Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
10261por Bradley, TonyTabla de Contenidos: “…Basic Windows Security; Introduction; Why Do You Need to Be Secure?; Why Are You at Risk?; Summary; Additional Resources; Chapter 2. …”
Publicado 2006
Libro electrónico -
10262por Beijnum, Iljitsch vanTabla de Contenidos: “…Multilayer SwitchesMemory and the Routing Table; Performance; Anticipating Growth; Failure Risks; Water; Power Failure; Building a Wide Area Network; The Likelihood of Concurrent Fiber Cuts; Network Topology Design; A Design Model; The Topology; IP Address Space and AS Numbers; The Different Types of Address Space; Provider-Independent Address Space; Your Own Provider Aggregatable Block; Address Space From an ISP; Requesting Address Space; Renumbering IP Addresses; The AS Number; Routing Registries; Routing Policy Specification Language; Getting Started with BGP; Enabling BGP…”
Publicado 2002
Libro electrónico -
10263por Krebs, JochenTabla de Contenidos: “…MetricsProgress (Velocity); Quality; Team Morale; Reporting; Status Report; Interpretation; Summary; Chapter 6: Return on Investment; Goals and Objectives; The Increment; Financial Models; Payback Period; Net Present Value (NPV); Internal Rate of Return; Cost-Benefit Analysis; Benefits Provided by Projects; Decreasing Benefits; Benefits Deadline; Increasing Benefits; Risks; Technology; Summary; Chapter 7: Project Portfolio Management; Balancing the Project Portfolio; Avoid Pursuing Too Many Projects at Once; Balance Your Portfolio with Risky and Rewarding Projects…”
Publicado 2008
Libro electrónico -
10264por Russel, CharlieTabla de Contenidos: “…Making a RoadmapDefining Goals; Assessing Risk; Summary; Part II Installation and Configuration; Chapter 5 Getting Started; Designing a Deployment Environment; Choosing an Installation Method; Choosing a Preinstallation Environment; Choosing a Software Update Solution; Choosing an Application Deployment Solution; Understanding Licensing and Product Activation; Designing a Test Lab; Planning Server Configurations; Creating Your Deployment Plan; Creating Your Deployment Environment; Using Setup Manager; Using Unattended Setup with Windows Server 2003 R2…”
Publicado 2006
Libro electrónico -
10265por Brenton, ChrisTabla de Contenidos: “…Mastering Network Security Second Edition; Acknowledgments; Contents at a Glance; Contents; Introduction; What This Book Covers; Who Should Read This Book; Chapter 1: A Systems Analysis Approach to Information Technology; An Introduction to Systems Analysis; Applying Systems Analysis to Information Technology; Summary; Chapter 2: Security as a Process; Survival of the Fittest: The Myth of Total Security; Risk Mitigation: Case Studies of Success and Failure; The Systems Development Life Cycle (SDLC): Security as a Process from Beginning to End…”
Publicado 2003
Libro electrónico -
10266Publicado 2001Tabla de Contenidos: “…Chapter 13 Kickstarting Your Innovation CultureMaking Change; The Innovation Manager and Her Unit; Summary; Main Points; Chapter 14 Structures and Mechanisms for Dissent; Making Innovation Happen; Encouraging a Greater Capacity for Risk; Demonstrating That You're Not Always Right; Not Punishing Failure; Summary; Main Points; Chapter 15 Encouraging Continued Dissent; Introduction; Speak Last; Seak Out Dissenting Views; Out-of-control Discussion; Protect Dissenters; Help Would-be Dissenters Speak Up; Challenge Your Group's Status Quo; Summary; Main Points…”
Libro electrónico -
10267por Landy, Gene K.Tabla de Contenidos: “…; Organization of this Book; Approach of this Book; Understanding and Using Intellectual Property; Doing Deals; Understanding and Dealing with Legal Risk Factors; Global Perspective; Focusing on Your End Game from the Beginning; How to Use this Book…”
Publicado 2008
Libro electrónico -
10268Publicado 2007Tabla de Contenidos: “…Front Cover; The Best Damn IT Security Management Book Period; Copyright Page; About the Authors; Contents; Part 1: From Vulnerability to Patch; Chapter 1: Windows of Vulnerability; Introduction; What Are Vulnerabilities?; Understanding the Risks Posed by Vulnerabilities; Summary; Chapter 3: Vulnerability Assessment Tools; Introduction; Features of a Good Vulnerability Assessment Tool; Using a Vulnerability Assessment Tool; Step 1: Identify the Hosts on Your Network; Step 2: Classify the Hosts into Asset Groups; Step 3: Create an Audit Policy; Step 4: Launch the Scan…”
Libro electrónico -
10269por Cardwell, KevinTabla de Contenidos: “…Front Cover; The Best Damn Cybercrime and Digital Forensics Book Period; Copyright Page; Contributing Authors; Contents; Chapter 1: Computer Forensics in Today's World; Introduction; History of Forensics; Objectives of Computer Forensics; Computer-Facilitated Crimes; Reasons for Cyber Attacks; Computer Forensic Flaws and Risks; Modes of Attack; Stages of Forensic Investigation in Tracking Computer Crime; Rules of Computer Forensics; Digital Forensics; Assessing the Case: Detecting/Identifying the Event/Crime; Preservation of Evidence: Chain of Custody…”
Publicado 2007
Libro electrónico -
10270por Lee, Robert T. H.Tabla de Contenidos: “…Chapter 6: Key IndicatorsMomentum Oscillator; Queuing Theory of Moving Average Crossovers (QMAC); MACD; Average Direction Index; Protective Stops; Conclusion; Chapter 7: Applied Systems; Catching That Trend; Built-In Color Trend Indicator; Supporting Moving Averages; Trade on Daily Signals; Trading with Ichimoku; Conclusion; Chapter 8: Formulating Your Trading Plan; Determining Your Time Frame; Selecting Stocks; Risk Management; Determine Entry Points; Determine Exit Strategies; Reality Check; Chapter 9: Financial Astrology; Using Lunar Cycles in Trading; How to Pick Winning Stocks…”
Publicado 2012
Libro electrónico -
10271por Davis, Ray, 1949-Tabla de Contenidos: “…For ReflectionChapter 4: Control and Uncertainty; Managing the Risk Element; Worry About What You Can Control; Two Aspects of a Leader's Job: Controllable Results and Uncertainty; Black and White: Making Decisions Easy; Do Your Best, Get Input, and Remember-It's Just A Number!…”
Publicado 2014
Libro electrónico -
10272por Debreceni, ToddTabla de Contenidos: “…The Skeleto-Muscular SystemSurface Anatomy; The Eyes, Ears, and Nose; The Mouth; The Skin; Symmetry and Proportion; Anatomical Planes; Facial Ratios and Phi; Ratios and Body Proportions; Geometric Analysis; Distinctions of Gender, Age, and Ancestry; Distinctions of Gender; Distinctions of Age; Distinctions of Ancestry; Chapter Summary; CHAPTER 3Making the Lifecast; Introduction; Sidebar - David Parvin; Safety Risks; Sidebar - John Schoonraad; The Materials; The Process; Overview; Teeth; Face and Neck; Bust: Head and Shoulders; Hands, Arms, Legs, Feet, and Ears; Hands and Arms; Legs and Feet…”
Publicado 2009
Libro electrónico -
10273por Heaton, JohnTabla de Contenidos: “…Building a standard work breakdown structureIdentifying and quantifying the effort drivers; Creating your estimation tool; Chapter 3: Controlling the Project; Introduction; Requirements Traceability Matrix; Creating an effective risk register; Creating an effective issue management register; Creating a defect and enhancement register; Creating a cyclical build and test process; Setting up a collaborative environment; Installing client tools for a collaborative environment; Chapter 4: Wrapping Up the Project; Introduction; Creating OWB code artifacts; Creating OBIEE code artifacts…”
Publicado 2012
Libro electrónico -
10274por Flood, Joanne M.Tabla de Contenidos: “…CHAPTER 13: ASC 272 LIMITED LIABILITY ENTITIESPERSPECTIVE AND ISSUES; DEFINITIONS OF TERMS; CONCEPTS, RULES, AND EXAMPLES; CHAPTER 14: ASC 274 PERSONAL FINANCIAL STATEMENTS; PERSPECTIVE AND ISSUES; DEFINITIONS OF TERMS; CONCEPTS, RULES, AND EXAMPLES; CHAPTER 15: ASC 275 RISKS AND UNCERTAINTIES; PERSPECTIVE AND ISSUES; DEFINITIONS OF TERMS; CONCEPTS, RULES, AND EXAMPLES; CHAPTER 16: ASC 280 SEGMENT REPORTING; PERSPECTIVE AND ISSUES; DEFINITIONS OF TERMS; CONCEPTS, RULES, AND EXAMPLES; CHAPTER 17: ASC 305 CASH AND CASH EQUIVALENTS; PERSPECTIVE AND ISSUES; DEFINITIONS OF TERMS…”
Publicado 2014
Libro electrónico -
10275Publicado 2009Tabla de Contenidos: “…When You Don't Have the Ideal TeamUnderstaffed design team; No design engineers or subject matter experts; No clear project owner; Too many people in working meetings; Summary; CHAPTER 3: Project Planning; The Ideal Project Starting Point; Determining Your Project's Parameters; Revenue or cost focus; Desire to innovate; Length of time horizon; Understanding the problem before solving it; Willingness to invest; Risk factors; Developing the Project Plan; Research; Modeling and requirements definition; Framework definition; Detailed design; Ongoing support; Summary…”
Libro electrónico -
10276por Yong, Kwek PingTabla de Contenidos: “…Lack of ResourcesRushing the Deal; Poor Planning; Overdependence on Checklists; Poor Risk Mitigation; Poor Alignment of Interests; Reverse Takeovers; Dispute between SEC and CSRC; Conclusion; Notes; Chapter 3: Financial Due Diligence; Financial Due Diligence Checklist; Major Differences between China and Developed Countries; The Approach; Information Collection Process; Sales; Cost of Sales; Expenses; Cash; Other Payables and Other Receivables; Fixed Tangible and Intangible Assets; Accounting Information Systems; Tax Issues and Preferential Tax Policies toward Hi-Tech Enterprises…”
Publicado 2013
Libro electrónico -
10277por Langer, Arthur M.Tabla de Contenidos: “…Get Used to Ambiguity; 6. Take Risks…”
Publicado 2013
Libro electrónico -
10278Publicado 2014Tabla de Contenidos: “…Introduction GOCAME strategy overview; GOCAME conceptual framework; GOCAME process and the W5H rule; Security evaluation for a web system: A proof of concept; Target entity and information need; Security characteristic specification; Metric and indicator specifications; Implementing the M&E; Risk and security vulnerability issues; Metrics and indicators for repeatable and consistent analysis: a discussion; Related work; Conclusion and future work; References; 3 A Fresh Look at Semantic Natural Language Information Assurance and Security: NL IAS from Watermarking and Downgrading to..…”
Libro electrónico -
10279por Cartwright, HerseyTabla de Contenidos: “…Identifying design requirements Identifying design constraints; Making design assumptions; Identifying design risks; Creating the conceptual design; Chapter 4:The vSphere Management Design; Introduction; Identifying vCenter components and dependencies; Selecting a vCenter deployment option; Determining the vCenter system requirements; Selecting a database for vCenter deployment; Determining database interoperability; Choosing a vCenter Single Sign-On deployment mode; Designing for management availability; Backing up the vCenter Server components…”
Publicado 2014
Libro electrónico -
10280Publicado 2013Tabla de Contenidos: “…Every Future Business Leader Needs to Be a Good Design ThinkerThe 10 Design Thinking Principles That Redefine Business Management; 01 Design Thinking Is Action - Oriented; 02 Design Thinking Is Comfortable with Change; 03 Design Thinking Is Human - Centric -; 04 Design Thinking Integrates Foresight; 05 Design Thinking Is a Dynamic Constructive Process; 06 Design Thinking Promotes EMpathy; 07 Design Thinking Reduces Risks; 08 Design Thinking Can Create Meaning; 09 Design Thinking Can Bring Enterprise Creativity to Next Level; 10 Design Thinking Is The New Competitive Logic of Business Strategy…”
Libro electrónico