Mostrando 9,961 - 9,980 Resultados de 13,276 Para Buscar '"Risk"', tiempo de consulta: 0.11s Limitar resultados
  1. 9961
    Publicado 2019
    “…Algorithmic technologies are deployed for identifying potential terrorists through vast surveillance networks, for producing sentencing guidelines and recidivism risk profiles in criminal justice systems, for demographic and psychographic targeting of bodies for advertising or propaganda, and more generally for automating the analysis of language, text, and images. …”
    Libro electrónico
  2. 9962
    por Karney, Benjamin R.
    Publicado 2007
    “…To evaluate this impact, the authors draw on marital status data in service personnel records to estimate trends in marriage and marital dissolution between 1996 and 2005 and the specific effects of time deployed to Afghanistan and Iraq on subsequent risk of ending a marriage. The results generally run counter to expectations. …”
    Libro electrónico
  3. 9963
    por Biech, Elaine
    Publicado 2021
    Tabla de Contenidos: “…Skill 39: Demonstrate Problem-Solving Ability -- Achieving Results -- Skill 40: Manage Projects -- Skill 41: Attend to Details -- Skill 42: Make Key Decisions -- Skill 43: Be Accountable -- Skill 44: Sell Ideas -- Organizational Alignment -- Skill 45: Demonstrate Business Acumen -- Skill 46: Promote the Organization's Vision and Values -- Skill 47: Initiate Process Improvement -- Skill 48: Champion and Manage Change -- Skill 49: Practice Creativity, Innovation, and Appropriate Risk Taking -- Skill 50: Market, Sell, and Develop Business -- Skill 51: Exhibit Technology, Analytics, and Data Knowledge -- Part Three: Crossing the Finish Line -- Challenge 1: Build Character -- Challenge 2: Don't Allow Your Career to Run Amok -- Challenge 3: Managers Support Employee Development -- Part Four: Support for the Race: Tools and Activities -- Balancing Career and Life Goals -- Mind Maps -- Individual Development Plan -- My Career Development Plan -- Resources and References -- Acknowledgments -- Index -- About the Author -- About ATD…”
    Libro electrónico
  4. 9964
    Publicado 2020
    “…Recent trends in research, such as affect and risk theory, serve as the basis for the discussion. …”
    Libro electrónico
  5. 9965
    Tabla de Contenidos: “…Some groups are at a very high risk of unemployment…”
    Libro electrónico
  6. 9966
    por OECD CERI Staff
    Publicado 2002
    Tabla de Contenidos: “…""Multilateral and regional trade agreements continue to apply""""Many new and complex policy challenges""; ""Agricultural support still high in many OECD countries""; ""Generous US Farm bill proposals are a risk to reform""; ""EU Agenda 2000 reforms due for review in 2002 and 2003""; ""URAA has been influential in the agricultural reform process""; ""Table 4. …”
    Libro electrónico
  7. 9967
    Tabla de Contenidos: “…Household debt is low, and the risk profile of new mortgages has been reducedAdjusting the fiscal framework to better address the nation's economic and social needs; Figure 7. …”
    Libro electrónico
  8. 9968
    Tabla de Contenidos: “…Summary: a profile of at-risk fishery workers and fishers""; ""IV. Summaries of case studies of adjustment""; ""A. …”
    Libro electrónico
  9. 9969
    Publicado 2015
    “…In the business world, when teams are not aligned and don't collaborate across the various boundaries, they put the whole organisation at risk. This irritates customers, frustrates employees and causes countless lost opportunities. …”
    Libro electrónico
  10. 9970
    Publicado 2016
    Tabla de Contenidos: “…Reputation: An Asset of Increasing Value -- A Competitive Factor -- In Pursuit of "Perfect Information" -- Who Owns Reputation? -- Reputation, Risk, and Creating Opportunity -- Chapter Seven Co-Creation Is Essential for Aligning Brands and Customers -- Relationships Still Matter -- Shared and Aligned Values -- Have We Reached the Summit? …”
    Libro electrónico
  11. 9971
    Publicado 2016
    Tabla de Contenidos: “…; INTRODUCTION; 'BEST PRACTICE' VERSUS 'GOOD PRACTICE'; THE ITIL FRAMEWORK; THE ITIL CORE; COMPLEMENTARY MATERIAL; RELATED MATERIAL; THE ITIL SERVICE MANAGEMENT MODEL; KEY CONCEPTS; SECTION 2: THE SERVICE LIFECYCLE; 2 SERVICE STRATEGY; INTRODUCTION; GOVERNANCE; RISK; KEY PROCESSES; IT SERVICE PROVIDER TYPES; THE FOUR PS OF STRATEGY; SERVICE MANAGEMENT AS A STRATEGIC ASSET…”
    Libro electrónico
  12. 9972
    Publicado 2018
    Tabla de Contenidos: “…Marketing Analytics -- Introduction -- RFM Analysis -- Response Modeling -- Churn Prediction -- X-selling -- Customer Segmentation -- Customer Lifetime Value -- Customer Journey -- Recommender Systems -- Fraud Analytics -- Credit Risk Analytics -- HR Analytics -- Conclusion -- Review Questions -- Multiple Choice Questions -- Open Questions -- Note -- References -- Chapter 4: Uplift Modeling -- Introduction -- The Case for Uplift Modeling: Response Modeling -- Effects of a Treatment -- Experimental Design, Data Collection, and Data Preprocessing -- Experimental Design -- Campaign Measurement of Model Effectiveness -- Uplift Modeling Methods -- Two-Model Approach -- Regression-Based Approaches -- Tree-Based Approaches -- Ensembles -- Continuous or Ordered Outcomes -- Evaluation of Uplift Models -- Visual Evaluation Approaches -- Performance Metrics -- Practical Guidelines -- Two-Step Approach for Developing Uplift Models -- Implementations and Software -- Conclusion -- Review Questions -- Multiple Choice Questions -- Open Questions -- Note -- References -- Chapter 5: Profit-Driven Analytical Techniques -- Introduction -- Profit-Driven Predictive Analytics -- The Case for Profit-Driven Predictive Analytics -- Cost Matrix -- Cost-Sensitive Decision Making with Cost-Insensitive Classification Models -- Cost-Sensitive Classification Framework -- Cost-Sensitive Classification -- Pre-Training Methods -- During-Training Methods -- Post-Training Methods -- Evaluation of Cost-Sensitive Classification Models -- Imbalanced Class Distribution -- Implementations -- Cost-Sensitive Regression -- The Case for Profit-Driven Regression -- Cost-Sensitive Learning for Regression -- During Training Methods -- Post-Training Methods -- Profit-Driven Descriptive Analytics -- Profit-Driven Segmentation -- Profit-Driven Association Rules -- Conclusion -- Review Questions…”
    Libro electrónico
  13. 9973
    Publicado 2014
    “…Both the identity of dance and that of theory are at risk as soon as the two intertwine. This anthology collects observations by choreographers and scholars, dancers, dramaturges and dance theorists in an effort to trace the multiple ways in which dance and theory correlate and redefine each other: What is the nature of their relationship? …”
    Libro electrónico
  14. 9974
    Publicado 2024
    “…Learn from real-world examples how leveraging AI, including machine learning and generative AI, is imperative for businesses to navigate risk, drive value, and gain a competitive advantage Key Features Understand machine learning and generative AI terminology, concepts, and the AI technology stack. …”
    Libro electrónico
  15. 9975
    Publicado 2025
    Tabla de Contenidos: “…Your Yellow Brick Road -- Chapter 9 Real-World Application -- Health -- Wealth -- Relationships -- Factors That Keep Organizations Stuck -- Resistance to Change -- Lack of Vision or Strategy -- Bureaucracy and Hierarchy -- Risk Aversion -- Complacency (the Success Trap) -- Chapter 10 Accepting Feedback (without Letting It Defeat You) -- Chapter 11 Overcoming Pitfalls -- Pitfall 1: You Buy the Book but Don't Implement the Process Fully -- Pitfall 2: You Let the Illusion of a Simple Process Make You Think It's Going to Be Easy -- Pitfall 3: You Choose to Stay Stuck in One of the Phases -- Stuck in Subconscious Conscious Phase -- Stuck in Conscious Communicated Phase -- Stuck in Communicated Broadcasted Phase -- Chapter 12 Mentoring Others -- References -- About the Author -- Index -- EULA…”
    Libro electrónico
  16. 9976
    Publicado 2006
    Tabla de Contenidos: “…OVERVIEW OF INFORMATION ASSURANCE TECHNOLOGIESINTRUSION MASKING TECHNOLOGIES; DEFENSE IN DEPTH TECHNOLOGIES; CONCLUSION; ACKNOWLEDGMENT; GLOSSARY; CROSS REFERENCES; REFERENCES; PART 2: Social and Legal Issues; The Legal Implications of Information Security: Regulatory Compliance and Liability; INTRODUCTION; WHAT IS AT RISK?; STATUTORY AND REGULATORY COMPLIANCE; CONTRACTUAL LIABILITY; TORT LIABILITY; CONCLUSION; GLOSSARY; CROSS REFERENCES; REFERENCES; Hackers, Crackers, and Computer Criminals; INTRODUCTION; DEFINITIONS AND EXAMPLES; TACTICS, TECHNOLOGIES, AND TECHNIQUES…”
    Libro electrónico
  17. 9977
    Publicado 2008
    Tabla de Contenidos: “…Cover -- Contents -- Foreword -- Introduction -- Part I: Introduction to Network Security Solutions -- Chapter 1 Overview of Network Security Technologies -- Firewalls -- Virtual Private Networks (VPN) -- Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) -- Anomaly Detection Systems -- Authentication, Authorization, and Accounting (AAA) and Identity Management -- Network Admission Control -- Routing Mechanisms as Security Tools -- Summary -- Part II: Security Lifestyle: Frameworks and Methodologies -- Chapter 2 Preparation Phase -- Risk Analysis -- Social Engineering -- Security Intelligence -- Creating a Computer Security Incident Response Team (CSIRT) -- Building Strong Security Policies -- Infrastructure Protection -- Endpoint Security -- Network Admission Control -- Summary -- Chapter 3 Identifying and Classifying Security Threats -- Network Visibility -- Telemetry and Anomaly Detection -- Intrusion Detection and Intrusion Prevention Systems (IDS/IPS) -- Summary -- Chapter 4 Traceback -- Traceback in the Service Provider Environment -- Traceback in the Enterprise -- Summary -- Chapter 5 Reacting to Security Incidents -- Adequate Incident-Handling Policies and Procedures -- Laws and Computer Crimes -- Security Incident Mitigation Tools -- Forensics -- Summary -- Chapter 6 Postmortem and Improvement -- Collected Incident Data -- Root-Cause Analysis and Lessons Learned -- Building an Action Plan -- Summary -- Chapter 7 Proactive Security Framework -- SAVE Versus ITU-T X.805 -- Identity and Trust -- Visibility -- Correlation -- Instrumentation and Management -- Isolation and Virtualization -- Policy Enforcement -- Visualization Techniques -- Summary -- Part III: Defense-In-Depth Applied -- Chapter 8 Wireless Security -- Overview of Cisco Unified Wireless Network Architecture…”
    Libro electrónico
  18. 9978
    por Shaul, Josh
    Publicado 2007
    “…This book will help the DBA to assess their current level of risk as well as their existing security posture. …”
    Libro electrónico
  19. 9979
    Publicado 2005
    Tabla de Contenidos: “…Chapter 31: Escalate Is Not a Dirty WordChapter 32: Declare Your Project's Risk Value; Chapter 33: How to Run an Effective Meeting; Chapter 34: The S-Shape Curve 50/70 Rule; Part Six: Project Closeout; Chapter 35: Conducting a Post-Project Review; Part Seven: Promoting the Advancement of Project Management beyond Your Projects; Chapter 36: Project Review Mentoring Workshops; Chapter 37: The Project Manager/Resource Manager Leadership Workshop; Chapter 38: How to Institutionalize Improvements in Your Organization; Part Eight: Some Final Thoughts; Glossary; Index…”
    Libro electrónico
  20. 9980
    Publicado 2008
    Tabla de Contenidos: “…CHAPTER 8 Your Station Is the Logical SolutionPART II: Writing Genius Creative Whether You're a Creative Genius or Not; CHAPTER 9 Recognizing Creative Problems; CHAPTER 10 Creating a Centerpiece for Your Commercial; CHAPTER 11 Making the Spot Emotional; CHAPTER 12 Solving Consumer Problems Without Clichés; CHAPTER 13 Telling Your Target Market What to Do; PART III: Demonstrating That Using Your Station Is Not a Gamble, but a Good, Calculated Risk; CHAPTER 14 Calculating Return on Investment (ROI) and Managing Client Expectations; CHAPTER 15 Explaining the Pure Logic of Buying Your Station…”
    Libro electrónico