11 resultados para private security military company

em Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho"


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Pós-graduação em História - FCLAS

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Pós-graduação em Ciência da Computação - IBILCE

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This work points out innovative alternatives for increasing the visibility of nonprofits using the creative profile of the public relations professional through guerrilla marketing. By means of methodological literature and document the suggested proposal is that the public relations through a Strategic Planning, articulate actions of guerrilla marketing on behalf of third sector concerns increasing its visibility to the state's eyes, the private sector and company making the fundraising and the visibility of these entities increase with low cost, creativity and technique. How guerrilla marketing can encourage smaller competitor it is evident to face their opponents with great creative weapons, innovative and cost effective, providing improvement in the area of activity and easier to raise funds; especially in the third sector entities, which is moved without any profit, only for individual or collective will to solve social issues

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Internal and external computer network attacks or security threats occur according to standards and follow a set of subsequent steps, allowing to establish profiles or patterns. This well-known behavior is the basis of signature analysis intrusion detection systems. This work presents a new attack signature model to be applied on network-based intrusion detection systems engines. The AISF (ACME! Intrusion Signature Format) model is built upon XML technology and works on intrusion signatures handling and analysis, from storage to manipulation. Using this new model, the process of storing and analyzing information about intrusion signatures for further use by an IDS become a less difficult and standardized process.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Pós-graduação em História - FCHS

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Biosecurity is currently a concern for all health-related services, including dentistry, since infection control has a relevant importance. In dental practice, health-related occupations have contact with a great number of individuals who are potentially capable to transmit pathogens. This study comprised a descriptive evaluation of the universal precaution measures for infection control adopted by dental practitioners working at public and private offices in the city of Araçatuba, SP. Data collection was performed by a quiz with questions about individual and collective protection equipments. The results showed that the use of caps was reported by 55% of the professionals working at the public sector and 90% for the private sector. The use of masks and gloves was reported by all professionals surveyed; nevertheless, glove change between patients was not reported by 40% of professionals working at the public sector. There were more flaws in public offices as to the use of protective barriers, since except for the use of gloves, gowns and masks, the frequency of use of those barriers was smaller than at private offices.