Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
10241por Dube, RogerTabla de Contenidos: “…Key Distribution for Software-Based PRGsKey Distribution; Key Storage; Key Use; Key Distribution for Hardware-Based RNGs; Creation of RNGs; Initialization of RNGs; Distribution of RNGs; Key Storage and Use; Minimizing Hardware Attack Risks; References; 4 THE QUALITIES OF WORKABLE SECURITY SOLUTIONS; Secure Coprocessors; Attack Vectors; Techniques for Creating Strong Coprocessors; Secure Bootstrap Loading; Protection of the Bootstrap Process; Secure Memory Management; Protection of Memory Management; Trusted Platform Module; TPM Attack Vectors; LaGrande (Trusted Execution Technology)…”
Publicado 2008
Libro electrónico -
10242por Wysocki, Robert K.Tabla de Contenidos: “…; Defining a Project; Sequence of Activities; Unique Activities; Complex Activities; Connected Activities; One Goal; Specified Time; Within Budget; According to Specification; A Business-focused Definition of a Project; An Intuitive View of the Project Landscape; Defining a Program; Defining a Portfolio; The Enterprise Level; Understanding the Scope Triangle; Scope; Quality; Cost; Time; Resources; Risk; Envisioning the Scope Triangle as a System in Balance…”
Publicado 2014
Libro electrónico -
10243por Cohen, Steven, 1953 September 6-Tabla de Contenidos: “…Letting the Constraints Constrain YouAllowing Caution to Become Inertia; Hiding Behind Ambiguity; Forgetting That People Matter; The Innovative, Effective Public Manager; Why Risk Taking Is Possible; The Need for Effective and Innovative Public Management; Chapter 3: How to Find and Keep Good People; Why Good People Are Hard to Hire; How to Find Good People; Assessing Staffing Needs; Developing a Recruitment Network; Getting the Word Out; Encouraging Good People to Apply; Judging Applicants; How to Hire the Good People You Have Found; Learning the Rules of the Game…”
Publicado 2013
Libro electrónico -
10244Publicado 2015Tabla de Contenidos: “…Taking the ExamSummary; Exam Essentials; Chapter 2 Security Basics: A Foundation; The Development of Security Techniques; Understanding Security Terms and Concepts; The Problem (Opportunity) and the Solution; Evolution of Items; Security Foundation Concepts; CIA Triad; Primary Security Categories; Access Control; Nonrepudiation; Risk; Prudent Man, Due Diligence, and Due Care; User Security Management; Least Privilege; AAA; Mandatory Vacation; Separation of Duties; M of N Requirement; Two-Man Rule; Job Rotation; Geographic Access Control; Temporal Access Control, Time of Day Control; Privacy…”
Libro electrónico -
10245Publicado 2015Tabla de Contenidos: “…Chapter 11 Focus on the Context: System, Organization, Culture, and Timing; Influencing in an Open System; Organizations, Teams, and Families; Culture Is Context; Timing Is Everything-Almost; Chapter 12 Focus on the Context: Yourself; Wants versus Needs; Strengths and Limitations; Style and Blind Spots; Keeping It Light; Readiness, Reluctance, and Risk; Chapter 13 Focus on the Issues: What's at Stake?…”
Libro electrónico -
10246Publicado 2017Tabla de Contenidos: “…-- Questions -- References -- Chapter 7 Index numbers - time travel for averages -- Questions -- References -- Chapter 8 The beguiling ways of bad statistics I -- Questions -- References -- Chapter 9 The beguiling ways of bad statistics II -- Questions -- References -- Part III Preliminaries to inference -- Chapter 10 Puzzles and paradoxes in probability -- Questions -- References -- Chapter 11 Some paradoxes of randomness -- Questions -- References -- Chapter 12 Hidden risks for gamblers -- Questions -- References -- Chapter 13 Models in statistics -- Questions -- References -- Chapter 14 The normal distribution: history, computation and curiosities -- Questions -- References -- Part IV Statistical inference -- Chapter 15 The pillars of applied statistics I - estimation -- Questions -- References -- Chapter 16 The pillars of applied statistics II - hypothesis testing -- Questions -- References -- Chapter 17 'Data snooping' and the significance level in multiple testing -- Questions -- References -- Chapter 18 Francis Galton and the birth of regression -- Questions -- References -- Chapter 19 Experimental design - piercing the veil of random variation -- Questions -- References -- Chapter 20 In praise of Bayes -- Questions…”
Libro electrónico -
10247Publicado 2016Tabla de Contenidos: “…Step 3B: If Needed, Use Risk Appetite to Calculate Certain EquivalentsThings That Can Go Wrong; Judging the Quality of Values; Key Points to Remember; Endnotes; 8: Sound Reasoning; Reasoning for Michael's Job Decision; Reasoning in More Complex Decisions; The Relevance Diagram: A Tool for Structuring Complex Decisions; The Decision Model: A Tool for Analyzing Complex Decisions; The Tornado Diagram: A Tool for Displaying the Relevance of Information; Flying Bars: A Tool for Displaying Overall Uncertainty; Things That Can Go Wrong; When to Get Help with Reasoning…”
Libro electrónico -
10248por Aaron, LynnTabla de Contenidos: “…AI in Student Research and Creative Works -- The Role of AI in the Student's Research/Creation Process -- AI as it Pertains to the Intellectual Growth of the Student Researcher -- Using AI to Develop Research and Scholarship -- AI Literacy -- Opportunities -- Risks -- Citing/Disclosing -- Using AI to Evaluate Research and Scholarship -- Funder and Publisher Guidelines -- Using AI in Creative Works -- Copyright, Intellectual Property and Applications in Creative Industries -- Generative AI in Student Creative Works -- Summary and Additional Considerations -- Evaluating AI Tools in Higher Education -- Student Evaluation Practices and Assessment Strategies -- AI's Impact on Summative Assessment: An Example -- Alternative Grading Strategies -- Challenges with AI Detection Products -- Strategies for Pedagogical Evaluation -- Strategies for Technology Evaluation -- Strategies for Accessibility and DEI Evaluation -- Strategies for Student Input -- Special Section: A Brief History of AI -- Conclusion -- What Does the Future with AI Look Like? …”
Publicado 2024
Libro electrónico -
10249por Hendrickson, AlanTabla de Contenidos: “…The Center of MassThe Lifting Torque; Problems; 11 Maximum Power and Torque; Power; Maximum Power; Maximum Torque; An Important Caveat-Mass and Spring Vibrations; Problems; 12 Combining Multiple Motions; Overview; Combining Linear and Rotational Power; Converting Terms within the Power Formula; Combining Multiple Speed Effects; Problems; Part II: Stage Machinery Components; 13 Safety; General Concepts; Risk Assessment; Hazard Abatement; Single Failure Proof Design; Design Factor and Factor of Safety; Emergency Stop; Codes and Standards; Formalized Procedures; Inspection and Maintenance…”
Publicado 2008
Libro electrónico -
10250Publicado 2010Tabla de Contenidos: “…-- 5.4 Summary -- Chapter 6 Managing Process -- 6.1 Chapter Objectives -- 6.2 Context -- 6.3 Case Studies -- CASE STUDY: BANK ON THE VERGE -- CASE STUDY: DAMN THE PROCESS, FULL SPEED AHEAD -- 6.4 Summary -- Chapter 7 Managing Risk -- 7.1 Chapter Objectives -- 7.2 Context -- 7.3 Case Studies -- CASE STUDY: SEWEB AND RUSSOFT TECHNOLOGIES -- CASE STUDY: FALCON EDUTAINMENT AND THE RISKSIM PROJECT -- 7.4 Summary -- Chapter 8 Managing People Interactions -- 8.1 Chapter Objectives -- 8.2 Context -- 8.3 Case Studies -- CASE STUDY: TO BE OR NOT TO BE: A SENSE OF URGENCY AT TESTBRIDGE -- CASE STUDY: A FRIEND OR FOE AT HANOVER-TECH -- 8.4 Summary -- Chapter 9 Managing Stakeholder Expectations -- 9.1 Chapter Objectives -- 9.2 Context…”
Libro electrónico -
10251Publicado 2016Tabla de Contenidos: “…2.6 CLARIFYING SUCCESS CRITERIA2.7 FORMULATING THE SCOPE STATEMENT; 2.8 CONSIDERING ASSUMPTIONS AND RISKS; 3 - Leading and Managing Teams; 3.1 BECOMING THE PROJECT MANAGER; 3.2 DEVELOPING LEADERSHIP SKILLS; 3.3 WORKING WITH STAKEHOLDERS; 3.4 DEVELOPING THE TEAM; 3.5 DETERMINING ROLES; 3.6 EVALUATING PERFORMANCE; 3.7 TRACKING PROGRESS; 3.8 MANAGING EXPECTATIONS; 4 - Planning and Scheduling; 4.1 PREPARING THE PLAN; 4.2 DEVELOPING THE WORK BREAKDOWN STRUCTURE; 4.3 DEFINING THE SEQUENCE OF WORK; 4.4 DEVELOPING THE SCHEDULE; 4.5 EXECUTING THE PLAN; 4.6 PROCURING RESOURCES…”
Libro electrónico -
10252por Nakayama, KiyoshiTabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Acknowledgments -- Contributors -- Table of Contents -- Preface -- Part 1 Federated Learning -- Conceptual Foundations -- Chapter 1: Challenges in Big Data and Traditional AI -- Understanding the nature of big data -- Definition of big data -- Big data now -- Triple-A mindset for big data -- Data privacy as a bottleneck -- Risks in handling private data -- Increased data protection regulations -- From privacy by design to data minimalism -- Impacts of training data and model bias -- Expensive training of big data -- Model bias and training data…”
Publicado 2022
Libro electrónico -
10253Publicado 2020Tabla de Contenidos: “…-- Chapter5: Climate Change, Air Pollution and Health: Common sources, Similar impacts and Common solutions -- PartII: Air Pollution, Climate Change and Health: The Underlying Science & Impacts -- Chapter6: Air Pollution: Adverse Effects and Disease Burden -- Chapter7: Air Pollution, Oxidative Stress and Public Health in the Anthropocene -- Chapter8: Climate Change, Air Pollution and the Environment: The Health Argument -- Chapter9: Reducing air pollution: avoidable health burden -- PartIII: Climate Change and Health: Sustainability and vulnerable populations and regions -- Chapter10: Vulnerable populations and regions: Middle East as a case study -- Chapter11: Climate Change Risks for Agriculture, Health and Nutrition -- Chapter12: Sustaining Water Resources -- Chapter13: Health, air pollution and forest fires in the Amazon -- PartIV: climate Change and Health: Perspectives from Physicians -- Chapter14: Psychological Impacts of Climate Change and Recommendations -- Chapter15: Air Pollution and Cardiovascular Disease: A Proven Causality -- Chapter16: Healthy People, Healthy Planet: Holistic Thinking -- PartV: Climate Change and Health: Social Impacts -- Chapter17: Climate Change, Public Health, Social Peace -- Chapter18: Health of the People, Health of the Planet, Health of the Migrants -- Chapter19: Climate Justice and Public Health: Practical Ethics in Urgent Times -- PartVI: Overarching Solutions: The Role of Religion -- Chapter20: Faith in God & Health of People -- Chapter21: Caring for Creation – The Evangelical’s Guide -- Chapter22: Call to Action from Faith Leaders -- PartVII: Overarching Solutions: The Role of Science and Technology -- Chapter23: Public health co-benefits of greenhouse gas emissions reduction -- Chapter24: Good Health in the Anthropocene Epoch: Potentials for Transformative Solutions -- Chapter25: Well Under 2 Degrees Celsius: Ten Solutions for Carbon Neutrality and Climate Stability -- Chapter26: Defeating Energy Poverty: Invest In Scalable Solutions for the Poor -- Chapter27: Sensor-Enabled Climate Financing for Clean Cooking -- Chapter28: Research is vital to tackling climate change, but it cannot succeed alone -- PartVIII: Call to Action -- Chapter29: Governor of California -- Chapter30: United States Congressman -- Chapter31: Opportunities for a sustainable planet -- Chapter32: Sustainable development goals and health: Call for Cultural Revolution -- Chapter33: A Call to action by health care professionals…”
Libro electrónico -
10254por Chowdhary, AnkushTabla de Contenidos: “…Threat and vulnerability management -- Summary -- Further reading -- Chapter 3: Trust and Compliance -- Establishing and maintaining trust -- Access Transparency and Access Approval -- Access Transparency -- Enabling Access Transparency -- Access Approval -- Configuring Access Approval -- Security and privacy of data -- Third-party risk assessments -- Compliance in the cloud -- Compliance reports -- Continuous compliance -- Summary -- Further reading -- Chapter 4: Resource Management -- Overview of Google Cloud Resource Manager -- Understanding resource hierarchy -- Organization -- Folders…”
Publicado 2023
Libro electrónico -
10255por Raymond, Eric S.Tabla de Contenidos: “…Open Source as a Strategic WeaponOpen Source and Strategic Business Risk; The Business Ecology of Open Source; Coping with Success; Open R&D and the Reinvention of Patronage; Getting There from Here; Conclusion: Life After the Revolution; Afterword: Why Closing a Drivers Loses Its Vendor Money; Chapter 5. …”
Publicado 2001
Libro electrónico -
10256Publicado 2007Tabla de Contenidos: “…; Overview of PCI Requirements; Risks and Consequences; Benefits of Compliance; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. …”
Libro electrónico -
10257Publicado 2007Tabla de Contenidos: “…Computer Forensics in Today's World; Introduction; The History of Forensics; The Objectives of Computer Forensics; Computer-Facilitated Crimes; Reasons for Cyber Attacks; Computer Forensic Flaws and Risks; Computer Forensics: Rules, Procedures, and Legal Issues; The Computer Forensic Lab; Laboratory Strategic Planning for Business; Elements of Facilities Build-out; Electrical and Power Plant Considerations; Essential Laboratory Tools…”
Libro electrónico -
10258por Hirt, AllanTabla de Contenidos: “…The High Availability Primer; Disaster Recovery; Agreeing on a Solution; Guiding Principles for High Availability; Making Trade-Offs; Identifying Risks; Next Steps; Availability Calculations and Nines; What Is a Nine?…”
Publicado 2009
Libro electrónico -
10259Publicado 2005Tabla de Contenidos: “…PHP & MySQL Everyday Apps For Dummies; About the Author; Dedication; Author's Acknowledgments; Contents at a Glance; Table of Contents; Introduction; About This Book; Conventions Used in This Book; Foolish Assumptions; How This Book Is Organized; Icons Used in This Book; Where to Go from Here; Part I: Introducing Application Development; Chapter 1: Building Your Application; Understanding PHP and MySQL Versions; Using the Application Source Code; Modifying the Source Code; Planning Your Application; Chapter 2: Building in Application Security; Understanding Security Risks…”
Libro electrónico -
10260Publicado 2006Tabla de Contenidos: “…Layer 8: The People Layer; Introduction; Attacking the People Layer; Defending the People Layer; Making the Case for Stronger Security; People Layer Security Project; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix A. Risk Mitigation: Securing the Stack; Introduction; Physical; Data Link; Network; Transport; Session; Presentation; Application; People; Summary; Index…”
Libro electrónico