Mostrando 8,641 - 8,660 Resultados de 13,276 Para Buscar '"Risk"', tiempo de consulta: 0.12s Limitar resultados
  1. 8641
    por Institute of Medicine (U.S.).
    Publicado 1993
    Tabla de Contenidos: “…Assessing Health Care Reform -- Copyright -- Contents -- Preamble -- Extending Access to Health Care -- BARRIERS TO ACCESS -- FINANCIAL ACCESS -- Principles -- Practical Implications -- Assessing Access Provisions of Reform Proposals -- MORE THAN FINANCIAL ACCESS -- Containing Health Care Costs -- COSTS IN CONTEXT -- ELEMENTS OF A STRATEGY -- Specific Elements -- Elements Not Mentioned -- MOVING FROM GENERAL TO SPECIFIC POLICIES -- Administrative Costs-and Benefits -- Tax Caps and Geographic Variations in Health Care Costs -- Patient Cost Sharing and Special Problems -- Core and Supplemental Benefits -- Risk Selection versus Cost Containment -- Assuring the Quality of Care -- DEFINING QUALITY -- QUALIFY MEASUREMENT AND IMPROVEMENT -- Major Targets -- Criteria for a Strategy -- Individual and System Perspectives -- Roles and Responsibilities -- System Problems -- CLINICAL PRACTICE GUIDELINES -- SPECIFIC IMPLICATIONS -- Financing Reform -- Improving the Infrastructure for Effective Change -- GOVERNANCE AND ADMINISTRATION -- HUMAN AND PHYSICAL CAPITAL -- Human Capital -- Physical Capital -- KNOWLEDGE DEVELOPMENT -- Databases, Surveys, and Information Technologies -- Privacy and Confidentiality of Sensitive Personal Health Data -- Health Services, Outcomes, and Effectiveness Research -- Technology Assessment -- PUBLIC HEALTH POLICIES AND PROGRAMS -- OTHER INFRASTRUCTURE ISSUES -- Programs for Special Populations -- Tort Reform -- Public/Consumer Education -- Conclusion -- References…”
    Libro electrónico
  2. 8642
    Publicado 2021
    “…Skilled doctors would be held to higher standards of care, the most vulnerable consumers and employees would receive stronger protections, age restrictions for driving or for the consumption of alcohol would vary according the recklessness risk that each person poses, and borrowers would be entitled to personalized loan disclosures tailored to their unique needs and delivered in a format fitting their mental capacity. …”
    Libro
  3. 8643
    Publicado 2015
    “…He shows how competitive organizations, from private corporations to whole governments, can and should mitigate risk by red teaming. A growing number of institutions are already using this approach, Zenko shows, but he argues that the potential of red teaming far exceeds its current applications. …”
    Libro
  4. 8644
    “…Taking issue with scholars who argue that human rights are “Western” quasi-imperialist impositions on states in the global South, and risk undermining community and social obligation, Howard-Hassmann explains how human rights support communities and can only be preserved if states and individuals observe their duties to protect them -- Editor…”
    Libro
  5. 8645
    Publicado 2023
    “…The APA Handbook of Adolescent and Young Adult Development reviews the many factors that impact youth development across varying themes including biological underpinnings, cognitive and emotive processes, development through social contexts and roles, diversity in adolescence and the transition to adulthood, risk behaviors and psychopathology, positive youth development, intervention and policy, and new directions. …”
    Libro
  6. 8646
    por Beck, Ulrich, 1944-
    Publicado 1994
    “…Ulrich Beck's vision of the "risk society" has already become influential. Beck offers a new elaboration of his basic ideas, connecting reflexive modernization with new issues to do with the state and political organization. …”
    Libro
  7. 8647
    Publicado 2023
    “…A risposta si delineano, nell’approccio regolativo Ue, precise scelte di contenuto e di metodo: da un lato, l’individuazione, quali pietre angolari, delle garanzie di sorveglianza umana e di trasparenza, volte rispettivamente a prevenire il rischio di violazione dei diritti e a rafforzarne l’effettività; dall’altro, l’adozione di un modello risk-based. L’indagine, volta a ricostruire, lungo tali meridiani, un quadro integrato di regole a protezione del lavoratore, evidenzia il ruolo egemonico di fonti di matrice non strettamente giuslavoristica: de iure condito, il GDPR, de iure condendo, l’AI Act. …”
    Libro
  8. 8648
    Publicado 2005
    Tabla de Contenidos: “…. -- Celiac disease: effect of weaning on disease risk / Hernall, O. ... [et al.] -- Gut microbiota in infants between 6 and 24 months of age / Salminen, S., Gueimonde, M. -- Malabsorption of carbohydrates / Kneepkens, C.M.F., Hoekstra, J.H. -- Chronic nonspecific diarrhea of childhood / Kleinman, R.E. -- Development of motility / Staiano, A., Boccia, G. -- Motility and allergy / Bueno, L. -- The role of dietary fiber in childhood and its application in pediatric gastroenterology / Kokke, F.T.M., Taminiau, J.A.J.M., Benninga, M.A…”
    Libro
  9. 8649
    Publicado 2016
    Tabla de Contenidos: “…Managing Human Failure -- 6 Human factors in risk management -- List of Abbreviations -- Human Reliability Analysis -- Qualitative Approaches -- Identification of Safety-Critical Tasks -- Safety-Critical Task Screening -- Task Analysis -- Workshop-based Analysis -- Quantitative Approaches -- Comparing Qualitative and Quantitative Approaches -- Synergies with Safety Engineering -- Hazard and Operability Studies -- Failure Modes and Effects Analysis -- Bow Ties -- Other Forms of Risk Management -- Summary: Human Factors in Risk Management -- Key Points -- References -- 7 Reducing human failure -- List of Abbreviations -- Overview of Human Error…”
    Libro electrónico
  10. 8650
    Publicado 2023
    Tabla de Contenidos: “…-- Precise code coverage measures -- Closing out coverage -- Defects - what is the status of the software? -- Schedule and risk - too many test ideas, not enough time -- Iterative testing -- Strategy - what are our risks and priorities? …”
    Libro electrónico
  11. 8651
    Publicado 2015
    Tabla de Contenidos: “…The Oil Tax Weapon -- Consumer governments addicted to oil taxes -- Consumer governments hostage of oil subsidies -- Government defence budgets -- Marshmallow behaviour -- Let's change the tax rules -- Monetary Experiments and the Credit Risk Time Bomb -- Monetary experiments -- Black gold -- The race to the bottom -- The generational debate -- The monetary time bomb of credit risk -- Financial Flows. …”
    Libro electrónico
  12. 8652
    Publicado 2024
    Tabla de Contenidos: “…Data-informed approach versus data-driven approach -- The symphony of growth -- Decoding experiment analysis and iteration for ongoing growth -- Analyzing experiment results - the pillars of informed decision-making -- Embracing a growth mindset - embracing failure as an ally -- The symphony of evolution -- Summary -- Questions -- Answers -- Chapter 8: Define, Monitor, and Act on Your Performance Metrics -- The strategic importance of performance metrics -- Mitigate risk -- Focus innovation on validated user needs -- Increase team alignment -- Speed up iteration and adaptation -- Optimize user journeys end-to-end -- Fuel data-driven decision-making -- Defining the right performance metrics -- Connecting metrics to business objectives -- Monitoring and analyzing performance metrics -- Using performance metrics to drive growth -- Analyzing experiment results and iterating on product features and marketing strategies -- The power of experimentation -- Setting the stage for experiments -- Conducting experiments -- The importance of rigorous analysis -- Iterating and implementing changes -- Establishing a performance-driven culture -- Why does a metrics culture matter? …”
    Libro electrónico
  13. 8653
    Publicado 2018
    Tabla de Contenidos: “…-- Building blocks of information security -- Computer security -- Network security -- Firewalls -- Intrusion detection systems / intrusion prevention systems -- Multitier topology -- Internet security -- Password -- System upgrade and updates -- Phishing -- Beware of phishing phone calls -- Phishing protection -- Security issues, threats, and attacks -- IoT security risk -- Computer security risk -- Security Risk-Border Gateway Protocol -- Security and threats -- Natural disasters -- Human threats -- Security vulnerabilities -- Technology weaknesses -- Configuration weaknesses -- Security policy weaknesses -- Using unencrypted or weak encryption for a website -- Summary -- Questions -- Further reading -- Chapter 2: Secure Network Design -- Access control -- Asset classification and physical security -- Authentication, authorization, and accounting -- Network management and security design -- Network segmentation -- Segmentation strategy steps -- Network protection consideration and design -- Hardening your TCP/IP stack -- DoS and DDoS attacks -- Volume-based attacks -- Application layer attacks -- Low-rate attacks -- IP spoofing -- Anti-spoofing using access lists -- Encryption -- Anti-spoofing using RPF checks -- Ping sweeps and Port scans -- Mitigation -- DNS vulnerabilities -- How does DNS work? …”
    Libro electrónico
  14. 8654
    Publicado 2023
    Tabla de Contenidos: “…Secure coding practices versus safe coding techniques -- Synergies and differences in the testing phase -- Summary -- References -- Part 3: Executing the Process to Engineer a Secure Automotive Product -- Chapter 7: A Practical Threat Modeling Approach for Automotive Systems -- The fundamentals of performing an effective TARA -- Assets -- Damage scenarios -- Threat scenarios -- Attacker model and threat types -- Attack paths -- Risk assessment methods -- Risk treatment -- Common pitfalls when preparing a TARA -- Defining the appropriate TARA scope -- The practical approach -- Know your system -- Make your assumptions known -- Use case-driven analysis -- Prepare context and data flow diagrams -- Damages versus assets - where to start -- Identifying assets with the help of asset categories -- Building threat catalogs -- Creating attack paths using a system flow diagram -- Risk prioritization -- Defining cybersecurity goals -- Choosing security controls and operational environment (OE) requirements -- Tracking shared and accepted risks -- Review and signoff -- Case study using a digital video recorder (DVR) -- Assumptions -- Context diagram -- Identifying the assets -- Damage scenarios -- Cybersecurity requirements and controls -- Summary -- References -- Chapter 8: Vehicle-Level Security Controls -- Choosing cybersecurity controls -- Challenging areas -- Vehicle-level versus ECU-level controls -- Policy controls -- Secure manufacturing -- Challenges -- Secure off-board network communication -- Wi-Fi -- Bluetooth -- Cellular -- Host-based intrusion detection -- Network intrusion detection and prevention (NIDP) -- Domain separation and filtering -- Sensor authentication -- Secure software updates -- In-vehicle network protection -- CAN message authentication -- Ethernet -- Securing diagnostic abilities -- Security access control via UDS service 0x27…”
    Libro electrónico
  15. 8655
    Publicado 2024
    Tabla de Contenidos: “…Document classification -- N-grams -- Selecting a subset of n-grams -- Using genetic algorithms to search for a fixed-size subset -- Python implementation -- Summary -- Further reading -- Chapter 12: Explainable AI, Causality, and Counterfactuals with Genetic Algorithms -- Technical requirements -- Unlocking the black box - XAI -- Unraveling cause and effect - causality in AI -- What-if scenarios - counterfactuals -- Genetic algorithms in counterfactual analysis - navigating alternative scenarios -- The German Credit Risk dataset -- Exploring counterfactual scenarios for credit risk prediction -- The Applicant class -- The CreditRiskData class -- Counterfactuals with genetic algorithms -- The genetic algorithm solution -- More "what-if" scenarios -- Extending to other datasets -- Summary -- Further reading -- Part 4: Enhancing Performance with Concurrency and Cloud Strategies -- Chapter 13: Accelerating Genetic Algorithms - the Power of Concurrency -- Technical requirements -- Long runtimes in real-world genetic algorithms -- Parallelizing genetic algorithms -- Multithreading -- Multiprocessing -- Back to the OneMax problem -- A baseline benchmark program -- Simulating computational intensity -- Multiprocessing using the Pool class -- Increasing the number of processes -- Multiprocessing using the SCOOP library -- Distributed computing with SCOOP -- Summary -- Further reading -- Chapter 14: Beyond Local Resources - Scaling Genetic Algorithms in the Cloud -- Technical requirements -- The next level in genetic algorithm performance -embracing a client-server architecture -- Implementing a client-server model -- Using a separate environment -- Revisiting the One-Max problem, yet again -- Creating the server component -- Creating the client component -- Running the asynchronous client -- Using a production-grade app server…”
    Libro electrónico
  16. 8656
    por OECD
    Publicado 2022
    Tabla de Contenidos: “…Managing with capital markets that are incomplete or lack depth, or situations of high inflation -- The risk of having few financial instruments for pension providers to invest in -- The risk of high inflation -- 1.1.4. …”
    Libro electrónico
  17. 8657
    Publicado 2009
    Tabla de Contenidos: “…Hardin -- Suicide and violence risk assessment / Cameron Quanbeck and Pria Joglekar…”
    Enlace del recurso
    Libro electrónico
  18. 8658
    Publicado 2013
    Tabla de Contenidos: “…Thomas -- Seizure control during pregnancy / Anne Sabers -- Effect of pregnancy on AED kinetics / Peter Forgacs, Page Pennell -- Fetal and maternal risks with seizures / Vilho Hiilesmaa, Kari Teramo -- Obstetrical outcome and complications of pregnancy / Ingrid Borthen, Nils E. …”
    Enlace del recurso
    Libro electrónico
  19. 8659
    Publicado 2013
    Tabla de Contenidos: “…Lewis -- Climate change of the trans-Himalayan region and its impact on China-South Asia water security / David Kerr -- Environmental security and its implications for China's foreign relations / Junko Mochizuki and ZhongXiang Zhang -- Multilateral environmental engagement with Chinese characteristics / Timothy Scolnick -- The exploding balloon: environmental costs of China's participation in global capitalism / Dai Qing, Helen Lansdowne and Patricia Adams -- Human security implications of China's foreign energy relations / Gaye Christoffersen -- Fuelling insecurity: energy and human security in Sino-Myanmar relations / Gabriel Botel -- Food security and food safety in China's foreign policy / by Elizabeth Wishnick -- Pandemic responses in the Asia-Pacific: risk and opportunity in PRC's international relations / Jonathan Schwartz -- China's brain drain woes: elite emigration and national security / Willy Lam -- Corporate social responsibility in China's new economic diplomacy / Robert J. …”
    Enlace del recurso
    Libro electrónico
  20. 8660
    Publicado 2017
    Tabla de Contenidos: “…Compensatory Damages Principles in Civil and Common Law Jurisdictions : Requirements, Underlying Principles and Limits / Non-Compensatory Damages in Civil and Common Law Jurisdictions : Requirements and Underlying Principles / Damages Principles under the Convention on Contracts for the International Sale of Goods (CISC) / Contractual Limitations on Damages / Overview of Principles Reducing Damages / Damages Principles in Investment Arbitration / Procedural Issues / Function and Role of Damages Experts / Strategic Issues in Employing and Deploying Damages Experts / Overview of Damages and Accounting Basics / Assessing Damages for Breach of Contract / Overview of Methodologies for Assessing Fair Market Value / Applicable Valuation Approach / Income Approach and the Discounted Cash Flow Methodology / Determining the Weighted Average Cost of Capital / Market Approach or Comparables / Asset Based Approach and Other Valuation Methodologies / Country Risk / Taxation and Currency Issues in Damages Awards / Interest / Costs / Use of Econometric and Statistical Analysis and Tools / Damages in Energy and Natural Resources Arbitrations / Damages in Gas and Electricity Arbitrations / Damages in Construction Arbitrations / Damages in Financial Services Arbitrations / Damages in Life Sciences Arbitrations / M&A and Shareholder Arbitrations / Damages in Intellectual Property Arbitrations / Damages in Competition/Antitrust Arbitrations…”
    Libro