Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
10461Publicado 2012Tabla de Contenidos: “…Conducting the AppraisalChapter 3: Scheduling; Keeping Your Options Open; Conducting the Investigation; Looking for Approval; Creating the Retention Schedule Document; Implementing the Retention Schedule; Updating the Retention Schedule; Part II: Filing Made Simple; Chapter 4: I Know It's Here Somewhere; Filing Methods; Evaluating Filing Equipment and Supplies; Selecting a Filing Method; Creating a Digital Filing System; Chapter 5: Drives Can Drive You Crazy; At-Risk Drivers; Cleaning Up Your Driving Record; Maintaining Your Drives; Chapter 6: A Message about E-Mail; The Anatomy of an E-Mail…”
Libro electrónico -
10462Publicado 2014Tabla de Contenidos: “…Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Threat and Vulnerability Overview; Introduction; Risk overview; Hypervisor threats; Hypervisor vulnerabilities; Guest virtual machine threats; Guest virtual machine vulnerabilities; Network threats; Network vulnerabilities; Storage threats; Storage vulnerabilities; Physical threats; Physical vulnerabilities; Security concepts; Summary; Chapter 2: ESXi Host Security; Introduction; Hardening the host via Console; Hardening the host via vSphere Client…”
Libro electrónico -
10463por Franks, Bill, 1968-Tabla de Contenidos: “…; HOW IS BIG DATA MORE OF THE SAME?; RISKS OF BIG DATA; WHY YOU NEED TO TAME BIG DATA; THE STRUCTURE OF BIG DATA; EXPLORING BIG DATA; MOST BIG DATA DOESN'T MATTER; FILTERING BIG DATA EFFECTIVELY; MIXING BIG DATA WITH TRADITIONAL DATA; THE NEED FOR STANDARDS; TODAY'S BIG DATA IS NOT TOMORROW'S BIG DATA; WRAP-UP; NOTES…”
Publicado 2012
Libro electrónico -
10464Publicado 2012Tabla de Contenidos: “…Configuring SQL Server Setting for SecurityBest Practices Analyzer (BPA); SQL Server Configuration Manager; Back It Up; Uninstalling SQL Server; Uninstalling Reporting Services; Uninstalling Analysis Services; Uninstalling the SQL Server Database Engine; Troubleshooting a Failed Install; Summary; Chapter 3: Upgrading SQL Server 2012 Best Practices; Why Upgrade to SQL Server 2012?; Risk Mitigation - the Microsoft Contribution; Independent Software Vendors and SQL Community Contributions; Upgrading to SQL Server 2012; In-Place Upgrading; Side-by-Side Upgrade…”
Libro electrónico -
10465por Spendolini, ScottTabla de Contenidos: “…What Is a Security Plan?Assessment; Risk Analysis; Access Control; Data Access; Auditing and Monitoring; Application Management; Design; Development; Contingency; Review and Revision; Security Reviews; Automated Reviews; Manual Reviews; Simulating a Breach; Summary; CHAPTER 3 APEX Architecture; Overview of APEX; Administration Console; Managing Requests; Managing Instances; Managing Workspaces; Monitoring Activity; Workspaces; Users and Roles; Schema Mappings; Components; Application Builder; SQL Workshop; Team Development; Websheets; Architecture; Metadata-Based Architecture; Schemas…”
Publicado 2013
Libro electrónico -
10466por Drobny, StevenTabla de Contenidos: “…; Should real money funds manage to a risk target rather than areturn target?…”
Publicado 2014
Libro electrónico -
10467Publicado 2014Tabla de Contenidos: “…Increase the Income, Don't Cut the BudgetAnalyzing the True Cost of Your Mission; Your Opportunity Risk Factor: The Real Value of Your Time; What Makes Your Best Funders "Best"?…”
Libro electrónico -
10468Publicado 2014Tabla de Contenidos: “…Chapter 5: Vision: The Innovation ThesisKnow the Market; Formulate an Innovation Thesis; Execute on the Thesis; Chapter 6: Lean Enterprise Process; Roots of the Lean Startup; Limitations; Sprints; Experimental Process: A Quick Overview; Confirmation Bias; Risk Aversion; Documentation; Experimental Process: Step-by-Step; Form a Hypothesis; Identify Your Riskiest Assumption; Choose a Test Method; Segment Customers; Set Success Criteria; Build a Metrics Model; Build an MVP; Run the Experiment; Pivot or Persevere; Javelin Board; Chapter 7: Experimental Methods; Where to Find Customers…”
Libro electrónico -
10469por Shinder, Thomas W.Tabla de Contenidos: “….; Copyright; Contents; Acknowledgments; About the Authors; About the Technical Editor; Foreword; Chapter 1: Planning Platform Security; Reviewing the Core Security Principles; Planning a Secure Platform from End to Edge and Beyond; Understanding Business Requirements; Perform Risk Analysis; Review Policies, Procedures, Standards, and Guidelines; Security Awareness Training; Determine Access Control; Secure Software Development Strategy; Network Security…”
Publicado 2013
Libro electrónico -
10470Publicado 2013Tabla de Contenidos: “…-- Chapter 4: What are the Risks of Not Having an Agile Business Analyst? -- The limitations of requirements review sessions -- Software is only part of the solution -- The danger of the unquestioned business user -- Direct engagement between the Agile team and the business users -- The value of including an Agile business analyst -- The tyranny of proximity -- What to do when the business user is not available -- Opportunities that could be missed -- Chapter 5: 30 Ways for the Agile Business Analyst to Add Value to Your Project -- 1. …”
Libro electrónico -
10471por Guthrie, Forbes, 1973-Tabla de Contenidos: “…Scaling Is a Matter of PerspectiveRisk Assessment; Choosing the Right Size; Blade Servers vs. …”
Publicado 2011
Libro electrónico -
10472Publicado 2015Tabla de Contenidos: “…There Used to Be a Doorway HereHost Attribution; Bring Your Own Metadata; Identifying the Crown Jewels; Make Your Own Sandwich; More Crown Jewels; Low-Hanging Fruit; Standard Standards; Risk Tolerance; Can I Get a Copy of Your Playbook?…”
Libro electrónico -
10473Publicado 2011Tabla de Contenidos: “…Using Choices to Learn About Risk; 5. Income Processes, Labor Supply and Mobility; 6. …”
Libro electrónico -
10474Publicado 2010Tabla de Contenidos: “…Best Practices for Documentation; References; Appendix A: Example Document Outlines; Work Order (WO); Minutes; Problem Report/Corrective Action (PRCA); Engineering Change Request (ECR); Engineering Change Notice (ECN); Project Management Plan (PMP); Interface Control Documents (ICDs); Development Plans; Requirements; Risk Management Plan; Configuration Management Plan; Documentation Plan; Analysis Reports; Design Description; Test Plan; Operation Plan; Metrology Concerns and Procedures…”
Libro electrónico -
10475por Truax, MartinTabla de Contenidos: “…Hedging Tactics for Portfolio Risk ManagementSimple or Complex Technical Analysis-Your Choice; America's New Role in the Shrinking World; Chapter 6: Conquer the Crash, Condensed; A Myth Exposed; Economic Deterioration During the Final Decade of Wave V; What Are the Signs of a Topping Stock Market?…”
Publicado 2010
Libro electrónico -
10476por Buffington, Jason, 1970-Tabla de Contenidos: “…; In the Beginning, There Were Disk and Tape; Overview of Availability Mechanisms; Overview of Protection Mechanisms; Summary; Chapter 2: Data Protection by the Numbers; The Technical Metrics: RPO and RTO; Business Metrics: RA and BIA; Risk Mitigation: Fixing It in Advance; Total Cost of Ownership; Return on Investment; Turning IT Needs into Corporate Initiatives; Summary; Chapter 3: The Layers of Data Protection…”
Publicado 2010
Libro electrónico -
10477por Kissell, JoeTabla de Contenidos: “…Mac® Security Bible; Acknowledgments; Introduction; Contents at a Glance; Contents; Part I: Mac Security Basics; Chapter 1: Mac Security Overview; Mac Security: Myth versus Fact; Major Mac OS X Security Features; Privacy versus Security; Weighing Convenience against Security; Understanding Your Risks; The Theory and Practice of Best Practices; Seven Things You Should Do Right Now; Summary; Chapter 2: Securing Your Mac against Theft; Security Cables and Locks; Laptop Lockers; Other Theft Deterrents; Marking a Mac for Recovery; Tracking and Recovering Stolen Macs; Summary…”
Publicado 2010
Libro electrónico -
10478Publicado 2010Tabla de Contenidos: “…; PCI DSS in Depth; Quick Overview of PCI Requirements; PCI DSS and Risk; Benefits of Compliance; Case Study; Summary; References…”
Libro electrónico -
10479por Dorsey, Thomas J.Tabla de Contenidos: “…; Why You Should Use Point andFigure Charts; In the Beginning; On Taking Risks in Life; Chapter 2 Point and Figure Fundamentals; Basic Tenets of a Point and Figure Chart; Updating a Point and Figure Chart; Practice Chart: ABC Corporation; Mutual Fund Charting; Exchange-Traded Funds; Trend Lines; Bullish Support Line…”
Publicado 2013
Libro electrónico -
10480Publicado 2017Tabla de Contenidos: “…-- Educational Preparation -- Long-term Career Growth -- Practical Challenges -- Emotional Risks -- Sample Earnings Outlook -- Chapter 7: Do You Want to Work in Business or Be in Business? …”
Libro electrónico