Mostrando 8,301 - 8,320 Resultados de 13,276 Para Buscar '"Risk"', tiempo de consulta: 0.09s Limitar resultados
  1. 8301
    Publicado 2021
    “…Enable auditable legal and regulatory compliance with defined and agreed-upon data policies Employ better risk management Establish control and maintain visibility into your company’s data assets, providing a competitive advantage Drive top-line revenue and cost savings when developing new products and services Implement your organization’s people, processes, and tools to operationalize data trustworthiness…”
    Libro electrónico
  2. 8302
    Publicado 2021
    “…You will learn how to securely store passwords to reduce the risk of compromise. Biometric authentication—a mechanism that has gained popularity over recent years—is covered, including its strengths and weaknesses. …”
    Libro electrónico
  3. 8303
    Publicado 2013
    “…In MAKE Volume 35, we confront danger within the world of making, and how to be smarter about risk. We examine safe practices for makers, and we look at the illusion of danger vs. real danger, how to use common sense, and how to educate yourself to work more safely and productively. …”
    Libro electrónico
  4. 8304
    Publicado 2020
    “…About This Video Covers specialized data classifications, data encryption methods, AWS security services, and mechanisms you can use to implement them and secure your production environment Make security operations and business-risk trade-off decisions with regards to cost, security, and deployment complexity when given a set of application requirements Covers domains including Incident Response, Logging and Monitoring, Infrastructure Security, Identity and Access Management, and Data Protection In Detail The AWS Certified Security - Specialty certification gives AWS architects not only essential know-how, but also a strong foundation on which to build security into AWS architectures at every level. …”
    Video
  5. 8305
    Publicado 2009
    “…“David Adler’s Snap Judgment is a well-written, entertaining review of human action in risky situations, including stock market behavior and other risk-facing situations. In particular, Adler recounts the conclusions of many practitioners and behavioral finance scholars who have studied such matters. …”
    Libro electrónico
  6. 8306
    Publicado 2012
    “…Learn how hacker attacks work, from start to finish Choose the right security solution for each type of risk Create clear and enforceable security policies, and keep them up to date Establish reliable processes for responding to security advisories Use encryption effectively, and recognize its limitations Secure your network with firewalls, routers, and other devices Prevent attacks aimed at wireless networks No security experience required! …”
    Libro electrónico
  7. 8307
    por CREST
    Publicado 2014
    “…The threat to key systems is ever increasing and the probability of a security weakness being accidentally exposed or maliciously exploited needs to be continually assessed – such as via a penetration test – to ensure that the level of risk is at an acceptable level to the business. A penetration test involves the use of a variety of manual and automated techniques to simulate an attack on an organisation’s information security arrangements – either from malicious outsiders or your own staff. …”
    Libro electrónico
  8. 8308
    Publicado 2013
    “…IBM® InfoSphere® Master Data Management Reference Data Management Hub (InfoSphere MDM Ref DM Hub) is designed as a ready-to-run application that provides the governance, process, security, and audit control for managing reference data as an enterprise standard, resulting in fewer errors, reduced business risk and cost savings. This IBM Redbooks® publication describes where InfoSphere MDM Ref DM Hub fits into information management reference architecture. …”
    Libro electrónico
  9. 8309
    Publicado 2014
    “…The business leader’s guide to using Open Data to analyze patterns and trends, manage risk, solve problems—and seize the competitive edge Two major trends—the exponential growth of digital data and an emerging culture of disclosure and transparency—have converged to create a world where voluminous information about businesses, government, and the population is becoming visible, accessible, and usable. …”
    Libro electrónico
  10. 8310
    Publicado 2022
    “…This book will be of interest to students of critical security studies, anthropology, risk studies, science and technology studies and International Relations. …”
    Libro electrónico
  11. 8311
    Publicado 1982
    Tabla de Contenidos: “…Spectral Characteristics -- Intensity of Tinnitus Maskers/Instruments and Duration of Use -- Damage/Risk Criteria and Tinnitus Maskers/Instruments -- 5 Standardizing Procedures -- MEDICAL EXAMINATION -- AUDIOLOGICAL EXAMINATION -- References and Bibliography -- Index…”
    Libro electrónico
  12. 8312
    por World Health Organization
    Publicado 2020
    Tabla de Contenidos: “…Intro -- _GoBack -- Acknowledgements -- Acronyms and abbreviations -- Glossary -- Executive summary -- Introduction -- 1.1 Background -- 1.2 Goal and objectives -- 1.3 Intended audiences -- 1.4 Guideline development process -- Voluntary medical male circumcision as an intervention for HIV prevention -- 2.1 Evidence to inform updated recommendations: the impact of male circumcision on risk of HIV infection -- 2.2 Other factors to inform decision-making -- Issues and considerations regarding VMMC for younger adolescent boys -- 3.1 Adolescent development -- 3.2 Rationale and background for review of VMMC for HIV prevention among younger adolescents -- 3.3 Evidence to inform policy on the offer of VMMC for HIV prevention to adolescents ages 10-14 years compared with older adolescents: safety, acceptability and maintaining effective coverage -- 3.4 Other factors to inform decision-making -- Use of device-based method for male circumcision in context of HIV prevention -- 4.1 Rationale for review and background on use of device-based methods for male circumcision in the context of HIV prevention -- 4.2 Evidence to inform updated recommendations -- 4.3 Evaluation of collar clamp and elastic collar compression (in situ) devices -- 4.4 Evaluation of surgical assist devices -- 4.5 Programme considerations on use of device-based methods for male circumcision -- Enhancing uptake of VMMC among adult men and male adolescents in high HIV prevalence settings -- 5.1 Rationale and background -- 5.2 Evidence-based interventions: service delivery changes for enhanced uptake of VMMC for HIV prevention among adolescents and adults -- 5.3 Evidence-based interventions: economic compensation -- 5.4 Programme and policy considerations from evidence and Guideline Development Group discussions -- 5.5 Policy review on men's health and services -- 5.6 Case studies…”
    Libro electrónico
  13. 8313
    por Institute of Medicine (U.S.)
    Publicado 2011
    “…One way to bridge this gap may be for industry, academia, and government to develop partnerships that share resources while distributing risk. However, intellectual property protections and other barriers can inhibit collaborative efforts. …”
    Libro electrónico
  14. 8314
    por Diamandis, Peter H.
    Publicado 2012
    Tabla de Contenidos: “…Intro -- Dedication -- Introduction to Abundance: Updated for the 2014 Edition -- Part One: Perspective -- Chapter One: Our Grandest Challenge -- Chapter Two: Building the Pyramid -- Chapter Three: Seeing the Forest Through the Trees -- Chapter Four: It's Not as Bad as You Think -- Part Two: Exponential Technologies -- Chapter Five: Ray Kurzweil and the Go-Fast Button -- Chapter Six: The Singularity Is Nearer -- Part Three: Building the Base of the Pyramid -- Chapter Seven: The Tools of Cooperation -- Chapter Eight: Water -- Chapter Nine: Feeding Nine Billion -- Part Four: The Forces of Abundance -- Chapter Ten: The DIY Innovator -- Chapter Eleven: The Technophilanthropists -- Chapter Twelve: The Rising Billion -- Part Five: Peak of the Pyramid -- Chapter Thirteen: Energy -- Chapter Fourteen: Education -- Chapter Fifteen: Health Care -- Chapter Sixteen: Freedom -- Part Six: Steering Faster -- Chapter Seventeen: Driving Innovation and Breakthroughs -- Chapter Eighteen: Risk and Failure -- Chapter Nineteen: Which Way Next? …”
    Libro electrónico
  15. 8315
    Publicado 2021
    “…Stroke remains a global risk to public health, and a pernicious source of mortality and loss of independence in those afflicted. …”
    Libro electrónico
  16. 8316
    por Larman, Craig
    Publicado 2004
    “…Coverage includes: Compelling evidence that iterative methods reduce project risk Frequently asked questions Agile and iterative values and practices Dozens of useful iterative and agile practice tips New management skills for agile/iterative project leaders Key practices of Scrum, XP, RUP, and Evo Whether you're an IT executive, project manager, student of software engineering, or developer, Craig Larman will help you understand the promise of agile/iterative development, sell it throughout your organizationaeand transform the promise into reality …”
    Libro electrónico
  17. 8317
    Publicado 2004
    “…You have also created a website for your business that details the products or services that you offer, but it doesn't allow potential customers to purchase anything online. Don't risk losing business-learn to create a dynamic online environment using only three programs. …”
    Libro electrónico
  18. 8318
    Publicado 2021
    “…Big data security and privacy threats permeate every link of the big data industry chain, such as data production, collection, processing, and sharing, and the causes of risk are complex and interwoven. Blockchain technology has been highly praised and recognised for its decentralised infrastructure, anonymity, security, and other characteristics, and it will change the way we access and share information. …”
    Libro electrónico
  19. 8319
    Publicado 2022
    “…What should decision-making and risk-management look like under these conditions, with managers whose rationality is bounded?…”
    Libro electrónico
  20. 8320
    por Gregory, Peter H.
    Publicado 2022
    “…Written by an expert in the field, the book offers exam-focused coverage of information security governance, information risk management, information security program development and management, and information security incident management. …”
    Libro electrónico