Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
3321por Bousquet, Guillaume“…Finally, the paper presents evidence of a limited degree of risk sharing of departmental idiosyncratic shocks, as transfers from the central government are mostly pro-cyclical. …”
Publicado 2015
Capítulo de libro electrónico -
3322por International Transport Forum.“…The ITF was asked to perform a broad risk analysis of the project and investigate options for the delivery of the project through a PPP. …”
Publicado 2015
Capítulo de libro electrónico -
3323
-
3324por Gönenç, Rauf“…Progress in macroeconomic fundamentals has enhanced credibility and reduced risk premia and capital costs. This has had broad effects on capital supply conditions in the entire economy. …”
Publicado 2010
Capítulo de libro electrónico -
3325
-
3326Publicado 1994“…With this added scope and power, however, comes increased risk, which makes it essential that additional precautions be taken. …”
Libro electrónico -
3327Publicado 2015“…The real story of what it takes to risk it all and go for broke. Conventional wisdom says most startups need to be in Silicon Valley, started by young engineers around a sexy new idea, and backed by VC funding. …”
Libro electrónico -
3328Publicado 2023Libro electrónico
-
3329
-
3330
-
3331por Lind-WaldockTabla de Contenidos: “…The Complete Guide to Futures Trading: What You Need to Know about the Risks and Rewards; Contents; Foreword; Preface; About the Contributors; Chapter 1: Futures; HISTORICAL ROOTS; WHAT FUTURES ARE; WHAT FUTURES ARE NOT; WHO TRADES FUTURES?…”
Publicado 2005
Libro electrónico -
3332Tabla de Contenidos: “…Front Matter -- Contents -- List of figures and tables -- Acknowledgements -- The emerging concept of extra-familial risks and harms -- A framework for analysing the evidence -- Building relationships -- Improving interagency collaboration -- Changing contexts of harm -- Addressing the specific dynamics of risk and harm -- A youth-centred paradigm -- A framework for designing and improving responses -- New directions for the UK and beyond -- Glossary -- References -- Index…”
Libro electrónico -
3333Publicado 2022Libro
-
3334por Falk, Richard“…The Global Governance Forum and the Global Challenges Foundation collaborate in this collection in their concern that the UN Charter and the contemporary infrastructure for international cooperation are no longer fit for purpose and lack the instruments, resources and legitimacy to address the risks threatening our future…”
Publicado 2024
Libro electrónico -
3335Publicado 2021“…Nevertheless, there is a need to better understand the implications in terms of risks, benefits and potential costs of CBDCs. From privacy concerns to macroeconomic effects, these implications blur the boundaries of the payment and financial systems, challenging the core functions of our economy and society"--…”
Libro electrónico -
3336Publicado 2024Tabla de Contenidos: “…Attack trees -- Mitigations -- Microsoft Threat Modeling Tool -- Example of an enterprise threat model -- Summary -- Self-assessment questions -- Answers -- Part 2: Mitigating Risks in Implementation -- Chapter 7: Authentication and Authorization -- Authentication -- Authorization -- Security Models -- Single sign-on and open authorization -- Single sign-on (SSO) -- Open authorization (OAuth) -- Implementing SSO and OAuth with Google -- Example of enterprise implementation -- Summary -- Self-assessment questions -- Answers -- Chapter 8: Input Validation and Sanitization -- Input validation -- Input sanitization -- Language-specific defenses -- Buffer overflows -- Example of the enterprise input validation and sanitization -- Summary -- Self-assessment questions -- Answers -- Chapter 9: Standard Web Application Vulnerabilities -- Injection attacks -- Broken authentication and session management -- Request forgery -- Language-specific defenses -- Example of enterprise web defenses -- Summary -- Self-assessment questions -- Answers -- Chapter 10: Database Security -- Overview of SQL -- SQL injection -- Maintaining database correctness -- Managing activity concurrency -- Language-specific defenses -- RBAC security in DBMS -- Encryption in DBMS -- An example of enterprise DB security -- Summary -- Self-assessment questions -- Answers -- Part 3: Security Validation -- Chapter 11: Unit Testing -- The principles of unit testing -- The advantages of unit testing -- Unit testing frameworks -- An example of enterprise threat model -- PHPUnit -- JUnit -- PyUnit -- Summary -- Self-assessment questions -- Answers -- Chapter 12: Regression Testing -- Regression testing overview -- Key concepts -- Process -- Benefits -- Robotic process automation -- The intersection of RPA and regression testing -- Regression testing tools -- Load testing…”
Libro electrónico -
3337Publicado 1996Tabla de Contenidos: “…The Arctic Aeromedical Laboratory's Thyroid Function Study: A Radiological Risk and Ethical Analysis -- Copyright -- Preface -- Contents -- Executive Summary -- DESCRIPTION OF THE AAL THYROID FUNCTION STUDY -- HEALTH EFFECTS OF I ADMINISTRATION IN HUMANS -- THE ETHICS OF HUMAN SUBJECTS RESEARCH -- CONCLUSIONS AND RECOMMENDATIONS -- 1 Introduction -- THE COMMITTEE'S CHARGE -- THE AAL AND THE THYROID FUNCTION STUDY -- CONDUCT OF THE STUDY: SAMPLE SIZE AND DISTRIBUTION -- Alaska Natives -- Army and Air Force Servicemen -- CONDUCT OF THE STUDY: SUBJECT SELECTION -- Wainwright -- Anaktuvuk Pass -- Fort Yukon -- Arctic Village -- Point Hope -- Military Testing -- STUDY RESULTS -- THE COMMITTEE'S METHODS -- Written Information -- Interview and Public Hearing Information -- COMMON THEMES FROM THE PUBLIC SESSION -- 2 Health Effects of I Administration in Humans -- RADIOLOGICAL BACKGROUND OF THE AAL STUDY -- OVERVIEW OF EPIDEMIOLOGICAL EVIDENCE REGARDING RADIATION-INDUCED THYROID CANCER -- CALCULATIONS OF RADIATION RISK -- RISK ESTIMATES FOR THE AAL STUDY -- SIGNIFICANCE OF CALCULATED RISKS OF RADIATION-INDUCED THYROID CANCER -- RADIATION GUIDELINES FOR I USAGE-THEN AND NOW -- 1957 Guidelines -- Current Guidelines -- THE EVOLUTION OF OUR UNDERSTANDING OF RADIATION HEALTH EFFECTS -- 3 The Ethics of Human Subjects Research -- BACKGROUND -- Evolution of Ethical Standards -- The Nuremberg Code -- After the Code -- The Evolution of Modern Federal Regulations -- The Nuremberg Code as Applied to AAL Research in 1955-1957 -- The Common Rule and the AAL Research: Looking Back from the 1990s -- CONCLUSION -- 4 Conclusions and Recommendations -- References -- Appendix A Thyroid Function in Health and Disease -- THE HUMAN THYROID -- ROLE OF IODINE IN THYROID FUNCTION AND DIAGNOSTIC TESTS -- URINARY AND SALIVARY EXCRETION STUDIES…”
Libro electrónico -
3338
-
3339
-
3340