Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (14)
  • HBZ  (1)
  • 1995-1999  (14)
  • 1980-1984
  • Internet
Datasource
Material
Language
Years
Year
  • 1
    Language: English
    Pages: Online-Ressource (1 online resource (78 p.))
    Edition: Online-Ausg. World Bank E-Library Archive
    Parallel Title: Cropper, Maureen Public Choices between Lifesaving Programs
    Keywords: Air Quality and Clean Air ; Breast Cancer ; Brown Issues and Health ; Children ; Disease Control and Prevention ; Environment ; Environmental Economics and Policies ; Environmental Health ; Finance and Financial Sector Development ; Health ; Health Care ; Health Education ; Health Monitoring and Evaluation ; Health Services ; Health, Nutrition and Population ; Implementation ; Industrial Pollution ; Industry ; Insurance and Risk Mitigation ; Internet ; Knowledge ; Ozone ; Population Policies ; Public Health ; Risks ; Screening ; Smokers ; Smoking ; Strategy ; Water Pollution ; Water Resources ; Water and Industry ; Workplace ; Air Quality and Clean Air ; Breast Cancer ; Brown Issues and Health ; Children ; Disease Control and Prevention ; Environment ; Environmental Economics and Policies ; Environmental Health ; Finance and Financial Sector Development ; Health ; Health Care ; Health Education ; Health Monitoring and Evaluation ; Health Services ; Health, Nutrition and Population ; Implementation ; Industrial Pollution ; Industry ; Insurance and Risk Mitigation ; Internet ; Knowledge ; Ozone ; Population Policies ; Public Health ; Risks ; Screening ; Smokers ; Smoking ; Strategy ; Water Pollution ; Water Resources ; Water and Industry ; Workplace
    Abstract: August 1995 - Do funding priorities for health and safety policies reflect irrational fears? the disaster of the month - rather than address more fundamental problems? A thousand people were surveyed to gauge popular feelings about funding choices between environmental and public health programs. In developing and industrial countries alike, there is concern that health and safety policy may respond to irrational fears - to the disaster of the month - rather than address more fundamental problems. In the United States, for example, some policymakers say the public worries about trivial risks while ignoring larger ones and that funding priorities reflect this view. Many public health programs with a low cost per life saved are underfunded, for example, while many environmental regulations with a high cost per life saved are issued each year. Does the existing allocation of resources reflect people's preoccupation with the qualitative aspects of risks, to the exclusion of quantitative factors (lives saved)? Or can observed differences in the cost per life saved of environmental and public health programs be explained by the way the two sets of programs are funded? Cropper and Subramanian examine the preferences of U.S. citizens for health and safety programs. They confronted a random sample of 1,000 U.S. adults with choices between environmental health and public health programs, to see which they would choose. The authors then examined what factors (qualitative and quantitative) seem to influence these choices. Respondents were asked about pairs of programs, among them: smoking education or industrial pollution control programs, industrial pollution control or pneumonia vaccine programs, radon eradication or a program to ban smoking in the workplace, and radon eradication or programs to ban pesticides. The survey results, they feel, have implications beyond the United States. They find that, while qualitative aspects of the life-saving programs are statistically significant in explaining people's choices among them, lives saved matter, too. Indeed, for the median respondent in the survey, the rate of substitution between most qualitative risk characteristics and lives saved is inelastic. But for a sizable minority of respondents, choice among programs appears to be insensitive to lives saved. The interesting question for public policy is what role the latter group plays in the regulatory process. This paper - a joint product of the Environment, Infrastructure, and Agriculture Division, Policy Research Department, and the Environment and Natural Resources Division, Asia Technical Department - is part of a larger effort in the Bank to see what can be learned about efficient environmental policy by examining the U.S. experience with environmental regulation. The authors may be contacted at mcropperworldbank.org or usubramanian@worldbank.org
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 3897211602
    Language: German
    Pages: XVII, 491 S. , Ill., graph. Darst. , 23 cm
    Edition: 2., erweiterte und aktualisierte Aufl., dt. Ausg. der 3. Aufl
    Uniform Title: DNS and BIND 〈dt.〉
    RVK:
    Keywords: Internet ; UNIX (Computer file) ; BIND ; DNS ; BIND ; DNS
    Note: Dt. Ausg. der 3. engl. Aufl
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Beijing [China] ; : O'Reilly | Boston, MA :Safari,
    ISBN: 1565925297
    Language: English
    Pages: xiv, 211 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 004.6
    Keywords: Business enterprises ; Computer networks ; Computer networks ; Security measures ; Extranets (Computer networks) ; Internet ; Telecommuting ; Electronic books ; local
    Abstract: Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization? The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines--connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution. This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH). New features in the second edition include SSH, which is a popular VPN solution for Unix systems, and an expanded description of the IPSec standard, for which several vendors have announced support. Topics include: How the VPN compares to other available networking technologies Introduction to encryption, firewalls, the IPSec standard, and other technologies that let VPNs work Point to Point Tunneling Protocol (PPTP) and L2TP The Altavista Tunnel The Cisco PIX Firewall Secure Shell (SSH) Maintenance and troubleshooting
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Ottawa : University of Ottawa Press
    ISBN: 9780776604930 , 0776604937 , 9780776615738 , 0776615734
    Language: English
    Pages: 1 Online-Ressource (224 pages)
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als
    DDC: 303.48
    Keywords: Information superhighway ; Information technology ; Internet ; Information superhighway ; Information technology ; Internet ; Electronic books ; Electronic books ; Electronic books
    Abstract: Preface; Beyond Infrastructure: Canadian and European Identities in Cyberspace; Part One: Stationary Travelers?; The Trans-Canada Highway vs The Information Highway: The Road Less Traveled?; On the (Information) Highway: So Is This a Journey or What?; Part Two: Cyberlaw; Human Rights in Cyberspace; Internet and Public Order; The Legal Aspects of Digital Signatures; Part Three: Communities in Cyberspace; How Comfortably Does the Internet Sit on Canada's Tundra? Reflections on Public Access to the Information Highway in the North
    Abstract: Policy-Making and the Value of Electronic Forms of Public Debate: Underpinning, Assumptions and First ExperiencesTwo Canadian Models of Communities on the Net: SchoolNet and Community Access; Teledemocracy in the Province: An Experiment with Internet-Based Software and Public Debate; Part Four: (Business) Opportunities on the Net; Work and Community in Networked Organizations; ICTs for SMEs: The SME Wins on the Information Highway; The Centre for Editing Early Canadian Texts (CEECT) and Cyberspace; Part Five: The Role of Government
    Abstract: The Position of Flanders with Regard to Some Internet-Related MattersQuébécois Policy and the Development of the Information Highway; Advancing Canada's Information Highway: Strategies for the New Millennium; Electronic Commerce Policy and the European Commission; References; Abstracts; About the Authors
    URL: Volltext  (Kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 3896320335
    Language: German
    Pages: 298 S , Ill., graph. Darst , 21 cm
    Edition: 1. Ausg.
    RVK:
    RVK:
    Keywords: Hörfunk ; Personalcomputer ; Funktechnik ; Funkempfänger ; Personalcomputer ; Kurzwellenempfang ; Internet ; Rundfunkempfang ; Programm ; Verzeichnis ; Funkempfänger ; Personal Computer ; Kurzwellenempfang ; Internet ; Rundfunkempfang ; Programm
    Note: Literaturangaben
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 0767411218
    Language: English
    Pages: vi, 83 S. , Ill. , 22 cm
    DDC: 025.04
    Keywords: Anthropology ; Computer network resources ; Internet ; Study and teaching
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Article
    Article
    In:  Soziologie des Rechts (1998), Seite 1 - 10 | year:1998 | pages:1 - 10
    ISBN: 3789057363
    Language: German
    Titel der Quelle: Soziologie des Rechts
    Publ. der Quelle: Baden-Baden : Nomos-Verl.-Ges., 1998
    Angaben zur Quelle: (1998), Seite 1 - 10
    Angaben zur Quelle: year:1998
    Angaben zur Quelle: pages:1 - 10
    Keywords: Internet ; Justiz ; Rechtssoziologie
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Washington, D.C : World Bank
    ISBN: 0821342568
    Language: English
    Pages: Online-Ressource (ix, 21 p) , 28 cm
    Edition: Online-Ausg. World Bank E-Library Archive
    Series Statement: IFC discussion papers no.35
    DDC: 658/.054678/091724
    Keywords: Corporations Computer networks ; Internet ; Corporations Computer networks ; Internet
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Book
    Book
    Walnut Creek [u.a.] : AltaMira Press
    ISBN: 0761990305 , 0761990313
    Language: English
    Pages: 246 S.
    Series Statement: Ethnographic alternatives book series 6
    Series Statement: Ethnographic alternatives series
    DDC: 302.2
    RVK:
    RVK:
    Keywords: Internet ; Kommunikation ; Soziologie
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Englewood Cliffs, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxvi, 587 p. , ill. ; , 24 cm
    Edition: [2nd ed.].
    DDC: 004.2/565
    Keywords: Internet ; Java (Computer program language) ; Sun computers ; Electronic books ; local
    Abstract: 9524J-6 "As practical as a Swiss Army knife for a power-hungry SysAdmin. For all the Sun gurus, veterans and newbies: This is for you. As a must-have in one's library, it'll be one of your most worn out references in your serious IT career. It is practical and very illustrative in its approach to solving sample problems." -Dexter D. Laggui Hailed in its first edition as an indispensable reference for system administrators, Sun Performance and Tuning has been revised and expanded to cover Solaris 2.6, the newest generation of SPARC hardware, and the latest Internet and Java server technologies. Featuring a quick guide to get you started, as well as detailed reference information, this book is indispensable both for developers who need to design for speed and administrators who need to manage system and network performance. Performance guru Adrian Cockcroft brings his unique expertise and structured approach to this complex and rapidly changing topic, providing detailed information on key aspects of performance management and system behavior that is not available anywhere else. Rich Pettit, author of the SE performance toolkit, describes the performance interfaces in Solaris and how to use this freely available toolkit to build your own customized performance-monitoring tools. Key topics covered include: Performance Management and Measurement TCP and Internet Server Tuning JAVA Network Computer Server Sizing SPARC System Architectures Kernel Algorithms and Tuning How to Build Your Own Performance Tools Performance Rules and the virtual_adrian SE Tool To get up to speed quickly on critical performance issues, this is the one book any Sun administrator, integrator or developer needs.
    Note: "Sun Microsystems.". - First ed. has subtitle: SPARC & Solaris. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Reading, Mass. : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvii, 339 p. , ill. ; , 25 cm
    DDC: 004.6/6
    Keywords: Computer network architectures ; Computer network protocols ; Internet ; Routers (Computer networks) ; Electronic books ; local
    Abstract: Written for TCP/IP network administrators, protocol designers, and network application developers, this book gives the most complete and practical view ever into the inner workings of Internet routing. The book focuses on OSPF (Open Shortest Path First), a common TCP/IP routing protocol that provides robust and efficient routing support in the most demanding Internet environments. A methodical and detailed description of the protocol is offered and OSPF's role within the wider context of a TCP/IP network is demonstrated. Practical throughout, the book provides not only a theoretical description of Internet routing, but also a real-world look into how theory translates into practice. It shows how algorithms are implemented, and how the routing protocols function in a working network where transmission lines and routers routinely break down. You will find clear explanations of such routing fundamentals as how a router forwards packets, IP addressing, CIDR (Classless Inter-Domain Routing), the routing table, Internet routing architecture, and the two main routing technologies: Distance Vector and link-state algorithms. OSPF is discussed in depth, with an examination of the rationale behind OSPF's design decisions and how it has evolved to keep pace with the rapidly changing Internet environment. OSPF topics covered by the book include the following: OSPF areas and virtual links NBMA (Nonbroadcast multi-access) and Point-to-MultiPoint network segments OSPF configuration and management Interaction with other routing protocols OSPF cryptographic authentication OSPF protocol extensions, including the Demand Circuit extensions and the multicast extensions to OSPF (MOSPF) An OSPF FAQ IP multicast and multicast routing are also discussed. Methods for debugging routing problems are explained, including a catalog of available debugging tools. The book also offers side-by-side comparisons of all the unicast and multicast routing protocols currently in use in the Internet. You will come away from this book with a sophisticated understanding of Internet routing and of the OSPF protocol in particular. Moreover, the book's practical focus will enable you to put this deeper understanding to work in your network environment. 0201634724B04062001
    Note: Includes bibliographical references (p. 317-330) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Santa Monica, CA : Rand
    ISBN: 9780833043320 , 0833043323 , 9780833026569 , 0585246483 , 0833026569 , 9780585246482
    Language: English
    Pages: 1 Online-Ressource (xiii, 168 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Parallel Title: Print version Zapatista "social netwar" in Mexico
    Keywords: Ejército Zapatista de Liberación Nacional (Mexico) Public opinion ; Ejército Zapatista de Liberación Nacional (Mexico) ; Public opinion ; National security ; Information networks Social aspects ; Internet Social aspects ; Public opinion ; National security ; Information networks ; Internet ; Ejército Zapatista de Liberación Nacional (Mexico) ; Ejército Zapatista de Liberación Nacional ; HISTORY ; POLITICAL SCIENCE ; International Relations ; General ; Information networks ; Social aspects ; Internet ; Social aspects ; Military policy ; National security ; Propaganda ; Public opinion ; Strategie ; Peasant Uprising (Chiapas, Mexico : 1994- ) ; Mexico ; Mexico ; Chiapas ; History ; Mexico Military policy ; Chiapas (Mexico) History Peasant Uprising, 1994- ; Propaganda ; Mexico ; Chiapas (Mexico) ; Electronic books ; Electronic books
    Abstract: The information revolution is leading to the rise of network forms of organization in which small, previously isolated groups can communicate, link up, and conduct coordinated joint actions as never before. This in turn is leading to a new mode of conflict--"netwar"--In which the protagonists depend on using network forms of organization, doctrine, strategy, and technology. Many actors across the spectrum of conflict--from terrorists, guerrillas, and criminals who pose security threats, to social activists who may not--are developing netwar designs and capabilities. The Zapatista movement in Mexico is a seminal case of this. In January 1994, a guerrilla-like insurgency in Chiapas by the Zapatista National Liberation Army (EZLN), and the Mexican government's response to it, aroused a multitude of civil-society activists associated with human-rights, indigenous-rights, and other types of nongovernmental organizations (NGOs) to "swarm"--electronically as well as physically--from the United States, Canada, and elsewhere into Mexico City and Chiapas. There, they linked with Mexican NGOs to voice solidarity with the EZLN's demands and to press for nonviolent change. Thus, what began as a violent insurgency in an isolated region mutated into a nonviolent though no less disruptive "social netwar" that engaged the attention of activists from far and wide and had nationwide and foreign repercussions for Mexico. This study examines the rise of this social netwar, the information-age behaviors that characterize it (e.g., extensive use of the Internet), its effects on the Mexican military, its implications for Mexico's stability, and its implications for the future occurrence of social netwars elsewhere around the world
    Note: "Prepared for the U.S. Army, RAND Arroyo Center , Includes bibliographical references (pages 155-168) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    ISBN: 3896692097
    Language: German
    Pages: 336 S. , Ill.
    Additional Material: 1 Diskette (3,5")
    Edition: 1. Aufl.
    Series Statement: Reihe praktischer Journalismus 31
    Series Statement: Praktischer Journalismus
    RVK:
    RVK:
    Keywords: Internet ; Journalismus ; Online-Dienst ; Journalismus ; Online-Recherche ; Journalismus
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : IBM Redbooks
    ISBN: 0738408123
    Language: English
    Pages: 1 online resource
    Series Statement: Redbooks
    Parallel Title: Erscheint auch als
    DDC: 004.67/84
    Keywords: Extranets (Computer networks) ; Business enterprises Computer networks ; Computer networks ; Internet ; Extranets ; Entreprises ; Réseaux d'ordinateurs ; Réseaux d'ordinateurs ; Internet ; Internet
    Abstract: The 3174 Establishment Controller is an important component, when acting This document describes the 3174 Establishment Controller Configuration The focus will be on the 3174 customization in frame relay networks when Classic SNA over frame relay This publication is intended for IBM and customer system engineers, system.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...