Mostrando 8,941 - 8,960 Resultados de 13,276 Para Buscar '"Risk"', tiempo de consulta: 0.14s Limitar resultados
  1. 8941
    Publicado 2023
    Tabla de Contenidos: “…Bennett and Alison Robertson Depuration Kinetics and Growth Dilution of Caribbean Ciguatoxin in the Omnivore Lagodon rhomboides: Implications for Trophic Transfer and Ciguatera Risk -- Tibor Pasinszki, Jimaima Lako and Todd E. …”
    Libro electrónico
  2. 8942
    por DeGroot, Morris H., 1931-1989
    Publicado 2004
    Tabla de Contenidos: “…8.1 Elements of a Decision Problem8.2 Bayes Risk and Bayes Decisions; 8.3 Nonnegative Loss Functions; 8.4 Concavity of the Bayes Risk; 8.5 Randomization and Mixed Decisions; 8.6 Conve Sets; 8.7 Decision Problems in Which ~ 2 and D Are Finite; 8.8 Decision Problems with Observations; 8.9 Construction of Bayes Decision Functions; 8.10 The Cost of Observation; 8.11 Statistical Decision Problems in Which Both O and D Contain Two Points; 8.12 Computation of the Posterior Distribution When the Observations Are Made in More Than One Stage; Exercises; Chapter 9. …”
    Libro electrónico
  3. 8943
    Publicado 2018
    Tabla de Contenidos: “…Asynchronous API -- Micro-frontend -- Trilateral API per container -- Summary -- Chapter 7: Testing -- Shifting testing to the left -- Test engineering -- Isolated testing -- Unit testing -- Component testing -- Transitive testing -- Integration testing -- Contract testing -- End-to-end testing -- Manual testing -- Example - end-to-end relay -- Submit order leg -- Order submitted leg -- Summary -- Chapter 8: Monitoring -- Shifting testing to the right -- Key performance indicators -- Real and synthetic traffic -- Real-user monitoring -- Synthetic transaction monitoring -- Observability -- Measurements -- Work metrics -- Resource metrics -- Events -- Telemetry -- Alerting -- Focus on recovery -- Performance -- Summary -- Chapter 9: Security -- Shared responsibility model -- Security by design -- Accounts as code -- Defense in depth -- Edge layer -- Component layer -- Data layer -- Encryption -- Data in transit -- Data at rest -- Envelope encryption -- Tokenization -- Domain events -- Disaster recovery -- Application security -- Federated identity management -- API gateway -- JWT assertion and filter patterns -- Regulatory compliance -- Summary -- Chapter 10: Value Focused Migration -- Risk mitigation -- Anti-pattern - Lift and Shift -- Anti-pattern - synchronous anti-corruption layer -- Strangler pattern -- Bi-directional synchronization and latching -- Legacy change data capture -- Empower self-sufficient, full-stack teams -- Evolutionary architecture -- Welcome polyglot cloud -- Summary -- Other Books You May Enjoy -- Index…”
    Libro electrónico
  4. 8944
    por Bonetti, Benjamin
    Publicado 2013
    Tabla de Contenidos: “….; Who decides what you can and can't do?; Accepting risk and failure; Stepping stones . . .; You're already there . . .; How's the view?…”
    Libro electrónico
  5. 8945
    Publicado 2015
    Tabla de Contenidos: “…Paraphrasing and Summarizing SkillsTime-Traveling; Next Step; 10 Sharpen Your Executive Business Acumen; Top Down and Bottom Up; Think Across the Entire Organization; ATL and BTL Solution Boxes; Talking About Trains; Become the Champion of Solution Box B; I-Date for Box B; 11 Stage 2: Don't Forget The Split; It's Not a Race; The Quantified Problem; The Quantified Cause; The Quantified Solution; Printer Story: The Value of the Three Qs; 12 Discussions with an ATL Executive; The ValueStar: Learning ATL Vocabulary; ROI: Selling Money; Making the Most of Time; Risk: The Million-Dollar Question…”
    Libro electrónico
  6. 8946
    Publicado 2023
    Tabla de Contenidos: “…Summary -- Exam Essentials -- Review Questions -- Chapter 3 Privacy Operational Life Cycle: Assess -- Document Your Privacy Program Baseline -- Education and Awareness -- Monitoring and Responding to the Regulatory Environment -- Assess Policy Compliance against Internal and External Requirements -- Data, Systems, and Process Assessment -- Risk Assessment Methods -- Incident Management, Response, and Remediation -- Perform Gap Analysis against an Accepted Standard or Law -- Program Assurance -- Processors and Third-Party Vendor Assessment -- Evaluate Processors and Third-Party Vendors -- Understand Sources of Information -- Risk Assessment -- Contractual Requirements and Ongoing Monitoring -- Physical Assessments -- Mergers, Acquisitions, and Divestitures -- Privacy Assessments and Documentation -- Privacy Threshold Analyses (PTAs) -- Define a Process for Conducting Privacy Assessments -- Summary -- Exam Essentials -- Review Questions -- Chapter 4 Privacy Operational Life Cycle: Protect -- Privacy and Cybersecurity -- Cybersecurity Goals -- Relationship between Privacy and Cybersecurity -- Cybersecurity Controls -- Security Control Categories -- Security Control Types -- Data Protection -- Data Encryption -- Data Loss Prevention -- Data Minimization -- Backups -- Policy Framework -- Cybersecurity Policies -- Cybersecurity Standards -- Cybersecurity Procedures -- Cybersecurity Guidelines -- Exceptions and Compensating Controls -- Developing Policies -- Identity and Access Management -- Least Privilege -- Identification, Authentication, and Authorization -- Authentication Techniques -- Provisioning and Deprovisioning -- Account and Privilege Management -- Privacy by Design -- Privacy and the SDLC -- System Development Phases -- System Development Models -- Integrating Privacy with Business Processes -- Vulnerability Management -- Vulnerability Scanning…”
    Libro electrónico
  7. 8947
    por Bejtlich, Richard
    Publicado 2005
    Tabla de Contenidos: “…Cover -- Contents -- Foreword -- Preface -- About the Author -- About the Contributors -- PART I: INTRODUCTION TO NETWORK SECURITY MONITORING -- Chapter 1 The Security Process -- What Is Security? -- What Is Risk? -- A Case Study on Risk -- Security Principles: Characteristics of the Intruder -- Security Principles: Phases of Compromise -- Security Principles: Defensible Networks -- Conclusion -- Chapter 2 What Is Network Security Monitoring? …”
    Libro electrónico
  8. 8948
    por Stewart, James Michael
    Publicado 2004
    Tabla de Contenidos: “…Critical InformationExam Essentials; 5.5 Privilege Management; Critical Information; Exam Essentials; 5.6 Forensics; Critical Information; Exam Essentials; 5.7 Risk Identification; Critical Information; Exam Essentials; 5.8 Security Training; Critical Information; Exam Essentials; 5.9 Security Documentation; Critical Information; Exam Essentials; Review Questions; Answers to Review Questions; Index; Numbers; A; B; C; D; E; F; G; H; I; J; K; L; M; N; O; P; R; S; T; U; V; W; X; Z…”
    Libro electrónico
  9. 8949
    por Levy, Jared, 1976-
    Publicado 2011
    “…"A comprehensive yet simplified guide to the complex world of options investing and risk management Before trading derivatives, one needs to understand the secrets and mechanics behind the options market. …”
    Libro electrónico
  10. 8950
    Publicado 2010
    “…Dennis, Integration Competency Center Director, Nike Use Lean Techniques to Integrate Enterprise Systems Faster, with Far Less Cost and Risk By some estimates, 40 percent of IT budgets are devoted to integration. …”
    Libro electrónico
  11. 8951
    Publicado 2013
    Tabla de Contenidos: “…; Diagnostics for Model Selection; Model Estimation; Calculating Conditional Expectations and Probability Densities; Calculating Conditional, Ex Ante Risk-Adjusted Returns; First Passage Times…”
    Libro electrónico
  12. 8952
    Publicado 2014
    Tabla de Contenidos: “…Why Physical Security Is Important to an Awareness Program How Physical Attacks Work ; Reconnaissance ; Off-site Reconnaissance ; Maps ; The Company Website ; Additional Sources ; On-Site Reconnaissance ; Surveillance ; Real Estate Meeting ; RFID Credential Stealing ; Attack Planning ; Attack Execution ; Minimizing the Risk of Physical Attacks ; Preparing for a Physical Assessment ; Set an Objective ; Declare Off-Limits Areas ; Schedule ; Authorization Letter ; Can''t Afford a Physical Security Assessment? …”
    Libro electrónico
  13. 8953
    por Wennberg, Karl
    Publicado 2022
    Tabla de Contenidos: “…2.1 Academic Innovation Support in Practice -- 3 Incubator Support Action in Practice: A Conceptual Discussion -- 3.1 Information and Nudging for Utilization -- 3.2 Direct Support in Solving Problems -- 3.3 Coaching Along the Startup Process -- 3.4 Networking and Providing Creative Arenas -- 4 Conceptual Rationales Behind Public Support Systems for Innovation -- 4.1 Direct Interventions May Run the Risk of Causing Market Distortions -- 4.2 Focus on Favorable Conditions -- 5 Discussion and Conclusions -- 5.1 Direct Support with Limits -- References…”
    Libro electrónico
  14. 8954
    Publicado 2021
    Tabla de Contenidos: “…Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Part 1 Getting Started with Investing -- Chapter 1 Making Sense of Your Investing Options -- Growing Your Money in Ownership Investments -- Sharing in corporate growth and profits: Stocks -- Profiting from real estate -- Succeeding in small business -- Making "riskier" choices: Options, cryptocurrencies, and so on -- Keeping Money in Lending Investments -- Understanding Risks and Returns -- Realizing risks -- Managing risks -- Making sense of returns -- Where to Invest and Get Advice -- Finding the best fund companies and brokers -- Finding an acceptable advisor -- Chapter 2 Using Investments to Accomplish Your Goals -- Setting and Prioritizing Your Shorter-Term Goals -- Accumulating a rainy-day fund -- Saving for large purchases -- Investing for a small business or home -- Saving for kids' higher educational costs -- Investing short-term money -- Investing in Retirement Accounts -- Understanding retirement account perks -- Grappling with retirement account concerns -- Taking advantage of retirement accounts -- Surveying retirement account choices -- Selecting retirement account investments -- Assessing Your Risk-Taking Desires -- Chapter 3 Setting Your Return Expectations -- Estimating Your Investments' Returns -- Money market funds and savings account returns -- Bond returns -- Stock returns -- Real estate returns -- Small-business returns -- Compounding Your Returns -- The value of getting a few extra percent -- Considering your goals -- Chapter 4 Minimizing Your Taxes When Investing -- Understanding Investment Taxes -- Tracking taxation of investment distributions -- Determining your tax bracket -- Highlighting the Tax Cuts and Jobs Act bill…”
    Libro electrónico
  15. 8955
    por Myers, Tony, 1969-
    Publicado 2003
    Tabla de Contenidos: “…-- The cogito -- The cogito and the post-structuralists -- Madness: the vanising mediator between nature and culture -- The birth of God: reading the cogito via Schelling -- From subject to subjectivization -- -- What is so terrible about postmodernity? -- The postmodern risk society -- The disintegration of the big other -- The postmodern superego: enjoy! …”
    Enlace del recurso
    Libro electrónico
  16. 8956
    Publicado 2013
    Tabla de Contenidos: “…Drug effects : drug, set and setting ; Medical marijuana and other therapeutic uses of illicit drugs ; Prescribed and over-the-counter (OTC) drugs ; Novel psychoactive substances ; The gateway hypothesis/stepping stone theory ; Drug-related violence ; Drugs and crime ; Drug risks and health harms ; Injecting drug use ; HIV/AIDS and other blood-borne viruses. -- Drug policy, treatment and perceptions of the drug problem. …”
    Enlace del recurso
    Libro electrónico
  17. 8957
    por Requena Peláez, José Miguel
    Publicado 2016
    Tabla de Contenidos: “…ADVERSE REACTIONS OF FOODS -- FREQUENCY AND PREVALENCE -- MAIN RISK GROUPS -- MAIN SYMPTOMS -- RECOMMENDATIONS IN CASE OF ALLERGIC REACTIONS OR INTOLERANCES -- ALLERGIES AND INTOLERANCES DIAGNOSIS -- PREVENTION OF INTOLERANCES AND FOOD ALLERGIES -- TREATMENT OF ALLERGIES AND INTOLERANCES -- FIRST AID IN FOOD POISONINGS -- WHAT WE HAVE LEARNED -- TEST -- LESSON 3. …”
    Libro electrónico
  18. 8958
    Publicado 2008
    Tabla de Contenidos: “…""; ""Third Case Study: High-Risk Behavior""; ""Questions""; ""Traditional Sources""; ""Contemporary Sources…”
    Click para texto completo desde fuera UPSA
    Click para texto completo desde UPSA
    Libro electrónico
  19. 8959
    por Kocis, James M.
    Publicado 2009
    Tabla de Contenidos: “…Chapter 11: The IRR and the Public Markets Part Three: Topics on Risk; Chapter 12: Performance Attribution; Chapter 13: The Concentration of Wealth; Chapter 14: The Diversification of Portfolios; Chapter 15: Cash Management Models; Part Four: Conclusions; Chapter 16: The Private Equity Professional; Chapter 17: Summary; Appendix A: Proposed Venture Capital Portfolio Valuation Guidelines; Appendix B: On-Site GP Audit Program Guide; Appendix C: Qualitative Due Diligence: Structured Interview; Appendix D: Qualitative Due Diligence: Structured Reference Calls…”
    Libro electrónico
  20. 8960
    Publicado 2005
    Tabla de Contenidos: “…Intrapersonal-Level Processes; 2 Time Orientation Measurement: A Conceptual Approach; 3 Thinking About and Acting Upon the Future: Development of Future Orientation Across the Life Span; 4 Time and Terror: Managing Temporal Consciousness and the Awareness of Mortality; 5 Time Perspective, Health, and Risk Taking; 6 Time Orientation and Economic Decision Making; 7 Future Orientation and Anxiety…”
    Libro electrónico