Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
8641por Institute of Medicine (U.S.).Tabla de Contenidos: “…Assessing Health Care Reform -- Copyright -- Contents -- Preamble -- Extending Access to Health Care -- BARRIERS TO ACCESS -- FINANCIAL ACCESS -- Principles -- Practical Implications -- Assessing Access Provisions of Reform Proposals -- MORE THAN FINANCIAL ACCESS -- Containing Health Care Costs -- COSTS IN CONTEXT -- ELEMENTS OF A STRATEGY -- Specific Elements -- Elements Not Mentioned -- MOVING FROM GENERAL TO SPECIFIC POLICIES -- Administrative Costs-and Benefits -- Tax Caps and Geographic Variations in Health Care Costs -- Patient Cost Sharing and Special Problems -- Core and Supplemental Benefits -- Risk Selection versus Cost Containment -- Assuring the Quality of Care -- DEFINING QUALITY -- QUALIFY MEASUREMENT AND IMPROVEMENT -- Major Targets -- Criteria for a Strategy -- Individual and System Perspectives -- Roles and Responsibilities -- System Problems -- CLINICAL PRACTICE GUIDELINES -- SPECIFIC IMPLICATIONS -- Financing Reform -- Improving the Infrastructure for Effective Change -- GOVERNANCE AND ADMINISTRATION -- HUMAN AND PHYSICAL CAPITAL -- Human Capital -- Physical Capital -- KNOWLEDGE DEVELOPMENT -- Databases, Surveys, and Information Technologies -- Privacy and Confidentiality of Sensitive Personal Health Data -- Health Services, Outcomes, and Effectiveness Research -- Technology Assessment -- PUBLIC HEALTH POLICIES AND PROGRAMS -- OTHER INFRASTRUCTURE ISSUES -- Programs for Special Populations -- Tort Reform -- Public/Consumer Education -- Conclusion -- References…”
Publicado 1993
Libro electrónico -
8642Publicado 2021“…Skilled doctors would be held to higher standards of care, the most vulnerable consumers and employees would receive stronger protections, age restrictions for driving or for the consumption of alcohol would vary according the recklessness risk that each person poses, and borrowers would be entitled to personalized loan disclosures tailored to their unique needs and delivered in a format fitting their mental capacity. …”
Libro -
8643Publicado 2015“…He shows how competitive organizations, from private corporations to whole governments, can and should mitigate risk by red teaming. A growing number of institutions are already using this approach, Zenko shows, but he argues that the potential of red teaming far exceeds its current applications. …”
Libro -
8644por Howard-Hassmann, Rhoda E., 1948-“…Taking issue with scholars who argue that human rights are “Western” quasi-imperialist impositions on states in the global South, and risk undermining community and social obligation, Howard-Hassmann explains how human rights support communities and can only be preserved if states and individuals observe their duties to protect them -- Editor…”
Publicado 2019
Libro -
8645Publicado 2023“…The APA Handbook of Adolescent and Young Adult Development reviews the many factors that impact youth development across varying themes including biological underpinnings, cognitive and emotive processes, development through social contexts and roles, diversity in adolescence and the transition to adulthood, risk behaviors and psychopathology, positive youth development, intervention and policy, and new directions. …”
Biblioteca de la Universidad de Navarra (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada)Libro -
8646por Beck, Ulrich, 1944-“…Ulrich Beck's vision of the "risk society" has already become influential. Beck offers a new elaboration of his basic ideas, connecting reflexive modernization with new issues to do with the state and political organization. …”
Publicado 1994
Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra, Biblioteca del Instituto Diocesano de Teología y Pastoral de Bilbao)Libro -
8647Publicado 2023“…A risposta si delineano, nell’approccio regolativo Ue, precise scelte di contenuto e di metodo: da un lato, l’individuazione, quali pietre angolari, delle garanzie di sorveglianza umana e di trasparenza, volte rispettivamente a prevenire il rischio di violazione dei diritti e a rafforzarne l’effettività; dall’altro, l’adozione di un modello risk-based. L’indagine, volta a ricostruire, lungo tali meridiani, un quadro integrato di regole a protezione del lavoratore, evidenzia il ruolo egemonico di fonti di matrice non strettamente giuslavoristica: de iure condito, il GDPR, de iure condendo, l’AI Act. …”
Libro -
8648Publicado 2005Tabla de Contenidos: “…. -- Celiac disease: effect of weaning on disease risk / Hernall, O. ... [et al.] -- Gut microbiota in infants between 6 and 24 months of age / Salminen, S., Gueimonde, M. -- Malabsorption of carbohydrates / Kneepkens, C.M.F., Hoekstra, J.H. -- Chronic nonspecific diarrhea of childhood / Kleinman, R.E. -- Development of motility / Staiano, A., Boccia, G. -- Motility and allergy / Bueno, L. -- The role of dietary fiber in childhood and its application in pediatric gastroenterology / Kokke, F.T.M., Taminiau, J.A.J.M., Benninga, M.A…”
Libro -
8649Publicado 2016Tabla de Contenidos: “…Managing Human Failure -- 6 Human factors in risk management -- List of Abbreviations -- Human Reliability Analysis -- Qualitative Approaches -- Identification of Safety-Critical Tasks -- Safety-Critical Task Screening -- Task Analysis -- Workshop-based Analysis -- Quantitative Approaches -- Comparing Qualitative and Quantitative Approaches -- Synergies with Safety Engineering -- Hazard and Operability Studies -- Failure Modes and Effects Analysis -- Bow Ties -- Other Forms of Risk Management -- Summary: Human Factors in Risk Management -- Key Points -- References -- 7 Reducing human failure -- List of Abbreviations -- Overview of Human Error…”
Libro electrónico -
8650Publicado 2023Tabla de Contenidos: “…-- Precise code coverage measures -- Closing out coverage -- Defects - what is the status of the software? -- Schedule and risk - too many test ideas, not enough time -- Iterative testing -- Strategy - what are our risks and priorities? …”
Libro electrónico -
8651Publicado 2015Tabla de Contenidos: “…The Oil Tax Weapon -- Consumer governments addicted to oil taxes -- Consumer governments hostage of oil subsidies -- Government defence budgets -- Marshmallow behaviour -- Let's change the tax rules -- Monetary Experiments and the Credit Risk Time Bomb -- Monetary experiments -- Black gold -- The race to the bottom -- The generational debate -- The monetary time bomb of credit risk -- Financial Flows. …”
Libro electrónico -
8652Publicado 2024Tabla de Contenidos: “…Data-informed approach versus data-driven approach -- The symphony of growth -- Decoding experiment analysis and iteration for ongoing growth -- Analyzing experiment results - the pillars of informed decision-making -- Embracing a growth mindset - embracing failure as an ally -- The symphony of evolution -- Summary -- Questions -- Answers -- Chapter 8: Define, Monitor, and Act on Your Performance Metrics -- The strategic importance of performance metrics -- Mitigate risk -- Focus innovation on validated user needs -- Increase team alignment -- Speed up iteration and adaptation -- Optimize user journeys end-to-end -- Fuel data-driven decision-making -- Defining the right performance metrics -- Connecting metrics to business objectives -- Monitoring and analyzing performance metrics -- Using performance metrics to drive growth -- Analyzing experiment results and iterating on product features and marketing strategies -- The power of experimentation -- Setting the stage for experiments -- Conducting experiments -- The importance of rigorous analysis -- Iterating and implementing changes -- Establishing a performance-driven culture -- Why does a metrics culture matter? …”
Libro electrónico -
8653Publicado 2018Tabla de Contenidos: “…-- Building blocks of information security -- Computer security -- Network security -- Firewalls -- Intrusion detection systems / intrusion prevention systems -- Multitier topology -- Internet security -- Password -- System upgrade and updates -- Phishing -- Beware of phishing phone calls -- Phishing protection -- Security issues, threats, and attacks -- IoT security risk -- Computer security risk -- Security Risk-Border Gateway Protocol -- Security and threats -- Natural disasters -- Human threats -- Security vulnerabilities -- Technology weaknesses -- Configuration weaknesses -- Security policy weaknesses -- Using unencrypted or weak encryption for a website -- Summary -- Questions -- Further reading -- Chapter 2: Secure Network Design -- Access control -- Asset classification and physical security -- Authentication, authorization, and accounting -- Network management and security design -- Network segmentation -- Segmentation strategy steps -- Network protection consideration and design -- Hardening your TCP/IP stack -- DoS and DDoS attacks -- Volume-based attacks -- Application layer attacks -- Low-rate attacks -- IP spoofing -- Anti-spoofing using access lists -- Encryption -- Anti-spoofing using RPF checks -- Ping sweeps and Port scans -- Mitigation -- DNS vulnerabilities -- How does DNS work? …”
Libro electrónico -
8654Publicado 2023Tabla de Contenidos: “…Secure coding practices versus safe coding techniques -- Synergies and differences in the testing phase -- Summary -- References -- Part 3: Executing the Process to Engineer a Secure Automotive Product -- Chapter 7: A Practical Threat Modeling Approach for Automotive Systems -- The fundamentals of performing an effective TARA -- Assets -- Damage scenarios -- Threat scenarios -- Attacker model and threat types -- Attack paths -- Risk assessment methods -- Risk treatment -- Common pitfalls when preparing a TARA -- Defining the appropriate TARA scope -- The practical approach -- Know your system -- Make your assumptions known -- Use case-driven analysis -- Prepare context and data flow diagrams -- Damages versus assets - where to start -- Identifying assets with the help of asset categories -- Building threat catalogs -- Creating attack paths using a system flow diagram -- Risk prioritization -- Defining cybersecurity goals -- Choosing security controls and operational environment (OE) requirements -- Tracking shared and accepted risks -- Review and signoff -- Case study using a digital video recorder (DVR) -- Assumptions -- Context diagram -- Identifying the assets -- Damage scenarios -- Cybersecurity requirements and controls -- Summary -- References -- Chapter 8: Vehicle-Level Security Controls -- Choosing cybersecurity controls -- Challenging areas -- Vehicle-level versus ECU-level controls -- Policy controls -- Secure manufacturing -- Challenges -- Secure off-board network communication -- Wi-Fi -- Bluetooth -- Cellular -- Host-based intrusion detection -- Network intrusion detection and prevention (NIDP) -- Domain separation and filtering -- Sensor authentication -- Secure software updates -- In-vehicle network protection -- CAN message authentication -- Ethernet -- Securing diagnostic abilities -- Security access control via UDS service 0x27…”
Libro electrónico -
8655Publicado 2024Tabla de Contenidos: “…Document classification -- N-grams -- Selecting a subset of n-grams -- Using genetic algorithms to search for a fixed-size subset -- Python implementation -- Summary -- Further reading -- Chapter 12: Explainable AI, Causality, and Counterfactuals with Genetic Algorithms -- Technical requirements -- Unlocking the black box - XAI -- Unraveling cause and effect - causality in AI -- What-if scenarios - counterfactuals -- Genetic algorithms in counterfactual analysis - navigating alternative scenarios -- The German Credit Risk dataset -- Exploring counterfactual scenarios for credit risk prediction -- The Applicant class -- The CreditRiskData class -- Counterfactuals with genetic algorithms -- The genetic algorithm solution -- More "what-if" scenarios -- Extending to other datasets -- Summary -- Further reading -- Part 4: Enhancing Performance with Concurrency and Cloud Strategies -- Chapter 13: Accelerating Genetic Algorithms - the Power of Concurrency -- Technical requirements -- Long runtimes in real-world genetic algorithms -- Parallelizing genetic algorithms -- Multithreading -- Multiprocessing -- Back to the OneMax problem -- A baseline benchmark program -- Simulating computational intensity -- Multiprocessing using the Pool class -- Increasing the number of processes -- Multiprocessing using the SCOOP library -- Distributed computing with SCOOP -- Summary -- Further reading -- Chapter 14: Beyond Local Resources - Scaling Genetic Algorithms in the Cloud -- Technical requirements -- The next level in genetic algorithm performance -embracing a client-server architecture -- Implementing a client-server model -- Using a separate environment -- Revisiting the One-Max problem, yet again -- Creating the server component -- Creating the client component -- Running the asynchronous client -- Using a production-grade app server…”
Libro electrónico -
8656por OECDTabla de Contenidos: “…Managing with capital markets that are incomplete or lack depth, or situations of high inflation -- The risk of having few financial instruments for pension providers to invest in -- The risk of high inflation -- 1.1.4. …”
Publicado 2022
Libro electrónico -
8657Publicado 2009Tabla de Contenidos: “…Hardin -- Suicide and violence risk assessment / Cameron Quanbeck and Pria Joglekar…”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
8658Publicado 2013Tabla de Contenidos: “…Thomas -- Seizure control during pregnancy / Anne Sabers -- Effect of pregnancy on AED kinetics / Peter Forgacs, Page Pennell -- Fetal and maternal risks with seizures / Vilho Hiilesmaa, Kari Teramo -- Obstetrical outcome and complications of pregnancy / Ingrid Borthen, Nils E. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
8659Publicado 2013Tabla de Contenidos: “…Lewis -- Climate change of the trans-Himalayan region and its impact on China-South Asia water security / David Kerr -- Environmental security and its implications for China's foreign relations / Junko Mochizuki and ZhongXiang Zhang -- Multilateral environmental engagement with Chinese characteristics / Timothy Scolnick -- The exploding balloon: environmental costs of China's participation in global capitalism / Dai Qing, Helen Lansdowne and Patricia Adams -- Human security implications of China's foreign energy relations / Gaye Christoffersen -- Fuelling insecurity: energy and human security in Sino-Myanmar relations / Gabriel Botel -- Food security and food safety in China's foreign policy / by Elizabeth Wishnick -- Pandemic responses in the Asia-Pacific: risk and opportunity in PRC's international relations / Jonathan Schwartz -- China's brain drain woes: elite emigration and national security / Willy Lam -- Corporate social responsibility in China's new economic diplomacy / Robert J. …”
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
8660Publicado 2017Tabla de Contenidos: “…Compensatory Damages Principles in Civil and Common Law Jurisdictions : Requirements, Underlying Principles and Limits / Non-Compensatory Damages in Civil and Common Law Jurisdictions : Requirements and Underlying Principles / Damages Principles under the Convention on Contracts for the International Sale of Goods (CISC) / Contractual Limitations on Damages / Overview of Principles Reducing Damages / Damages Principles in Investment Arbitration / Procedural Issues / Function and Role of Damages Experts / Strategic Issues in Employing and Deploying Damages Experts / Overview of Damages and Accounting Basics / Assessing Damages for Breach of Contract / Overview of Methodologies for Assessing Fair Market Value / Applicable Valuation Approach / Income Approach and the Discounted Cash Flow Methodology / Determining the Weighted Average Cost of Capital / Market Approach or Comparables / Asset Based Approach and Other Valuation Methodologies / Country Risk / Taxation and Currency Issues in Damages Awards / Interest / Costs / Use of Econometric and Statistical Analysis and Tools / Damages in Energy and Natural Resources Arbitrations / Damages in Gas and Electricity Arbitrations / Damages in Construction Arbitrations / Damages in Financial Services Arbitrations / Damages in Life Sciences Arbitrations / M&A and Shareholder Arbitrations / Damages in Intellectual Property Arbitrations / Damages in Competition/Antitrust Arbitrations…”
Libro