cham : Springer International Publishing AG,c2015 ISBN 9783319120386
    Sprache: Englisch
    Fachgebiete: Allgemeines
    RVK:
    Schlagwort(e): Electronic books. ; Electronic books. ; Electronic books. ; Aufsatzsammlung ; Electronic books.
    URL: OAPEN
    URL: Image  (Thumbnail cover image)
    URL: OAPEN  (Creative Commons License)
    URL: Image  (Thumbnail cover image)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (kostenfrei)
    URL: Cover
    URL: Volltext  (kostenfrei)
    URL: FULL  ((Currently Only Available on Campus))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    UID:
    b3kat_BV045274865
    Umfang: 1 Online-Ressource (xvii, 196 Seiten)
    ISBN: 9783319931944
    Serie: Wellbeing in politics and policy
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 978-3-319-93193-7
    Sprache: Englisch
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: FULL
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
  • 8
    UID:
    b3kat_BV045164909
    Umfang: 1 Online-Ressource (xiv, 424 Seiten) , Illustrationen, Diagramme, Karten
    ISBN: 9783319928135
    Serie: The urban book series
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 978-3-319-92812-8
    Sprache: Englisch
    Schlagwort(e): Aufsatzsammlung ; Case studies ; Edited volumes
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: FULL
    URL: OAPEN
    Mehr zum Autor: Ham, Maarten van 1972-
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Online-Ressource
    Online-Ressource
    Northampton, MA :Edward Elgar Publishing, Inc.,
    UID:
    almahu_9948265247002882
    Umfang: 1 online resource (200 p.) : , ill. ; , cm.
    ISBN: 9781783475117 (e-book)
    Serie: New horizons in management
    Inhalt: With update-to-date reviews of the current research and literature on women's entrepreneurship, this is the first book of its kind to address entrepreneurial coaching for women as a development tool. The authors provide a theoretical, conceptual and applied perspective to explore the distinctive challenges facing this group, before discussing the implementations and outcomes of coaching programmes in an entrepreneurial setting. They conclude with strategies for future research and progress. Students and scholars of business management, entrepreneurship and gender studies will find the unique perspectives to be of interest. This book will also be useful as a tool for small business service providers, women entrepreneurs, policy makers and government officials.
    Anmerkung: 1. Introduction -- 2. Internal influences on women entrepreneurs -- 3. External influences on women entrepreneurs -- 4. Coaching as a technique for development -- 5. The potential of coaching for women entrepreneurs -- 6. Delivering the tailored e-coaching (TEC) programme -- 7. The impact of the TEC programme on women entrepreneurs -- 8. Entrepreneurial learning in coaching relationships -- 9. Implications for theory and practice.
    Weitere Ausg.: ISBN 9781783475100 (hardback)
    Sprache: Englisch
    URL: FULL  ((Currently Only Available on Campus))
    URL: Volltext  (URL des Erstveröffentlichers)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    UID:
    b3kat_BV047866921
    Umfang: 1 Online-Ressource
    ISBN: 9789048534586
    Serie: Atlantis Studies in Computational Finance and Financial Engineering
    Inhalt: Risk Quantification and Allocation Methods for Practitioners offers a practical approach to risk management in the financial industry. This in-depth study provides quantitative tools to better describe qualitative issues, as well as clear explanations of how to transform recent theoretical developments into computational practice, and key tools for dealing with the issues of risk measurement and capital allocation
    Anmerkung: Erscheint als Open Access bei De Gruyter , English
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 978-94-6298-405-9
    Sprache: Englisch
    Schlagwort(e): Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: FULL  ((Currently Only Available on Campus))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz