Mostrando 10,261 - 10,280 Resultados de 13,276 Para Buscar '"Risk"', tiempo de consulta: 0.11s Limitar resultados
  1. 10261
    por Bradley, Tony
    Publicado 2006
    Tabla de Contenidos: “…Basic Windows Security; Introduction; Why Do You Need to Be Secure?; Why Are You at Risk?; Summary; Additional Resources; Chapter 2. …”
    Libro electrónico
  2. 10262
    por Beijnum, Iljitsch van
    Publicado 2002
    Tabla de Contenidos: “…Multilayer SwitchesMemory and the Routing Table; Performance; Anticipating Growth; Failure Risks; Water; Power Failure; Building a Wide Area Network; The Likelihood of Concurrent Fiber Cuts; Network Topology Design; A Design Model; The Topology; IP Address Space and AS Numbers; The Different Types of Address Space; Provider-Independent Address Space; Your Own Provider Aggregatable Block; Address Space From an ISP; Requesting Address Space; Renumbering IP Addresses; The AS Number; Routing Registries; Routing Policy Specification Language; Getting Started with BGP; Enabling BGP…”
    Libro electrónico
  3. 10263
    por Krebs, Jochen
    Publicado 2008
    Tabla de Contenidos: “…MetricsProgress (Velocity); Quality; Team Morale; Reporting; Status Report; Interpretation; Summary; Chapter 6: Return on Investment; Goals and Objectives; The Increment; Financial Models; Payback Period; Net Present Value (NPV); Internal Rate of Return; Cost-Benefit Analysis; Benefits Provided by Projects; Decreasing Benefits; Benefits Deadline; Increasing Benefits; Risks; Technology; Summary; Chapter 7: Project Portfolio Management; Balancing the Project Portfolio; Avoid Pursuing Too Many Projects at Once; Balance Your Portfolio with Risky and Rewarding Projects…”
    Libro electrónico
  4. 10264
    por Russel, Charlie
    Publicado 2006
    Tabla de Contenidos: “…Making a RoadmapDefining Goals; Assessing Risk; Summary; Part II Installation and Configuration; Chapter 5 Getting Started; Designing a Deployment Environment; Choosing an Installation Method; Choosing a Preinstallation Environment; Choosing a Software Update Solution; Choosing an Application Deployment Solution; Understanding Licensing and Product Activation; Designing a Test Lab; Planning Server Configurations; Creating Your Deployment Plan; Creating Your Deployment Environment; Using Setup Manager; Using Unattended Setup with Windows Server 2003 R2…”
    Libro electrónico
  5. 10265
    por Brenton, Chris
    Publicado 2003
    Tabla de Contenidos: “…Mastering Network Security Second Edition; Acknowledgments; Contents at a Glance; Contents; Introduction; What This Book Covers; Who Should Read This Book; Chapter 1: A Systems Analysis Approach to Information Technology; An Introduction to Systems Analysis; Applying Systems Analysis to Information Technology; Summary; Chapter 2: Security as a Process; Survival of the Fittest: The Myth of Total Security; Risk Mitigation: Case Studies of Success and Failure; The Systems Development Life Cycle (SDLC): Security as a Process from Beginning to End…”
    Libro electrónico
  6. 10266
    Publicado 2001
    Tabla de Contenidos: “…Chapter 13 Kickstarting Your Innovation CultureMaking Change; The Innovation Manager and Her Unit; Summary; Main Points; Chapter 14 Structures and Mechanisms for Dissent; Making Innovation Happen; Encouraging a Greater Capacity for Risk; Demonstrating That You're Not Always Right; Not Punishing Failure; Summary; Main Points; Chapter 15 Encouraging Continued Dissent; Introduction; Speak Last; Seak Out Dissenting Views; Out-of-control Discussion; Protect Dissenters; Help Would-be Dissenters Speak Up; Challenge Your Group's Status Quo; Summary; Main Points…”
    Libro electrónico
  7. 10267
    por Landy, Gene K.
    Publicado 2008
    Tabla de Contenidos: “…; Organization of this Book; Approach of this Book; Understanding and Using Intellectual Property; Doing Deals; Understanding and Dealing with Legal Risk Factors; Global Perspective; Focusing on Your End Game from the Beginning; How to Use this Book…”
    Libro electrónico
  8. 10268
    Publicado 2007
    Tabla de Contenidos: “…Front Cover; The Best Damn IT Security Management Book Period; Copyright Page; About the Authors; Contents; Part 1: From Vulnerability to Patch; Chapter 1: Windows of Vulnerability; Introduction; What Are Vulnerabilities?; Understanding the Risks Posed by Vulnerabilities; Summary; Chapter 3: Vulnerability Assessment Tools; Introduction; Features of a Good Vulnerability Assessment Tool; Using a Vulnerability Assessment Tool; Step 1: Identify the Hosts on Your Network; Step 2: Classify the Hosts into Asset Groups; Step 3: Create an Audit Policy; Step 4: Launch the Scan…”
    Libro electrónico
  9. 10269
    por Cardwell, Kevin
    Publicado 2007
    Tabla de Contenidos: “…Front Cover; The Best Damn Cybercrime and Digital Forensics Book Period; Copyright Page; Contributing Authors; Contents; Chapter 1: Computer Forensics in Today's World; Introduction; History of Forensics; Objectives of Computer Forensics; Computer-Facilitated Crimes; Reasons for Cyber Attacks; Computer Forensic Flaws and Risks; Modes of Attack; Stages of Forensic Investigation in Tracking Computer Crime; Rules of Computer Forensics; Digital Forensics; Assessing the Case: Detecting/Identifying the Event/Crime; Preservation of Evidence: Chain of Custody…”
    Libro electrónico
  10. 10270
    por Lee, Robert T. H.
    Publicado 2012
    Tabla de Contenidos: “…Chapter 6: Key IndicatorsMomentum Oscillator; Queuing Theory of Moving Average Crossovers (QMAC); MACD; Average Direction Index; Protective Stops; Conclusion; Chapter 7: Applied Systems; Catching That Trend; Built-In Color Trend Indicator; Supporting Moving Averages; Trade on Daily Signals; Trading with Ichimoku; Conclusion; Chapter 8: Formulating Your Trading Plan; Determining Your Time Frame; Selecting Stocks; Risk Management; Determine Entry Points; Determine Exit Strategies; Reality Check; Chapter 9: Financial Astrology; Using Lunar Cycles in Trading; How to Pick Winning Stocks…”
    Libro electrónico
  11. 10271
    por Davis, Ray, 1949-
    Publicado 2014
    Tabla de Contenidos: “…For ReflectionChapter 4: Control and Uncertainty; Managing the Risk Element; Worry About What You Can Control; Two Aspects of a Leader's Job: Controllable Results and Uncertainty; Black and White: Making Decisions Easy; Do Your Best, Get Input, and Remember-It's Just A Number!…”
    Libro electrónico
  12. 10272
    por Debreceni, Todd
    Publicado 2009
    Tabla de Contenidos: “…The Skeleto-Muscular SystemSurface Anatomy; The Eyes, Ears, and Nose; The Mouth; The Skin; Symmetry and Proportion; Anatomical Planes; Facial Ratios and Phi; Ratios and Body Proportions; Geometric Analysis; Distinctions of Gender, Age, and Ancestry; Distinctions of Gender; Distinctions of Age; Distinctions of Ancestry; Chapter Summary; CHAPTER 3Making the Lifecast; Introduction; Sidebar - David Parvin; Safety Risks; Sidebar - John Schoonraad; The Materials; The Process; Overview; Teeth; Face and Neck; Bust: Head and Shoulders; Hands, Arms, Legs, Feet, and Ears; Hands and Arms; Legs and Feet…”
    Libro electrónico
  13. 10273
    por Heaton, John
    Publicado 2012
    Tabla de Contenidos: “…Building a standard work breakdown structureIdentifying and quantifying the effort drivers; Creating your estimation tool; Chapter 3: Controlling the Project; Introduction; Requirements Traceability Matrix; Creating an effective risk register; Creating an effective issue management register; Creating a defect and enhancement register; Creating a cyclical build and test process; Setting up a collaborative environment; Installing client tools for a collaborative environment; Chapter 4: Wrapping Up the Project; Introduction; Creating OWB code artifacts; Creating OBIEE code artifacts…”
    Libro electrónico
  14. 10274
    por Flood, Joanne M.
    Publicado 2014
    Tabla de Contenidos: “…CHAPTER 13: ASC 272 LIMITED LIABILITY ENTITIESPERSPECTIVE AND ISSUES; DEFINITIONS OF TERMS; CONCEPTS, RULES, AND EXAMPLES; CHAPTER 14: ASC 274 PERSONAL FINANCIAL STATEMENTS; PERSPECTIVE AND ISSUES; DEFINITIONS OF TERMS; CONCEPTS, RULES, AND EXAMPLES; CHAPTER 15: ASC 275 RISKS AND UNCERTAINTIES; PERSPECTIVE AND ISSUES; DEFINITIONS OF TERMS; CONCEPTS, RULES, AND EXAMPLES; CHAPTER 16: ASC 280 SEGMENT REPORTING; PERSPECTIVE AND ISSUES; DEFINITIONS OF TERMS; CONCEPTS, RULES, AND EXAMPLES; CHAPTER 17: ASC 305 CASH AND CASH EQUIVALENTS; PERSPECTIVE AND ISSUES; DEFINITIONS OF TERMS…”
    Libro electrónico
  15. 10275
    Publicado 2009
    Tabla de Contenidos: “…When You Don't Have the Ideal TeamUnderstaffed design team; No design engineers or subject matter experts; No clear project owner; Too many people in working meetings; Summary; CHAPTER 3: Project Planning; The Ideal Project Starting Point; Determining Your Project's Parameters; Revenue or cost focus; Desire to innovate; Length of time horizon; Understanding the problem before solving it; Willingness to invest; Risk factors; Developing the Project Plan; Research; Modeling and requirements definition; Framework definition; Detailed design; Ongoing support; Summary…”
    Libro electrónico
  16. 10276
    por Yong, Kwek Ping
    Publicado 2013
    Tabla de Contenidos: “…Lack of ResourcesRushing the Deal; Poor Planning; Overdependence on Checklists; Poor Risk Mitigation; Poor Alignment of Interests; Reverse Takeovers; Dispute between SEC and CSRC; Conclusion; Notes; Chapter 3: Financial Due Diligence; Financial Due Diligence Checklist; Major Differences between China and Developed Countries; The Approach; Information Collection Process; Sales; Cost of Sales; Expenses; Cash; Other Payables and Other Receivables; Fixed Tangible and Intangible Assets; Accounting Information Systems; Tax Issues and Preferential Tax Policies toward Hi-Tech Enterprises…”
    Libro electrónico
  17. 10277
    por Langer, Arthur M.
    Publicado 2013
    Tabla de Contenidos: “…Get Used to Ambiguity; 6. Take Risks…”
    Libro electrónico
  18. 10278
    Publicado 2014
    Tabla de Contenidos: “…Introduction GOCAME strategy overview; GOCAME conceptual framework; GOCAME process and the W5H rule; Security evaluation for a web system: A proof of concept; Target entity and information need; Security characteristic specification; Metric and indicator specifications; Implementing the M&E; Risk and security vulnerability issues; Metrics and indicators for repeatable and consistent analysis: a discussion; Related work; Conclusion and future work; References; 3 A Fresh Look at Semantic Natural Language Information Assurance and Security: NL IAS from Watermarking and Downgrading to..…”
    Libro electrónico
  19. 10279
    por Cartwright, Hersey
    Publicado 2014
    Tabla de Contenidos: “…Identifying design requirements Identifying design constraints; Making design assumptions; Identifying design risks; Creating the conceptual design; Chapter 4:The vSphere Management Design; Introduction; Identifying vCenter components and dependencies; Selecting a vCenter deployment option; Determining the vCenter system requirements; Selecting a database for vCenter deployment; Determining database interoperability; Choosing a vCenter Single Sign-On deployment mode; Designing for management availability; Backing up the vCenter Server components…”
    Libro electrónico
  20. 10280
    Publicado 2013
    Tabla de Contenidos: “…Every Future Business Leader Needs to Be a Good Design ThinkerThe 10 Design Thinking Principles That Redefine Business Management; 01 Design Thinking Is Action - Oriented; 02 Design Thinking Is Comfortable with Change; 03 Design Thinking Is Human - Centric -; 04 Design Thinking Integrates Foresight; 05 Design Thinking Is a Dynamic Constructive Process; 06 Design Thinking Promotes EMpathy; 07 Design Thinking Reduces Risks; 08 Design Thinking Can Create Meaning; 09 Design Thinking Can Bring Enterprise Creativity to Next Level; 10 Design Thinking Is The New Competitive Logic of Business Strategy…”
    Libro electrónico