Mostrando 4,461 - 4,480 Resultados de 13,276 Para Buscar '"Risk"', tiempo de consulta: 0.09s Limitar resultados
  1. 4461
    Publicado 2004
    Libro
  2. 4462
    Publicado 1978
    Libro
  3. 4463
    Publicado 2021
    “…These professionals are served by the CFA Institute and two risk management associations: the Global Association of Risk Professionals (GARP) and the Professional Risk Managers' International Association (PRMIA). …”
    Libro electrónico
  4. 4464
    Publicado 2021
    Tabla de Contenidos: “…Table of Contents Information Security Governance Practical Aspects of Information Security Governance Overview of Information Risk Management Practical Aspects of Information Risk Management Procedural Aspects of Information Risk Management Overview of Information Security Program Development Management Information Security Infrastructure and Architecture Practical Aspects of Information Security Program Development Management Information Security Monitoring Tools and Techniques Overview of Information Security Incident Manager Practical Aspects of Information Security Incident Management…”
    Libro electrónico
  5. 4465
    por Grandes, Martin
    Publicado 2002
    “…This paper addresses two important questions not fully tackled in the existing literature: i) to what extent do permanent or transitory changes in fundamentals affect sovereign risk perception, i.e. default risk, once contagion is controlled for? …”
    Capítulo de libro electrónico
  6. 4466
    por Loader, David
    Publicado 2002
    Tabla de Contenidos: “…The project life cycle; Chapter 6. Technology risk; Chapter 7. Trends and developments; Glossary; Index…”
    Libro electrónico
  7. 4467
    Publicado 2014
    “…Introducing a revolutionary new quantitative approach to hybrid securities valuation and risk management To an equity trader they are shares. …”
    Libro electrónico
  8. 4468
    Publicado 2016
    “…THE COMPLETE GUIDE TO USING ANALYTICS TO MANAGE RISK AND UNCERTAINTY IN COMPLEX GLOBAL BUSINESS ENVIRONMENTS Practical techniques for developing reliable, actionable intelligence–and using it to craft strategy Analytical opportunities to solve key managerial problems in global enterprises Written for working managers: packed with realistic, useful examples This guide helps global managers use modern analytics to gain reliable, actionable, and timely business intelligence–and use it to manage risk, build winning strategies, and solve urgent problems. …”
    Libro electrónico
  9. 4469
    por IT Governance Research Team.
    Publicado 2009
    Tabla de Contenidos: “…HOW TO USE WEB 2.0 AND SOCIAL NETWORKING SITES SECURELY; INTRODUCTION ; CHAPTER 1: WEB 2.0 THREATS ; Malware and blended attacks ; Hacking attacks ; Phishing ; Social engineering ; Loss of productivity ; Reputational risk ; CHAPTER 2: PROTECTING ORGANISATIONS FROM RISK; Introducing policies and staff awareness training; Protecting an organisation from reputational risk; Checking a commercial website's credentials; Filtering ; Vulnerability management ; APPENDIX A: GLOSSARY ; APPENDIX B: SOCIAL NETWORKING SCREENSHOTS; ITG RESOURCES ; Pocket Guides ; Toolkits ; Best Practice Reports…”
    Libro electrónico
  10. 4470
    Publicado 2021
    “…Covers all exam domains: Healthcare industry Information governance in healthcare Information technologies in healthcare Regulatory and standards environment Privacy and security in healthcare Risk management and risk assessment Third-party risk management Online content includes: 250 practice exam questions Test engine that provides full-length practice exams and customizable quizzes…”
    Libro electrónico
  11. 4471
    Publicado 2020
    “…This deep dive into the how’s and why’s of asset allocation is organized by the three decisive components of a successfully allocated portfolio: Return Forecasting discusses the desired return investors seek. Risk Forecasting covers the level of risk investors are prepared to assume to achieve that return. …”
    Libro electrónico
  12. 4472
    Publicado 2013
    “…Written by a leading national risk management expert with extensive experience advising high-net-worth individuals, Wealth Exposed alerts you to the full range of risks to which high-net-worth individuals are exposed, while schooling you in your risk management ABCs. …”
    Libro electrónico
  13. 4473
    Publicado 2013
    “…You must be aware of the value, potential return and risk of your human capital: your job, career and what you do for a living. …”
    Libro electrónico
  14. 4474
    por Price, James
    Publicado 2023
    “…Information Assets carry enormous risk and value. Most boards and executives don't know how to govern and manage IAs effectively and nobody is held accountable. …”
    Libro electrónico
  15. 4475
    por Schoenberger, E. Henry
    Publicado 2010
    Tabla de Contenidos: “…Republicans who just say no -- Housing prices in free fall or in a return to value, commercial is rotten too -- Greedy deregulated banks abandoned prudence and reason for fees and bonuses -- Wall Street: financial investment versus real investment, the only ethic is survival of the richest -- Appraisers and raters drove the getaway cars -- Self-serving regulators serve the self-interested ultra rich -- Financial engineering- the quantification of risk myth -- "Too complex to explain" financial instruments: derivatives, CDOs, CMOs, swaps, and randic tranches- pools of worse than junk bond debt -- Risk reduction, a financial engineering faith-based hoax -- Risk measurement simplified -- Haute degrees and social standing do not equal judgment or ethics -- Arcane professional nomenclature utilized to obfuscate and sell empty promises -- The insidious use and abuse of language by allowing it to shape thought -- The financial media- reporters or shills? …”
    Libro
  16. 4476
    Publicado 2013
    Tabla de Contenidos: “…4.2 Pricing Convertible Bonds4.3 Two-Factor Numerical Procedure; 4.4 Default Risk; 4.5 Pricing Convertible Bonds Subject to Interest Rate Risk and Default Risk; 4.6 Conclusion; Note; References; CHAPTER 5 - CREDIT VALUATION ADJUSTMENTS MATHEMATICAL FOUNDATIONS, PRACTICAL IMPLEMENTATION AND WRONG WAY RISKS; 5.1 Introduction; 5.2 Mathematical Foundations of CVA; 5.3 Practical Implementation: Issues and (Wrong Way) Risks; 5.4 Model Risks in CVA Calculation; 5.5 Summary and Prospects; Notes; References…”
    Libro electrónico
  17. 4477
    Publicado 2004
    Libro
  18. 4478
    por Boyle, Phelim
    Publicado 2001
    Libro
  19. 4479
    Publicado 1996
    Libro
  20. 4480
    por Calder, Alan
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title -- Copyright -- About the Author -- Contents -- Introduction -- The ISO 27000 family -- Before you start -- Chapter 1: Project mandate -- Strategic alignment -- Prioritisation and endorsement -- Change management -- The CEO's role -- The project initiation document -- Chapter 2: Project initiation -- Objectives -- Project management -- Project leadership -- Senior management support -- Project team -- Project plan -- Structured approach to implementation -- Phased approach -- The project plan -- Integration with existing security management systems -- Quality system integration -- Looking ahead -- Costs and project monitoring -- Risk register -- Chapter 3: ISMS initiation -- Continual improvement -- Security improvement plan -- Expanding the RACI matrix -- Documentation -- Four levels of documentation -- Documentation approaches -- Control of documents -- Chapter 4: Management framework -- Scoping -- Endpoint security -- Defining boundaries -- Network and data flow mapping -- Cutting corners -- Formalise key arrangements -- Information security policy -- Communication strategy -- Staff buy-in -- Chapter 5: Baseline security criteria -- Chapter 6: Risk management -- Introduction to risk management -- Risk assessment -- Five-step risk assessment process -- Risk analysis -- Risk workshop -- Impacts -- Controls -- Risk assessment tools -- Controls -- Nature of controls -- Control selection criteria -- Statement of Applicability -- Risk treatment plan -- Chapter 7: Implementation -- Competencies -- The 'all persons' requirement -- Staff awareness -- Outsourced processes -- Chapter 8: Measure, monitor and review -- Internal audit and testing -- Management review -- Chapter 9: Audit -- Six secrets to certification success -- ISO 27001 resources -- Further reading…”
    Libro electrónico