Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
4721por Tuckman, BruceTabla de Contenidos: “…Fixed IncomeSecurities; Contents; Preface to the Third Edition; Acknowledgments; An Overview of Global Fixed Income Markets; PART ONE The Relative Pricing of Securities with Fixed Cash Flows; CHAPTER 1 Prices, Discount Factors, and Arbitrage; CHAPTER 2 Spot, Forward, and Par Rates; CHAPTER 3 Returns, Spreads, and Yields; PART TWO Measures of Interest Rate Risk and Hedging; CHAPTER 4 One-Factor Risk Metrics and Hedges; CHAPTER 5 Multi-Factor Risk Metrics and Hedges; CHAPTER 6 Empirical Approaches to Risk Metrics and Hedging; PART THREE Term Structure Models…”
Publicado 2012
Libro electrónico -
4722Publicado 2023Tabla de Contenidos: “…Introduction: no more bootstraps -- Believe-in-you money -- An economy that loves Black people -- Antiracist investors -- Transformative vs transactional -- Shared risk vs risk averse -- Restorative and mutually beneficial vs unequal power dynamics -- Releases shame and fear vs promotes secrecy and complexity -- Collective action vs go-it-alone -- Regenerative vs exploitative -- Are you believing yet?…”
Libro electrónico -
4723Publicado 2015Tabla de Contenidos: “…Replay Attacks -- Compromising the Human-Machine Interface -- Compromising the Engineering Workstation -- Blended Attacks -- Examples of Weaponized Industrial Cyber Threats -- Stuxnet -- Dissecting Stuxnet -- What it Does -- Lessons Learned -- Shamoon/DistTrack -- Flame/Flamer/Skywiper -- Attack Trends -- Evolving Vulnerabilities: The Adobe Exploits -- Industrial Application Layer Attacks -- Antisocial Networks: A New Playground for Malware -- Cannibalistic Mutant Underground Malware -- Dealing with an Infection -- Summary -- Chapter 8 - Risk and Vulnerability Assessments -- Information in this Chapter -- Cyber Security and Risk Management -- Why Risk Management is the Foundation of Cyber Security -- What is Risk? …”
Libro electrónico -
4724Publicado 2016Tabla de Contenidos: “…Part 3 - The Day-to-Day Operation of a Fund -- Introduction -- Process workflow -- Investment capital -- Investment process -- Asset servicing -- Fund operations -- Valuation and accounting -- On-exchange pricing and valuation issues -- Valuation checklist -- Income and expense -- Margin and collateral -- Distributions -- Performance fee calculation -- Management Information -- Transfer agency -- Subscriptions and Redemptions -- Distributions -- Custody and depositary -- Global custody -- Life Cycle of Derivatives Transactions -- Settlement of On-Exchange Derivatives -- Life Cycle of the Settlement of OTC Derivatives -- Securities lending and borrowing -- Securities Lending -- Introduction -- Securities Lending Defined -- Characteristics of securities lending -- Uses of securities lending -- Securities lending precautions and controls -- The Risks -- Borrower Default -- Day-Light Exposure -- Settlement Delays -- Market Inefficiencies -- Collateral -- Securities -- Certificates of deposit -- Government bonds -- Equities -- Irrevocable letters of credit (L/Cs) -- Securities lending agreements -- Role of the prime brokers/global custodians -- Nondiscretionary program -- Discretionary (or managed) program -- Operating the pool -- Benefits and entitlements -- Lenders' rights -- Manufactured dividends -- Role of the custodian or intermediary -- Importance of accuracy and timeliness -- Actions required -- Implications for collateral -- Repurchase agreement (repo) -- Securities lending relationship structure -- Summary -- Margin Calls and Collateral Management -- Compliance -- Summary -- Part 4 - Risk -- Risks faced by a fund and how the administrator can assist the fund to manage the risks -- Operational risk -- Types of risk -- Risks Faced by an Administrator and Custodian -- Cased Studies and Illustrations of Risks and the Management of the Risks…”
Libro electrónico -
4725por Whitaker, SeanTabla de Contenidos: “…Change control meetings -- Change control board -- Delegated authority -- Change log -- Configuration management system -- Can you answer these questions? -- Task 10: Plan risk management by developing a risk management plan, and identifying, analyzing, and prior to rising project risks in the risk register and defining risk response strategies, in order to manage uncertainty throughout the project life cycle. -- Exam need to know... -- Risk management plan -- Risk identification -- Qualitative risk analysis -- Quantitative risk analysis -- Risk response planning -- Can you answer these questions? …”
Publicado 2013
Libro electrónico -
4726Publicado 2016Tabla de Contenidos: “…2.3.9.4 Computational fluid dynamics2.3.10 CONCENTRATION FLUCTUATIONS; 2.3.11 MITIGATION: TERRAIN, BARRIERS, SPRAYS, SHELTER, AND EVACUATION; 2.3.12 PLANT LAYOUT; 2.3.13 COMPUTER AIDS; 2.4 PRESENT APPROACH TO PROCESS SAFETY; 2.4.1 RISK AND HAZARD; 2.4.2 METHODOLOGY IN RISK ASSESSMENT; 2.4.2.1 Nodes in risk assessment; 2.4.2.2 Teams and information required for a risk assessment; 2.4.3 QUANTITATIVE RISK ASSESSMENT; 2.4.4 SCALABILITY IN RISK ASSESSMENT METHODOLOGIES; 2.4.5 PROBABILITY BASED APPROACHES; 2.4.5.1 Fault tree analysis; 2.4.5.2 Event tree analysis; 2.4.5.3 Bow-tie plots…”
Libro electrónico -
4727por Vilariño Sanz, Ángel
Publicado 2001Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca Universidad de Deusto)Libro -
4728por Dickinson, Thomas“…Global downturn may yet put successes at risk…”
Publicado 2008
Capítulo de libro electrónico -
4729por Neville, Katherine, 1945-
Publicado 2003Biblioteca de la Universidad de Navarra (Otras Fuentes: Biblioteca Provicincial Misioneros Claretianos - Provincia de Santiago)Libro -
4730por Krichene, NoureddineTabla de Contenidos: “…Graphical Description of Uncertainty: Highly Volatile Capital Markets Measuring Risk and Return; Portfolio Diversification Theory; Mean-Variance Efficiency Frontier; Investor's Risk Preferences: Utility Function and Indifference Curves; A Portfolio Diversification Model; Portfolio Diversification in the Case of Two Risky Assets; A Model of a Riskless Asset and a Risky Asset; The Capital Market Line; Tobin's Two-Fund Theorem; Asset Pricing Based on Risk-Return Tradeoff; Systematic and Unsystematic Risk; The Capital Asset Pricing Model (CAPM); The Security Market Line…”
Publicado 2013
Libro electrónico -
4731por Duhon, Terri Lynn, 1972-Tabla de Contenidos: “…; Market Risk; Credit Risk; Other Risk; Conclusion; Discussion Questions; Chapter 14: How Do We Manage These Risks?…”
Publicado 2012
Libro electrónico -
4732Publicado 2019Tabla de Contenidos: “…ESTIMATING -- Learning outcomes -- 6.1 Introduction -- 6.2 What we estimate and why it is important -- 6.3 Expert judgement -- 6.4 Bottom-up and top-down approaches -- 6.5 A parametric approach -- 6.6 Estimating by analogy -- 6.7 Checklist -- Sample questions -- Pointers for activities -- 7. RISK -- Learning outcomes -- 7.1 Introduction -- 7.2 Risk management -- 7.3 Identifying risks -- 7.4 Assessing the risk -- 7.5 Quantitative approaches to risk -- 7.6 The qualitative approach to project risk assessment -- 7.7 Deciding the appropriate actions -- 7.8 Planning, monitoring and control -- 7.9 Summary -- Sample questions -- Pointers for activities -- 8. …”
Libro electrónico -
4733Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright -- Contents -- Introduction -- Winning at Life -- Chapter 1: Strive -- Popular Beliefs About Success Are Profoundly Wrong -- Strive for Real, Lasting Success -- (S)-Set a Goal -- (T)-Think About How to Get There and Plan for Success -- (R)-Risk: Embrace It, Expect It -- (I)-Insights, or What Did You Learn from Your Uncomfortable Change or Risk? …”
Libro electrónico -
4734por Scardovi, Claudio. authorTabla de Contenidos: “…1 Unbearable lightness of banking -- 2 Synapsis in the global financial system -- 3 In transformation we trust -- 4 Cyber capital at risk -- 5 Digital transformation in payments -- 6 Transformation in funding -- 7 Transformation in investment management -- 8 Transformation in lending -- 9 Transformation in risk management -- 10 Transformation in insurance -- 11 Digital for the greater good -- 12 The synapses challenge ahead…”
Publicado 2017
Libro electrónico -
4735Publicado 2017Tabla de Contenidos: “…AVOIDANCE: MINIMISING THE RISKS -- Minimising risks with the client -- Minimising risks with contractors and subcontractors -- Minimising risks with subconsultants -- 3. …”
Libro electrónico -
4736Publicado 2016Tabla de Contenidos: “…5.1 Key Sarbanes-Oxley Act (SOx) Elements -- Title I: Public Company Accounting Oversight Board -- Title II: Auditor Independence -- Title III: Corporate Responsibility -- Title IV: Enhanced Financial Disclosures -- Title V: Analyst Conflicts of Interest -- Titles VI through X: Fraud Accountability and White‐Collar Crime -- Title XI: Corporate Fraud Accountability -- 5.2 Performing Section 404 Reviews under AS5 -- 5.3 AS5 Rules and Internal Audit -- 5.4 Impact of the Sarbanes-Oxley Act -- Notes -- Chapter 6: COBIT and Other ISACA Guidance -- 6.1 Introduction to COBIT -- 6.2 COBIT Framework -- 6.3 Principle 1: Meeting Stakeholder Needs -- 6.4 Principle 2: Covering the Enterprise End to End -- 6.5 Principle 3: A Single Integrated Framework -- 6.6 Principle 4: Enabling a Holistic Approach -- 6.7 Principle 5: Separating Governance from Management -- 6.8 Using COBIT to Assess Internal Controls -- 6.9 Mapping COBIT to COSO Internal Controls -- Notes -- Chapter 7: Enterprise Risk Management: COSO ERM -- 7.1 Risk Management Fundamentals -- Risk Identification -- Key Risk Assessments -- Probability and Uncertainty -- Risk Interdependencies -- Risk Ranking -- Quantitative Risk Analysis: Expected Values and Response Planning -- Quantitative Risk Analysis: Risk Monitoring -- 7.2 COSO ERM: Enterprise Risk Management -- 7.3 COSO ERM Key Elements -- COSO ERM: The Internal Environment Component -- COSO ERM Objective Setting -- COSO ERM Event Identification -- COSO ERM Risk Assessment -- COSO ERM Risk Response Elements -- COSO ERM Control Activities -- COSO ERM Information and Communication -- COSO ERM Monitoring -- 7.4 Other Dimensions of COSO ERM: Enterprise Risk Objectives -- Operations Risk Management Objectives -- Reporting Risk Management Objectives -- Legal and Regulatory Compliance Risk Objectives -- 7.5 Entity-Level Risks…”
Libro electrónico -
4737Publicado 2023Tabla de Contenidos: “…Develop Plans and Designs -- Implement Change -- Project Management -- Process Inventory Strengthen Project Management -- Project Planning and Work Estimation -- Monitoring Progress -- Process Aligned Status Reporting -- Tollgate to Production -- Key Takeaways -- Chapter 6: The Technology Path to Digitization -- Netflix, Digital Leader -- Embracing Digital Technologies -- Intelligent Process Automation (IPA) -- Defining the Intelligent Process Automation Program Charter -- Discovery and Assessment -- Process Design and Optimization -- Development and Testing -- Data-Centric AI -- State of Data Quality -- Process Inventory Provides an Enterprise Labeling Schema -- Use Cases for Operational Excellence -- Business-Led Modular Architectures -- Anchoring Microservice Design to Process Inventory -- Enabling Enterprise Architecture Design -- Enterprise Architecture Frameworks -- Translate Business Strategy into IT Strategy -- Create Transparency -- Application Portfolio Management -- Define Target State Vision and Roadmap -- Key Takeaways -- Chapter 7: Strengthening Risk Management -- Deepwater Horizon Oil Spill -- Importance of Risk Management -- Enterprise Risk Management -- Opportunities in Enterprise Risk Management -- Moving Beyond Qualitative Risk Assessments -- Need to Improve Risk Data -- Risk Operating Model Opportunities -- The Future of ERM Fueled by Process Inventory -- Defining the Enterprise Risk Management Framework -- Ignite ERM of the Future with Data Excellence -- High-Quality GRC Risk Data -- Data-Driven Risk Insights -- Risk Assessment Examples -- Risk Taxonomy -- Integrated Risk Assessment -- Recertification of Process Inventory -- Business Continuity Risk -- Compliance Risk -- Operational Risk -- Outcome of the Integrated Risk Assessment Approach -- Key Takeaways -- Part III: Implementing the Process Inventory Framework…”
Libro electrónico -
4738Publicado 2015Tabla de Contenidos: “…Reflecting -- Part II. Risking -- Part III. Re-imagining…”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
4739Compete smarter, not harder a process for developing the right priorities through strategic thinkingpor Putsis, William, 1959-Tabla de Contenidos: “…Introduction -- The importance of fundamentals -- Finding the right market opportunities -- Managing the risk of growth…”
Publicado 2014
Libro electrónico -
4740por Zia, AsimTabla de Contenidos: “…Introduction : post-Kyoto climate governance -- The politics of scale I : temporal and spatial discounting -- The politics of scale II : synergies and trade-offs in complex systems -- The politics of ideology I : risk perceptions and psychology of denial -- The politics of ideology II : communicating uncertain climate change risk -- The politics of knowledge I : marketization of climate governance -- The politics of knowledge II : accountability and adaptation -- Governing environmental complexity…”
Publicado 2013
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico