Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
10141Publicado 2022Tabla de Contenidos: “…Chapter 16 Online Activism and Athlete Advocacy in Professional Women's Golf Risk Or Reward? -- Introduction -- Digital Media and Female Athletes -- Professional Women's Golf -- Meghan MacLaren -- Perspectives -- Activism and Advocacy to this Point -- Methodological Approach -- Meghan MacLaren's Response: October 2020 -- The Risks and Rewards of Athlete Activism -- Conclusion -- Acknowledgement -- References -- Chapter 17 Psychological Benefits for the Athlete Activist -- Introduction -- Resilience and Minority Stress -- Psychological Benefits of Activism -- Resilience and Athlete Activism -- A Call to Action -- Note -- References -- Index…”
Libro electrónico -
10142Publicado 1996Tabla de Contenidos: “…Lower-Extremity Amputation (LEA) -- POTENTIAL FOR PREVENTION -- Prevention of NIDDM -- High-Risk Strategy -- Population Strategy -- Potential Benefit from Prevention -- Prevention of Complications -- Early Detection of NIDDM -- Blood Glucose Control -- Early Detection and Management of Complications -- RESEARCH TO FACILITATE PREVENTION OF NIDDM AND ITS COMPLICATIONS -- Population-based Primary Prevention -- Blood Glucose Control -- Economic Appraisal -- References -- 13 Healthcare Utilization, Expenditures, and Insurance Coverage for American Indians and Alaska Natives Eligible for the... -- INTRODUCTION -- DATA AND METHODS -- Sources of Data -- Definition of Key Variables -- Data Limitations -- FINDINGS -- Characteristics and Healthcare Coverage of the SAIAN Population -- Regular Source of Healthcare -- Use of Healthcare Services -- Out-Of-Pocket Expenditures -- DISCUSSION -- References…”
Libro electrónico -
10143Publicado 2018Tabla de Contenidos: “…Solutions 130 Chapter 35: Opportunity Assessment Technique 131 Chapter 36: Customer Letter Technique 133 Chapter 37: Startup Canvas Technique 135 Breakout: The Biggest Risk 136 Discovery Planning Techniques 138 Chapter 38: Story Map Technique 139 Chapter 39: Customer Discovery Program Technique 141 Breakout: Defining Product/Market Fit 147 Chapter 40: Profile: Martina Lauchengco of Microsoft 148 Discovery Ideation Techniques 150 Chapter 41: Customer Interviews 151 Chapter 42: Concierge Test Technique 153 Chapter 43: The Power of Customer Misbehavior Technique 154 Breakout: The Power of Developer Misbehavior 156 Chapter 44: Hack Days 157 Discovery Prototyping Techniques 158 Chapter 45: Principles of Prototypes 160 Chapter 46: Feasibility Prototype Technique 161 Chapter 47: User Prototype Technique 163 Chapter 48: Live-Data Prototype Technique 165 Chapter 49: Hybrid Prototype Technique 167 Discovery Testing Techniques 168 Chapter 50: Testing Usability 169 Chapter 51: Testing Value 174 Chapter 52: Demand Testing Techniques 176 Breakout: Discovery Testing in Risk-Averse Companies 178 Chapter 53: Qualitative Value Testing Techniques 180 Chapter 54: Quantitative Value Testing Techniques 183 Breakout: The Role of Analytics 185 Breakout: Flying Blind 188 Chapter 55: Testing Feasibility 190 Breakout: Discovery for Hardware Products 192 Chapter 56: Testing Business Viability 193 Breakout: User Test vs. …”
Libro electrónico -
10144Publicado 2023Tabla de Contenidos: “…. -- 3.4 Explain data security risks and mitigation strategies. -- 3.5 Given a scenario, apply server hardening methods. -- 3.6 Summarize proper server decommissioning concepts. -- 3.7 Explain the importance of backups and restores. -- 3.8 Explain the importance of disaster recovery. -- 4.1 Explain the troubleshooting theory and methodology. -- 4.2 Given a scenario, troubleshoot common hardware failures. -- 4.3 Given a scenario, troubleshoot storage problems. -- 4.4 Given a scenario, troubleshoot common OS and software problems…”
Libro electrónico -
10145por OECDTabla de Contenidos: “…Medium- to long-term response -- 3.1.3. Managing risk will be critical to use blended finance effectively in LDCs -- 3.2. …”
Publicado 2020
Libro electrónico -
10146Publicado 2024Tabla de Contenidos: “…Ethical Considerations and Risks -- Element 31 Starting Point, Threshold of Pain, and Target -- Element 32 Variables -- Element 33 The Art of Managing Non-Negotiables -- Element 34 Cross-Cultural Negotiations -- Checklist for International Negotiations -- Element 35 Emotions, Stress, and Personal Chemistry -- Personal Chemistry Is More Important Than Technique -- The Importance of Communication and Awareness -- Rational Decision-Making: A Myth -- Choosing Between Alternatives -- Irrational or Rational? …”
Libro electrónico -
10147Publicado 2023Tabla de Contenidos: “…Microsoft Authenticator App -- FIDO2 Security Keys -- Comparison -- Configuring Windows Hello -- Configuring Microsoft Authenticator -- Configuring the Authentication Policy -- Registering Devices -- Configuring FIDO2 -- Configuring the Authentication Policy -- Registering Devices -- Implementing and Managing Self-Service Password Reset -- Configuring SSPR -- Managing SSPR -- Authentication Methods -- Registration -- Notifications -- Customization -- On-premises integration -- Implementing and Managing Azure AD Password Protection -- Custom smart lockout -- Custom banned passwords -- Password protection for Windows Server Active Directory -- Configuring and Managing Multifactor Authentication -- Per-User Multifactor Authentication -- Security Defaults -- Conditional Access -- Additional Multifactor Authentication Behavior Settings -- Investigating and Resolving Authentication Issues -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 6: Implementing and Managing Secure Access -- Planning for Identity Protection -- Investigating Risks -- Remediating risks -- Implementing and Managing Azure Identity Protection -- Planning Conditional Access Policies -- Assignments -- Conditions -- Access Controls -- Implementing and Managing Conditional Access Policies -- Creating Conditional Access Policies -- Reporting on Conditional Access Policies -- Configuring a Log Analytics Workspace -- Integrating Azure AD or Entra ID Logs -- Reviewing the Workbook -- Summary -- Exam Readiness Drill - Chapter Review Questions -- Chapter 7: Managing Security Reports and Alerts by Using the Microsoft 365 Defender Portal -- Instructions to Unlock the Free Practice Resources -- Reviewing and Taking Action to Improve the Microsoft Secure Score in the Microsoft 365 Defender Portal…”
Libro electrónico -
10148por Hall, Vincent AustinTabla de Contenidos: “…Chapter 8: Limitations of Coding with LLMs -- Technical requirements -- Inherent limitations of LLMs -- Core limitations -- Other limitations to LLMs -- Evaluating LLM performance -- Overcoming inherent limitations -- Challenges in integrating LLMs into coding workflows -- Relevant workflow example -- Security risks -- IP concerns -- Dependency management -- Explainability -- Future research directions to address limitations -- Continuous learning -- Novel architectures -- Computational efficiency -- Specialized training -- Summary -- Bibliography -- Chapter 9: Cultivating Collaboration in LLM-Enhanced Coding -- Technical requirements -- Why share LLM-generated code? …”
Publicado 2024
Libro electrónico -
10149Publicado 2023Tabla de Contenidos: “…Measure and monitor GHG emissions, climate risks and impacts at different territorial levels -- Case 1. …”
Libro electrónico -
10150Publicado 2012“…CONCLUSIONS: Allelic variants of CFH, ARMS 2, HTRA 1 and VEGFR 2 genes modify the risk of suffering AMD Response to intravitreal ranibizumab injections is moderately influenced by CFH, VEGF A and VEGFR 2 polymorphisms Age-related macular degeneration (ARMD) is one of the most important ocular diseases due to its prevalence and the visual loss it produces…”
Enlace del recurso
Electrónico -
10151Publicado 2013“…The conclusions of this study are: 1) The population included in this study presents similar demographic features and cardiovascular risk factors profile to other populations described in Spain. …”
Enlace del recurso
Electrónico -
10152por Greenawalt, Kent, 1936-“…Using these and other case studies, Greenawalt considers how to balance the country's constitutional commitment to personal freedoms and to the separation of church and state with the vital role that religion has always played in American society. Do we risk distorting students' understanding of America's past and present by ignoring religion in public-school curricula? …”
Publicado 2005
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Biblioteca Universitat Ramon Llull)Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
10153La arquitectura de la prevención la ergonomía prospectiva y el análisis de los riesgos en el trabajoPublicado 2019Tabla de Contenidos: “…Prospective ergonomics and risk -- Abstract -- La arquitectura de la prevención -- La ergonomía prospectiva y el -- Juan Alberto Castillo M. -- Presentación -- La ergonomía prospectiva -- Introducción a la arquitectura de la prevención -- Capítulo I -- Actividad preventiva y actividad del trabajo -- 1.1. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
10154Publicado 2021“…Authored by Alain Casanovas Ysla, it provides practical insights into the implementation and application of compliance systems, focusing on risk management, governance, and the development of a compliance culture. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
10155Publicado 2014Tabla de Contenidos: “…Strategic Objective 1g: Increase the Percentage of Alumni Who Can Adapt When Change Occurs or Bounce Back After Illness, Injury, or HardshipDepression Risk Questionnaire; Summary; Ensure That Wounded Warriors Are Well-Adjusted in Body; Strategic Objective 2b: Decrease the Percentage of Alumni Whose Physical Health Problems Interfere with Work or Regular Activities; Strategic Objective 2e: Decrease the Percentage of Alumni Who Are Overweight or Obese; Summary; Ensure That Wounded Warriors Are Economically Empowered…”
Libro electrónico -
10156Publicado 2004“…Examines five accountability models--two from the manufacturing sector; a performance incentive model used in the evaluation of job training programs for the poor; accountability in the legal sector; and accountability in health care as shown by clinical practice guidelines, use of statistical risk-adjustment methods, and the public reporting of health performance measures. …”
Libro electrónico -
10157Publicado 2021Tabla de Contenidos: “…. -- Example -- Measuring your success -- Purpose -- Inputs and preconditions -- Outputs and post conditions -- How to do it... -- Managing risk -- Purpose -- Inputs and preconditions -- Outputs and post conditions -- How to do it... -- Example -- Product roadmap -- Purpose -- Inputs and preconditions -- Outputs and post conditions -- How to do it... -- Example -- Release plan -- Purpose -- Outputs and post conditions -- How to do it... -- Example -- Iteration plan -- Purpose -- Inputs and preconditions -- Outputs and post conditions -- How to do it... -- Example -- Estimating effort -- Purpose -- Inputs and preconditions -- Outputs and post conditions -- How to do it... -- How it works... -- Each team member selects one card to represent their estimate and places it face down -- Example -- Work item prioritization -- Purpose -- Inputs and preconditions -- Outputs and post conditions -- How to do it... -- How it works... -- Example -- Iteration 0 -- Purpose -- Outputs and post conditions -- How to do it... -- Example -- Architecture 0 -- Purpose -- Inputs and preconditions -- Outputs and post conditions -- How to do it... -- Example -- Organizing your models -- Purpose -- Inputs and preconditions -- Outputs and post conditions -- How to do it... -- How it works... -- Chapter 2: System Specification -- Why aren't textual requirements enough? …”
Libro electrónico -
10158Publicado 2022Tabla de Contenidos: “…-- Find the Strengths and Note the Weaknesses -- Draw the Business Risk Picture -- Do You Have a Mandate? -- What's Next? …”
Libro electrónico -
10159por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Businesses face lower bank lending rates, but higher risk premiums; Figure 21. The reallocation of labour and capital resources has been weak; Figure 22. …”
Publicado 2015
Libro electrónico -
10160por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Government projections of general government expenditures and revenues (% of GDP)""; ""Sovereign risk has risen but changes in market prices of public debt have been contained""; ""Figure 1.10. …”
Publicado 2011
Libro electrónico