Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
8261Publicado 2017“…Assess your IT incident response with the PROCESS programmatic evaluation tool Get an overview of the IMS all-hazard, all-risk framework Understand the responsibilities of the Incident Commander Form a unified command structure for events that affect multiple business units Systematically evaluate what broke and how the incident team responded…”
Libro electrónico -
8262Publicado 2017“…Over 50+ hands-on recipes to help you pen test networks using Python, discover vulnerabilities, and find a recovery path About This Book Learn to detect and avoid various types of attack that put system privacy at risk Enhance your knowledge of wireless application concepts and information gathering through practical recipes Learn a pragmatic way to penetration-test using Python, build efficient code, and save time Who This Book Is For If you are a developer with prior knowledge of using Python for penetration testing and if you want an overview of scripting tasks to consider while penetration testing, this book will give you a lot of useful code for your toolkit. …”
Libro electrónico -
8263Publicado 2005“…You can build new systems with less risk, higher quality, and improve data access. Best of all, you can learn how to integrate new applications that support your key business objectives. …”
Libro electrónico -
8264por Kroll, Per“…With the help of this book's practical advice and insight, software practitioners will learn how to tackle challenging development projects--small and large--using an iterative and risk-driven development approach with a proven track record. …”
Publicado 2003
Libro electrónico -
8265Publicado 2015“…Evidence suggests that disruption of the circadian rhythms (or desynchronization) is a significant risk factor for the development of metabolic diseases, cardiovascular diseases, cancer and sleep disorders. …”
Libro electrónico -
8266Publicado 2014“…Cowritten by leading information security experts, this authoritative guide fully addresses the skills required for securing a network and managing risk. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. …”
Libro electrónico -
8267Publicado 2014“…A big challenge in writing web applications today is the intense pressure to go for the short term win: you quickly pull something together that looks good, launch, and move on. But the risk is that now you're locked in — making major changes over the lifetime of the code base requires radical surgery, or sometimes just starting over. …”
-
8268Publicado 2019“…Its purpose was to shorten detention times of ships and cargo in quarantine stations, to minimize the risk of importing infectious diseases, such as yellow fever and plague, and to establish universally applicable standards of hygiene in maritime trade. …”
Libro electrónico -
8269Publicado 2016“…Discover how Agile helps you deliver value early, respond to change and manage risk. Master the secrets of accurate estimation. …”
-
8270Publicado 2023“…We blame algorithms, intent on selling us more of the same, and on a media industry too greedy to risk investing in intellectually challenging, radically new, products. …”
Libro electrónico -
8271por Liska, Allan“…Symantec security engineer and former UUNet network architect Allan Liska addresses every facet of network security, from risk profiling through access control, Web/email security through day-to-day monitoring. …”
Publicado 2003
Libro electrónico -
8272Publicado 2005“…Understand the total cost of ownership and return on investment for network security solutions Understand what motivates hackers and how to classify threats Learn how to recognize common vulnerabilities and common types of attacks Examine modern day security systems, devices, and mitigation techniques Integrate policies and personnel with security equipment to effectively lessen security risks Analyze the greater implications of security breaches facing corporations and executives today Understand the governance aspects of network security to help implement a climate of change throughout your organization Learn how to qualify your organization’s aversion to risk Quantify the hard costs of attacks versus the cost of security technology investment to determine ROI Learn the essential elements of security policy development and how to continually assess security needs and vulnerabilities The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization’s risks and objectively quantify both costs and cost savings related to network security technology investments. …”
Libro electrónico -
8273Publicado 2005“…Gain important new insights into managing teams, mitigating risk, promoting corporate ethics, and much more…”
Libro electrónico -
8274Publicado 2001“…Applying Use Cases, Second Edition, walks you through the software development process, demonstrating how use cases apply to project inception, requirements and risk analysis, system architecture, scheduling, review and testing, and documentation. …”
Libro electrónico -
8275por Billingsley, Randall S.“…Arbitrage is central both to corporate risk management and to a wide range of investment strategies. …”
Publicado 2006
Libro electrónico -
8276por McClure, Stuart“…Organizations using Web-based business applications are increasingly at risk. Web Hacking: Attacks and Defense is a powerful guide to the latest information on Web attacks and defense. …”
Publicado 2002
Libro electrónico -
8277Publicado 2007“…After teaching how to understand the character of the market, Appel offers tried-and-true strategies that will help you make high-return, low-risk investments using mutual funds, exchange-traded funds (ETFs) and real investment trusts. …”
Libro electrónico -
8278Publicado 2009“…Today, if you own a Windows computer you need to understand the risks and the potential damage security threats pose. …”
Libro electrónico -
8279por Cohen, Guy“…In Volatile Markets Made Easy: Trading Stocks and Options for Increased Profits , investing expert Guy Cohen teaches you how to earn big returns by systematically cherry picking the best trades while minimizing risk, and execute a simple trading plan that leverages your profits in volatile markets. …”
Publicado 2009
Libro electrónico -
8280por Keyes, Jessica, 1950-“…Discussing the spectrum of social media and social activities available to business today, it explains the functions of social networking in a business context, shows how to measure and manage social networking, details the utility and role of social networking on a department specific basis, and considers security, risk, legal, and privacy issues"--…”
Publicado 2013
Libro electrónico