Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Taxation 224
- Law and legislation 187
- History 108
- Transparency in government 71
- Economic conditions 63
- Engineering & Applied Sciences 56
- Education 55
- Economics 53
- Finance 51
- Historia 50
- Computer programming 49
- Programming languages (Electronic computers) 47
- Computer networks 45
- Management 44
- Archaeology 41
- Research 40
- Security measures 40
- Computer security 38
- Derecho Comunitario 37
- Programming Languages, Compilers, Interpreters 37
- Social aspects 36
- Development 35
- International cooperation 32
- Application software 31
- History and criticism 31
- TFC 31
- Economic aspects 30
- Python (Computer program language) 29
- Artificial intelligence 28
- Computer Science 28
-
901Publicado 2023Tabla de Contenidos: “…-- Recommended reading -- About anxiety and learning -- About reflection-in-action -- About the double task -- About action learning -- About leadership in the middle of it all -- About 'soft is hard' -- Chapter 2 Being mindful of what is above and below the surface -- Process awareness of what is below the surface -- Practising mindful awareness -- Emotion as data: above and below, inner and outer -- Reading and carrying -- Engaging our assumptions -- Deep underlying assumptions as competing commitments -- Points from my research -- Reflection: what is your personal experience? …”
Libro electrónico -
902Publicado 2023Tabla de Contenidos: “…Chapter 3: Getting Started with the Inventory Management Module -- Introducing Inventory management -- Inbound operations -- Outbound operations -- Internal operations -- Setting up our warehouse and inventory configurations -- Sites -- Warehouse -- Aisles and locations -- Item setup -- ABC classification -- Creating and posting inventory journals -- Inbound operations -- Outbound operations -- Inventory journals -- Working with transfer orders -- Inquiries and reports -- Closing and adjustment -- Summary -- Questions -- Answers -- Chapter 4: Procurement and Sourcing, the Start of the Journey -- Procure-to-purchase process -- Purchase requisition -- Setting up and carrying out an RFQ -- POs -- Vendor collaboration portal -- The PO life cycle on vendor collaboration -- Setting up vendor collaboration -- Processing a PO on the vendor collaboration portal -- Collaboration on RFQs -- Working with vendor rebates -- Setting up -- Rebate program types -- Rebate groups -- Rebate agreement -- Generating rebate claims -- What about consignment inventory? …”
Libro electrónico -
903Publicado 2023Tabla de Contenidos: “…Evolution of Sediment Parameters after a Beach Nourishment Reprinted from: Land 2021, 10, 914, doi:10.3390/land10090914 143 -- Pedro Aguilar, Edgar Mendoza and Rodolfo Silva Interaction between Tourism Carrying Capacity and Coastal Squeeze in Mazatlan, Mexico Reprinted from: Land 2021, 10, 900, doi:10.3390/land10090900 159 -- Carlos Mestanza-Ram ́on, Selene Paz-Mena, Carlos L ́opez-Paredes, Mirian Jimenez-Gutierrez, Greys Herrera-Morales, Giovanni D'Orio and Salvatore Straface History, Current Situation and Challenges of Gold Mining in Ecuador's Litoral Region Reprinted from: Land 2021, 10, 1220, doi:10.3390/land10111220 183 -- Alexis Mooser, Giorgio Anfuso, Hristo Stanchev, Margarita Stancheva, Allan T. …”
Libro electrónico -
904Publicado 2016Tabla de Contenidos: “…-- An Alternative to Convertible Debt -- Chapter 9 Crowdfunding -- Product Crowdfunding -- Equity Crowdfunding -- How Equity Crowdfunding Differs -- Chapter 10 How Venture Capital Funds Work -- Overview of a Typical Structure -- How Firms Raise Money -- How Venture Capitalists Make Money -- Management Fees -- Carried Interest -- Reimbursement for Expenses -- How Time Impacts Fund Activity -- Reserves -- Cash Flow -- Cross-Fund Investing -- Departing Partners -- Corporate Venture Capital -- Strategic Investors -- Fiduciary Duties -- Implications for the Entrepreneur -- Chapter 11 Negotiation Tactics -- What Really Matters? …”
Libro electrónico -
905Publicado 2022Tabla de Contenidos: “…-- 9.1.1 An attacker has exploited a vulnerability -- 9.1.2 A stranger has found what they think is a vulnerability -- 9.1.3 A vendor has released a security advisory -- 9.2 Vulnerability management -- 9.2.1 Vulnerability life cycle management -- 9.2.2 Vulnerability scanning workflow -- 9.3 Break your own stuff: Penetration testing -- 9.3.1 Defining the scope -- 9.3.2 Carrying out the test -- 9.3.3 The report -- 9.4 Getting expert help: Bug bounties -- 9.5 Breaking in: Physical penetration testing -- 9.5.1 Why is physical penetration testing not carried out? …”
Libro electrónico -
906Publicado 2016Tabla de Contenidos: “…2.4 Probability Theory Predicts Mendelian Ratios -- The Product Rule -- Experimental Insight 2.2 -- The Sum Rule -- Conditional Probability -- Experimental Insight 2.3 -- Binomial Probability -- 2.5 Chi-Square Analysis Tests the Fit between Observed Values and Expected Outcomes -- The Normal Distribution -- Chi-Square Analysis -- Chi-Square Analysis of Mendel's Data -- 2.6 Autosomal Inheritance and Molecular Genetics Parallel the Predictions of Mendel's Hereditary Principles -- Autosomal Dominant Inheritance -- Autosomal Recessive Inheritance -- Molecular Genetics of Mendel's Traits -- Case Study: Inheritance of Sickle Cell Disease in Humans -- Summary -- Keywords -- Problems -- Chapter 3: Cell Division and Chromosome Heredity -- 3.1 Mitosis Divides Somatic Cells -- Stages of the Cell Cycle -- Substages of M Phase -- Chromosome Distribution -- Completion of Cell Division -- Cell Cycle Checkpoints -- Cell Cycle Mutations and Cancer -- 3.2 Meiosis Produces Gametes for Sexual Reproduction -- Meiosis versus Mitosis -- Meiosis I -- Meiosis II -- The Mechanistic Basis of Mendelian Ratios -- Segregation in Single-Celled Diploids -- 3.3 The Chromosome Theory of Heredity Proposes that Genes are Carried on Chromosomes -- Genetic Analysis 3.1 -- X-Linked Inheritance -- Testing the Chromosome Theory of Heredity -- 3.4 Sex Determination Is Chromosomal and Genetic -- Sex Determination in Drosophila -- Genetic Analysis 3.2 -- Mammalian Sex Determination -- Diversity of Sex Determination -- Experimental Insight 3.1 -- 3.5 Human Sex-Linked Transmission Follows Distinct Patterns -- Expression of X-Linked Recessive Traits -- Genetic Analysis 3.3 -- X-Linked Dominant Trait Transmission -- Y-Linked Inheritance -- 3.6 Dosage Compensation Equalizes the Expression of Sex-Linked Genes -- Case Study: The (Degenerative) Evolution of the Mammalian Y Chromosome -- Summary…”
Libro electrónico -
907por Dickinger, AstridTabla de Contenidos: “…Cover -- 1 INTRODUCTION -- 1.1 RESEARCH QUESTIONS AND AIMS -- 1.2 IMPLICATIONS -- 1.3 RESEARCH DESIGN -- 1.4 STRUCTURE -- 2 THE EXPLORATIVE RESEARCH -- 2.1 A BRIEF SUMMARY OF QUALITATIVE RESEARCH -- 2.1.1 Advantages and Disadvantages of Qualitative Research Methods -- 2.1.2 Preparing for the Field and the Selection of Experts -- 2.1.3 Qualitative Interviewing -- 2.1.4 Qualitative Data Processing and Analyzing -- 2.2 CARRYING OUT THE QUALITATIVE RESEARCH -- 3 THE M-COMMERCE VALUE CHAIN -- 3.1 THE BASIC MODEL -- 3.2 INFRASTRUCTURE AND SERVICES -- 3.2.1 Mobile Transport -- 3.2.2 Mobile Interface and Applications -- 3.2.2.1 Mobile Phones -- 3.2.2.1.1 Phones as Portable Entertainment Players -- 3.2.2.1.2 Phones as a New Marketing Tool for Retailers and Manufacturers -- 3.2.2.1.3 Phones as a Multi-Channel Shopping Device -- 3.2.2.1.4 Phones as Portable Navigation Guides -- 3.2.2.1.5 Phones as Tickets and Money -- 3.2.2.1.6 Phones as a Mobile Internet Device -- 3.2.3 Mobile Service Technologies and Delivery Support -- 3.2.3.1 Messaging Services -- 3.2.3.2 Security and Privacy -- 3.3 CONTENT -- 3.3.1 Content Creation -- 3.3.2 Content Packaging -- 3.3.3 Market Making -- 3.4 THE MOBILE USER -- 4 MOBILE SERVICES -- 4.1 CHARACTERISTICS OF MOBILE SERVICES -- 4.2 TYPES OF MOBILE SERVICES -- 4.2.1 Information Services -- 4.2.2 Entertainment Services -- 4.2.3 Transaction Services -- 4.2.4 Communication Services -- 4.2.5 Mobile Marketing Services -- 4.2.5.1 Mobile Branding -- 4.2.5.2 Mobile CRM -- 4.2.5.3 Mobile Advertising -- 4.2.5.4 Mobile Market Research -- 5 THEORETICAL AND METHODOLOGICAL FRAMEWORK -- 5.1 RELEVANCE OF THE THEORETICAL FRAMEWORK -- 5.2 DIFFUSION AND ADOPTION THEORIES -- 5.2.1 Diffusion of Innovations -- 5.2.2 Social Cognitive Theory -- 5.2.3 Theory of Planned Behavior & -- Theory of Reasoned Action -- 5.2.4 The Technology Acceptance Model…”
Publicado 2007
Libro electrónico -
908Tabla de Contenidos: “…Business Continuity Plan Validation & Training -- Up-to-date Maintenance of the BCP -- Chapter Summary -- Part III: Application Security -- Chapter 6: Application and Web Security -- Introduction -- Software Applications -- Completeness of the Inputs -- Correctness of the Inputs -- Completeness of Processing -- Correctness of Processing -- Completeness of the Updates -- Correctness of the Updates -- Preservation of the Integrity of the Data in Storage -- Preservation of the Integrity of the Data while in Transmission -- Importance of an Effective Application Design and Development Life Cycle -- Important Guidelines for Secure Design and Development -- Web Browsers, Web Servers, and Web Applications -- Vulnerabilities in Web Browsers -- Inappropriate Configuration -- Unnecessary or Untrusted Add-ons -- Malware or Executables run on the Web Browser -- No Patching up or Carrying out the Security Updates -- How to Overcome the Vulnerabilities of Web Browsers -- Vulnerabilities of Web Servers -- Default Users and Default Permissions are not changed -- Sample files and scripts are not removed -- Default Configuration is Not Changed -- File and Directory Permissions are not Set Properly -- Security Loop-Holes or Defects in the Web Server Software or Underlying Operating System -- How to Overcome the Web Server Vulnerabilities -- Web Applications -- SQL Injection Attacks -- Command Injection Attacks -- Buffer Overflow Attacks -- Cro ss-Site Scripting -- Cookie Poisoning -- Session Hijacking Attacks -- How to Overcome Web Application Vulnerabilities -- Secure Socket Layer (SSL) Security and Digital Certificate -- Chapter Summary -- Chapter 7: Malicious Software and Anti-Virus Software -- Introduction -- Malware Software -- Introduction to Malware -- Covert channels -- Types of Malware in Detail -- Spyware -- Adware -- Trojans -- Viruses -- Worms -- Backdoors…”
Libro electrónico -
909por Matthiopoulos, JasonTabla de Contenidos: “…How to make mathematical statements Numbers, equations and functions -- 1.1 Qualitative and quantitative scales -- Habitat classifications -- 1.2 Numbers -- Observations of spatial abundance -- 1.3 Symbols -- Population size and carrying capacity -- 1.4 Logical operations -- 1.5 Algebraic operations -- Size matters in male garter snakes -- 1.6 Manipulating numbers -- 1.7 Manipulating units -- 1.8 Manipulating expressions -- Energy acquisition in voles -- 1.9 Polynomials -- The law of mass action in epidemiology -- 1.10 Equations -- 1.11 First order polynomial equations -- Population size and composition -- 1.12 Proportionality and scaling: a special kind of first order polynomial equation -- Simple mark-recapture -- Converting density to population size -- 1.13 Second and higher order polynomial equations -- Estimating the number of infected animals from the rate of infection -- 1.14 Systems of polynomial equations -- Deriving population structure from data on population size -- 1.15 Inequalities -- Minimum energetic requirements in voles -- 1.16 Coordinate systems -- Non-Cartesian map projections -- 1.17 Complex numbers -- 1.18 Relations and functions -- Food webs…”
Publicado 2011
Libro electrónico -
910por Pastoors, AndreasTabla de Contenidos: “…Chapter 12: Hominin Footprints in Caves from Romanian Carpathians -- Introduction -- Vârtop Cave (Bihor Mountains) -- Room of the Steps and the Vârtop Footprints -- Geochronology -- Ciur Izbuc Cave (Pădurea Craiului Mountains) -- References -- Chapter 13: Episodes of Magdalenian Hunter-Gatherers in the Upper Gallery of Tuc d ́Audoubert (Ariège, France) -- Introduction -- Design of the Project -- Participants -- Materials -- The Volp Caves -- The Cave of Tuc d ́Audoubert -- Archaeological Context -- Human Tracks -- Methods -- Results -- Galerie des Effondrements -- Galerie des Empreintes -- Western End Section -- Western Centre -- Eastern Centre -- Eastern End Section -- Galerie des Petits Pieds -- Salle des Talons -- Synopsis -- Identity of the Trackmakers -- Identified Events -- Track Details -- Spoor Type, Side and Trackways -- Carrying Additional Weight -- Body Postures and Gait -- Group Configuration -- Axis of Locomotion -- Human Interaction with Cave Bear Bones -- Superimposition of Human Tracks -- General Conditions and Reliability of Identification -- Discussion and Conclusion -- References -- Chapter 14: Following the Father Steps in the Bowels of the Earth: The Ichnological Record from the Bàsura Cave (Upper Palaeol... -- Introduction -- Human Footprints of the Bàsura Cave: Previous Studies -- Geology of the Bàsura Cave -- Ichnology of Bàsura Cave -- Footprints, Handprints, Finger and Human Body Traces -- Finger Flutings -- Clay Pits and Related Finger Traces -- Animal Traces -- Approaches and Methodologies -- High-Resolution Digital Photogrammetry -- 3D Scanning -- Morphometric Analysis -- The Archaeological Approach and New Absolute Dating -- Charcoal Remains and Insights on the Illumination of Caves -- Inferences from Human Tracks and the Reconstruction of a Scenery -- The Human Trackmaker Identikit -- The Exploration of the Cavity…”
Publicado 2021
Libro electrónico -
911Publicado 2018“…It shows a number of techniques and methodologies that will help you master the Metasploit framework and explore approaches to carrying out advanced penetration testing in highly secured environments. …”
Libro electrónico -
912Publicado 2022Tabla de Contenidos: “…The Civil Judicial Process -- Nurses as Witnesses -- Regulation of Nursing Practice -- Nurse Practice Acts -- Credentialing -- Standards of Care -- Contractual Arrangements in Nursing -- Legal Roles of Nurses -- Collective Bargaining -- Selected Legal Aspects of Nursing Practice -- Informed Consent -- Delegation -- Violence, Abuse, and Neglect -- Discrimination -- Controlled Substances -- Substance Use Disorder in Nursing -- Sexual Harassment -- Abortions -- Death and Related Issues -- Areas of Potential Liability in Nursing -- Crimes and Torts -- Privacy of Clients' Health Information -- Social Media -- Loss of Client Property -- Unprofessional Conduct -- Legal Protections in Nursing Practice -- Good Samaritan Acts -- Professional Liability Insurance -- Carrying Out a Physician's Orders -- Providing Competent Nursing Care -- Documentation -- The Incident Report -- Reporting Crimes, Torts, and Unsafe Practices -- Legal Responsibilities of Students -- Chapter 4: Values, Ethics, and Advocacy -- Introduction -- Values -- Values Transmission -- Values Clarification -- Ethics and Morality -- Moral Development -- Moral Frameworks -- Moral Principles -- Nursing Ethics -- Nursing Codes of Ethics -- Origins of Ethical Problems in Nursing -- Making Ethical Decisions -- Strategies to Enhance Ethical Decisions and Practice -- Specific Ethical Issues -- AIDS -- Abortion -- Organ and Tissue Transplantation -- End-of-Life Issues -- Allocation of Scarce Health Resources -- Management of Personal Health Information -- Advocacy -- The Advocate's Role -- Unit 2: Contemporary Healthcare -- Chapter 5: Healthcare Delivery Systems -- Introduction -- Types of Healthcare Services -- Primary Prevention: Health Promotion and Illness Prevention -- Secondary Prevention: Diagnosis and Treatment -- Tertiary Prevention: Rehabilitation, Health Restoration, and Palliative Care…”
Libro electrónico -
913por Scott, Sharon M.Tabla de Contenidos: “…Overseeing orientation -- Putting your recruits through basic training -- Rules and regulations training -- Equipment training -- Shadowing -- Reverse shadowing -- Subbing -- Taking flight -- Addressing Staff Responsibilities -- Covering scheduled shifts -- Holidays -- Inclement weather -- Sickness and other emergencies -- Attending staff meetings -- Representing the station on social media -- Cultivating a respectful workplace -- Suspension of shows -- Part 5 Riding the Waves: Ups and Downs in Community Broadcasting -- Chapter 13 Understanding Murphy's Law of Radio -- Being Prepared When the Broadcast Goes Silent -- User error -- Utility failure -- Radio silence -- Streaming silence -- Dealing with Static and Other Interference -- FM interference -- Stream glitching -- Disappearing (or Delayed) Talent -- Failing Equipment -- Spilling onto the Soundboard -- Breaking the Rules -- Staying Tough and Carrying On -- Chapter 14 Cultivating Community Connections -- Bringing the Community to the Station -- Hosting open studio events -- Interviewing great guests -- Getting past the gates -- Securing a release form -- Conducting the interview -- Reporting on community trauma -- Bringing power to the people! …”
Publicado 2023
Libro electrónico -
914Publicado 2016Tabla de Contenidos: “…3.6 Functional Nanoporous Material for Arsenic Removal -- 3.7 Functional Nanoporous Material for Phosphorus Removal -- 3.8 Critical Research Needs -- 3.9 Conclusion -- 3.10 References -- Chapter 4: Hierarchical materials as a design concept for multifunctional membranes -- 4.1 Introduction -- 4.2 Photocatalytic Membranes and Membrane Reactors -- 4.3 Hierarchically Designed Nanocatalysts for Catalytic Membranes -- 4.4 Superhydrophobic Membranes -- 4.5 Future Research -- 4.6 Acknowledgements -- 4.7 References -- Chapter 5: Smart membrane materials for controllable oil-water separation -- 5.1 Introduction -- 5.2 Fundamental Theory of Wettability of Solid Materials -- 5.3 Controllable Oil-Water Separation with Superwetting Membranes -- 5.3.1 pH controlled oil-water separation -- 5.3.2 Photo-controlled oil-water separation -- 5.3.3 Gas-regulated oil-water separation -- 5.3.4 Temperature controlled oil-water separation -- 5.3.5 Solvent-manipulated and ion-exchange controllable oil-water separation -- 5.3.6 Electric field tuned oil-water separation -- 5.4 Summary and Perspective -- 5.5 References -- Chapter 6: Design of the next-generation FO draw solution -- 6.1 Introduction -- 6.1.1 History of forward osmosis draw solutes -- 6.1.2 Recent trends in draw solutes -- 6.2 Design of Draw Solutes -- 6.2.1 Physical properties of draw solute -- 6.2.1.1 Misconception with osmotic pressure -- 6.2.1.2 Maximum available osmotic pressure -- 6.2.1.3 Entropic Sensitivity -- 6.2.1.4 Minimum Stimuli-Driven Osmotic Concentration -- 6.2.1.5 Carrying Capacity -- 6.2.1.6 Osmotic Density -- 6.2.1.7 Osmotic Cost -- 6.2.1.8 Solute cycle rate -- 6.2.1.9 Mass Transport -- 6.2.1.10 Membrane Permeability - Reverse Solute Flux -- 6.2.2 Types of draw solute -- 6.2.2.1 Osmotic filtration -- 6.2.2.2 Membrane distillation -- 6.2.2.3 Unremoved draw solutes -- 6.2.2.4 Magnetic draw solute…”
Libro electrónico -
915Publicado 2016Tabla de Contenidos: “…-- Missing data -- Locating missing data -- Zero values -- Fixing missing data -- Ignore the problem rows -- Fix the problem manually -- Use a fabricated value -- Use a central measure -- Use Last Observation Carried Forward -- Use a similar value -- Use the most likely value -- Data errors -- Truncated fields -- Data type and character set errors -- Logic or semantic errors -- Outliers -- Visual mining for outliers -- Statistical detection of outliers -- Summary -- Index…”
Libro electrónico -
916Publicado 2018Tabla de Contenidos: “…-- Creating extensible page objects -- Turning your page objects into a readable DSL -- Fluent page objects -- Summary -- Chapter 6: Utilizing the Advanced User Interactions API -- Getting started with the API -- Using the API to solve difficult problems -- Working with hover menus -- Working with drag and drop -- Working with offsets -- Working with access keys -- The Advanced Interactions API doesn't always work for me -- Summary -- Chapter 7: JavaScript Execution with Selenium -- Introducing the JavaScript executor -- Let's not get carried away -- So, what should we do with it? -- A more complex example -- Executing complex blocks of JavaScript with the JavascriptExecutor -- Can I use JavaScript libraries? …”
Libro electrónico -
917Publicado 2024Tabla de Contenidos: “…-- Spotlight on Participants -- How We Evaluate Carries a Message -- High-Accountability Evaluation -- Now Is the Hour -- Confronting the Wish to Be Passive -- Part 7 No Masks, No Bargains -- Chapter 26 Proximal Health: A Surgeon's Perspective -- Chapter 27 My Worst Consulting Nightmare -- The Lessons -- Next Time -- Chapter 28 Seven Questions: To the Most Frequently Asked Answers -- Postscript -- Selected Bibliography -- Acknowledgments -- About the Author -- Index -- EULA…”
Libro electrónico -
918por Kenel, PhilippTabla de Contenidos: “…Cover -- Contents -- List of Tables and Graphs -- Acknowledgements -- Introduction -- Chapter 1: The Many Meanings of Social Entrepreneurship -- 1.1 Introduction: Social Entrepreneurship - Still a 'Messy' Field of Research -- 1.2 All Things Social Entrepreneurship Carry Meaning(s) - Always -- 1.3 Describing and Defining Social Entrepreneurship - No Innocent Task -- 1.4 Social Entrepreneurship Linked to Wider Narratives -- 1.5 A 'Systemic' Perspective: Social Entrepreneurship in Relationship to Neoliberalism -- 1.6 The Meanings of Social Entrepreneurship: Context‐Specific, Dynamic and Shaped by Different Actors -- 1.7 'Conceptual Confusion' as the Starting Point of an Empirical Research Project -- Chapter 2: Social Entrepreneurship in Germany -- 2.1 Introduction: 'Social Entrepreneurship' in Germany - Perceived as an 'Imported' Concept and Still Rather Marginal -- 2.2 How to Make Sense of 'Social Entrepreneurship' in the German Context -- 2.3 The Development of a Social Entrepreneurship field in Germany -- 2.4 The (Critical) Reception of the 'Social Entrepreneurship' Movement and Its Actors in Germany -- 2.5 The Political and Socio‐Economic Context in Germany During the Emergence of Social Entrepreneurship -- 2.6 Social Entrepreneurship in Germany: Once a Neoliberal Movement, always a Neoliberal Movement? …”
Publicado 2024
Libro electrónico -
919Publicado 2013Tabla de Contenidos: “…-- 5.3 Futures trading - from pits to screens -- 5.4 Buying and selling -- 5.5 The clearing mechanism -- 5.6 Futures margins -- 5.7 Physical delivery versus cash settlement -- 5.8 Futures and cash markets compared -- 5.9 The advantages of futures -- 6 Short-term interest rate futures -- 6.1 Definitions -- 6.2 STIR contracts pricing -- 6.3 Basis -- 6.4 Convergence -- 6.5 Behaviour of futures prices -- 6.6 Basic hedging example -- 6.7 Short-term futures contracts compared -- 6.8 Comparison of futures and FRAs -- 6.9 Spread positions -- 7 Bond and stock index futures -- 7.1 Definition of bond futures contracts -- 7.2 The cheapest-to-deliver bond -- 7.3 Cash-and-carry pricing for bond futures -- 7.4 The implied repo rate -- 7.5 The delivery mechanism -- 7.6 Basic hedging with bond futures…”
Libro electrónico -
920Publicado 2023Tabla de Contenidos: “…-- Introducing the feasibility analysis framework -- Executive summary -- Business concept -- Industry analysis -- Market/customer analysis -- Founding team analysis -- Product/service development analysis -- Financial analysis -- Feasibility decision -- Timeline to launch -- Part 2 Testing the Feasibility of Your Business Concept -- Chapter 5 Understanding Your Industry -- Understanding Your Industry -- Using a Framework of Industry Structure -- Carrying capacity, uncertainty, and complexity -- Threats to new entrants -- Threats from substitute products/services -- Threats from buyers' bargaining power -- Threats from suppliers' bargaining power -- Rivalry among existing firms -- Understanding the Value Chain -- Deciding on an Entry Strategy -- Differentiation -- Niche -- Cost superiority -- Researching Your Industry -- Answering key questions about your industry -- Studying public companies -- Searching for data at government websites -- Going offline for more research -- Benchmarking Against the "Perfect" Industry -- Chapter 6 What Your Customers Can Tell You -- Conducting Customer Discovery -- Segmenting your market -- Defining your niche -- Discovering Your Customers -- Finding the data you need -- Looking at the total accessible market -- Conducting customer discovery in the field -- Observing customers in their natural habitats -- Survey by email and telephone -- Conduct interviews and focus groups -- Building an early customer profile -- Identifying more important people to interview -- Graphing a customer segmentation matrix…”
Libro electrónico