Mostrando 10,421 - 10,440 Resultados de 13,276 Para Buscar '"Risk"', tiempo de consulta: 0.10s Limitar resultados
  1. 10421
    por Hartmann, Bernd J.
    Publicado 2013
    Tabla de Contenidos: “…Cheapest cost avoider, cheapest insurer und superior risk bearer; 1. Begriffe; 2. Insbesondere zur Versicherbarkeit; 3. …”
    Libro electrónico
  2. 10422
    Publicado 2017
    Tabla de Contenidos: “…Knoppers -- Early Philistia revisited and revised / Ido Koch -- Palynological analysis of the Glacis of the Seleucid Acra in Jerusalem: duration of construction and environmental reconstruction / Dafna Langgut -- The future of the past: at-risk world heritage, cyber-archaeology, and transdisciplinary research / Thomas E. …”
    991005137949706719
  3. 10423
    por Veer, E. A. Vander
    Publicado 2008
    Tabla de Contenidos: “…Going Shopping; Cost: Free, Risk: Yours; Placing an Ad; Want Ads; Changing Your Ad; Finding Stuff; Answering an Ad; III. …”
    Libro electrónico
  4. 10424
    Publicado 2010
    Tabla de Contenidos: “…Correlation with Change Management and Incident TimelinesMaking Metrics Available to Your Alerting Mechanisms; Using Metrics to Guide Load-Feedback Mechanisms; A Metrics Collection System, Illustrated: Ganglia; Conclusion; 4Continuous Deployment; Eric Ries; Small Batches Mean Faster Feedback; Small Batches Mean Problems Are Instantly Localized; Small Batches Reduce Risk; Small Batches Reduce Overhead; The Quality Defenders' Lament; Getting Started; Continuous Deployment Is for Mission-Critical Applications; Conclusion; 5Infrastructure As Code; Adam Jacob; Service-Oriented Architecture…”
    Libro electrónico
  5. 10425
    Publicado 2010
    Tabla de Contenidos:
    Libro electrónico
  6. 10426
    por Vincent, John Konnayil
    Publicado 2013
    Tabla de Contenidos: “…Philosophy and StyleMarquee Trades; Portfolio Analysis; Notes; Chapter 12: David Swensen; Philosophy and Style; Marquee Trades; Portfolio Analysis; Notes; Chapter 13: Prem Watsa; Philosophy and Style; Marquee Trades; Portfolio Analysis; Notes; Part Two: Mechanical Approaches to Following the Masters; Chapter 14: Introduction; Manager Selection; Asset Allocation and Sentiment Capture; Risk Avoidance; Constructing Model Portfolios Mechanically: A Primer; Equal Allocation Largest Positions; Equal Allocation Largest New Positions; Weighted Allocation Largest Positions…”
    Libro electrónico
  7. 10427
    Publicado 2010
    Tabla de Contenidos: “…; Foreclosure Basics; Avoiding Foreclosure; When Foreclosure Is Inevitable; Chapter 9: Damage Control; Insurance; You Are at Risk; Make a Collect Call; Investments; Where Is Your Money?…”
    Libro electrónico
  8. 10428
    Publicado 2017
    Tabla de Contenidos: “…; ""1.5 -- The security of connected objects: the risks and the challenges""; ""1.6 -- Protocols, standards and compatibility: toward a technological convergence""; ""1.6.1 -- The origins of some norms and standards""; ""1.7 -- Humanity, intelligence and technologies""…”
    Libro electrónico
  9. 10429
    Publicado 2009
    Tabla de Contenidos: “…; Site Popularity and Ranking; How People Are Finding My Competitors; Relative Site Performance; Competitor Activity; Where Are My Risks?; Trolling and Spamming; Copyright and Legal Liability; Fraud, Privacy, and Account Sharing…”
    Libro electrónico
  10. 10430
    Publicado 2020
    Tabla de Contenidos: “…PART 1: BACKGROUND -- Chapter 1: Biological invasions in South Africa: An overview -- Chapter 2: A brief, selective history of researchers and research initiatives related to biological invasions in South Africa -- PART 2: BIOLOGICAL INVASIONS IN SOUTH AFRICA -- Chapter 3: The biogeography of South African terrestrial plant invasions -- Chapter 4:Invasive alien aquatic plants in freshwater ecosystems -- Chapter 5: Terrestrial Vertebrate Invasions in South Africa -- Chapter 6: Alien freshwater fauna in South Africa -- Chapter 7: Alien terrestrial invertebrates in South Africa -- Chapter 8: Biological invasions in South Africa’s offshore sub-Antarctic territories -- Chapter 9: Coastal invasions: The South African context -- Chapter 10: Pathogens of vertebrate animals as invasive species: Insights from South Africa -- Chapter 11: Biological invasions in South Africa’s urban ecosystems: Patterns, processes, impacts and management -- PART 3: DRIVERS OF INVASION -- Chapter 12: South Africa’s pathways of introduction and dispersal and how they have changed over time -- Chapter 13: The role of environmental factors in promoting and limiting biological invasions in South Africa -- Chapter 14: Biotic interactions as mediators of biological invasions: Insights from South Africa -- PART 4: IMPACTS OF INVASION -- Chapter 15:Impacts of invasions on terrestrial water resources in South Africa -- Chapter 16:The impact of invasive alien plants on rangelands in South Africa -- Chapter 17: An evaluation of the impacts of alien species on biodiversity in South Africa using different methods -- PART 5: MANAGEMENT OF INVASIONS -- Chapter 18: Biological invasion policy and legislation development and implementation in South Africa -- Chapter 19: More than a century of biological control against invasive alien plants in South Africa: a synoptic view of what has been accomplished -- Chapter 20:Analysing the risks posed by biological invasions to South Africa -- Chapter 21:The extent and effectiveness of alien plant control projects in South Africa -- Chapter 22: Experience and lessons from alien and invasive animal control projects carried out in South Africa -- Chapter 23: Biological invasions and ecological restoration in South Africa -- Chapter 24: The social dimensions of biological invasions in South Africa -- Chapter 25: Education, training and capacity building in the field of biological invasions in South Africa -- PART 6: NEW INSIGHTS -- Chapter 26: South Africa as a donor of naturalized and invasive alien plants to other parts of the world -- Chapter 27: South Africa as a donor of alien animals -- Chapter 28: Knowing-doing continuum or knowing-doing gap? …”
    Libro electrónico
  11. 10431
    Publicado 2023
    Tabla de Contenidos: “…Integrity of Public Sector Organs -- On mitigating integrity risks relating to major investment projects financed with public funds -- On whistleblower protection -- On designing a corruption perception survey -- On integrity leadership behaviour -- On the powers of the Integrity Authority -- 5. …”
    Libro electrónico
  12. 10432
    por Pyles, James
    Publicado 2007
    Tabla de Contenidos: “…Configuring a Multiserver Farm; Planning for Scalability; Roles That Cannot Be Redundant; Evaluating the Risks of Application Server Failures; Topologies; Implementing a Multiserver Farm; Run Setup on the First Server; Steps; Conclusion; 5. …”
    Libro electrónico
  13. 10433
    Publicado 2007
    Tabla de Contenidos: “…Cover -- Contents -- Sidebars -- Preface -- Acknowledgments -- About the Authors -- Section I: Concepts -- Chapter 1 Complexity -- 1.1 The Structure of Complex Systems -- 1.2 The Inherent Complexity of Software -- 1.3 The Five Attributes of a Complex System -- 1.4 Organized and Disorganized Complexity -- 1.5 Bringing Order to Chaos -- 1.6 On Designing Complex Systems -- Chapter 2 The Object Model -- 2.1 The Evolution of the Object Model -- 2.2 Foundations of the Object Model -- 2.3 Elements of the Object Model -- 2.4 Applying the Object Model -- Chapter 3 Classes and Objects -- 3.1 The Nature of an Object -- 3.2 Relationships among Objects -- 3.3 The Nature of a Class -- 3.4 Relationships among Classes -- 3.5 The Interplay of Classes and Objects -- 3.6 On Building Quality Classes and Objects -- Chapter 4 Classification -- 4.1 The Importance of Proper Classification -- 4.2 Identifying Classes and Objects -- 4.3 Key Abstractions and Mechanisms -- Section II: Method -- Chapter 5 Notation -- 5.1 The Unified Modeling Language -- 5.2 Package Diagrams -- 5.3 Component Diagrams -- 5.4 Deployment Diagrams -- 5.5 Use Case Diagrams -- 5.6 Activity Diagrams -- 5.7 Class Diagrams -- 5.8 Sequence Diagrams -- 5.9 Interaction Overview Diagrams -- 5.10 Composite Structure Diagrams -- 5.11 State Machine Diagrams -- 5.12 Timing Diagrams -- 5.13 Object Diagrams -- 5.14 Communication Diagrams -- Chapter 6 Process -- 6.1 First Principles -- 6.2 The Macro Process: The Software Development Lifecycle -- 6.3 The Micro Process: The Analysis and Design Process -- Chapter 7 Pragmatics -- 7.1 Management and Planning -- 7.2 Staffing -- 7.3 Release Management -- 7.4 Reuse -- 7.5 Quality Assurance and Metrics -- 7.6 Documentation -- 7.7 Tools -- 7.8 Special Topics -- 7.9 The Benefits and Risks of Object-Oriented Development -- Section III: Applications…”
    Libro electrónico
  14. 10434
    por Lucas, Douglas J.
    Publicado 2006
    Tabla de Contenidos: “…S&P ON STRUCTURED FINANCE LOSS GIVEN DEFAULTS&P CONSTANT ANNUAL DEFAULT AND RECOVERIES; MOODY'S MATERIAL IMPAIRMENT STUDY; COMPARING AND RECONCILING STRUCTURED FINANCE DEFAULT RATES; MOODY'S ON STRUCTURED FINANCE HISTORICAL LOSS RATES; MOODY'S CONSTANT ANNUAL DEFAULT AND RECOVERIES; BLENDING S&P AND MOODY'S STUDIES; APPLYING CDRs AND RECOVERIES TO SF CDOs; CONCLUSION; Chapter 8: Structured Finance Cash Flow CDOs; SF CDOs VERSUS HIGH-YIELD CDOs; RATING AGENCIES ON STRUCTURED FINANCE CDOs; STRUCTURED FINANCE ASSETS' NEGATIVE CONVEXITY; EXTENSION RISK; CONCLUSION…”
    Libro electrónico
  15. 10435
    por Millsap, Cary V.
    Publicado 2003
    Tabla de Contenidos: “…Expectations About Data CollectionData Scope; Scoping Errors; Long-Running User Actions; "Too Much Data" Is Really Not Enough Data; Oracle Diagnostic Data Sources; For More Information; Targeting the Right ImprovementActivity; A New Standard of Customer Care; How to Find the Economically Optimal Performance Improvement Activity; Making Sense of Your Diagnostic Data; Forecasting Project Net Payoff; Forecasting Project Benefits; Monetizing the benefits; If you can't monetize the benefits; Forecasting Project Cost; Forecasting Project Risk; Part II; Interpreting Extended SQL Trace Data…”
    Libro electrónico
  16. 10436
    por Shinder, Thomas W.
    Publicado 2007
    Tabla de Contenidos: “…The Paper ChaseRemovable Storage Risks; Physical Security Summary; Preventing Accidental Compromise of Data; Know Your Users; Educate Your Users; Control Your Users; Preventing Intentional Internal Security Breaches; Hiring and Human Resource Policies; Detecting Internal Breaches; Preventing Intentional Internal Breaches; Preventing Unauthorized External Intrusions; External Intruders with Internal Access; Tactical Planning; Recognizing Network Security Threats; Understanding Intruder Motivations; Recreational Hackers; Profit-motivated Hackers; Vengeful Hackers; Hybrid Hackers…”
    Libro electrónico
  17. 10437
    por Ivens, Kathy
    Publicado 2005
    Tabla de Contenidos: “…PHONELINE PORTS ARE LABELED HPNAThe Fix:; POWERLINE HARDWARE ANNOYANCES; The Fix:; POWER STRIPS AND POWERLINE DEVICES; The Fix:; POWERLINE NETWORKING FROM THE DECK OR VERANDA; The Fix:; INSTALLATION SOFTWARE IS A MUST; The Fix:; WHAT&S THE SECURITY RISK FOR POWERLINE NETWORKS?; The Fix:; SECURITY PASSWORDS MUST MATCH; The Fix:; CHANGE THE DEFAULT SECURITY PASSWORD; The Fix:; MIXING POWERLINE WITH OTHER NETWORK TOPOLOGIES; The Fix:; WIRELESS HARDWARE ANNOYANCES; The Fix:; AVOIDING STUFF THAT BLOCKS WIRELESS TRANSMISSIONS; The Fix:; WORKING WITH OMNIDIRECTIONAL ANTENNAS; The Fix…”
    Libro electrónico
  18. 10438
    por Buffett, Warren, 1930-
    Publicado 2007
    Tabla de Contenidos: “…MARKET 'S MOODS; LISTEN FOR OPPORTUNITY'S CALL; KNOW THE DIFFERENCE BETWEEN PRICE AND VALUE; SEEK INTRINSIC VALUE; EXPECT TO BE OUT OF STEP; EARNINGS, EARNINGS, EARNINGS; LOOK FORWARD, NOT BACK; AVOID RISK; DON'T GAMBLE; WATCH FOR UNUSUAL CIRCUMSTANCES; DON'T BE SURPRISED BY CIRCUMSTANCES; AVOID EXCESSIVE DEBT; LOOK FOR SCREAMING BARGAINS; ARBITRAGE WHEN POSSIBLE; BE PATIENT; THINK FOR YOURSELF; HAVE THE RIGHT TOOLS…”
    Libro electrónico
  19. 10439
    Publicado 2007
    Tabla de Contenidos: “…Hardcore Vulnerability ExploitationAuthenticated Scans; Chapter 12: Linux; Linux Vulnerabilities; Choosing Tools; Information Gathering; Unneeded Services; .rhosts and hosts.equiv Files; NFS; File Permissions; Buffer Overflows; Physical Security; General Security Tests; Patching Linux; Chapter 13: Novell NetWare; NetWare Vulnerabilities; Choosing Tools; Getting Started; Authentication; Solid Practices for Minimizing NetWare Security Risks; Part V: Hacking Applications; Chapter 14: Messaging Systems; Messaging System Vulnerabilities; E-Mail Attacks; Instant Messaging; Voice over IP…”
    Libro electrónico
  20. 10440
    por Edwards, Lewin A. R. W.
    Publicado 2006
    Tabla de Contenidos: “…Working for Yourself as an Embedded Engineer5.1 Is Self-Employment for You? Risks and Benefits; 5.2 From Moonlighting to Full-Time Consultant Status- Bookkeeping, Taxes and Workload; 5.3 Ways to Find and Keep Customers; 5.4 Iterative Projects: Never-Ending Horror?…”
    Libro electrónico