Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
4941Publicado 2011“…Edward Olmstead teaches step-by-step how to control risk, safeguard investments, and much more. Then, Michael Thomsett presents 12 conservative strategies for hedging losses, mitigating risk, creating income, and increasing overall returns. …”
Libro electrónico -
4942por Godin, Seth“…On the other, they're petrified that growth means change, and change means risk, and risk means death. Nobody wants to screw up and ruin a good thing, so most companies (and individuals) just keep trying to be perfect at the things they've always done. …”
Publicado 2005
Grabación no musical -
4943Publicado 2019“…You also need to know the latest thinking on how to create an irresistible pitch deck, mitigate risk through experimentation, and develop unique opportunities through business model innovation.The Harvard Business Review Entrepreneur's Handbook addresses these challenges and more with practical advice and wisdom from Harvard Business Review's archive. …”
Grabación musical -
4944Publicado 2019“…Finally, you will compute Value at Risk (VaR) and simulate portfolio values using Monte Carlo Simulation which is a broader class of computational algorithms. …”
Vídeo online -
4945Publicado 2019“…As CEO, you set the vision, the strategy, and the tone of your organization.You establish priorities, anticipate and address challenges, champion and lead change efforts, set people up for success, and manage risk. Though you may have a great senior executive team and a top-flight board, the success of your organization depends on your leadership.We've combed through hundreds of Harvard Business Review articles and selected the best ones to help you toggle between long- and short-term views, manage risk and innovation, and cultivate productive relationships with your staff and your board. …”
Grabación musical -
4946por Doren, Dennis M.Tabla de Contenidos: “…Cover; Contents; Introduction; 1 - Relevant Components of Sex Offender Civil Commitment Laws: The Evaluation "Referral Questions"; 2 - Procedures for Conducting the Assessment; 3 - Diagnostic Issues Within Sex Offender Civil Commitment Assessments: Defining Relevant Paraphilias; 4 - Diagnostic Issues Within Sex Offender Civil Commitment Assessments: Diagnostic Issues Beyond the Paraphilias; 5 - Using Risk Assessment Instrumentation; 6 - Recidivism Base Rates; 7 - Clinical Adjustments; 8 - The Evaluation Report and Court Testimony; 9 - Ethical Issues; Appendix A; Appendix B; Appendix C…”
Publicado 2002
Libro electrónico -
4947por Ghatak, Saran, 1973-Tabla de Contenidos: “…Contents; Acknowledgments; Introduction; Chapter One: Science and Criminal Danger in the Nineteenth Century; Chapter Two: Eugenics and Hereditarianism in the United States; Chapter Three: Origin of the Psychopathology of Crime; Chapter Four: The Advent of Actuarial Justice; Chapter Five: Policing of Political Dissent; Chapter Six: "Risk Wars": The Campaign against Terrorism; Conclusion; Bibliography; Index…”
Publicado 2011
Libro electrónico -
4948por Murray, Brian H., 1968-Tabla de Contenidos: “…Digital brand abuse -- The dark side -- Objectionable content -- Pornography -- Adult entertainment -- Child pornography -- Hate, violence, and extremism -- Gambling -- Parody -- Defining "objectionable" -- Who's at risk? -- What to do -- The business case -- Boardroom summary -- The opportunities and threats of online commentary -- The rumor mill -- Financial earnings -- Early warning -- Information security -- Other security and liability threats -- The world's largest focus group -- Activism and "sucks" sites -- Nobody is immune -- Managing risk -- Buried treasure -- The business case -- Boardroom summary -- Customer diversion -- Customer capture -- Cybersquatting -- Typo-piracy -- Domain name administration -- Arbitration -- Search engine manipulation -- Invisible seeding -- Visible seeding -- Spoofing --Paid placement -- Managing seeding and spoofing issues -- Software utility generated advertisements -- Mislabeled links -- Unsolicited e-mail -- Keeping the customer -- Bringing the customer back -- Scope of the problem -- The future -- The business case -- Boardroom summary -- Online partners and distribution issues -- A managing partner compliance -- The customer experience -- Changing dynamics -- Online partners -- Affiliates -- Suppliers -- Distributors -- Third parties -- Monitoring partners -- Step 1: Prioritization -- Step 2: Brand management -- Step 3: Enforcement -- The business case -- Boardroom summary -- Counterfeits and gray markets -- Gray markets -- Combating gray market activity -- Counterfeiting -- Copier supplies -- Pharmaceuticals -- Online monitoring -- Criteria that may signal a suspect distributor -- Testing authenticity -- The business case -- Boardroom summary -- Defending against digital piracy -- Music -- Sales leads -- Video -- Cease and desist -- Customer convenience -- Copy protection and digital rights management -- Software -- Text and images -- E-books -- The Stephen King experiment -- News services -- Market data -- The business case -- Boardroom summary -- Trust -- The costs of compromised privacy and security -- Information collection technologies -- Cookies -- Web beacons -- Information security -- Customer information transmission -- Customer information storage -- Fraud -- Managing privacy and security -- The business case -- Boardroom summary -- Competitive intelligence -- Using online competitive intelligence to outmaneuver competitor brands -- The internet as a competitive intelligence source -- Brand presence -- Brand reach -- Competitor brand abuse -- Competitor absence -- Linking relationships -- Partnerships -- Recruiting competitor partners -- Online commentary -- Collecting the data -- Counterintelligence -- Actionable information -- The business case -- Boardroom summary…”
Publicado 2004
Libro electrónico -
4949Publicado 2023“…New banking and finance technologies may improve operational efficiency, risk management, compliance, and client pleasure, but they can decrease barriers and introduce new concerns, such as cybersecurity risk. …”
Libro electrónico -
4950Publicado 2024“…The course provides learners with template-based planning, detailed walkthroughs of risk assessment, and the crafting of emergency communication strategies. …”
Video -
4951Publicado 2017“…These extremely preterm infants have an increased risk of mortality and disabilities like cerebral palsy, sight and hearing impairment as well as learning and psychological difficulties. …”
Libro electrónico -
4952Publicado 2011“…Unprotected anal intercourse is the biggest risk factor for HIV infection among men who have sex with men. …”
Libro electrónico -
4953Publicado 2024“…Today, cyberattacks can place entire organizations at risk. Cybersecurity can no longer be delegated to specialists: Success requires everyone to work together, from leaders on down. …”
Libro electrónico -
4954Publicado 2024“…We delve into practical methods for reducing risk, empowering teams, and promoting a culture of continuous improvement. …”
Grabación no musical -
4955por Canadian Agency for Drugs and Technologies in Health“…Since patients with open-angle glaucoma (OAG) require lifetime therapy, they are at greater risk of ocular surface disease (OSD), which is associated with the long-term use of topical ophthalmic antiglaucoma medications. …”
Publicado 2018
Libro electrónico -
4956
-
4957Publicado 2007“…Part IV discusses additive and multiplicative utilities, risk preferences, and 'option pricing' methods. Part V discusses risk analysis. …”
Sumario
Libro -
4958Publicado 2010“…Finally, it addresses the issue of how the educational ambition of acting in the children’s best interests is connected with the phenomenon of children at risk --…”
Sumario
Libro -
4959por Goodman, Robert, MRCPsychTabla de Contenidos: “…Specific disorders and presentations -- pt. 3. Risk factors -- pt. 4. Treatment and services…”
Publicado 2012
Libro electrónico -
4960por Dizon, Don S.Tabla de Contenidos: “…The basics -- Risk factors, diagnosis, and staging -- Treatment of ovarian cancer -- Coping with treatment and side effects -- Relapse -- If treatment fails -- Prevention, screening, and advocacy…”
Publicado 2004
Table of contents
Libro