Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Business & Economics 134
- Economic conditions 107
- Economic policy 107
- Management 86
- History 84
- Development 77
- Economic History 77
- Education 74
- Seguros 73
- Computer security 72
- Security measures 69
- Computer networks 61
- Quality control 59
- Computer software 58
- Insurance 49
- Engineering & Applied Sciences 47
- Historia 44
- Economics 41
- Medical care 37
- Quality assurance 36
- Evaluation 35
- Application software 34
- Government policy 33
- Testing 31
- Environment 30
- Governance 30
- Cloud computing 29
- Computer Science 29
- Data processing 28
- Education, Higher 28
-
1501
-
1502por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…Variation du nombre des cadres dans la fonction publique : femmes et ensemble -- Assurer l'équilibre -- Les problèmes différents appellent des solutions différentes -- Le développement du leadership et ses incidences politiques -- Domaines à étudier de près à l'avenir -- Notes…”
Publicado 2001
Libro electrónico -
1503Publicado 2015Tabla de Contenidos: “…How magnetic hard drives store data -- Summary -- References -- Chapter 3 - Labs and tools -- Information in This Chapter: -- Introduction -- Forensic laboratories -- Virtual labs -- Lab security -- Evidence storage -- Policies and procedures -- Quality assurance -- Tool validation -- Documentation -- Forms -- Examiner notes -- Examiner's final report -- Digital forensic tools -- Tool selection -- Hardware -- Other equipment -- Software -- Additional resources -- Open source tools -- Alert! …”
Libro electrónico -
1504Data Cleaning with Power BI The Definitive Guide to Transforming Dirty Data into Actionable InsightsPublicado 2024Tabla de Contenidos: “…-- Building a process for cleaning data -- Data assessment -- Data profiling -- Data validation -- Data cleaning strategies -- Data transformations -- Data quality assurance -- Documentation -- Understanding quality over quantity in data cleaning -- Summary -- Questions -- Chapter 4: The Most Common Data Cleaning Operations -- Technical requirements -- Removing duplicates -- Removing missing data -- Splitting columns -- Merging columns -- Replacing values -- Creating calculated columns versus measures -- Calculated columns -- Measures -- Calculation group -- Considerations -- Summary -- Questions -- Part 2 - Data Import and Query Editor -- Chapter 5: Importing Data into Power BI -- Technical requirements -- Understanding data completeness -- Understanding data accuracy -- Understanding data consistency…”
Libro electrónico -
1505Publicado 2023Tabla de Contenidos: “…Implement - integrating gamified activities into your product development process -- Gamifying your product development process -- Gamifying the ideation process -- Ideation and innovation sessions -- Recognizing and rewarding top contributors -- Gamifying product vision and strategy development -- Collaborative workshops with gamified reward systems -- Creating team-based challenges and goals -- Gamifying market research -- Competitive rewards for achieving milestones in market research -- RICE scoring for feature prioritization -- Gamifying user experience (UX) design -- Design challenges and competitions -- Leveling up your UX and UI teams -- Gamifying product management -- Gamifying product development and execution -- Reward systems for meeting development milestones -- Sprint-based challenges and rewards -- Encouraging cross-functional collaboration in product development -- Gamifying product feedback and continuous improvement -- Improvement challenges and rewards -- Gamifying user testing and feedback collection -- Gamifying gathering requirements -- Gamifying the process -- Gamifying backlog refinement -- Gamifying the Agile development process -- Gamified task management systems -- Themed retrospectives -- Gamifying quality assurance and testing -- Reward systems to find and report bugs -- Product implementation -- Gamifying product launch planning -- Gamifying the product launch process -- Team-based rewards and recognition for successful launches -- Post-launch goals and challenges to maintain motivation -- Gamifying post-launch monitoring and analysis -- Leveling up your product marketing team -- Summary -- Further reading -- Chapter 11: Case Studies and Best Practices -- Brands that master gamification -- Duolingo -- Strava -- GuruShots -- The American Red Cross -- Habitica -- Prodigy…”
Libro electrónico -
1506Publicado 2023Tabla de Contenidos: “…Use Case: Food Quality Assurance -- Problem Exploration -- Solution Exploration -- Goal Setting -- Solution Design -- What Solutions Already Exist? …”
Libro electrónico -
1507por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Valeur ajoutée et exportations par produits -- Assurer une croissance inclusive et respectueuse de l'environnement -- Réduire encore la pauvreté et les inégalités -- Graphique 4.8. …”
Publicado 2013
Libro electrónico -
1508Publicado 2018Tabla de Contenidos: “…-- Understanding TDD -- Red-Green-Refactor -- Speed is the key -- It's not about testing -- Testing -- Black-box testing -- White-box testing -- The difference between quality checking and quality assurance -- Better tests -- Mocking -- Executable documentation -- No debugging -- Summary -- Chapter 2: Tools, Frameworks, and Environments -- Git -- Virtual machines -- Vagrant -- Docker -- Build tools -- The integrated development environment -- The IDEA demo project -- Unit-testing frameworks -- JUnit -- TestNG -- Hamcrest and AssertJ -- Hamcrest -- AssertJ -- Code coverage tools -- JaCoCo -- Mocking frameworks -- Mockito -- EasyMock -- Extra power for mocks -- User interface testing -- Web-testing frameworks -- Selenium -- Selenide -- Behavior-driven development -- JBehave -- Cucumber -- Summary -- Chapter 3: Red-Green-Refactor - From Failure Through Success until Perfection -- Setting up the environment with Gradle and JUnit -- Setting up Gradle/Java project in IntelliJ IDEA -- The Red-Green-Refactor process -- Writing a test -- Running all the tests and confirming that the last one is failing -- Writing the implementation code -- Running all the tests -- Refactoring -- Repeating -- Tic-Tac-Toe game requirements -- Developing Tic-Tac-Toe -- Requirement 1 - placing pieces -- Test - board boundaries I -- Implementation -- Test - board boundaries II -- Implementation -- Test - occupied spot -- Implementation -- Refactoring -- Requirement 2 - adding two-player support -- Test - X plays first -- Implementation -- Test - O plays right after X -- Implementation -- Test - X plays right after O -- Requirement 3 - adding winning conditions -- Test - by default there's no winner…”
Libro electrónico -
1509por OCDE, OECD /.Tabla de Contenidos: “…Réglementation de l'énergie, des transports et des communications -- Agir de manière coordonnée pour améliorer la mobilité sur le marché du travail et assurer une intégration effective des migrants en situation régulière -- Graphique. …”
Publicado 2016
Libro electrónico -
1510por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Taux de cotisation aux programmes d'assurance sociale -- Tableau 20. Dépenses au titre des programmes du marché du travail -- Graphique 27. …”
Publicado 2002
Libro electrónico -
1511por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…L'instauration de mesures visant à promouvoir des marchés financiers plus inclusifs est essentielle pour assurer l'accès des PME aux financements dont elles ont besoin. -- 4.2.5. …”
Publicado 2016
Libro electrónico -
1512por Organisation de coopération et de développement économiques.Tabla de Contenidos: “…Orientations pour le développement d'un système de permis transférables -- Orientations stratégiques pour déterminer le contenu du dispositif de permis transférables -- Assurer la sécurité juridique et économique des permis en même temps que l'adaptabilité du programme -- Limiter les coûts de transaction, éviter les obstacles non justifiés aux transferts…”
Publicado 2001
Libro electrónico -
1513Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Information and Data Security Fundamentals -- Information security challenges -- Evolution of cybercrime -- The modern role of information security -- IT security engineering -- Information assurance -- The CIA triad -- Organizational information security assessment -- Risk management -- Information security standards -- Policies -- Training -- Key components of an effective training and awareness program -- Summary -- Chapter 2: Defining the Threat Landscape -- What is important to your organization and who wants it? …”
Libro electrónico -
1514Publicado 2021Tabla de Contenidos: “…-- Definition of Pertinent Terms -- United States -- History -- Organizational Structure -- Europe -- A Graduate Division's Basic Functions and Roles -- Functions -- Roles of Graduate Deans -- Changes to Forms of Doctoral Education and Student Numbers -- Quality Assurance Coordination -- Initiator and Catalyst for Intellectual Innovation -- Interdisciplinary and Inter-Institutional Doctoral Education and Training -- Increasing International Research and International Doctoral Students -- Supervision and Mentoring -- Professional Development and Career Support of Doctoral Candidates -- Ethics Training -- Institutional Research Unit -- Inclusive (Post)graduate Community Builder -- Conclusion -- Notes -- References -- 5 Mind the Gap: A Description of US Doctoral Education, Challenges, and the Skills Gap -- The Face of Doctoral Education Today -- Job Market for PhDs -- Where Are They Employed? …”
Libro electrónico -
1515Publicado 2024Tabla de Contenidos: “…Chapter 7: IA Templates and Utility - IA Object -- Technical requirements -- Object - Utility - IA -- Random Integer in Range -- Random Decimal in Range -- Run Process Read Stdout Stderr with Timeout -- File to Base64 -- Threshold Excel to Collection -- Get Threshold by Label -- Object Overview -- Process templates -- Single-Process, single-Work Queue, synchronous review Process template -- Single-Process, single-Work Queue, asynchronous review Process template -- Three-Process, three-Work Queue, asynchronous review Process template -- Summary -- Part 3: Control Room and Management -- Chapter 8: The LAM, User Roles, and MTE -- Technical requirements -- IA User Roles and Permissions -- ML Auditor -- ML Deployer -- ML Reviewer -- A User Role comparison -- MTEs -- MTE for the ML Auditor and ML Reviewer User Roles -- MTE limitations -- An updated LAM template -- Summary -- Chapter 9: ML Deployments and Database Operations -- ML deployments and rollbacks -- Web API deployment strategies -- Script deployment strategies -- Code Stage deployment strategies -- Database operations -- Table growth maintenance -- Extracting ML prediction data from the database -- Exporting reviewed prediction data from the database -- Summary -- Chapter 10: IA's Impact on the Robotic Operating Model -- Strategy -- Future of Work Vision -- Business case and value -- Governance, Risk, and Controls -- Workforce -- Building your organizational model -- Adopting new ways of thinking and working -- Roles and career paths -- Design -- Assessment and Prioritization -- Requirements Design -- Development -- Methodology and Teamwork -- Delivery Controls -- Testing and Quality Assurance -- Operations -- Deploy and Release -- Support model -- Summary -- Part 4: Real-Life Scenarios and Other Blue Prism Products -- Chapter 11: Processing Refunds -- Technical requirements…”
Libro electrónico -
1516Publicado 2024Tabla de Contenidos: “…Review Questions -- Chapter 7 PKI and Cryptographic Applications -- Asymmetric Cryptography -- Public and Private Keys -- RSA -- ElGamal -- Elliptic Curve Cryptography -- Diffie-Hellman Key Exchange -- Quantum Cryptography -- Hash Functions -- SHA Family -- MD5 -- RIPEMD -- Comparison of Hash Function Value Lengths -- Digital Signatures -- HMAC -- Digital Signature Standard -- Public Key Infrastructure -- Certificates -- Certificate Authorities -- Certificate Life Cycle -- Certificate Formats -- Asymmetric Key Management -- Hybrid Cryptography -- Applied Cryptography -- Portable Devices -- Email -- Web Applications -- Steganography and Watermarking -- Networking -- Emerging Applications -- Cryptographic Attacks -- Summary -- Study Essentials -- Written Lab -- Review Questions -- Chapter 8 Principles of Security Models, Design, and Capabilities -- Secure Design Principles -- Objects and Subjects -- Closed and Open Systems -- Secure Defaults -- Fail Securely -- Keep It Simple and Small -- Zero-Trust -- Trust but Verify -- Privacy by Design -- Secure Access Service Edge (SASE) -- Techniques for Ensuring CIA -- Confinement -- Bounds -- Isolation -- Access Controls -- Trust and Assurance -- Understand the Fundamental Concepts of Security Models -- Trusted Computing Base -- State Machine Model -- Information Flow Model -- Noninterference Model -- Composition Theories -- Take-Grant Model -- Access Control Matrix -- Bell-LaPadula Model -- Biba Model -- Clark-Wilson Model -- Brewer and Nash Model -- Select Controls Based on Systems Security Requirements -- Common Criteria -- Authorization to Operate -- Understand Security Capabilities of Information Systems -- Memory Protection -- Virtualization -- Trusted Platform Module (TPM) -- Interfaces -- Fault Tolerance -- Encryption/Decryption -- Manage the Information System Life Cycle -- Summary -- Study Essentials…”
Libro electrónico -
1517Publicado 2003Tabla de Contenidos: “…-- Diagnosis -- Instruction/Training -- Interpretation -- Planning/Scheduling -- Prediction -- Things to Remember -- Modes of Knowledge Conversion -- How to Codify Knowledge -- Codifying Tacit Knowledge -- Codification Tools and Procedures -- Knowledge Maps -- Decision Tables -- Decision Trees -- Frames -- Production Rules -- Case-Based Reasoning -- Knowledge-Based Agents -- The Knowledge Developer's Skill Set -- Knowledge Requirements -- Skills Requirements -- Implications for Knowledge Management -- Summary -- Terms to Know -- Test Your Understanding -- Knowledge Exercises -- References -- Chapter 8: System Testing and Deployment -- In a Nutshell -- Quality and Quality Assurance -- Knowledge Testing -- Key Definitions -- Issues to Consider -- Approaches to Logical Testing -- Circular Errors -- Redundancy Errors -- Unusable Knowledge -- Subsumption Errors -- Inconsistent Knowledge -- Approaches to User Acceptance Testing -- Test Team and Plan -- User Acceptance Test Criteria -- User Acceptance Test Techniques -- Managing the Testing Phase -- KM System Deployment -- Issues Related to Deployment -- Selection of the Knowledge Base Problem -- Ease of Understanding the KM System -- Knowledge Transfer -- Integration Alternatives -- The Issue of Maintenance -- Organizational Factors -- Other Factors -- Role of the Champion -- User Training and Deployment -- Preparing for KM System Training -- Combating Resistance to Change -- Postimplementation Review -- Security Considerations…”
Libro electrónico -
1518Publicado 2010Tabla de Contenidos: “…Dates for Submitting Tax Returns -- Part 3 Inheritance Tax -- Chapter 12: Completing the Inheritance Tax Return -- Inheritance Tax Return Form Iht400 -- Completing Form Iht400 -- Calculating the Inheritance Tax Payable -- Delivering the Return Form to Hmrc -- Making Amendments or Corrections to Form Iht400 -- Scotland and Northern Ireland -- Chapter 13: How to Value Property for Inheritance Tax -- Personal Possessions and Chattels -- Land and Property -- Leases -- Bank and Building Society Accounts -- Quoted Shares and Securities -- Unit Trusts -- Unquoted Shares and Securities -- Government Securities -- National Savings Certificates and Premium Bonds -- Individual Savings Accounts -- Foreign Assets -- Trusts -- Pensions -- Life Assurance -- Business Interests -- Jointly-Owned Assets -- Related Property Owned Jointly With a Spouse or Civil Partner -- Jointly-Owned Assets: Scottish Law -- Chapter 14: Overseas Property -- Chargeability to Inheritance Tax -- Domicile -- Location of Assets -- Valuation of Overseas Property -- Double Taxation Relief -- Chapter 15: Considering Gifts Made Before Death -- The Occasions of Charge -- Three-Step Method for Calculating Iht -- Reliefs Available on Lifetime Gifts -- Gifts With Reservation of Benefit -- Pre-Owned Asset Transfer Rules -- Chapter 16: Calculating Inheritance Tax Liability on the Death Estate -- The Chargeability of the Deceased Person -- Charges to Inheritance Tax on Death -- Valuation Rules in An Estate Computation -- The Death Estate Computation -- Calculation of Inheritance Tax on the Death Estate -- Nil Rate Band for Spouses -- Exempt Beneficiaries Taking the Residue of the Estate -- Business Property Reliefs -- Tax Credit Reliefs -- Date for Payment of Inheritance Tax -- Chapter 17: Tax Planning After Death and Deeds of Variation -- Disclaimers -- Deeds of Variation…”
Libro electrónico -
1519Publicado 2009Tabla de Contenidos: “…Best Practices -- The Conference Board -- American Law Institute -- American Bar Association -- Institutional Investors -- Council of Institutional Investors -- National Association of Corporate Directors -- Business Roundtable -- Public Pension Funds -- Summary -- Key Terms -- Review Questions -- Discussion Questions -- Notes -- Chapter 8: Internal Auditors' Roles and Responsibilities -- Introduction -- Primary Objectives -- Internal Auditing Function and Corporate Governance -- Internal Auditors as Assurance Providers -- Internal Auditors as Consultants -- Trend and Relevance of Internal Auditors -- Authorities and Responsibilities of Internal Auditors -- Authority -- Responsibility -- Internal Audit Outsourcing -- Audit Committee Relationship with Internal Auditor -- Internal Auditors' Role in Internal Control -- Institute of Internal Auditors -- Determinants of Effective Internal Audit -- Best Practices -- Internal Audit Performance -- Internal Audit Framework -- Internal Auditing Education -- The Internal Audit Opinion on Internal Controls -- Summary -- Key Terms -- Review Questions -- Discussion Questions -- Notes -- Chapter 9: External Auditors' Roles and Responsibilities -- Introduction -- Primary Objectives -- External Auditing and Corporate Governance -- External Auditor Responsibilities -- Auditor Competency -- Audit Failures and Audit Quality -- Public Company Accounting Oversight Board -- Registration and Inspection of Public Accounting Firms -- PCAOB Auditing Standards -- PCAOB Enforcement Investigations -- Audit Committee Oversight of External Auditors -- Appointment, Compensation, and Retention of Auditors -- Preapproval of Audit Services and Permissible Nonaudit Services -- Review of Independent Auditor Plan for the Integrated Audit -- Review and Discussion of Financial Reports -- Monitoring the Auditor's Independence…”
Libro electrónico -
1520por PMI, Project Management InstituteTabla de Contenidos: “…Program Activities -- 4.1 Program Integration Management -- 4.1.1 Program Integration Management Activities -- 4.1.2 Mapping of the Program Life Cycle to Program Activities -- 4.2 Program Definition Phase Activities -- 4.2.1 Program Formulation Activities -- 4.2.2 Program Planning Phase Activities -- 4.3 Program Delivery Phase Activities -- 4.3.1 Program Delivery Management -- 4.3.2 Program Performance Management -- 4.3.3 Benefits Sustainment and Program Transition -- 4.3.4 Program Change Management -- 4.3.5 Program Communications Management -- 4.3.6 Program Financial Management -- 4.3.7 Program Information Management -- 4.3.8 Program Procurement Management -- 4.3.9 Program Quality Assurance and Control -- 4.3.10 Program Resource Management -- 4.3.11 Program Risk Management -- 4.3.12 Program Schedule Management…”
Publicado 2024
Libro electrónico