Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
10501por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Progress on structural reforms -- Macroeconomic performance and risks -- Figure 2. Regained competitiveness contributes to Irish exports -- Figure 3. …”
Publicado 2015
Libro electrónico -
10502Publicado 2023Tabla de Contenidos: “…-- Chapter 14 Large Model Monetization Strategies-Quick Wins -- AI Operating System Models -- AI App Store -- Quick-Win Opportunities -- The Digital Monetization Paradigm -- Understanding the Risks -- What's Next? -- Chapter 15 Large Model Monetization Strategies-The Bigger Picture -- What Are the Costs? …”
Libro electrónico -
10503Publicado 2023Tabla de Contenidos: “…. -- The green transition comes at a price but with disproportionately high benefits -- Definitions and terminology facilitate communication -- Raising awareness and public acceptance -- Carbon management as an overarching framework for policy making -- Complexity sets the scene for policy dilemmas and unintended consequences -- Governance and regulation -- Putting the framework together: being systemic -- Policy must address systemic business risks in value chains -- Systems thinking in sustainability policies -- Innovation policies should incorporate a time dimension…”
Libro electrónico -
10504Publicado 2022Tabla de Contenidos: “…Chapter 8: Planning and Managing Passwordless Authentication Methods -- Technical requirements -- Administering authentication methods (FIDO2/passwordless) -- Modern authentication for identity and access management -- Implementing an authentication solution based on Windows Hello for Business -- Implementing an authentication solution with the Microsoft Authenticator app -- Summary -- Chapter 9: Planning, Implementing, and Administering Conditional Access and Azure Identity Protection -- Technical requirements -- Planning and implementing Conditional Access policies and controls -- Zero-trust methodology -- Conditional Access policies -- Configuring Smart Lockout thresholds -- Implementing and managing a user risk policy -- Azure AD Identity Protection -- Monitoring, investigating, and remediating elevated risky users -- Summary -- Section 4 - Implementing Access Management for Applications -- Chapter 10: Planning and Implementing Enterprise Apps for Single Sign-On (SSO) -- Technical requirements -- Designing and implementing access management and SSO for apps -- Discovering apps with Microsoft Cloud App Security -- Integrating on-premises apps using Azure AD Application Proxy -- Planning your line-of-business application registration strategy -- Implementing application registrations -- Planning and configuring multi-tier application permissions -- Summary -- Chapter 11: Monitoring Enterprise Apps with Microsoft Defender for Cloud Apps -- Technical requirements -- Planning your cloud application strategy -- Discovering apps with Microsoft Defender for Cloud Apps -- Implementing cloud app security policies -- Planning and configuring cloud application permissions -- Discovering apps by using MCAS or an ADFS app report -- Discovering apps with MCAS app report -- Discovering apps with an ADFS app report…”
Libro electrónico -
10505Publicado 2012Tabla de Contenidos: “…Cover -- Contents -- Introduction -- Acknowledgements -- Thinking wealthy -- 1 Anybody can be wealthy - you just need to apply yourself -- 2 Decide on your definition of wealth -- 3 Set your objectives -- 4 Keep it under your hat -- 5 Most people are too lazy to be wealthy -- 6 Get a reality check -- 7 Understand your money beliefs and where they come from -- 8 Understand that wealth is a consequence, not a reward* -- 9 Decide what you want money for -- 10 Understand that money begets money -- 11 Calculate the net return -- 12 If you see money as the solution you'll find it becomes the problem -- 13 You can make lots of money, you can enjoy your job, and you can sleep nights -- 14 Don't make money by being bad -- 15 Money and happiness - understand their relationship -- 16 Know the difference between price and value -- 17 know how the wealthy think -- 18 Don't envy what others have -- 19 It's harder to manage yourself than it is to manage your money -- Getting wealthy -- 20 You've got to know where you are before you start -- 21 You've got to have a plan -- 22 Get your finances under control -- 23 Insurance pays someone, and odds are it's not you -- 24 Only by looking wealthy can you become wealthy -- 25 Speculate to accumulate (no, this isn't gambling) -- 26 Decide your attitude to risk -- 27 Think through the alternatives to taking a risk -- 28 If you don't trust someone, don't do business with them -- 29 It's never too late to start getting wealthy -- 30 Start saving young (or teach your kids this one if it's too late for you) -- 31 Understand that your financial needs change at different stages of your life -- 32 You have to work hard to get rich enough not to have to work hard -- 33 Learn the art of deal making -- 34 Learn the art of negotiating…”
Libro electrónico -
10506por Sundberg, NiklasTabla de Contenidos: “…-- Sustainability in IT, sustainability by IT, and IT for society -- Sustainable IT GHG emission taxonomy -- Corporate sustainability and sustainable IT -- Drivers for a sustainable IT agenda -- ESG considerations for IT -- Financial value -- Non-financial value -- Risks -- Employee engagement -- Readiness -- Summary -- Bibliography -- Part 2: What Are Sustainable IT Practices? …”
Publicado 2022
Libro electrónico -
10507Publicado 2022Tabla de Contenidos: “…Lessons from Catastrophe: Risk Management in Oral Societies -- Patrick Nunn 1 -- Loredana Lancini 2 -- Rita Compatangelo-Soussignan 2 -- 6. …”
Libro electrónico -
10508por OECDTabla de Contenidos: “…Financial stability risks appear to be contained but need to be monitored -- 2.3. …”
Publicado 2024
Libro electrónico -
10509Publicado 2020“…Acute kidney injury (AKI) is still associated with high morbidity and mortality incidence rates, and also bears an elevated risk of subsequent chronic kidney disease. Although the kidney has a remarkable capacity for regeneration after injury and may recover completely depending on the type of renal lesions, the options for clinical intervention are restricted to fluid management and extracorporeal kidney support. …”
Libro electrónico -
10510por Richter, Matthias, 1964-“…Approaches chosen for the book are placed in the context of issues such as climate change, green- and open-space development, flood-risk assessment, threats to urban biodiversity, and increasing environmental pollution…”
Publicado 2011
Libro electrónico -
10511por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Proportion of the population at risk of poverty or social exclusion, 2008 vs. 2012; Figure 1.2. …”
Publicado 2014
Libro electrónico -
10512por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…The challenge of raising large volumes of funds with acceptable rollover risk…”
Publicado 2014
Libro electrónico -
10513por Organisation for Economic Co-operation and Development.“…No attempt was made to categorise the criteria according to event type or risk significance…”
Publicado 2001
Libro electrónico -
10514Publicado 2012Tabla de Contenidos: “…Financial account related risk factors to financial stability; Tackling imbalances in the euro area; Figure 1.13. …”
Libro electrónico -
10515Publicado 2016“…Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to reduce risk. Presents case studies and actual data to demonstrate threat data visualization techniques and threat simulation tools Explores the usage of kill chain modelling to inform actionable security intelligence Demonstrates a methodology that can be used to create a full threat forecast analysis for enterprise networks of any size…”
Libro electrónico -
10516Publicado 2015“…What's different about storytelling for the progressive, risk-taking networks who are delivering provocative, groundbreaking, binge-worthy content, without the restraints of the traditional, advertiser-supported programming model. …”
Libro electrónico -
10517Publicado 2014Tabla de Contenidos: “…Compensation Discussion and Analysis -- The Tabular Disclosures -- Option Grant Practices -- Director Compensation -- Disclosure of Material Compensation Risk -- Compensation Disclosure Requirements for Smaller Reporting Companies -- Golden Parachute Compensation -- Pending Dodd-Frank Disclosure Requirements -- Beneficial Ownership Reporting -- Disclosure of Related Person Transactions -- Director Independence and Governance Disclosure -- Disclosure of Equity Compensation Plans -- Plan Filing Requirements -- Form 8-K -- Selected Provisions of Regulation S-K -- CHAPTER 7 Other Securities Issues -- Selected Dodd-Frank Provisions Relating to Executive Compensation -- Special Rules Regarding Stock Transactions -- NYSE/NASDAQ Rules: Approval of Equity Compensation Plans -- Selected Sarbanes-Oxley Provisions Relating to Executive Compensation -- CHAPTER 8 Tax Rules and Issues -- Overview -- Organizations Responsible for Federal Tax -- Major U.S. …”
Libro electrónico -
10518Publicado 2017Tabla de Contenidos: “…-- It's all about you -- Imagine -- Because -- 'Now', 'quickly', 'immediately', 'fast' and 'instantly': time-critical words -- Please and thank you -- 'In charge', 'ownership', 'risk free', 'guarantee' and 'no obligation': control words -- 'Free' -- 'New' -- 'Aware', 'realise' and 'experience' -- Chapter 5: K Is for Knowledge -- Demonstrating Expertise -- Let's Start with Publishing -- Blogging -- Which platform? …”
Libro electrónico -
10519Publicado 2011“…It explores the complicated relationship between mental conditions and societal issues as well as examining risk and protective factors for the prevalence, course, adaptation to and recovery from mental illness. …”
Libro electrónico -
10520Publicado 2023Tabla de Contenidos: “…-- Refactoring and clean code -- Misconceptions about refactoring -- Why you should consider refactoring -- Improving the design of your software -- Maintainability and scalability -- Understanding, avoiding, and fixing bugs -- Faster development -- When you should refactor -- The "Rule of Three" -- Preparatory refactoring for smooth feature implementation -- Refactoring for bug fixing -- Comprehension refactoring -- The "Boy Scout Rule" -- Planned refactoring -- Long-term refactoring and "Branch by Abstraction" -- Refactoring in a code review -- What you should refactor -- Impact analysis -- Risk assessment -- Value estimation -- Prioritization matrix -- Further considerations -- Refactor or rewrite? …”
Libro electrónico