Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
8061por Gates, Bill, 1955-Tabla de Contenidos: “…-- Create a paperless office -- Commerce: the Internet changes everything -- Ride the inflection rocket -- The Middleman must add value -- Touch your customers -- Adopt the web lifestyle -- Change the boundaries of business -- Get to market first -- Manage knowledge to improve strategic thought -- Bad news must travel fast -- Convert bad news to good -- Know your numbers -- Shift people into thinking work -- Raise your corporate IQ -- Big wins require big risks -- Bring insight to business operations -- Develop processes that empower people -- Information technology enables reengineering -- Treat it as a strategic resource -- Special enterprises -- No health care system is an island -- Take government to the people -- When reflex is a matter of life and death -- Create connected learning communities -- Expect the unexpected -- Prepare for the digital future…”
Publicado 1999
Biblioteca de la Universidad de Navarra (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada)Libro -
8062por Turner, Jonathan E., 1969-Tabla de Contenidos: “…-- Evolution of AML Controls -- Adjusting to Rapidly Increasing Scale -- A Highly Flexible Methodology Results in Processes that Are Difficult to Stop -- AML Is a Process, Not a Destination -- All Countries' Regulatory Programs Are Not Equal -- Technology and Offshore Havens Intersect -- The Cost vs. the Benefit -- Consider the Pace of Change and Progress -- Conclusion -- ch. 6 Discovery and Prevention -- Early Warning Is Essential to AML -- Proactive Means Active -- By the Numbers -- Paradigm Shift -- Testing Your Own AML Systems -- Expanding the Business Comparison -- The Regulatory Framework -- High-Risk Areas -- Money Laundering Meets Terror Financing -- Hiding in Plain Sight -- Criminalizing the Concealment Activities -- Creating Financial Fronts -- Keeping the Money Moving -- Keeping the Tax Man Happy -- Conclusion -- ch. 7 Terror Financing -- Terrorists Use Money Laundering Techniques -- Similarities and Distinctions -- Application of the Methodology to Terror Financing -- Global Impact of Financial Crimes -- Alternative Laundering Mechanisms -- Regulatory Responses -- Conclusion -- ch. 8 Identifying Risk Exposures -- AML Exposures: Assessing Financial Institution Risk -- Language, Culture, and Ethnicity -- The Legal Landscape -- Geography: Distance Matters -- The Goal of the Launderer Is to Hide -- The United States Takes a Different Approach -- Laundering Groups Seek to Evade Detection -- A Fractured Enforcement and Regulatory Picture -- The Regulatory Position on Cyber Risks -- Simple Fraud, Still Successful -- Conclusion -- ch. 9 Investigating Money Movement -- Money Laundering Is Now Transnational Organized Crime -- Succeeding in the Investigative Process -- Government Access to Information -- Mining Data for Money Laundering -- Some Products Help the Perpetrators -- Investigating Virtual Payment Technologies -- Looking to the Future Investigative Issues -- Putting an Investigative Plan in Motion -- People Are Essential to Proof -- Finding Money Laundering Abroad -- Money Laundering Exposure during the Financial Industry Consolidation -- Conclusion -- ch. 10 Reporting and Recovery -- Reporting to Law Enforcement -- Honest People Act Differently -- Anticipating Challenges with Cyber Recoveries -- Building Appropriate Controls into Online Payment Systems -- Global Coordination on Future Issues -- Weighing Access vs. …”
Publicado 2011
Libro electrónico -
8063Publicado 2021Tabla de Contenidos: “…The Integrative Approach to Assessing and Managing Risk -- 6.1 Reconciling Social Value and Equal Concern…”
Libro electrónico -
8064Publicado 2016Tabla de Contenidos: “…9.3.1 Domain Specification -- 9.3.1.1 Establishing the Context and Risk Identification -- 9.3.1.2 Risk Analysis: Likelihoods and Consequences of Energy Security Risks -- 9.3.1.3 Likelihoods of Energy Security Risks -- 9.3.1.4 Consequences of Energy Security Risks -- 9.3.1.5 Risk Evaluation: Strategies to Enhance Energy Security -- 9.3.1.6 Risk Treatment and Coherence With Other Energy Policy Objectives -- 9.4 GOVERNANCE OF SYSTEMIC RISKS -- 9.4.1 Different Modes Have Different Temporalities -- 9.4.2 Different Modes Have Different Spatial Jurisdictions -- 9.4.3 Focus on Services Helps -- 9.5 CONCLUSION -- REFERENCES -- 10 - Towards a Low-Carbon, Citizens-Driven Europe's Energy Security Agenda -- 10.1 REFRAMING THE DOMINANT DISCOURSE ON ENERGY SECURITY IN EUROPE -- 10.2 THE RISE OF THE HUMAN FACTOR -- 10.3 SOME MAJOR RECOMMENDATIONS FOR IMPROVING EUROPEAN ENERGY POLICIES -- ACKNOWLEDGEMENTS -- REFERENCES -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- K -- L -- M -- N -- O -- P -- R -- S -- T -- U -- V -- W -- Back Cover…”
Libro electrónico -
8065Publicado 2018Tabla de Contenidos: “…9.4.3 Writing rules -- 9.4.4 Using predefined rule-sets -- 9.5 Finding intrusions in system-call audit logs -- 9.5.1 The execution vulnerability -- 9.5.2 Catching fraudulent executions -- 9.5.3 Monitoring the filesystem -- 9.5.4 Monitoring the impossible -- 9.6 Trusting humans to detect anomalies -- Summary -- Chapter 10: The Caribbean breach: a case study in incident response -- 10.1 The Caribbean breach -- 10.2 Identification -- 10.3 Containment -- 10.4 Eradication -- 10.4.1 Capturing digital forensics artifacts in AWS -- 10.4.2 Outbound IDS filtering -- 10.4.3 Hunting IOCs with MIG -- 10.5 Recovery -- 10.6 Lessons learned and the benefits of preparation -- Summary -- Part 3: Maturing DevOps security -- Chapter 11: Assessing risks -- 11.1 What is risk management? -- 11.2 The CIA triad -- 11.2.1 Confidentiality -- 11.2.2 Integrity -- 11.2.3 Availability -- 11.3 Establishing the top threats to an organization -- 11.4 Quantifying the impact of risks -- 11.4.1 Finances -- 11.4.2 Reputation -- 11.4.3 Productivity -- 11.5 Identifying threats and measuring vulnerability -- 11.5.1 The STRIDE threat-modeling framework -- 11.5.2 The DREAD threat-modeling framework -- 11.6 Rapid risk assessment -- 11.6.1 Gathering information -- 11.6.2 Establishing a data dictionary -- 11.6.3 Identifying and measuring risks -- 11.6.4 Making recommendations -- 11.7 Recording and tracking risks -- 11.7.1 Accepting, rejecting, and delegating risks -- 11.7.2 Revisiting risks regularly -- Summary -- Chapter 12: Testing security -- 12.1 Maintaining security visibility -- 12.2 Auditing internal applications and services -- 12.2.1 Web-application scanners -- 12.2.2 Fuzzing -- 12.2.3 Static code analysis -- 12.2.4 Auditing Cloud Infrastructure -- 12.3 Red teams and external pen testing -- 12.4 Bug bounty programs -- Summary -- Chapter 13: Continuous security…”
Libro electrónico -
8066por Bok, KennethTabla de Contenidos: “…Chapter 3 Activities and Applications -- 3.1 Trading / DEXs -- 3.1.1 Automated Market Makers (AMMs) -- 3.1.2 Aggregators -- 3.2 Overcollateralized Lending / Borrowing -- 3.3 Governance / DAOs -- 3.4 Undercollateralized Lending -- 3.4.1 Uncollateralized Lending to Real-world Borrowers -- 3.4.2 Uncollateralized Lending to Crypto Institutions -- 3.4.3 Real World Assets -- 3.4.4 Centrifuge -- 3.4.5 MakerDAO and RWA -- 3.4.6 SocGen Pilots and MakerDAO Collaboration -- 3.4.7 Smart Bonds -- 3.4.8 Credit Scoring -- 3.5 Investing -- 3.5.1 Index Products - Spot -- 3.5.2 Index Products - Perpetual Futures -- 3.5.3 Dashboards -- 3.6 Payments -- 3.6.1 Crypto Payment Gateways -- 3.6.2 Big Payments and Crypto -- 3.6.3 Crypto Debit / Credit Cards -- 3.6.4 On-off Ramps -- 3.6.5 Solana Pay and Circle -- 3.6.6 Bitcoin Payments -- 3.7 Insurance -- 3.8 Prediction Markets -- 3.9 Chapter Summary -- Notes -- Chapter 4 Risks and Mitigation -- 4.1 Types of Losses -- 4.2 Basic Terminology -- 4.3 Endogenous DeFi Risks -- 4.3.1 Smart Contract Risks: Code Exploit Example: The DAO Hack -- 4.3.2 Economic Exploit Example: Mango Markets -- 4.3.3 Operational Exploit Example: Ronin Bridge Hack -- 4.3.4 CeFi Contagion / Systemic Risk -- 4.4 Exogenous DeFi Risks -- 4.4.1 Financial Stability -- 4.4.2 Pronounced Risks in Developing Countries -- 4.4.3 Banking-to-Crypto Concentration Risks -- 4.4.4 Stablecoins -- 4.4.5 Market Integrity -- 4.4.6 Frontrunning -- 4.4.7 Market Manipulation -- 4.4.8 Money Laundering, Funding of Illicit Activity and Terrorism -- 4.4.9 Consumer Protection -- 4.4.10 Disclosure, or the Lack Thereof -- 4.4.11 Data Protection -- 4.5 Chapter Summary -- Notes -- Chapter 5 Regulation -- 5.1 Introduction -- 5.2 Global Nature of Crypto and DeFi -- 5.2.1 How this Chapter Is Organized -- 5.3 What Regulators Want -- 5.4 Are Tokens Securities? …”
Publicado 2023
Libro electrónico -
8067Publicado 2024Tabla de Contenidos: “…4.4 Benefits of a Standard Methodology -- 4.5 Critical Components -- 4.6 Valmet Customer Project Management -- Introduction to Valmet and Valmet's Project Management -- Valmet PEM -- Conclusion -- 4.7 Project Quality Gates-Structured Approach to Ensure Project Success -- SAP Activate Methodology -- 4.8 Técnicas Reunidas -- Open Book Estimate as a Successful Contract Alternative to Execute Projects in the Oil and Gas Sector -- Cost Estimate Methodology -- 4.9 Sony Corporation and Earned Value Management -- Further Reading -- 4.10 Project Management Tools and Socialized Project Management -- 4.11 Artificial Intelligence and Project Management -- 4.12 Life-Cycle Phases -- 4.13 Expanding Life-Cycle Phases -- 4.14 Churchill Downs Incorporated -- 4.15 Indra: The Need for a Methodology -- 4.16 Implementing the Methodology -- 4.17 Implementation Blunders -- 4.18 Overcoming Development and Implementation Barriers -- 4.19 Wärtsilä: Recognizing the Need for Supporting Tools -- Excellent Project Management-A Prerequisite to Customer Satisfaction -- 4.20 General Motors Powertrain Group -- 4.21 Indra: Closing the Project -- 4.22 When Traditional Methodologies May Not Work -- Insights about Recovering Troubled Projects and Programs -- 5 Integrated Processes -- 5.0 Introduction -- 5.1 Understanding Integrated Management Processes -- 5.2 Evolution of Complementary Project Management Processes -- 5.3 Total Quality Management -- Total Quality Management -- Risk/Opportunity Management Using Six Sigma Tools and Probabilistic Models -- 5.4 Concurrent Engineering -- 5.5 Risk Management -- 5.6 Wärtsilä: The Need for Proactive Risk Management -- Proactive Project Risk Management in Wärtsilä Power Plant Projects -- 5.7 Indra: When a Risk Becomes Reality (Issue Management) -- 5.8 The Failure of Risk Management -- 5.9 Defining Maturity Using Risk Management…”
Libro electrónico -
8068por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Housing market developments continue to diverge; Economic prospects and risks…”
Publicado 2014
Libro electrónico -
8069Publicado 2014Tabla de Contenidos: “…Consider Off-the-Shelf Solutions Over High-Risk New Development when Possible…”
Libro electrónico -
8070Publicado 2023Tabla de Contenidos: “…8.4 From Biological Superorganism to Stigmergic Society -- 8.5 Biologization: Exiting the Anthropocene and Entering the Symbiocene -- References -- Chapter 9 Metahuman: Unleashing the Infinite Potential of Humans -- 9.1 Becoming Human: The Biological Uniqueness of Humans -- 9.2 Implications of Biological Human Uniqueness for Metaverse -- 9.3 MetaHuman Creator: Building a More Realistic Virtual World -- 9.4 The Case Against Reality: Why Evolution Hid the Truth from Our Eyes -- 9.5 Simulated Reality: The Simulation Hypothesis -- 9.6 Metareality and Metahuman -- References -- Chapter 10 Opportunities vs. Risks -- 10.1 The "New New Normal" and Upcoming T Junction -- 10.2 Opportunities -- 10.3 Risks -- 10.4 Team Human: From Communications to Communitas -- References -- Chapter 11 Conclusion and Outlook -- 11.1 Today's Life in "Parallel Universes" -- 11.2 The Road Ahead to the Future Multiverse: 6G, Next G, and the Metaverse -- 11.3 Age of Discovery: Navigating the Risks and Rewards of Our New Renaissance -- References -- Epilogue -- Index -- THE COMSOC GUIDES TO COMMUNICATIONS TECHNOLOGIES -- EULA…”
Libro electrónico -
8071por Sy, Dux RaymondTabla de Contenidos: “…Project Tracking; Tracking Project Tasks; Tracking Risks; Workshop 6.1: Updating the Schedule and Tracking Risks…”
Publicado 2012
Libro electrónico -
8072por OECDTabla de Contenidos: “…Links to supporting material (accessed on 26 May 2023) -- 6 Verification and compliance management -- Introduction -- Compliance risk management -- Increasing availability of data -- Sharpened targeting of risks -- Data science -- Taxpayer programmes -- Planning for future risks -- Delivery of compliance actions -- Electronic compliance checks -- Audits -- Moving audit work to a virtual environment -- Tax crime investigations -- References -- Annex 6.A. …”
Publicado 2023
Libro electrónico -
8073por OECDTabla de Contenidos: “…General Assessment of the Macroeconomic Situation -- Introduction -- Recent developments -- The outlook is for a significant but uneven recovery -- The global recovery is projected to strengthen as vaccination deployment becomes widespread -- Inflation is expected to increase temporarily but the longer-term outlook remains uncertain, with upside risks -- Trade prospects are improving, but imbalances may widen -- The outlook is subject to upside and downside risks -- Significant uncertainty remains about the pace of vaccine deployment and the evolution of the virus -- Excess saving poses upside risks to household consumption -- Companies have resisted well, but performance has varied across sectors and company sizes -- Pandemic-related risks are still high in some emerging-market economies -- Policy requirements -- The pace of vaccine production and deployment needs to be accelerated -- Monetary policy -- Fiscal policy -- Structural reforms are needed to improve resilience, facilitate reallocation and strengthen growth prospects -- Bibliography -- Annex 1.A. …”
Publicado 2021
Libro electrónico -
8074Publicado 2022Tabla de Contenidos: “…Incidents -- Understand the Risk Management Process -- Risk Visibility and Reporting -- Risk Management Concepts -- Risk Management Frameworks -- Risk Treatment -- Perform Security Assessment Activities -- Security Assessment Workflow Management -- Participate in Security Testing -- Interpretation and Reporting of Scanning and Testing Results -- Remediation Validation -- Audit Finding Remediation -- Manage the Architectures: Asset Management and Configuration Control -- Operate and Maintain Monitoring Systems -- Events of Interest -- Logging -- Source Systems -- Legal and Regulatory Concerns -- Analyze Monitoring Results -- Security Baselines and Anomalies -- Visualizations, Metrics, and Trends…”
Libro electrónico -
8075Publicado 2024Tabla de Contenidos: “…Example 1 - Hyper-personalized campaigns by a fashion e-commerce platform -- Example 2 - Optimized patient outreach by a healthcare provider network -- Example 3 - Market expansion strategy for a SaaS company -- Summary -- Questions -- Answers -- Chapter 6: Financial Analytics with Dynamics 365 AI -- Enhanced financial forecasting and budgeting with AI -- Technical sophistication in predictive analytics -- Automation in budgeting processes -- Dynamic and adaptive financial planning -- Scenario planning and risk assessment -- Business impacts and considerations -- Enhanced fraud detection and prevention using advanced analytics with Dynamics 365 AI -- Employing a multifaceted analytical approach for detection -- Machine learning for dynamic and adaptive fraud detection -- Seamless integration with organizational data systems -- Real-time detection and automated intervention -- Navigating ethical terrain and ensuring compliance -- Revolutionizing risk assessment and mitigation strategies -- Enhanced risk identification through deep data analysis -- Detailed risk analysis and quantification -- Strategic mitigation with AI insights -- Adaptive monitoring for ongoing risk management -- Ethical and regulatory adherence in AI-driven risk management -- Dynamics 365 AI - transforming financial operations -- Case study 1 - forecasting accuracy in a multinational corporation -- Case study 2 - banking on AI to combat fraud -- Case study 3 - risk management reinvented for an investment firm -- Summary -- Questions -- Answers -- Part 3: Advanced Applications and Future Directions -- Chapter 7: Leveraging Generative AI in Dynamics 365 -- The mechanism behind generative AI - An in-depth technical exploration -- Advanced neural networks in GANs -- Training dynamics and computational aspects -- Generative AI in text and language processing…”
Libro electrónico -
8076por OECDTabla de Contenidos: “…Intro -- Acknowledgements -- Editorial Confronting the Crisis -- Policies for a stronger recovery -- Summing up -- 1 General assessment of the macroeconomic situation -- Introduction -- Growth is slowing and financial conditions have tightened -- Global growth has lost momentum amidst high inflation -- Trade growth held up in the first half of 2022, but recent indicators have weakened -- Financial market conditions have tightened significantly -- Global growth is projected to weaken further with inflation slowing gradually -- Key risks and vulnerabilities -- The impact of lower energy imports to Europe from Russia could prove more severe than expected -- Monetary policy tightening highlights pre-existing financial vulnerabilities -- Rising private sector debt-service burdens and lower bond market liquidity are keys risks in the advanced economies -- Financial vulnerabilities in emerging-market economies are exacerbated by external spillovers -- Calibrating monetary policy responses will be challenging -- Reduced uncertainty and lower commodity prices are upside risks -- Policy requirements -- Further monetary policy tightening is necessary in most countries -- Targeted fiscal policy support is needed -- Inflationary pressures and stretched budgets limit the scope for policy support in emerging-market economies -- Structural policy efforts need to be enhanced -- Bibliography -- Annex 1.A. …”
Publicado 2022
Libro electrónico -
8077Publicado 2018Tabla de Contenidos: “…e / Project Portfolio Risk Identification and Analysis, Considering Project Risk Interactions and Using Bayesian Networks, Reprinted from: Sustainability 2018, 10, 1609, doi: 10.3390/su10051609 -- Sangsomboon Ploywarin, Yan Song and Dian Sun / Research on Factors Affecting Public Risk Perception of Thai High-Speed Railway Projects Based on "Belt and Road Initiative", Reprinted from: Sustainability 2018, 10, 1978, doi: 10.3390/su10061978 -- Dalya Ismael and Tripp Shealy / Sustainable Construction Risk Perceptions in the Kuwaiti Construction Industry, Reprinted from: Sustainability 2018, 10, 1854, doi: 10.3390/su10061854…”
Libro electrónico -
8078Publicado 2013Tabla de Contenidos: “…Front Cover; Contents; Preface; About the Author; Chapter 1 - The BYOD Revolution; Chapter 2 - Making a Financial Case for BYOD; Chapter 3 - Integrating BYOD into Performance Measurement and Management Systems; Chapter 4 - Assessment and Mitigation of Risks in a BYOD Environment; Chapter 5 - Guidelines for Managing and Securing Mobile Devices in the Enterprise; Chapter 6 - Cloud Best Practices; Chapter 7 - Configuration Management in a BYOD Environment; Chapter 8 - Content Management, Mobile and Otherwise; Chapter 9 - Integrating BYOD into Resource Management…”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
8079por Mériaux, PatriceTabla de Contenidos: “…FOREWORD -- 1 NATURE, FUNCTIONS AND COMPOSITION OF DIKES -- 1.1 Overview of existing structures in France -- 1.2 How dike systems work (dikes and spillways) -- 1.3 Composition of dikes -- 2 CLASSIFICATION OF MALFUNCTIONS AND FAILURE MECHANISMS -- 2.1 Overtopping -- 2.2 External erosion and scouring -- 2.3 Internal erosion (or piping) -- 2.4 Generalised slope failure -- 3 VISUAL INSPECTION OF DIKES: INITIAL INSPECTION AND ROUTINE SURVEILLANCE -- 3.1 Justification for, principles and frequency of visual inspections -- 3.2 Operating conditions and procedure -- 3.3 Fill dikes -- 3.4 Masonry and concrete walls -- 3.5 Spillways -- 3.6 Particular structures and features -- 4 SURVEILLANCE DURING FLOODING -- 4.1 Importance of preparation (flood alert plan and/or action plan) -- 4.2 Visual surveillance during flooding -- 4.3 Post-flood visual surveillance -- 5 DIKE MAINTENANCE -- 5.1 General principles and resources -- 5.2 Vegetation control -- 5.3 Burrowing animals -- 5.4 Slope protection and walls -- 5.5 Toe protective works -- 6 THE BASIC PRINCIPLES OF DIKE DIAGNOSIS -- 6.1 Identifying failure risks and adapting the diagnosis -- 6.2 Historical research -- 6.3 Topography -- 6.4 Visual inspection -- 6.5 Hydrological and hydraulic survey -- 6.6 External erosion and scouring: the geomorphological approach -- 6.7 Geotechnical diagnosis -- 6.8 Numerical modelling -- 6.9 Evaluation of vulnerability -- 6.10 Prioritisation of risks -- 6.11 Solutions for upgrading dikes -- 6.12 Assistance for the owner/director of works -- BASIC TERMINOLOGY -- Photographic records (corresponding to Chapters 1-6) -- APPENDICES -- Appendix 1: Basic principles of soil mechanics -- Appendix 2: Basic principles of soil hydraulics -- Appendix 3: Surveillance dossier for "dry" dikes " How to perform a visual inspection of a fill dike: Initial inspection and routine surveillance -- Appendix 4: Presentation of an example of post-flood inspection and initial emergency repairs: visual inspection of the Agly dikes -- Appendix 5: Annotated digest of the main French regulations concerning flood protection dikes…”
Publicado 2007
Libro electrónico -
8080por Organisation for Economic Co-operation and Development.Tabla de Contenidos: “…. -- (ii) Assets used -- (iii) Risks assumed -- (iv) Conclusion -- C-2. Second step: Determining the profits of the hypothesised distinct and separate enterprise based upon a comparability analysis -- (i) Introduction -- (ii) Recognition of dealings -- (iii) Applying transfer pricing methods to attribute profit -- (iv) Comparability analysis -- D. …”
Publicado 2001
Libro electrónico