Mostrando 9,741 - 9,760 Resultados de 13,276 Para Buscar '"Risk"', tiempo de consulta: 0.18s Limitar resultados
  1. 9741
    Publicado 1993
    Tabla de Contenidos: “…Schwab -- The roles and relationships among the various sectors in curriculum development, 1976 / National Institute of Education -- The Tyler rationale reconsidered, 1977 / Ralph W. Tyler -- A nation at risk : the imperative for educational reform, 1983 / National Commission on Excellence in Education…”
    Libro
  2. 9742
    Publicado 2006
    Tabla de Contenidos: “…Nadig and Allen Hamdan -- Obesity, diabetes, and risk of cancer: a review of epidemiological studies / Susanna C. …”
    Libro
  3. 9743
    Publicado 2017
    Tabla de Contenidos: “…-- How to Tell the True Problem from a Distracting Tangent -- Confronting the Smartphone Problem -- Starting Small Is Still Starting -- The Power of Irimi -- Chapter 7: 呼吸Kokyu: Breath-Power -- Kokyu-Ho: Knocking Someone Over with Only a Breath -- Time to Get Uncomfortable -- One Way to Get Past Your Anxiety -- Breathing While You Work -- How to Take Control of Your Day -- Risking Failure to Succeed -- Real Risk, Real Rewards -- Creating Emotional Exhale Moments -- Try It Yourself-Today -- Chapter 8: 合気Aiki: Unity -- What I Should Have Known -- Harmony in Action -- Using Aiki in Daily Life -- Try It Yourself -- Use What You Have -- The Road Less Traveled -- Start with Self-Awareness -- Embrace Your Weaknesses -- Adapt, Improvise, and Overcome -- Do Your Own Self-Assessment -- Finding a Way -- Chapter 9: 残心Zanshin: Calm Awareness -- Real-Life Daredevils -- The Skill That Gives Spies Their Edge -- An Exercise in Zanshin -- Moments of Calm Awareness -- Prepared for the Unexpected -- Developing Zanshin -- A Moment of Truth -- The Power of Zanshin -- Chapter 10: 和Wa: Harmony -- Why the Finns Are Different -- Fighting for Peace -- Harmonious Hiring -- The New Polaroid: Winning through Cooperation -- Harmonious Progress -- Understanding How Progress Really Works -- The Honorable No -- The Honorable No That Saved My Company-and My Sanity -- Conclusion 澄み切りSumi-Kiri: Clarity of Mind and Body -- Clarity of Mind and Body -- The Road to Acceptance -- Listening to the Inner Voice -- Clearing the Way for Action -- My Teacher -- Duty and Obligation…”
    Libro electrónico
  4. 9744
    Publicado 2019
    Tabla de Contenidos: “….] -- Monitoring ICU mortality risk with a long short-term memory recurrent neural network / Ke Yu ... …”
    Libro electrónico
  5. 9745
    Publicado 2007
    Tabla de Contenidos: “…Associative Arrays and the Risks of Prototype; 3.1.3. External Libraries: Risks and Benefits; 3.2. script.aculo.us; 3.3. …”
    Libro electrónico
  6. 9746
    por Highsmith, James A., 1945-
    Publicado 2004
    Tabla de Contenidos: “…Cover -- Contents -- Preface -- Introduction -- Chapter 1: The Agile Revolution -- Innovative Product Development -- Reliable Innovation -- Continuous Innovation -- Product Adaptability -- Reduced Delivery Schedules -- People and Process Adaptability -- Reliable Results -- Core Agile Values -- Responding to Change -- Working Products -- Customer Collaboration -- Individuals and Interactions -- Agile Project Management -- Agility Defined -- The APM Framework -- Thriving in a Chaordic World -- Our Journey -- Chapter 2: Guiding Principles: Customers and Products -- Herman and Maya -- The Guiding Principles of Agile Project Management -- Deliver Customer Value -- Innovation and Adaptability -- Planning and Control to Execution -- Delivery versus Compliance -- Employ Iterative, Feature-Based Delivery -- Creating a Better Product -- Producing Earlier Benefits -- Progressive Risk Reduction -- Champion Technical Excellence -- Customers and Products -- Chapter 3: Guiding Principles: Leadership-Collaboration Management -- Management Style -- The Business of APM -- Reliable, Not Repeatable -- Progress Reporting -- Leadership-Collaboration Management -- Encourage Exploration -- Shared Space -- Encouragement Isn't Enough -- Build Adaptive (Self-Organizing, Self-Disciplined) Teams -- Getting the Right People -- Articulating the Product Vision -- Encouraging Interaction -- Participatory Decision Making -- Insisting on Accountability -- Steering, Not Controlling -- Self-Discipline -- Simplify -- Generative Rules -- Barely Sufficient Methodology -- Principles to Practices -- Chapter 4: An Agile Project Management Model -- Principles and Practices -- An Agile Process Framework -- Phase: Envision -- Phase: Speculate -- Phase: Explore -- Phase: Adapt -- Phase: Close -- Judgment Required -- Project Size -- Agile Practices -- Chapter 5: The Envision Phase…”
    Libro electrónico
  7. 9747
    Publicado 2012
    Tabla de Contenidos: “…-- Part I: Security Automation Essentials -- Chapter 1: The Security Management Problem -- Security Management Challenges -- The Number and Variety of Systems and Software to Secure -- The Need for Continuous Security Management -- The Need for a Comprehensive Picture of Enterprise Security -- The Need for Standardization in Security -- Security Requirements from Regulations and Other Sources -- The Security Automation Solution -- Security Automation Basics -- Knowledge About Individual Security Elements -- Using Checklists to Achieve Compliance -- The Evolution of Security Automation Technologies and Standards -- Enumeration Standards -- Language Standards -- Risk Measurement Standards -- Chapter 2: What Is SCAP? …”
    Libro electrónico
  8. 9748
    Publicado 2016
    Tabla de Contenidos: “…Spark pipelines for dataset preprocessing -- Dataset preprocessing automation -- Summary -- Chapter 3: A Holistic View on Spark -- Spark for a holistic view -- The use case -- Fast and easy computing -- Methods for a holistic view -- Regression modeling -- The SEM approach -- Decision trees -- Feature preparation -- PCA -- Grouping by category to use subject knowledge -- Feature selection -- Model estimation -- MLlib implementation -- The R notebooks' implementation -- Model evaluation -- Quick evaluations -- RMSE -- ROC curves -- Results explanation -- Impact assessments -- Deployment -- Dashboard -- Rules -- Summary -- Chapter 4: Fraud Detection on Spark -- Spark for fraud detection -- The use case -- Distributed computing -- Methods for fraud detection -- Random forest -- Decision trees -- Feature preparation -- Feature extraction from LogFile -- Data merging -- Model estimation -- MLlib implementation -- R notebooks implementation -- Model evaluation -- A quick evaluation -- Confusion matrix and false positive ratios -- Results explanation -- Big influencers and their impacts -- Deploying fraud detection -- Rules -- Scoring -- Summary -- Chapter 5: Risk Scoring on Spark -- Spark for risk scoring -- The use case -- Apache Spark notebooks -- Methods of risk scoring -- Logistic regression -- Preparing coding in R -- Random forest and decision trees -- Preparing coding -- Data and feature preparation -- OpenRefine -- Model estimation -- The DataScientistWorkbench for R notebooks -- R notebooks implementation -- Model evaluation -- Confusion matrix -- ROC -- Kolmogorov-Smirnov -- Results explanation -- Big influencers and their impacts -- Deployment -- Scoring -- Summary -- Chapter 6: Churn Prediction on Spark -- Spark for churn prediction -- The use case -- Spark computing -- Methods for churn prediction -- Regression models…”
    Libro electrónico
  9. 9749
    por Tyson, Eric
    Publicado 2019
    Tabla de Contenidos: “…Understanding Investment Returns -- Sizing Investment Risks -- Comparing the risks of stocks and bonds -- Focusing on the risks you can control -- Discovering low-risk, high-return investments -- Diversifying Your Investments -- Spreading the wealth: Asset allocation -- Allocating money for the long term -- Sticking with your allocations: Don't trade -- Investing lump sums via dollar-cost averaging -- Acknowledging Differences among Investment Firms -- Focusing on the best firms -- Places to consider avoiding -- Seeing through Experts Who Predict the Future -- Investment newsletters -- Investment gurus -- Leaving You with Some Final Advice -- Chapter 9 Understanding Your Investment Choices -- Slow and Steady Investments -- Transaction/checking accounts -- Savings accounts and money-market funds -- Bonds -- Building Wealth with Ownership Vehicles -- Socking your money away in stocks -- Investing internationally in stocks -- Generating wealth with real estate -- Investing in small business (and your career) -- Off the Beaten Path: Investment Odds and Ends -- Precious metals -- Bitcoin and other cryptocurrencies -- Annuities -- Collectibles -- Chapter 10 Investing in Funds -- Understanding the Benefits of Mutual Funds and Exchange-Traded Funds -- Exploring Various Fund Types -- Money-market funds -- Bond funds -- Stock funds -- Balancing bonds and stocks: Hybrid funds -- U.S., international, and global funds -- Index funds -- Specialty (sector) funds -- Selecting the Best Funds -- Reading prospectuses and annual reports -- Keeping costs low -- Evaluating historic performance -- Assessing fund manager and fund family reputations -- Rating tax friendliness -- Determining your needs and goals -- Deciphering Your Fund's Performance -- Dividends -- Capital gains -- Share price changes -- Evaluating and Selling Your Funds…”
    Libro electrónico
  10. 9750
    Publicado 2024
    Tabla de Contenidos: “…-- 1.1.2 Open-Source Intelligence (OSINT) and Social Engineering -- 1.2 Impact of Social Engineering -- 1.2.1 Financial Losses -- 1.2.2 Loss of Productivity -- 1.2.3 Cyberattacks Cause Business Disruption -- 1.2.4 Loss of Reputation -- 1.3 Types of Social Engineering Attacks -- 1.3.1 Phishing Attacks -- 1.3.2 What Attributes Make Some People More Susceptible to Phishing Attacks than Others -- 1.3.3 Identification of a Social Engineering Attack -- 1.4 Use of AI in Social Engineering Attacks -- 1.4.1 Most Infamous Cases of Social Engineering -- 1.5 Conclusion -- Chapter 2 Social Engineering -- 2.1 Introduction -- 2.2 Related Work -- 2.3 Methodology -- 2.3.1 Reconnaissance -- 2.3.2 Planning -- 2.3.3 Building Trust -- 2.3.4 Exploitation -- 2.3.5 Exit/Escape -- 2.4 Discussion -- 2.5 Conclusion -- Chapter 3 Cybersecurity Risks, Vulnerabilities, and Countermeasures to Prevent Social Engineering Attacks -- 3.1 Introduction -- 3.2 Social Engineering and Its Role in Cyber-Theft -- 3.2.1 The Role of Social Engineering in Cyber-Theft -- 3.3 Vulnerabilities -- 3.3.1 Risks and Challenges -- 3.4 Current Cybersecurity Risks -- 3.4.1 Cybersecurity Challenges -- 3.4.2 Mitigating the Threat of Social Engineering -- 3.5 Conclusion -- Chapter 4 A Case Study on Packet Sniffers: Tools, Techniques, and Tactics -- 4.1 Introduction -- 4.2 Objective -- 4.3 Sniffing in a Wireless Network -- 4.4 Types of Sniffing Methods -- 4.4.1 Sniffing Can Be Done in Two Ways -- 4.5 Sniffing Uses -- 4.5.1 Ethical Uses -- 4.5.2 Unethical Uses -- 4.6 Sniffing Procedure -- 4.7 Use of Sniffer Tools -- 4.7.1 Ettercap Sniffer Tool…”
    Libro electrónico
  11. 9751
    Publicado 2023
    Tabla de Contenidos: “…-- Summary -- Further reading -- Chapter 2: Modern Software Development in Google Cloud -- What does a developer do? -- The risks of traditional software development -- Software bugs -- Slow development -- Resource exhaustion -- Lack of resiliency and fault tolerance -- Failing to estimate usage patterns -- Lack of proper monitoring and risk management -- Unclear priorities, accountability, and ownership -- Security approach -- Lost source code -- How modern software development mitigates risks -- Software bugs -- Resource exhaustion and slow development -- Lack of resiliency and fault tolerance -- Failure to estimate usage patterns -- Lack of proper monitoring and risk management -- Unclear priorities, accountability, and ownership -- Security approach -- The benefits of implementing modern software development on Google Cloud -- Built for agility, elasticity, and reliability -- Security at the core -- Built for developers -- Google Cloud toolbox for developers -- Migration and development paths to run your code on Google Cloud -- Migration checklist -- Migrate or refactor? …”
    Libro electrónico
  12. 9752
    Publicado 2019
    Tabla de Contenidos: “…-- Types of Flexibility -- The Value of Strategic Flexibility -- Incorporating Risk in Strategic Decision Making -- Limitations of Risk Based Decision Making Under Uncertainty -- Valuing Flexibility -- Strategy in Depth: The Black‐Scholes Model for Valuing Financial Options -- Research Made Relevant: The Value of Real Options Thinking -- Strategic Flexibility and Sustained Competitive Advantage -- Rare and Costly‐to‐Imitate Flexibility -- Organizing to Implement Strategic Flexibility -- Ethics and Strategy Feature: Treating Employees as Flexible Assets -- Summary -- Challenge Questions -- Problem Set -- End Notes -- CHAPTER 7 Collusion -- A Gas Station Conundrum -- What is Collusion? …”
    Libro electrónico
  13. 9753
    por OECD
    Publicado 2020
    Tabla de Contenidos: “…How CPBs' strategies and policies apply to the full supply chain -- 3.3. Risk management frameworks of CPBs -- 3.4. Challenges of supply chain risk management throughout the procurement cycle -- 3.4.1. …”
    Libro electrónico
  14. 9754
    Publicado 2019
    Seriada digital
  15. 9755
    Publicado 2023
    Tabla de Contenidos: “…-- Security and compliance -- Cost optimization -- Standardization and consistency -- Risk management -- How to govern infrastructure with Terraform -- Resource provisioning with Terraform -- Summary -- Chapter 14: Building a Secure Infrastructure with AWS Terraform -- What is security in infrastructure? …”
    Libro electrónico
  16. 9756
    por Viega, John
    Publicado 2003
    Tabla de Contenidos: “…See Also1.4. Limiting Risk with Privilege Separation; 1.4.2. Solution; 1.4.3. …”
    Libro electrónico
  17. 9757
    Publicado 2015
    Tabla de Contenidos: “…; 1.2 Revealed Preference; 1.2.1 Independence of irrelevant alternatives; 1.2.1.1 Aesop; 1.2.1.2 Utility; 1.2.1.3 Causal utility fallacy; 1.2.2 Revealed preference in game theory; 1.3 Decisions under Risk; 1.3.1 VN&M utility functions; 1.3.1.1 Attitudes to risk; 1.3.1.2 Unbounded utility?…”
    Libro electrónico
  18. 9758
    Publicado 2024
    Tabla de Contenidos: “…Introduction to data analysis at scale -- Data analysis on AWS -- AWS services -- Analysis on the cloud and outside -- Third-party data services -- Designing AWS flow diagrams with data analysis -- Practical - smart home insights with AWS IoT Analytics -- Industrial data analytics -- Evaluating performance -- Use cases within industry -- A case study for data analytics -- Practical - creating a data pipeline for end-to-end data ingestion and analysis -- Creating a channel -- Creating a data store -- Creating a pipeline -- Ingesting data -- Monitoring ingested data -- Creating a dataset from the data -- Summary -- Further reading -- Chapter 11: Examining Security and Privacy in IoT -- Technical requirements -- The current state of risk and security within IoT -- Challenges within security on IoT networks -- Security recommendations -- Security and privacy controls within the cloud management landscape -- Types of attacks -- Security on AWS -- Automated security remediation with AWS IoT Device Defender -- Risk management within the IoT landscape -- Threat modeling for IoT systems -- Security controls -- IR -- Privacy and compliance within IoT networks -- Cryptography controls for the IoT landscape -- Schneider Electric's implementation of an IoT solution security architecture -- Practical - Creating a secure smart lock system -- Materials -- Part 1 - Setting up the Arduino board and RFID reader -- Part 2 - Arduino code for encrypted RFID communication -- Part 3 - AWS server-side setup -- Configuring the Lambda function to be triggered by AWS IoT Core -- Updating the Arduino code to receive the authentication result from AWS IoT Core -- Summary -- Further reading -- Chapter 12: Exploring and Innovating with Open Source IoT -- Technical requirements -- Introduction to community innovations within IoT -- Open source as a standard…”
    Libro electrónico
  19. 9759
    Publicado 2021
    Tabla de Contenidos: “…-- Local interpretation for a single prediction at a time using LimeTabularExplainer -- Using LIME for NLP -- Training a LightGBM model -- Local interpretation for a single prediction at a time using LimeTextExplainer -- Trying SHAP for NLP -- Comparing SHAP with LIME -- Mission accomplished -- Summary -- Dataset sources -- Further reading -- Chapter 6: Anchors and Counterfactual Explanations -- Technical requirements -- The mission -- Unfair bias in recidivism risk assessments -- The approach -- The preparations -- Loading the libraries -- Understanding and preparing the data -- The data dictionary -- Examining predictive bias with confusion matrices -- Data preparation -- Modeling -- Getting acquainted with our "instance of interest" -- Understanding anchor explanations -- Preparations for anchor and counterfactual explanations with alibi -- Local interpretations for anchor explanations -- Exploring counterfactual explanations -- Counterfactual explanations guided by prototypes -- Counterfactual instances and much more with WIT -- Configuring WIT -- Datapoint editor -- Performance &amp -- Fairness -- Mission accomplished -- Summary -- Dataset sources -- Further reading -- Chapter 7: Visualizing Convolutional Neural Networks -- Technical requirements -- The mission -- The approach -- Preparations -- Loading the libraries -- Understanding and preparing the data -- Data preparation -- Inspect data -- The CNN models -- Load the CNN model…”
    Libro electrónico
  20. 9760
    por Gray, Patrick, 1977-
    Publicado 2007
    Tabla de Contenidos: “…Talking the TalkC-Suite Conversations: Greg Buoncontri, CIO of Pitney Bowes; Chapter 4: Clear the Benches; Continually Improving the Skills of Your People; Meaningfully Evaluating Your People; Chapter 5: Milking the Cow; Developing a Project Investment Mix; The PASRBRTKO: Project Analyzing, Selecting, Risk-assessing, Budgeting, Returns Tracking, and Killing Office; Auditioning and Initiating Projects; Monitoring and Controlling Projects; Closing and Capturing Knowledge; What the PMO Is Not; Chapter 6: Show Me the Money; The Right Stuff: Determining What to Measure; Managing to the Metrics…”
    Libro electrónico