Protection policies
-
The main objective of this article is to propose refinements to the land policy and legal framework concerning the repurposing of protective and special-use forest land. A study collected input from 50 managers in two provinces(Quang Ninh and Lao Cai) to assess the appropriateness and direction of amendments to the land policy and laws on this matter.
10p viyoko 01-10-2024 5 1 Download
-
The Environment Protection Fund is a state-owned institution that mainly provides concessional loans for environmental projects in Vietnam. Understanding the factors of access to green finances contributes not only in theory but also in the practice of identifying the financing constraints, and thereby supporting several policy implications. After conducting in-depth interviews with 32 individuals from the six largest and most experience Environment Funds and their clients in Vietnam, we identified three factors affecting access to concessional loans for environmental protection.
20p toduongg 24-08-2024 1 0 Download
-
Nối tiếp phần 1, phần 2 của cuốn sách "Quản trị Windows server 2008 (Tập 2)" gồm những nội dung chính sau: Chương 14 - Triển khai Windows Deployment Services; Chương 15 - Quản trị Group Policy; Chương 16 - Network Access Protection; Chương 17 - Bảo mật hệ thống với Windows Firewall;... Mời các bạn cùng tham khảo!
139p vankhinh0210 15-10-2023 9 4 Download
-
Forest Land Allocation (FLA), initiated in 1992, aims to protect the forest and develop rural livelihoods. Although this policy has significantly contributed to the gaps between intentions and outcomes regarding forest and land policies in Vietnam, numerous problems and scepticism remain on the benefits for communities, especially ethnic minorities.
18p vispiderman 15-06-2023 6 1 Download
-
(NB) Giáo trình Chuyên đề (Nghề: Quản trị mạng máy tính - Trình độ: Trung cấp) gồm có 6 chương như sau: Bài 1 – hệ thống Web Portal; bài 2 - triển khai dịch vụ Network Policy Server; bài 3 - triển khai dịch vụ Network Access Protection; bài 4 - triển khai dịch vụ Direct Access Server; bài 5 - triển khai Network Load Balancing; bài 6 - triển khai Failover Clustering. Mời các bạn cùng tham khảo.
244p runthenight02 08-11-2022 22 9 Download
-
It is necessary to continue researching and finalizing policies as well as specific actions in implementing forest protection and development solutions for Phia Oac - Phia Den National Park, Cao Bang Province (stopping and not granting new permits). Projects of mineral exploitation, development of economic garden model; ...). Strengthen scientific cooperation with domestic and foreign scientific research institutions.
27p capheviahe27 23-02-2021 21 4 Download
-
This paper describes the aims and achievements of these projects and, based on insights and experiences from these projects, provides some recommendations for future policy support regarding maintaining competences in nuclear industry and research.
7p christabelhuynh 29-05-2020 5 0 Download
-
To study these issues, the author use methods of analysis, comparison and synthesis under the foundation of the dialectical method and the human rights-based approach to put research issues in connection with growth and development on the basis of respecting, guaranteeing, protecting human rights in the field of execution of criminal judgments.
19p capheny 29-02-2020 24 2 Download
-
AI entities as subjects of crimes to explore possible models of criminal liability applicable to AI entities and prospect for changes of criminal law and policy in Vietnam in the future, making recommendations on improvement of legal framework, contributing to crime prevention and protection of human rights in the industrial revolution 4.0.
19p capheny 29-02-2020 23 1 Download
-
This study attempts to look at the freedom with which people believe they can express their views electronically. The pressing question is: is it the responsibility of the organization to protect the well being of an employed individual and his views, beliefs, and values, or is it all the responsibility of the individual to abstain from any actions that would bring about any form of workplace repercussions?
48p fugu897 03-07-2019 27 2 Download
-
Lecture SQL XML Security presentation of content: Web Data - protection requirements, dissemination policies, why XML, graph representation, the author-X Project, enforcing access control, protection object specification, propagation option,...
66p thangnamvoiva20 20-09-2016 47 4 Download
-
Health, safety and environment manual presents health safety and environment policy; workplace hazard assessment & control; safe work practices; safe job procedures; company rules; personal protective equipment; preventative maintenance.
863p thanhtoyz 16-07-2016 74 5 Download
-
The thesis topic "Impact of the development of socialist-oriented market economy on protecting the sovereignty and security of national borders in the Northern border provinces" is an independent research project, containing the dedication of the author, based on applying the system of theoretical perspectives of Marxism - Leninism and Ho Chi Minh’s ideology; guidelines and policies of the Party; directives and leadership resolutions of the Party
12p change12 30-06-2016 49 1 Download
-
In this chapter, students will be able to understand: Password policies ensure that users choose effective passwords; user-level security requires a separate account for each user; in share-level security, all users access shares by using the same passwords; a firewall is a hardware or software product that protects a network from unauthorized access, using techniques such as packet filtering, NAT, or proxy servers;...
15p tangtuy08 21-04-2016 35 3 Download
-
The study assessed the impacts of international trade and protection on wage premiums across Thai manufacturing industries by recognising that workers are heterogeneous in their skills.The author derived a theoretical model from Ohnsorge and Trefler (2007) that is the equilibrium model with heterogeneous skill bundles and estimated the model using micro data from Thailand.
10p nganga_06 05-10-2015 74 4 Download
-
"International Business: Session 6" protectionist policies; economic development programs (export promotion strategy, import substitution strategy); industrial policy (key domestic industries chosen, protected, and promoted); regional agreements.
52p theanhdth 10-10-2014 47 6 Download
-
Protect web content from those who don’t have a “need to know” Require users to authenticate using a userid/password before they are allowed access to certain URLs HTTP/1.1 requires that when a user makes a request for a protected resource the server responds with a authentication request header WWW-Authenticate contains enough pertinent information to carry out a “challenge-response” session between the user and the server
13p muathu_102 28-01-2013 49 2 Download
-
Security Service – a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers RFC 2828 – a processing or communication service that is provided by a system to give a specific kind of protection to system resources; security services implement security policies and are implemented bt security mechanisms.
14p muathu_102 28-01-2013 35 2 Download
-
traditional private/secret/single key cryptography uses one key Key is shared by both sender and receiver if the key is disclosed communications are compromised also known as symmetric, both parties are equal hence does not protect sender from receiver forging a message & claiming is sent by sender
23p muathu_102 28-01-2013 46 3 Download
-
Sits between two networks Used to protect one from the other Places a bottleneck between the networks All communications must pass through the bottleneck – this gives us a single point of control.
24p muathu_102 28-01-2013 70 5 Download