Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
10041Publicado 2000Tabla de Contenidos: “…Morality, 'the family' and media regulation Feminist magazine scholarship and women's magazines ; Shifting cultures of femininity in the 1990s ; Endnotes ; References ; 13 A social drama: media violence controversies and anti-violence campaign groups ; Introduction ; A brief overview of British anti-violence campaign groups ; Media violence controversies and the social drama of risk ; Ethics and media violence ; Endnotes ; References ; 14 Consuming interests in a culture of secrecy ; Introduction ; The power of secrecy ; A multitude of sins ; Evaluating news ; Squaring the circle ; Endnotes…”
Libro electrónico -
10042
-
10043por Seidman, DovTabla de Contenidos: “…Part II: How We ThinkIntroduction: The Paradox of Journey; Chapter 4: Playing to Your Strengths; Help; You Can Judge a Book by Its Cover; Looking Out for Number Two; The Evolution of What Is Valuable; Believe It; Chapter 5: From Can to Should; Rules as Proxies; Dancing with Rules; On the Tip of Your Tongue; Unlocking Should; Risk and Reward; Chapter 6: Keeping Your Head in the Game; Distraction; Small Lapses, Large Costs; Dissonance; Doing Consonance; Friction; Putting It in the Whole; Part III: How We Behave; Introduction: How We Do What We Do; Chapter 7: Doing Transparency…”
Publicado 2007
Libro electrónico -
10044Publicado 2014Tabla de Contenidos: “…Title Page; Copyright Page; Table of Contents; Manuscript Summary; Acknowledgements; List of Tables; List of Figures; Chapter 1-Introduction; 1.1 - Problem Articulation; 1.2 - Conceptual Context and Research Gap; 1.3 - Research Purpose, Objectives, and Research Questions; 1.4 - Manuscript Structure; Chapter 2-Literature Review; 2.1 - Capital Management of Projects: Integrating Risk Management and Design Flexibility at Front-End Strategizing; 2.2 - Real Options: Theory and Practice; 2.3 - Final Considerations; Chapter 3-Research Method; 3.1 - Research Design…”
Libro electrónico -
10045Publicado 2018Tabla de Contenidos: “…Blockchain for fraud-free emissions management -- Central banks and blockchains: the case for managing climate risk with a positive carbon price / Delton B. Chen -- Carbon deposits: using soil and blockchains to achieve net-zero emissions / Edward Dodge -- Blockchain ecosystem for carbon markets, environmental assets, rights, and liabilities: concept design and implementation / Anton Galenovich, Sergey Lonshakov and Alexey Shadrin -- How a blockchain network can ensure compliance with clean development mechanism methodology and reduce uncertainty about achieving intended nationally determined contributions / Steven Dunkel -- Networked carbon markets: permissionless innovation with distributed ledgers? …”
Libro electrónico -
10046por Rochkind, Marc. authorTabla de Contenidos: “…; ""Projects Have Three Dimensions""; ""Requirements""; ""The Development Team""; ""Hiring the Best""; ""The Schedule""; ""Scheduling the Unknowable""; ""A Scheduling Example""; ""Why Projects Fail""; ""Poor Requirements""; ""Weak Team""; ""Failure to Prototype High-Risk Features""; ""Bad Design""; ""Poor Development Processes""…”
Publicado 2013
Libro electrónico -
10047por Olausson, Mathias. author, Rossberg, Joachim. author, Ehn, Jakob. author, Skld, Mattias. authorTabla de Contenidos: “…""Scrum Process Template""""Work Items""; ""TF Service Web Access""; ""Charts and Queries""; ""Project Startup Phase""; ""PO Sets Off to Work""; ""Building the Initial Team""; ""Requirements""; ""Building the Backlog""; ""Adding Backlog Items in TF Service""; ""Definition of Done""; ""Estimation""; ""Poker Planning/Story Points""; ""Updating the PBI""; ""Risk Assessment""; ""Updating the Backlog Order""; ""Grooming the Backlog""; ""Building the Team""; ""Summary""; ""Chapter 6: Managing Teams and Alerts""; ""Adding Team Members""; ""Creating New Teams""…”
Publicado 2013
Libro electrónico -
10048Publicado 2015Tabla de Contenidos: “…Fuzzing for Software AssuranceThe Scientific Method and the Software Development Life Cycle; Adversarial Models; Case Study: The Risk of Software Exploitability; A New Experiment; How to Find More Information; Conclusion; References; Chapter 5. …”
Libro electrónico -
10049Publicado 2015Tabla de Contenidos: “…; ""Awaken New Leaders""; ""Develop Their Personal Brand""; ""Put Them in the Hot Seat""; ""When Sponsorship Fails""; ""Provide Air Cover for Risk Taking""; ""Coaching Moments""; ""Epilogue""…”
Libro electrónico -
10050por International Conference on Environmental Science and Information Application TechnologyTabla de Contenidos: “…The study of soil remediation objectives based on the human risk assessment-a case study of PAH-contaminated soil in NanjingCo-biodegradation of phenolic compounds of coke wastewater by two bacteria; Analysis on dynamic evolution and driving force of land-use landscape in Shandan County; Accumulated sand-belt along the oasis fringe and its ecological significance in Hexi of Gansu; The revelation of the experience of urban water landscape used in leisure tourism of the United States to China…”
Publicado 2015
Libro electrónico -
10051Publicado 2015Tabla de Contenidos: “…""Part Two: Investment Policy Formulation: Goals-Based Allocation""""Chapter 4: A Brief Journey through Institutional Theory""; ""Five Important Features of the Typical Institutional Investment Organization""; ""A Quick Detour via Asset Liability Management""; ""Summary and Conclusions""; ""Chapter 5: Mapping Institutional and Individual Issues""; ""The First Crucial Difference""; ""A Second Important Difference""; ""A Different Way of Defining Risk""; ""The Law of Large Numbers""; ""Implications""; ""Summary and Conclusions""; ""Chapter 6: Goals-Based Strategic Asset Allocation""…”
Libro electrónico -
10052Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1 - Introduction to Explainable Deep Learning Anomaly Detection -- Chapter 1: Understanding Deep Learning Anomaly Detection -- Technical Requirements -- Exploring types of anomalies -- Discovering real-world use cases -- Detecting fraud -- Predicting industrial maintenance -- Diagnosing medical conditions -- Monitoring cybersecurity threats -- Reducing environmental impact -- Recommending financial strategies -- Considering when to use deep learning and what for -- Understanding challenges and opportunities -- Summary -- Chapter 2: Understanding Explainable AI -- Understanding the basics of XAI -- Differentiating explainability versus interpretability -- Contextualizing stakeholder needs -- Implementing XAI -- Reviewing XAI significance -- Considering the right to explanation -- Driving inclusion with XAI -- Mitigating business risks -- Choosing XAI techniques -- Summary -- Part 2 - Building an Explainable Deep Learning Anomaly Detector -- Chapter 3: Natural Language Processing Anomaly Explainability -- Technical requirements -- Understanding natural language processing -- Reviewing AutoGluon -- Problem -- Solution walk-through -- Exercise -- Chapter 4: Time Series Anomaly Explainability -- Understanding time series -- Understanding explainable deep anomaly detection for time series -- Technical requirements -- The problem -- Solution walkthrough -- Exercise -- Summary -- Chapter 5: Computer Vision Anomaly Explainability -- Reviewing visual anomaly detection -- Reviewing image-level visual anomaly detection -- Reviewing pixel-level visual anomaly detection -- Integrating deep visual anomaly detection with XAI -- Technical requirements -- Problem -- Solution walkthrough -- Exercise -- Summary…”
Libro electrónico -
10053Publicado 2023Tabla de Contenidos: “…-- Shots Fired -- ASICBoost -- Chapter 9 The Future Is Born -- The Ethereum Team -- Blast Off -- The DAO -- Chapter 10 Digital Gold Transformation -- Bitcoin Becomes Digital Gold -- Halving -- The CEO Of Bitcoin -- Chapter 11 Crypto Turning Point -- Buy Bitcoin -- Moonboys and Lambos -- Chapter 12 New Layer to the Internet -- DeFi -- The Challengers -- Chapter 13 Brave New World -- Stablecoins -- Oracles -- Memecoins -- Community Coins -- Chapter 14 Investment Prep -- Step One: Researching -- Step Two: Choosing -- Bitcoin ATM -- Centralized Exchanges (CEX) -- Decentralized Exchanges (DEX) -- Step Three: Deploying Capital -- Chapter 15 Tips of the Trade -- Trading Tokens -- Some Trading Caveats -- Trader Training -- Charting -- Trendspotting -- Types of Trading -- Spot Trading -- Leveraged Trading -- Risk Management -- Nothing Ventured, Nothing Gained -- Chapter 16 Non-Fungible Tokens (NFTs) -- Historical NFTs -- CryptoPunks -- CryptoKitties -- The Next Generation -- NBA Topshot -- Art Blocks -- Beeple -- Drift -- Bored Ape Yacht Club -- The Next-Next Generation -- Chapter 17 Web3 and the Metaverse -- The Metaverse -- Not a New Idea…”
Libro electrónico -
10054Publicado 2022Tabla de Contenidos: “…Fins -- Strengthening the power of health care insurers to regulate medical device risks / David Rosenberg & Adeyemi Adediran…”
Libro electrónico -
10055por Organisation for Economic Co-operation and Development.Tabla de Contenidos: “…Tools for the promotion of techniques""; ""Figure 4. A taxonomy of alarm: risk perceptions hostile to new technologies""; ""Figure 5. …”
Publicado 2001
Libro electrónico -
10056Publicado 2015Tabla de Contenidos: “…; Probable Improbabilities; Saddam and I; Taking Tiny Risks; A Million-to-One Shot, Doc, Million to One!…”
Libro electrónico -
10057Publicado 2008Tabla de Contenidos: “…Hypothesis testing of a single population; Concept of Hypothesis Testing; Hypothesis Testing for the Mean Value; Hypothesis Testing for Proportions; The Probability Value in Testing Hypothesis; Risks in Hypothesis Testing; Chapter Summary; Exercise Problems; 9. …”
Libro electrónico -
10058por Biafore, BonnieTabla de Contenidos: “…Manage Your Portfolio; What's Investment Portfolio Management?; Return vs. Risk; Asset Allocation; Choosing an Asset Allocation Plan; Asset Allocation Made Ridiculously Easy; Reviewing Your Portfolio; Rebalancing Your Portfolio; Getting Back On Track; Part 3. …”
Publicado 2010
Libro electrónico -
10059Publicado 2016Tabla de Contenidos: “…Humor, love, rumors, and all the rest; 9 Exposure to Spam and Protection Strategies.; 9.1. Risk behaviors; 9.2. Protection strategies; 9.3. …”
Libro electrónico -
10060por Palmer, SallyTabla de Contenidos: “…; The qualities of a good leader; Leadership and power; Types of leadership; Management by walking about; Delegation; Types of delegation; The benefits of delegation; How to delegate successfully; The risks of delegation; Summary; Review and discussion questions; Case study; Work-based assignment; 6 Training and developing your team; Learning objectives; Introduction; The purpose of appraisal; The features of a good appraisal system…”
Publicado 1998
Libro electrónico