Бази даних

Наукова електронна бібліотека - результати пошуку

Mozilla Firefox Для швидкої роботи та реалізації всіх функціональних можливостей пошукової системи використовуйте браузер
"Mozilla Firefox"

Вид пошуку
у знайденому
Сортувати знайдені документи за:
авторомназвоюроком видання
Формат представлення знайдених документів:
повнийстислий
 Знайдено в інших БД:Віртуальна довідка (272)Тематичний інтернет-навігатор (20)Автореферати дисертацій (5815)Реферативна база даних (46641)Книжкові видання та компакт-диски (7032)Журнали та продовжувані видання (354)
Пошуковий запит: (<.>K=ЗАХИСТ$<.>+<.>K=КОРПОРАТИВНОЇ$<.>+<.>K=ІНФОРМАЦІЇ$<.>)
Загальна кількість знайдених документів : 492
Представлено документи з 1 до 20
...

   Тип видання:   методичний посібник   
1.


Abwehr englischer gangster-methoden "Silent killing" [Electronic resource]. - [S. l. : s. n.]. - 52 S.
Переклад назви: Захист від англійських гангстерських прийомів "Тихе вбивство"

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ




Кл.слова:
німецька армія -- рукопашний бій

   Тип видання:   науково-популярне видання   
2.
 


Сергеев, А.
Access 2007 [Електронний ресурс] : новые возможности / А. Сергеев. - СПб. : Питер, 2008. - 176 с.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Основная цель этой книги - продемонстрировать все новые возможности Microsoft Office Access 2007, позволяющие еще быстрее и эффективнее создавать собственные базы данных. В книге описаны все новые инструменты и функции Access 2007, с помощью которых можно быстро и без особых проблем спроектировать талбицу либо форму, а затем на их основе создать отчет, выводящий, скажем, объемы продаж за квартал. При желании можно написать достаточно сложный запрос, позволяющий выполнять фильтрацию и сортировку огромного масива данных, хранящегося в нескольких таблицах. Книга рассчитана, в первую очероедь, на пользователей, имеющих определенный опыт работы с предыдущими версиями Access и желающих быстро освоить воозможности новой версии программы. Вместе с тем и те, кто только начинает работать в Access, могут использовать книгу в качестве практического пособия по быстрому освоению этого популярного приложения создания баз данных.



Кл.слова:
база даних -- обробка інформації -- Microsoft Office

   Тип видання:   методичний посібник   
3.

Schneier, B.
Applied Cryptography [Electronic resource] : protocols, Algorthms, and Source Code in C / B. Schneier. - 2th. ed.. - New York : John Wiley & Sons, 1996
Переклад назви: Прикладна криптографія

Рубрики:

  Повний текст доступний у читальних залах НБУВ


There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter. If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter, that’s not security. That’s obscurity. On the other hand, if I take a letter and lock it in a safe, and then give you the safe along with the design specifications of the safe and a hundred identical safes with their combinations so that you and the world’s best safecrackers can study the locking mechanism—and you still can’t open the safe and read the letter—that’s security. For many years, this sort of cryptography was the exclusive domain of the military. The United States’ National Security Agency (NSA), and its counterparts in the former Soviet Union, England, France, Israel, and elsewhere, have spent billions of dollars in the very serious game of securing their own communications while trying to break everyone else’s. Private individuals, with far less expertise and budget, have been powerless to protect their own privacy against these governments. During the last 20 years, public academic research in cryptography has exploded. While classical cryptography has been long used by ordinary citizens, computer cryptography was the exclusive domain of the world’s militaries since World War II. Today, state–of–the–art computer cryptography is practiced outside the secured walls of the military agencies. The layperson can now employ security practices that can protect against the most powerful of adversaries—security that may protect against military agencies for years to come. Do average people really need this kind of security? Yes. They may be planning a political campaign, discussing taxes, or having an illicit affair. They may be designing a new product, discussing a marketing strategy, or planning a hostile business takeover. Or they may be living in a country that does not respect the rights of privacy of its citizens. They may be doing something that they feel shouldn’t be illegal, but is. For whatever reason, the data and communications are personal, private, and no one else’s business. This book is being published in a tumultuous time. In 1994, the Clinton administration approved the Escrowed Encryption Standard (including the Clipper chip and Fortezza card) and signed the Digital Telephony bill into law. Both of these initiatives try to ensure the government’s ability to conduct electronic surveillance. Some dangerously Orwellian assumptions are at work here: that the government has the right to listen to private communications, and that there is something wrong with a private citizen trying to keep a secret from the government. Law enforcement has always been able to conduct court–authorized surveillance if possible, but this is the first time that the people have been forced to take active measures to make themselves available for surveillance. These initiatives are not simply government proposals in some obscure area; they are preemptive and unilateral attempts to usurp powers that previously belonged to the people. Clipper and Digital Telephony do not protect privacy; they force individuals to unconditionally trust that the government will respect their privacy. The same law enforcement authorities who illegally tapped Martin Luther King Jr.’s phones can easily tap a phone protected with Clipper. In the recent past, local police authorities have either been charged criminally or sued civilly in numerous jurisdictions—Maryland, Connecticut, Vermont, Georgia, Missouri, and Nevada—for conducting illegal wiretaps. It’s a poor idea to deploy a technology that could some day facilitate a police state. The lesson here is that it is insufficient to protect ourselves with laws; we need to protect ourselves with mathematics. Encryption is too important to be left solely to governments. This book gives you the tools you need to protect your own privacy; cryptography products may be declared illegal, but the information will never be.



Кл.слова:
шифрування -- захист інформації

   Тип видання:   науково-популярне видання   
Категорія: Науки про Землю   
4.
 


Barlow, Maude.
Blue Gold [Electronic resource] : the fight to stop the corporate theft of the world's wate / Maude Barlow, Tony Clarke. - New York : The New Press, 2005. - 289 p
Переклад назви: Синє золото: боротьба за припинення корпоративної крадіжки світових водних ресурсів

Рубрики:

Географічні рубрики:
  

  Повний текст доступний у читальних залах НБУВ


In this “chilling, in-depth examination of a rapidly emerging global crisis” (In These Times), Maude Barlow and Tony Clarke, two of the most active opponents to the privatization of water show how, contrary to received wisdom, water mainly flows uphill to the wealthy. Our most basic resource may one day be limited: our consumption doubles every twenty years—twice the rate of population increase. At the same time, increasingly transnational corporations are plotting to control the world’s dwindling water supply. In England and France, where water has already been privatized, rates have soared, and water shortages have been severe. The major bottled-water producers—Perrier, Evian, Naya, and now Coca-Cola and PepsiCo—are part of one of the fastest-growing and least-regulated industries, buying up freshwater rights and drying up crucial supplies. A truly shocking exposé that is a call to arms to people around the world, Blue Gold shows in frightening detail why, as the vice president of the World Bank has pronounced, “The wars of the next century will be about water.”



Кл.слова:
водні ресурси -- екологія -- світова економіка

   Тип видання:   методичний посібник   
5.

Chapman, D. B.
Building Internet firewalls [Electronic resource] / D. B. Chapman, E. D. Zwicky. - Sebastopol : O'Reilly, 1995. - 517 p.
Переклад назви: Побудова інтернет-фаєрволів

Рубрики:

  Повний текст доступний у читальних залах НБУВ


More than a million systems are now connected to the Internet, and something like 15 million people in 100 countries on all seven continents use Internet services. More than 100 million email messages are exchanged each day, along with countless files, documents, and audio and video images. Everyone is jumping on the Internet bandwagon. Once a haven for academicians and scientists, the Net is now reaching large and small businesses, government at all levels, school children, and senior citizens. The commercial world is rushing headlong into doing business on the Internet, barely pausing while technologies and policies catch up with their desire to go online. But, too few of the seekers after Internet wisdom and riches consider whether their businesses will be safe on the Net. What kinds of security risks are posed by the Internet? Some risks have been around since the early days of networking -- password attacks (guessing them or cracking them via password dictionaries and cracking programs), denial of service, and exploiting known security holes. Some risks are newer and even more dangerous -- packet sniffers, IP (Internet Protocol) forgery, and various types of hijacking attacks. Firewalls are a very effective way to protect your system from these Internet security threats. Firewalls in computer networks keep damage on one part of the network (e.g., eavesdropping, a worm program, file damage) from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. What is a firewall? It's a hardware and/or software solution that restricts access from your internal network to the Internet -- and vice versa. A firewall may also be used to separate two or more parts of your local network (for example, protecting finance from R&D). The firewall is installed at the perimeter of the network, ordinarily where it connects to the Internet. You can think of a firewall as a checkpoint; all traffic, incoming and outgoing, is stopped at this point. Because it is, the firewall can make sure that it is acceptable. "Acceptable" means that whatever is passing through -- email, file transfers, remote logins, NFS mounts, etc. -- conforms to the security policy of the site. Building Internet Firewalls is a practical guide to building firewalls on the Internet. If your site is connected to the Internet, or if you're considering getting connected, you need this book. It describes a variety of firewall approaches and architectures and discusses how you can build packet filtering and proxying solutions at your site. It also contains a full discussion of how to configure Internet services (e.g., FTP, SMTP, Telnet) to work with a firewall. The book also includes a complete list of resources, including the location of many publicly available firewall construction tools. The book is divided into four parts: Part I discusses Internet threats, the benefits of firewalls, overall security strategies, and a summary of Internet services and their security risks. Part II describes possible firewall designs and general terms and concepts, how to protect the bastion host in your firewall configuration, how to build proxying and packet filtering firewalls, and how to configure Internet services to operate with a firewall. Part III describes how to maintain a firewall, develop a security policy, and respond to a security incident. Part IV contains appendic



Кл.слова:
мережа -- захист

   Тип видання:   наукове видання   
6.

Paquet, C.
Business case for network security [Electronic resource] : advocacy, governance, and ROI / C. Paquet, W. Saxe. - Indianapolis : Cisco Press, 2004. - 408 p
Переклад назви: Економічна модель для мережевої безпеки: захист, управління та дохід від інвестицій

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The business case for network security: advocacy, governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization’s risksand objectively quantify both costs and cost savings related to network security technology investments. This book covers the latest topics in network attacks and security. It includes a detailed security-minded examination of return on investment (ROI) and associated financial methodologies that yield both objective and subjective data. The book also introduces and explores the concept of return on prevention (ROP) and discusses the greater implications currently facing corporations, including governance and the fundamental importance of security, for senior executives and the board.



Кл.слова:
інвестиція -- кошти -- мережа -- бізнес

   Тип видання:   наукове видання   
7.

Bastien, G.
CCSP Cisco Secure PIX® Firewall advanced exam certification guide [Electronic resource] / G. Bastien, E. Carter, C. Degu. - 2th. ed.. - Indianapolis : Cisco Press, 2004. - 816 p.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Becoming a CCSP distinguishes you as part of an exclusive group of experts, ready to take on today's most challenging security tasks. Administration of the Cisco PIX Firewall is a difficult and complex task, critical for protecting a network. Whether you are seeking a PIX-focused certification or the full-fledged CCSP certification, learning what you need to know to pass the Cisco Secure PIX Firewall Advanced (CSPFA) exam will qualify you to keep your company's network safe while meeting business needs.



Кл.слова:
адміністрування мереж -- захист мережі

   Тип видання:   наукове видання   
8.

Dubrawsky, I.
CCSP Self-Study CCSP CSI [Electronic resource] : exam Certification Guide / I. Dubrawsky, P. Grey. - 2-е вид.. - Indianapolis : Cisco Press, 2004. - 528 p.
Переклад назви: CCSP самовчитель CCSP CSI: Керівництво сертифікаційного іспиту

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The official self-study test preparation guide for the CCSP CSI exam 642-541 This study guide helps you master all the topics on the CCSP CSI exam, including Classifying and mitigating network attacks Securing designs for small, medium-sized, remote-user, and enterprise networks Understanding the SAFE network modules Using Host IPS and the Cisco Security Agent Identifying security threats Securing a wireless network Applying the SAFE Blueprint to networks utilizing IP telephony Implementing appropriate security products to prevent or counteract vulnerabilities Defining a security policy Using the Cisco Secure product portfolio, including perimeter security, IDS, secure connectivity, security management, and Cisco AVVID Understanding the SAFE architectural overview CCSP CSI Exam Certification Guide, Second Edition, is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CSI exam. Inside, you'll find preparation hints and test-taking tips to help you identify areas of weakness and improve both your conceptual and hands-on knowledge of network security. CCSP CSI Exam Certification Guide, Second Edition, presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Foundation Summary lists and tables make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions reinforce key concepts. An entire chapter of scenarios helps you place the exam objectives in real-world situations, thus increasing recall during exam time. New in this edition is coverage of wireless networks, IP telephony, Host Intrusion Prevention System (IPS), and enterprise networks. The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take a complete, timed exam. The assessment engine tracks your performance and provides feedback on a module-by-module basis, presenting links to the text for further review and helping you devise a complete study plan. Well-regarded for its level of detail, assessment features, challenging review questions, and hands-on exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCSP CSI Exam Certification Guide, Second Edition, is part of a recommended study program from Cisco Systems that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Companion CD-ROM The CD-ROM contains more than 200 practice questions for the CCSP CSI exam, including simulation-based questions. CD-ROM test engine powered by www.boson.com. Boson Software is a Cisco Learning Partner.



Кл.слова:
програмне забезпечення -- база даних -- електронний ресурс -- сервер -- захист даних -- CCSP CSI exam

   Тип видання:   наукове видання   
9.

Deal, R. A.
Cisco ASA Configuration [Electronic resource] / R. A. Deal. - New York : McGRAW-HILL, 2009. - 753 p. - (Networking Professional's Library)
Переклад назви: Конфігурація Cisco ASA

Рубрики:

  Повний текст доступний у читальних залах НБУВ


The Cisco ASA product replaces Cisco PIX Firewalls, and Cisco expert Richard Deal updates his bestselling book, Cisco PIX Firewalls, to cover ASA. This book shows you how to configure and maintain a Cisco ASA appliance to control traffic in the corporate network and protect the network from internal and external threats and attacks. Cisco ASA Configuration covers the latest features available in versions 8.0 and 8.1, and includes detailed examples of complex configurations and troubleshooting. Implement and manage this powerful multifunction network adaptive security appliance with help from this expert guide.



Кл.слова:
продукт -- захист мережі -- пристрій

   Тип видання:   науково-популярне видання   
10.


Cities of the United States [Electronic resource] : a compilation of current information on economic, cultural, geographic, and social conditions / ed. L. C. DeShantz-Cook, J. K. Mueckenheim, K. Swartout. - Detroit : Thomson Gale, 2006. - 2517 p
Переклад назви: Міста США: збірник актуальної інформації про економічні, культурні, географічні і соціальні умови.

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


The editors are grateful for the assistance provided by dozens of helpful chambers of commerce and convention and visitors bureau professionals, as well as municipal, library, and school employees for their invaluable generosity and expertise



Кл.слова:
економіка -- культура -- соціологія -- США

   Тип видання:   довідник   
Категорія: Науки про Землю   
11.


Cities Of The United States [Electronic resource] : a compilation of current information on economic, cultural, geographic and social conditions : in 4 vol. / L.C. DeShantz-Cook, J.K. Mueckenheim, K. Swartout. - Farmington Hills : Gale, 2006. - 2518 p.
Переклад назви: Міста США : звід нагальної інформації в економічній, культурній, географічній та суспільній царині

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


For each of "America's top cities", this source provides a map; brief entries on geography; history; population profiles; government; economy; education; health care; recreation including arts and culture, festivals, and sports; transportation, and communications.



Кл.слова:
США -- економіка -- культура

   Тип видання:   науково-популярне видання   
12.

Smaldone, William.
Confronting Hitler [Electronic resource] : german social democrats in defense of the Weimar republic, 1929-1933 / William Smaldone. - Lanham : Lexington Books, 2009. - 335 p
Переклад назви: Протистояння Гітлера: німецькі соціал-демократи на захисті Веймарської республіки, 1929-1933

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


Confronting Hitler examines the lives of ten socialist leaders in their fight against Nazism. It reveals the aspects of these people's lives that most decisively shaped their views and actions during the Weimar Republic's final crisis, and it compares the German socialist experience of 1933 with those of other democratic socialist movements in the twentieth century.



Кл.слова:
Веймарська республіка -- нацизм -- політологія

   Тип видання:   методичний посібник   
13.

Cobb, С.
Cryptography For Dummies [Electronic resource] / С. Cobb. - Indianapolis : John Wiley & Sons, 2004. - 336 p.
Переклад назви: Криптографія для чайників

Рубрики:

  Повний текст доступний у читальних залах НБУВ


This guide to keeping your data safe offers the latest security techniques and advice on choosing and using cryptography products. It covers terminology, specific encryption technologies, pros and cons of different implementations, and more.



Кл.слова:
інформація -- захист

   Тип видання:   підручник   
14.

Gupta, A.
Defend I.T.: security by example [Electronic resource] / A. Gupta, S. Laliberte. - Boston : Addison Wesley, 2004. - 384 p.
Переклад назви: Захист ІТ: безпека за зразком

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Defend I.T.: Security by Example draws on detailed war stories to identify what was done right and what was done wrong in actual computer-security attacks, giving you the opportunity to benefit from real experiences. Approaches to securing systems and networks vary widely from industry to industry and organization to organization. By examining a variety of real-life incidents companies are too embarrassed to publicly share, the authors explain what could have been done differently to avoid the losses incurred--whether creating a different process for incident response or having better security countermeasures in place to begin with.



Кл.слова:
комп'ютерна безпека

   Тип видання:   наукове видання   
15.

Ла Барж, Р.
DVD: авторинг и производство [Електронний ресурс] : профессиональное руководство по DVD-видео, DVD-ROM, Web-DVD : пер. с англ. / Р. Ла Барж. - М. : Кудиц-Образ, 2004. - 416 с.

Рубрики:

  Повний текст доступний у читальних залах НБУВ


Это всеобъемлющее руководство включает все, что необходимо знать для публикации информации в форматах DVD-видео, DVD-ROM и WebDVD - от концепции проекта до тиражирования и дистрибуции продукта. После прочтения книги вы сможете организовывать свои проекты, выполнять их, а затем ycпешно продавать, с полным пониманием теории и практики. Каждый этап процесса ауторинга; и производства подробно объясняется и иллюстрируется. Книга также включает изложение современных концепций ауторинга, деловые советы по бизнес-моделям производства, методам маркетинга и дистрибуции, обширный глоссарий аббревиатур и терминов DVD-индустрии.



Кл.слова:
комп’ютерні технології -- електронний ресурс -- DVD -- носій інформації

   Тип видання:   енциклопедія   
Категорія: Соціологія   
16.


Encyclopedia of homelessness [Electronic resource] : in 2 vol. / ed. D. Levinson. - Thousand Oaks : Sage Publications, 2004. - 908 p.
Переклад назви: Енциклопедія безпритульності

Рубрики:

  Повний текст доступний у читальних залах НБУВ


There is nothing new about homelessness. There have been homeless people for some 10,000 years—from the time when humans built their first permanent homes in the first towns of the Fertile Crescent. The historical record, novels and poems, and sacred texts tell us the stories of beggars, wandering ascetics, penniless friars, displaced peasants, lost soldiers, street youths, vagrants, new arrivals in the city, and displaced workers. Homelessness has changed over the years. In the United States, during the late nineteenth century, it was hoboes and tramps who drew the attention of the public, the police, and then the social reformers of the Progressive Era. From the 1920s through the Great Depression, attention shifted to the skid rows, home to transient workers and retired single men. The decline of skid rows in the 1970s was followed by a new era of homelessness with many formerly institutionalized people—who had untreated or poorly treated emotional disorders—winding up on the streets of America. In the 1980s, the nature of homelessness changed again. Growing economic inequality, racism, a permanent decrease in the number of well-paid unskilled jobs, and a lack of affordable housing combined to make several million people—many of them African-American women and their children—homeless on America’s streets, in shelters, in motels, and in substandard and temporary apartments. This pattern continues in 2004. Homelessness is not just a U.S. problem, although when viewed cross-culturally, it becomes a more complex issue. In many developed nations, homeless families, many of them immigrants, are the major issue. In the developing nations of Asia, Africa, and Latin America, the homeless are often women and their children, youths, and migrants from rural areas who have come to cities looking for work and opportunity. The emergence of many cities in developing nations as major regional or global commercial centers has made the problem even worse, by increasing the appeal of cities as employment centers to the rural poor while at the same time providing less and less affordable housing and support services for immigrants. The goal of the Encyclopedia of Homelessness is to summarize our knowledge of homelessness. This includes describing the patterns of homelessness in the past, focusing on the recent and current situation in the United States, and sampling homelessness around the world. Entries cover causes; history; legal issues, advocacy, and policy; legislation and programs; lifestyle and health problems; organizations; research; services and service settings; size and perceptions; subpopulations and lifestyles; and world issues and perspectives. Descriptive articles cover homelessness today in eight major American cities and more than thirty cities and nations around the world. These entries allow for quick and easy comparisons.



Кл.слова:
безхатченко -- волоцюга -- вуличне життя -- соціальний захист

   Тип видання:   енциклопедія   
17.
 


Salinger, L. M.
Encyclopedia of White-Collar & Corporate Crime [Electronic resource] / L. M. Salinger. - Thousand Oaks : Sage Publications, 2005
Переклад назви: Енциклопедія білих комірців та корпоративної злочинності

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ

Vol. 1. - 928 p.


With more than 500 entries (including up-to-date information on such high profile cases as Martha Stewart and Enron), the Encyclopedia of White-Collar & Corporate Crime gathers history, definitions, examples, investigation, prosecution, assessments, challenges, and projections into one definitive reference work on the topic. This two-volume encyclopedia incorporates information about a variety of white-collar crimes, and provides examples of persons, statutes, companies, and convictions. Each entry offers a thorough and thoughtful summary of the topic. Rather than a simple definition, users are given a satisfying and sophisticated synopsis with references for further study. Articles consider all aspects of white-collar and corporate crime



Кл.слова:
злочин -- закон -- корпорація

   Тип видання:   методичний посібник   
18.

Hohpe, G.
Enterprise Integration Patterns [Electronic resource] : designing, Building, and Deploying Messaging Solutions / G. Hohpe, B. Woolf. - Boston : Addison Wesley, 2003. - 736 p.
Переклад назви: Шаблони корпоративної інтеграції: Проектування, будівництво і розгортання рішень повідомлень

Рубрики:

  Повний текст доступний у читальних залах НБУВ


This book provides a consistent vocabulary and visual notation framework to describe large-scale integration solutions across many technologies. It also explores in detail the advantages and limitations of asynchronous messaging architectures. The authors present practical advice on designing code that connects an application to a messaging system, and provide extensive information to help you determine when to send a message, how to route it to the proper destination, and how to monitor the health of a messaging system. If you want to know how to manage, monitor, and maintain a messaging system once it is in use, get this book.



Кл.слова:
програмування

   Тип видання:   наукове видання   
19.

Eekelaar, J.
Family Law Advocacy [Electronic resource] : how Barristers help the Victims of Family Failure / J. Eekelaar, M. Maclean. - Portland : Hart Publishing, 2009. - 132 p.
Переклад назви: Захист сімейного права: як адвокати допомогають жертвам сімейних відмов

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


The role of the law in settling family disputes has been a matter of particular debate over the past 25 years. In keeping with the general public perception, the media has been largely critical about the role of lawyers in family law matters, sustaining a general lack of confidence in the legal profession, and a more specific feeling that, in family matters, lawyers aggravate conflict or even represent a female conspiracy. The climate in which family lawyers practice in England and Wales is a harsh one. The authors of this path-breaking study felt it was time to find out more about the contributions of barristers in family law cases in the UK. Much of the study is comprised of an in-depth examination of the day-to-day activity of members of the UK Family Law Bar through observation of individual barristers as they performed their role in the context of a court hearing. In answering questions, such as whether the family justice system is excessively adversarial, whether family barristers earn too much from human unhappiness, or indeed whether those working in the front line of child protection earn enough, the authors reach some surprising conclusions. "The barrister is both mentor and guide for the client" is how they begin their conclusion; "we hope that we have shown that society should value their contribution better" is how they finish.



Кл.слова:
сімейне право

   Тип видання:   наукове видання   
20.

Alt, B. L.
Fleecing grandma and grandpa [Electronic resource] : protecting Against Scams, Cons, and Frauds / B. L. Alt, S. K. Wells. - Westport : Praeger Publishers, 2004. - 167 p.
Переклад назви: Оббираючи бабусь і дідусів: захист від шахрайства

Рубрики:

Географічні рубрики:

  Повний текст доступний у читальних залах НБУВ


Falling for a scam or con is humiliating for anyone, and can have terrible consequences. But for the elderly, being the victim of fraud can be disastrous, and they are the most common and vulnerable targets of everyday scams, cons, and frauds. From identity theft to gambling scams, from power of attorney issues to pyramid schemes, there is no dearth of creativity in the ways some criminals will relieve the elderly from their money and their homes. Here, Alt and Wells describe the most common scams, offer the stories of actual victims, and detail ways to protect yourself and your family from becoming easy targets. What makes the elderly such easy marks for con artists? How can they avoid the common traps? Knowing about them is one place to start, and this book helps readers to understand and identify the most common scams perpetrated against the elderly. Because such cons are so hard to prosecute, it is important to know the methods criminals employ to separate innocents from their hard-earned money. This lively, vivid account of one of the most insidious forms of crime will help families and individuals protect themselves and their loved ones from the machinations of those who view them as easy marks.



Кл.слова:
соціологія -- шахрайство
...
 

Всі права захищені © Національна бібліотека України імені В. І. Вернадського