Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
8241Publicado 2019“…Pete Hodgson and Patricio Echagüe demonstrate how feature flags help modern product delivery teams reduce risk by decoupling code deployment from feature release. …”
Libro electrónico -
8242por Wallace, Walter L.“…This is the complete executive's guide to driving sustainable competitive advantage and mitigating risk in today's complex supply networks. Two of the field's leading consultants show senior managers how to apply advanced strategic sourcing to significantly improve your supply chain's efficiency, effectiveness, and sustainability. …”
Publicado 2015
Libro electrónico -
8243Publicado 1993“…Using transactions as a unifying conceptual framework, the authors show how to build high-performance distributed systems and high-availability applications with finite budgets and risk. The authors provide detailed explanations of why various problems occur as well as practical, usable techniques for their solution. …”
Libro electrónico -
8244Publicado 2015“…Building a Private Cloud Using Microsoft System Center 2012 R2 LiveLessons is for IT Pros and organizations that want the power and flexibility of a multi-tenant cloud, but do not want to risk placing sensitive data in a public cloud. This video teaches you how to build a private cloud from scratch, using Microsoft Windows Server, System Center Virtual Machine Manager, and Hyper-V technologies. …”
-
8245Publicado 2014“…Conventional topographic databases, obtained by capture on aerial or spatial images provide a simplified 3D modeling of our urban environment, answering the needs of numerous applications (development, risk prevention, mobility management, etc.). However, when we have to represent and analyze more complex sites (monuments, civil engineering works, archeological sites, etc.), these models no longer suffice and other acquisition and processing means have to be implemented. …”
Libro electrónico -
8246Publicado 2015“…This year’s conference covered two-dozen topics, including: Continuous delivery and ubiquitous delivery DevOps in the enterprise Instrumentation, monitoring, and automation Microservices Managing risk and complexity Building the infrastructure of the IoT Human-machine cooperation Docker and CoreOS Software Defined Networking / network abstraction User experience optimization…”
-
8247Publicado 2015“…Drawing on extensive personal experience, Roudias also emphasizes the importance of project risk management, monitoring, and evaluation systems – and demonstrates how to use them to make timely and informed decisions at every stage of your project. …”
Libro electrónico -
8248Publicado 2017“…Contain different methods to manage risk and explore trading using Machine Learning. …”
Libro electrónico -
8249Publicado 2015“…Through the use of topic-focused instructional videos, you will gain an in-depth understanding of the new April 2015 revised CBK and CISSP exam as well as a deeper understanding of security, allowing you to master the key foundational principles for securing a network and managing risk. Description CISSP Complete Video Course contains 24 hours of training with content divided into 9 lessons with 94 video sub-lessons. …”
-
8250Publicado 2019“…Veteran security experts Omar Santos, Nick Garner, and Bo Rothwell provide a thorough foundation through demos and best practices for security risk analysis, as well as hacking tools and methods. …”
-
8251Publicado 2023“…Coverage of all of the exam topics in the book means you'll be ready for: security and risk management; asset security; security architecture and engineering; communication and network security; identity and access management (IAM); security assessment and testing; security operations; and software development security…”
Grabación no musical -
8252Publicado 2023“…The hardest part of leadership is mastering the inevitable high-risk, high-stakes challenges you will face. Whether you're making a split-second decision when your business is knocked sideways or you're finding the best strategy to navigate business-critical long-term circumstances, how can you be in peak form in those most crucial moments? …”
Grabación no musical -
8253Publicado 2021“…When you're ready to create your own game plan for trading currencies, you'll be able to build it around your investment objectives, experience level, and risk appetite. You'll also find details on the latest trends in currency trading, including currency ETFs, cryptocurrencies, and currency options. …”
Libro electrónico -
8254por Organisation for Economic Co-operation and Development.“…This report draws upon emerging monitoring and evaluation practices across developed and developing countries to identify four tools that countries can draw upon in their own assessment frameworks: 1) climate change risk and vulnerability assessments, 2) indicators to monitor progress on adaptation priorities, 3) project and programme evaluations to identify effective adaptation approaches, and 4) national audits and climate expenditure reviews. …”
Publicado 2015
Libro electrónico -
8255por Ahrend, Rudiger“…Stricter information disclosure rules or capital requirements, and strong supervisory authorities have also reduced countries' financial crisis risk…”
Publicado 2012
Capítulo de libro electrónico -
8256por International Transport Forum.“…Policy makers need to justify expenditure on road safety in terms of effectiveness, competing for the scarce resources available. The risk of making poor decisions and the cost of making better decisions can be reduced by the use of reliable studies on how effective safety measures are, based on Crash Modification Functions (CMFs). …”
Publicado 2012
Libro electrónico -
8257Publicado 2014“…As the group gains momentum, the leaders must recognize clinical signposts, strike a supportive balance of maintaining safety and encouraging risk, manage collective transitions and conflicts, and take their own professional risks to intervene appropriately and build self-confidence. …”
Video -
8258Publicado 2023“…The Technical-Business Equilibrium reveals practical strategies for assessing technical feasibility and risk, selecting the best solutions to meet your company's goals, and communicating those decisions to business stakeholders…”
Libro electrónico -
8259Publicado 2018“…In this ebook, April C. Wright—security risk and compliance program advisor for a Fortune 15 company—teaches InfoSec professionals how to promote security as an integral part of an organization’s software development life cycle (SDLC). …”
Libro electrónico -
8260Publicado 2019“…Macs, like all machines, are prone to break down eventually—in either a physical sense (a component going bad) or a logical sense (files becoming corrupted, apps misbehaving). You can reduce the risk of such problems, and minimize the damage when they do occur, with a regular maintenance regimen. …”
Libro electrónico