Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
5141por Hull, John, 1946-Tabla de Contenidos: “…Basic Numerical Procedures -- 22. Value at Risk -- 23. Estimating Volatilities and Correlations for Risk Management -- 24. …”
Publicado 2018
Libro electrónico -
5142por Le Coze, Jean-ChristopheTabla de Contenidos: “…The digitalisation of risk assessment: Fulfilling the promises of prediction? …”
Publicado 2023
Libro electrónico -
5143por Brotby, W. KragTabla de Contenidos: “…Information Security Governance Metrics; Chapter 11. Information Security Risk Management; Chapter 12. Information Security Program Development Metrics…”
Publicado 2009
Libro electrónico -
5144por Fisher, Kenneth L.Tabla de Contenidos: “…; Covered calls ... gotcha covered ; Dollar cost averaging : lower risk, better returns ; Variable annuities are all upside, no downside ; Equity-indexed annuities : better than normal annuities ; Passive investing is easy ; Do better with mutual funds by sending your spouse on a shopping spree ; Beta measures risk ; Equity risk premiums : forecasting future returns with ease ; When the VIX is high, it's time to buy ; Be confident on consumer confidence ; All hail the mighty Dow! …”
Publicado 2011
Libro electrónico -
5145Publicado 2020Tabla de Contenidos: “…Chapter 1: General Security Concepts and Trends -- Chapter 2: Network Fundamentals Infrastructure Security -- Chapter 3: Wireless and Intrusion Detection System Network Security -- Chapter 4: Role of People in Security—Operational and Organizational Security -- Chapter 5: Risk Management -- Chapter 6: Change Management and Disaster Recovery -- Chapter 7: Physical Security -- Chapter 8: Forensics, Legal Issues, and Privacy -- Chapter 9: Attacks -- Chapter 10: Network Attacks -- Chapter 11: Baseline and Secure Software Development -- Chapter 12: Email, Instant Messaging, and Web Components -- Chapter 13: Authentication and Remote Access -- Chapter 14: Access Control and Privilege Management -- Chapter 15: Cryptography -- Chapter 16: Public Key Infrastructure -- Glossary…”
Libro electrónico -
5146Publicado 2019“…Build a winning portfolio—and reduce your risk—with this bestselling guide Online investing has never been easier—or more potentially confusing. …”
Libro electrónico -
5147Publicado 2014Tabla de Contenidos: “…Chapter 4: Project Initiation and Risk AssessmentOverview; Project initiation; Risk assessment; How to audit project initiation; Conclusion; Chapter 5: Case Study PID & Risk Assessment; Overview; Case Study - extract of Project Initiation Document; Suggested response; Chapter 6: High-level Requirements; Overview; Gathering of requirements; Including controls in requirements; How to audit requirements gathering; Conclusion; Chapter 7: Case Study for High-level Requirements; Overview; Case study extract of requirements; Suggested response; Chapter 8: Building and Testing; Overview; Build phase…”
Libro electrónico -
5148Publicado 2010“…Reducing the rates of illness and death associated with these diseases will require greater awareness and knowledge among health care workers, improved identification of at-risk people, and improved access to medical care. …”
Libro electrónico -
5149Publicado 2022Tabla de Contenidos: “…Table of Contents Designing a Secure Network Architecture Integrating Software Applications into the Enterprise Enterprise Data Security, Including Secure Cloud and Virtualization Solutions Deploying Enterprise Authentication and Authorization Controls Threat and Vulnerability Management Vulnerability Assessment and Penetration Testing Methods and Tools Risk Mitigation Controls Implementing Incident Response and Forensics Procedures Enterprise Mobility and Endpoint Security Controls Security Considerations Impacting Specific Sectors and Operational Technologies Implementing Cryptographic Protocols and Algorithms Implementing Appropriate PKI Solutions, Cryptographic Protocols, and Algorithms for Business Needs Applying Appropriate Risk Strategies Compliance Frameworks, Legal Considerations, and Their Organizational Impact Business Continuity and Disaster Recovery Concepts Mock Exam 1 Mock Exam 2.…”
Libro electrónico -
5150Publicado 2023“…Individuals with HBOC have a high risk for breast and ovarian cancers and a moderate risk for other cancers, such as prostate, pancreatic, melanoma, and fallopian tube cancers. …”
Libro electrónico -
5151por National Academies of Sciences, Engineering, and Medicine (U.S.)Tabla de Contenidos: “…Intro -- TITLE PAGE -- COPYRIGHT PAGE -- TABLE OF CONTENTS -- 1 INTRODUCTION -- Structure of Symposium and Proceedings -- 2 SOCIAL, CULTURAL, AND ECONOMIC DETERMINANTS RELATED TO SUICIDE, PANEL 1 -- Financial Wellbeing as a Social Determinant of Suicide Risk in Veterans -- Setting the Stage: The Significance of Social Determinants of Health -- Overview of Trends in Suicide in High and Rising Mortality Rates Among Working-Age Adults -- Discussion -- 3 SOCIAL, CULTURAL, AND ECONOMIC DETERMINANTS RELATED TO SUICIDE, PANEL 2 -- Veterans in Rural Areas -- Native American/Alaska Native Veterans -- Women Veterans -- Discussion -- 4 SOCIAL, CULTURAL, AND ECONOMIC DETERMINANTS RELATED TO SUICIDE, PANEL 3 -- LGBTQ+ Veterans -- Black American Men and Provider Role Strain -- Discussion -- 5 COMMUNITY INTERVENTIONS FOR SUICIDE PREVENTION AND SUPPORT FOR VETERANS -- Upstream Prevention by Addressing Social Determinants of Health -- Community-Driven Efforts to Prevent Firearm Suicide -- The CDC Technical Package on Suicide Prevention -- Discussion -- 6 COMMUNITY INTERVENTIONS FOR VARIED APPLICATIONS IN HOUSING, HEALTH, AND SAFETY -- Housing and Homelessness -- Using a Collaborative Approach in Suicide Prevention -- Place-Based Interventions -- Discussion -- 7 REPORTS FROM INTERACTIVE SESSION GROUPS -- Older Veterans -- LGBTQ+ Veterans -- Veterans in Rural Communities -- Mental Health -- Black Veterans -- Women Veterans -- 8 DISCUSSION OF INTERACTIVE SESSION REPORTS AND SYNTHESIS OF THE SYMPOSIUM -- Cross-Cutting Themes Across Interactive Sessions -- Synthesis of the Symposium -- REFERENCES -- APPENDIXES -- A Symposium Agenda -- B Biographical Sketches of Planning Committee Members and Presenters…”
Publicado 2022
Libro electrónico -
5152Publicado 2021Tabla de Contenidos: “…Legal risk -- 5. Reputation risk -- 6. Summary comment -- 7. …”
Libro electrónico -
5153Publicado 2022Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Acknowledgments -- About the Author -- About the Contributors -- Introduction -- Part I Building Wealth Through Business Ownership -- Chapter 1 Own Good Businesses -- Business Ownership -- Active versus Passive Investing -- The Pitfalls of Investing -- Characteristics of a Good Business -- Own the Best and Leave the Rest -- Part II The Global Investment Opportunity -- Chapter 2 The GlobalEconomy -- Global Economic Evolution -- The Digital Economy -- Economic Growth Rates -- Wealth Creation -- Effects of Wealth Creation -- Global Scope Provides Flexibility -- Chapter 3 Global Trade -- Advancements in Global Shipping -- Air Freight -- Trends in Global Trade -- Global Trade Routes -- Trade Agreements -- Intergovernmental Organizations -- Supply Chains -- Chapter 4 The Global Financial Markets -- Global Financial Markets -- Global Equity Markets -- Initial Public Offerings -- Financial Market Interaction -- Credit Spreads -- Currency Markets -- Part III Risks of Investing Globally -- Chapter 5 Market Cycle Risk -- Economic Cycles -- Market Cycles -- Market Contagions -- Bear Market Warning Signs -- Bear Market Bottoms -- Managing Cycle Risk -- Chapter 6 Currency Risk -- Currency Market Overview -- Exchange Rate Dynamics -- How Currencies Affect Investment Returns -- Currency Debasement and Crashes -- Managing Currency Risk -- Chapter 7 Geopolitical Risk -- Types of Geopolitical Risk -- Geopolitical Hotspots -- Managing Geopolitical Risk -- Part IV Buying Global Businesses -- Chapter 8 Company Analysis -- Profitability -- Earnings Sustainability -- Balance Sheet Strength -- Growth Prospects -- Investment Risk -- Valuation -- Estimating Share Value -- Summary -- Part V Global Sectors and Industries -- Chapter 9 Communication Services -- Advertising -- Broadband Services…”
Libro electrónico -
5154Publicado 2012Tabla de Contenidos: “…Introduction -- Alternative directions for U.S. defense strategy -- Assessing the advantages and risks of alternative strategic directions -- Force reductions linked to alternative strategic directions -- Appendix: Summary advantages and disadvantages of alternative strategic directions…”
Libro electrónico -
5155por KfW Financial Sector Development SymposiumTabla de Contenidos: “…The Big Picture: Global Trends Affecting Agricultural Finance -- Institutional and Process Innovations in Serving Rural Clients -- Dealing With Risks in Agricultural Finance -- Using Modern Technology for High-Quality Services in Rural Areas…”
Publicado 2014
Libro electrónico -
5156Publicado 2018Tabla de Contenidos: “…Introduction -- Organizing financial data -- Bloomberg -- IHS Markit: big corporate data -- Financial data analysis -- Relative-value analysis -- Portfolio risk analysis -- Market analysis -- Creating reports -- Portfolio reports…”
Libro electrónico -
5157Publicado 2015Tabla de Contenidos: “…Part 1. Plan: threats, risk, and requirement landscape -- Part 2. Do: cloud security approaches and challenges -- Part 3. …”
Libro electrónico -
5158Publicado 1999Tabla de Contenidos: “…VII,A : Guidelines : veterinary medicinal products : general, efficacy, environmental risk assessment / [edited by the] European Commission, Directorate General III-Industry, Pharmaceuticals and cosmetics. - 1999 ed. - Bibliogr. - Indice…”
Libro -
5159Publicado 2024Tabla de Contenidos: “…Cloud Infrastructure and Platform Components -- Physical Environment -- Network and Communications -- VMs -- Storage -- Virtualization -- Management Plane -- Designing a Secure Data Center -- Physical Design -- Choosing a Location -- Buying versus Building -- Environmental Design -- Heating, Ventilation, and Air Conditioning (HVAC) -- Multi-Vendor Pathway Connectivity -- Logical Design -- Tenant Partitioning -- Access Control -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 9: Analyzing Risks -- Overview of Risk Management -- Key Concepts in Risk Management -- Risk Management in Cloud Environments -- IaaS -- PaaS -- SaaS -- Distinction between Cloud Service Models and Deployment Models (Public, Private, Hybrid, and Community) -- Cybersecurity -- Importance of Risk Management in Cloud Computing -- The Outsourcing Model -- Vendor-Lock In -- Data Residency - Processing, Storage, and Transfer Considerations -- Access to Resources -- Resources that are not persistent (ephemeral) -- Risk Identification and Analysis -- Risk Frameworks -- Assessing the CSP's Risk -- SLAs -- Identifying Cloud Security Risks -- Tools and Practices for Identifying Risks in Cloud Environments -- Risk Assessments and Tools -- External Third-Party Assessments -- Analyzing and Assessing Cloud Security Risks -- Qualitative versus Quantitative Risk Analysis Methods -- Tools and Frameworks for Cloud Risk Assessments -- Cloud Attack Surface Area, Vulnerabilities, Threats, and Attack Vectors -- Cloud Attack Surface and Vulnerabilities -- Hypervisor -- Direct Connections from Remote Devices -- Threats, Attack Vectors, and Incident Response (IR) in Cloud -- IR Planning for Cloud Environments -- Risk Response Strategies -- Addressing Cloud Security Risks - Safeguards and Countermeasures -- Data Breaches and Data Loss -- Non-Authorized Access…”
Libro electrónico -
5160Publicado 2013Tabla de Contenidos: “…-- Structure and differences -- Net asset value (NAV) -- Discounts and premiums -- Price and size -- Range and reach -- Chapter 2: Better performance and cheaper fees -- Better performance -- Beware unit trust tables -- The strange case of 'mirror funds' -- The effect of cheaper fees on performance -- Lesson from America -- The TER and more -- Performance fees and Warren Buffett -- Chapter 3: The opportunities and risks of discounts -- Opportunities and risks -- Factors affecting discounts -- How to judge value -- The risks of investment trusts -- Discount control mechanisms -- Chapter 4: Other pros and cons of investment trusts -- Investment trusts are better understood -- Gearing -- Directors and shareholders -- The long term and alternative assets -- Size and marketability -- Dividends -- Capital changes -- Enhanced flexibility -- Chapter 5: Useful investing miscellany -- Directors' and managers' shareholdings -- The report and accounts -- Doing the splits -- ETFs and trackers -- Portfolio turnover -- Different investment styles -- Chapter 6: Deciding investment objectives -- Saving and investing -- Risk tolerances: time and volatility -- Currency considerations -- Income requirements -- Choosing a benchmark -- The route to market -- Chapter 7: Successful investing -- Getting started -- Why it is important to stay invested -- Diversification -- Reinvesting dividends -- Regular rebalancing -- Reaching investment goals -- Chapter 8: Other investment secrets -- Sentiment versus fundamentals -- Keep it simple and cheap -- Multi-manager funds -- Hedge funds -- Structured products -- Ignore forecasts -- The magic of compound interest -- Chapter 9: The Investors Chronicle portfolios…”
Libro electrónico