Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Kevin E. Peterson"'
Publikováno v:
PLoS ONE, Vol 13, Iss 6, p e0198612 (2018)
Water level (WL) fluctuations in lakes influence many aspects of ecosystem processes. Concern about the potential impact of WL fluctuations on fisheries was one of the factors that motivated the decision in 2000 to alter the management of WL in the R
Externí odkaz:
https://doaj.org/article/a72fde98518c4c9a94bfa257290a60c8
Autor:
Kevin E. Peterson
Risk management is a critical process that touches every aspect of organizational asset protection as well as the activities of the professional protection officer. There are many specific and formalized models—even some sophisticated computer mode
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::37fbbc0f5769bd0ef52ca10d0fd72f28
https://doi.org/10.1016/b978-0-12-817748-8.00053-5
https://doi.org/10.1016/b978-0-12-817748-8.00053-5
Autor:
David F. Staples, Kevin E. Peterson, Ryan P. Maki, James H. Larson, Jon M. Vallazza, Brent C. Knights
Publikováno v:
North American Journal of Fisheries Management. 36:1425-1436
Many ecological processes depend on the regular rise and fall of water levels (WLs), and artificial manipulations to WL regimes can impair important ecosystem services. Previous research has suggested that differences in WL between late summer and ea
Autor:
Kevin E. Peterson
One unmistakable trend in security management is the growing interconnectedness between security professionals and information technology (IT) professionals. This chapter will consider some organizational characteristics and also address the security
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::50e0e14015f4e3630569605dc2c76872
https://doi.org/10.1016/b978-0-12-800113-4.00042-0
https://doi.org/10.1016/b978-0-12-800113-4.00042-0
Autor:
Fern Abbott, Brian D. Baker, Daniel R. Baker, Tucker Beecher, Inge Sebyan Black, John T. Brobst, Paul A. Caron, Jeffrey L. Colorossi, Tom M. Conley, Gerald D. Curry, Michael Dannecker, Whitney DeCamp, James A. DeMeo, Bruce W. Dobbins, Ona Ekhomu, Erik D. Erikson, Lawrence J. Fennelly, Eric L. Garwood, Brion P. Gilbride, Col. K.C. Goswami, David N. Halcovitch, Kevin Herskovitz, Christopher A. Hertig, Christopher Innace, Glen Kitteringham, Bryan Kling, James J. Leflar, Gary Lyons, Robert A. Metscher, Matthew J. Millsaps, Ronald R. Minion, Eloy L. Nunez, Patricia A. O’Donoghue, H.D.G.T. Oey, Kevin E. Palacios, Marianna Perry, Kevin E. Peterson, David L. Ray, Andrew R. Reitnauer, Randy W. Rowett, Jeffrey A. Slotnick, Larry Steele, Matt Stiehm, Charles T. Thibodeau, Franklin R. Timmons, Ann Y. Trinca, Ernest G. Vendrell, Mavis Vet, Ted Wade, Scott A. Watson, Eric Webb, Eric Stauffer, James Drymiller, Alice Grime, David Foldi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::917fb156e600945342b159237de8f4de
https://doi.org/10.1016/b978-0-12-800113-4.01002-6
https://doi.org/10.1016/b978-0-12-800113-4.01002-6
Autor:
Kevin E. Peterson
Information security includes the information protection measures such as marking, storage, proper transmission, and destruction of information. It also encompasses information technology (IT) security to protect the automated information systems, th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4a0dc966a5f7e62c1a8fac1be0604d00
https://doi.org/10.1016/b978-1-85617-746-7.00021-3
https://doi.org/10.1016/b978-1-85617-746-7.00021-3
Autor:
Rich Abrams, Brian D. Baker, George A. Barnett, Colin Best, Patrick C. Bishop, Inge Sebyan Black, Norman R. Bottom, John Christman, Darrien Davenport, Sandi J. Davies, David J. DeLong, Kevin T. Doss, Doug Durant, Ona Ekhomu, Francis J. Elliott, Jim Ellis, Richard P. Fiems, Terence M. Gibbs, Brion P. Gilbride, Martin Gill, Whitney D. Gunter, Michael A. Hannigan, Chris Hertig, Arthur A. Holm, Robert D. Jaffin, Glen Kitteringham, Jenifer Lantz, Roger Maslen, Robert Metscher, Denis A. O’Sullivan, Kevin Palacios, Kevin E. Peterson, K.C. Poulin, Kevin Pound, Timothy A. Pritchard, Mark E. Puetz, David L. Ray, Bethany J. Redmond, Chris Richardson, James E. Sellers, Dennis Shepp, Sean Smith, Michael Stroberger, Charles T. Thibodeau, Franklin R. Timmons, Christopher A. Vail, Ernest G. Vendrell, Ted Wade, Scott A. Watson, Rav-Zuridan Yisrael
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1b7aa6199d69dece781d69ff3894fc05
https://doi.org/10.1016/b978-1-85617-746-7.00049-3
https://doi.org/10.1016/b978-1-85617-746-7.00049-3
Autor:
Kevin E. Peterson
Risk management is a central concept in the fields of security, asset protection, and crime/loss prevention that helps to conserve the limited resources, apply the right solutions in the right places, and keep up with the changes in the operational e
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b88fb332626856f51ba6eca6196e5c5b
https://doi.org/10.1016/b978-1-85617-746-7.00027-4
https://doi.org/10.1016/b978-1-85617-746-7.00027-4
Autor:
Kevin E. Peterson
Technology and automation is bringing unprecedented benefits, efficiencies, and opportunities to the field of security and assets protection. From information sharing and information management to risk assessment and strategic security planning, auto
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9735be93120a8776851424fa575c52fe
https://doi.org/10.1016/b978-1-85617-746-7.00009-2
https://doi.org/10.1016/b978-1-85617-746-7.00009-2