Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
4861Publicado 2007Tabla de Contenidos: “…Stalking: Classification and Typology; 3. Stalking Risk Assessment; 4. Risk Management of Stalking; 5. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
4862Publicado 2020“….), which are considered a health concern. For risk assessment of cyanotoxins, more scientific knowledge is required to perform adequate hazard characterization, exposure evaluation and, finally, risk characterization of these toxins. …”
Libro electrónico -
4863Publicado 2006Tabla de Contenidos: “…Epidemiology and Primary Risk-Factors of OHSS 3. Secondary Risk-Factors of OHSS during Stimulation 4. …”
Libro electrónico -
4864por Whitaker, Sean. authorTabla de Contenidos: “…Communications Management -- 9. Risk Management -- 10. Procurement Management -- 11. …”
Publicado 2016
Libro electrónico -
4865Publicado 2016Tabla de Contenidos: “…Front Cover -- Contents -- Acknowledgments -- Authors -- Contributors -- Introduction -- Chapter 1: Learning to Survive and Thrive in a Changed Climate -- Chapter 2: Community Risk Implications -- Chapter 3: The Stages of Adaptive Planning -- Chapter 4: The Role of Local, State, and Federal Governments in Climate Change Adaptation -- Chapter 5: Elements of a Successful Adaptation Plan: Obstacles and Constraints -- Chapter 6: Case Studies in Long-Term Disaster Risk Reduction -- Chapter 7: Case Studies in Climate Change Adaptation -- Chapter 8: International Case Studies in Climate Change Adaptation -- Chapter 9: Conclusions and Recommendations -- Back Cover…”
Libro electrónico -
4866por Pritchard, JackiTabla de Contenidos: “…Appendix 1 FormsAppendix 2 Bodymaps; Appendix 3 Risk assessment tool; Appendix 4 Useful organisations; A ppendix 5 JJP Videos/DVDs; References; Subject Index; Author Index; BACK COVER…”
Publicado 2007
Libro electrónico -
4867Publicado 2024Tabla de Contenidos: “…-- Chapter 2 Power Tools ofthe Trade: Time Value, Risk, and Statistics -- Time Is Money -- Grappling with Risk -- Accounting 101 -- Making Sense of Data -- The Toolbox Is Full -- Chapter 3 Yes, Virginia, Every Asset Has an Intrinsic Value: Determining Intrinsic Value -- Value the Business or Just the Equity? …”
Libro electrónico -
4868por Moskowitz, DavidTabla de Contenidos: “…Intro -- Copyright Page -- Contents -- Foreword -- Preface -- About the authors -- Acknowledgments -- Chapter 1: Looking through the wrong end of the telescope -- 1.1: For NIST Cybersecurity Professional (NCSP) students -- 1.2: Using the book -- 1.3: The rest of the story -- Chapter 2: A clear and present danger -- 2.1: Digital evolution and the expanding attack surface -- 2.2: Evolving threat landscape -- 2.3: Lessons learned -- Chapter 3: Cybersecurity and business risk -- 3.1: Understanding enterprise risk management -- 3.2: ERM is an essential precursor to the adoption of the NIST-CSF -- 3.3: Introducing the CPD Model -- Chapter 4: Introduction to the NIST-CSF -- 4.1: Framework Core -- 4.2: Implementation Tiers -- 4.3: Framework Profiles -- 4.4: Create or improve a cybersecurity program -- Chapter 5: Introduction to NIST-CSF and the CPD Model -- 5.1: The "first principles" of the CPD Model -- 5.2: NIST-CSF and the CPD Model -- 5.3: Cybersecurity and the CPD Model -- Chapter 6: Beyond the Framework? …”
Publicado 2022
Libro electrónico -
4869por WHO Global TB ProgrammeTabla de Contenidos: “…Executive summary -- A. Identification of at-risk populations for LTBI testing and treatment -- B. …”
Publicado 2018
Libro electrónico -
4870Publicado 1995Tabla de Contenidos: “…Adverse Reproductive Outcomes in Families of Atomic Veterans: The Feasibility of Epidemiologic Studies -- Copyright -- Preface -- Contents -- Executive Summary -- CONCLUSIONS -- ORGANIZATION AND FRAMEWORK OF THE REPORT -- ADVERSE REPRODUCTIVE OUTCOMES -- ESTIMATION OF GENETIC RISK -- FEASIBILITY OF AN EPIDEMIOLOGIC STUDY -- Question 1. …”
Libro electrónico -
4871Publicado 2011Tabla de Contenidos: “…-- Summary -- Endnotes -- 9 Cloud Business Risk and Security -- Risks Associated with Cloud Services -- Where Do I Start? …”
Libro electrónico -
4872por Butler, Sara M.Tabla de Contenidos: “…-- "The logistics of divorce" -- "The risk factor" -- "Whose property is whose?" -- "What happened to the children?" …”
Publicado 2013
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
4873por Brueggemann, WalterTabla de Contenidos: “…Opening our hearts : the collect -- Well-arranged lives -- The world is not safe -- Brick production -- Can we risk it? -- Choirs of hope…”
Publicado 2008
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
4874por Almirón, NuriaTabla de Contenidos: “…Preface -- Introduction -- Financial capitalism and financialization -- Finance and information -- Financialization in the world's top media conglomerates -- Risks of media financialization for journalism…”
Publicado 2010
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca Universitat Ramon Llull, Biblioteca de la Universidad de Navarra)Libro -
4875Publicado 2022Tabla de Contenidos: “…Planning resources in a technology landscape -- Prioritization -- Team overhead -- Tooling for resource planning -- When planning has to be quick -- Exploring the differences between a project and a program -- Tooling -- Planning -- Knowing when to define a program -- Summary -- Further reading -- Chapter 6: Risk Management -- Driving clarity in risk assessment -- Risk identification -- Risk analysis -- Updating the plan -- Risk tracking -- Documenting the progress -- Tools and methodologies -- When risk assessment needs to be quick -- Managing risks in a technology landscape -- Technical risks in the Mercury program -- Exploring the differences between a project and a program -- Assessment -- Summary -- Chapter 7: Stakeholder Management -- Driving clarity in stakeholder management -- Stand-up -- Status update -- Monthly business review (MBR) -- Quarterly business review (QBR) -- Communication timing -- Defining your stakeholders -- Exploring the dos and don'ts for status reports -- Managing stakeholders in a technology landscape -- Communication systems -- Tooling -- Technical versus non-technical stakeholders -- Exploring the differences between a project and a program -- Scheduling for natural accountability -- Leadership syncs -- Summary -- Chapter 8: Managing a Program -- Driving clarity at the program level -- Defining boundaries -- Deciding when to build a program -- Building from the start -- Constructing a program mid-execution -- Tracking a program -- Program planning -- Risk management -- Stakeholder management -- Summary -- Chapter 9: Career Paths -- Examining the career paths of a TPM -- The path to becoming a TPM -- The paths of a TPM -- Exploring the IC path -- Exploring the people manager path -- Summary -- Part 3: Technical Toolset -- Chapter 10: The Technical Toolset -- Examining the need for a technical background…”
Libro electrónico -
4876Publicado 2021Tabla de Contenidos: “…-- Key Tactics -- The Insider Threat -- Conclusion -- Chapter 5 Addressing the Skills and Diversity Gap -- Assessing the Skills Gap -- Assessing the Diversity Gap -- The Power of Diverse Teams -- Bridging the Skills and Diversity Gaps -- Advice for Those Starting a Career in Cybersecurity -- To Move Up, Think Outside the Box -- Conclusion -- Part 2 Process -- Chapter 6 Effective Cyber Risk Management Requires Broad Collaboration -- Understanding Your Organization's Risk Appetite -- Measuring Actual Risk Against Risk Appetite -- How to Engage in Governance and Oversight of Cyber Risk -- Thinking Strategically About Potential Risks -- Reducing Risk by Sharing Information -- Reducing Risk Through Cyber Insurance -- In Closing -- Chapter 7 Blending NOC and SOC -- The Vision -- The Danger of Blending Superficially or Too Quickly…”
Libro electrónico -
4877por Jaeger, Axel VolkmarTabla de Contenidos: “…Legal Systems -- Conflict of Laws -- English and International Standard Forms of Contract -- Civil Law Business Terms -- Development Stages -- Understanding FIDIC: A Civil Law Approach -- FIDIC Contract Documents -- Employer’s Duties -- Contractor’s Duties -- Design Responsibility -- Engineer -- Time for Completion -- Variations -- Tests -- Certificates -- Defects Notification Period and (Post Contractual) Defects Liability -- Termination -- Discharge, Frustration and Force Majeure -- Risk, Insurance and Exceptional Risk -- Bonds, Guarantees, Letters of Credit -- Claim Management -- Disputes -- Samples -- Delay Schedule…”
Publicado 2010
Libro electrónico -
4878Publicado 2012Tabla de Contenidos: “…Introduction Depot purchased equipment maintenance Metrics for assessing capabilities and risks in depot purchased equipment maintenance Enterprise prioritization in depot purchased equipment maintenance funding A prototype model for assessing capabilities and risks in depot purchased equipment maintenance programming Software maintenance challenges for capabilities-based programming Policy options and conclusions Appendix A. …”
Libro electrónico -
4879por Organisation for Economic Co-operation and Development.Tabla de Contenidos: “…The Role Of Cost-Benefit Analysis In Evaluating Mitigation Measures For Natural Disasters -- Risk Perception And Choice In Homeowners Adoption Of Mitigation Measures -- Comparative Review -- Part 3. …”
Publicado 2008
Libro electrónico -
4880por Jain, P. K., 1963-Tabla de Contenidos: “…Part One: Background -- Chapter 1: Introduction -- Part Two: Financial Decisions -- Chapter 2: Capital Budgeting Practices -- Chapter 3: Capital Structure Decisions -- Chapter 4: Dividend Policy -- Chapter 5: Working Capital Management -- Part Three: Corporate Governance, Risk Management and Professionalism -- Chapter 6: Corporate Governance -- Chapter 7: Risk Management -- Chapter 8: Index of Professionalism in Financial Decisions -- Part Four: Summary & Conclusions -- Chapter 9: Profitability Analysis -- Chapter 10: Concluding Observations…”
Publicado 2013
Libro electrónico