Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
10601por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Intro -- Table of contents -- Basic statistics of Iceland, 2014 -- Executive summary -- Main findings -- Iceland's economic prospects are good, but capital controls and wage increases are key challenges -- Output has recovered -- Fiscal policy has become more sustainable, but contingent liabilities remain a risk -- The budget deficit has been eliminated -- Barriers to entrepreneurship, lack of competition and weaknesses in education undermine productivity -- Barriers to entrepreneurship are high -- Key recommendations -- Lifting capital controls while preserving stability -- Securing fiscal sustainability -- Setting the course for productivity growth -- Assessment and recommendations -- Figure 1. …”
Publicado 2015
Libro electrónico -
10602Publicado 2016“…This book explains the principles of knowledge structuration to ensure a valid BN and DBN model and illustrate the flexibility and efficiency of these representations in dependability, risk analysis and control of multi-state systems and dynamic systems. …”
Libro electrónico -
10603Publicado 2023Tabla de Contenidos: “…Getting started with Responsible AI in your organization -- Regulatory compliance in Azure Policy for Azure Machine Learning -- Azure Security Benchmark -- Federal Risk and Authorization Management Program -- New Zealand Information Security Manual (restricted) -- NIST SP 800-53 Rev. 5 -- Reserve Bank of India IT Framework for Banks v2016 -- Compliance auditing and reporting -- Azure portal -- Azure Resource Graph Explorer -- Compliance automation in Azure -- Azure Blueprints -- IaC -- Summary -- Part 2: Securing Your Data -- Chapter 4: Data Protection and Governance -- Working with data governance in Azure -- Identifying challenges -- Exploring benefits -- Getting started using cloud data best practices -- Exploring Azure tools and resources -- Storing and retrieving data in Azure Machine Learning -- Connecting datastores -- Adding data assets -- Encrypting and securing data -- Encryption at rest -- Encryption in transit -- Exploring backup and recovery -- Reviewing backup options for your datastores -- Recovering your workspace -- Summary -- Chapter 5: Data Privacy and Responsible AI Best Practices -- Technical requirements -- Working with Python -- Running a notebook in Azure Machine Learning -- Installing the SmartNoise SDK -- Installing Fairlearn -- Discovering and protecting sensitive data -- Identifying sensitive data -- Exploring data anonymization -- Introducing differential privacy -- Mitigating fairness -- Fairlearn -- Working with model interpretability -- Exploring the Responsible AI dashboard -- Exploring FL and secure multi-party computation -- FL with Azure Machine Learning -- Summary -- Further reading -- Part 3: Securing and Monitoring Your AI Environment -- Chapter 6: Managing and Securing Access -- Working with the PoLP -- Authenticating with Microsoft Entra ID -- Implementing RBAC -- Working with built-in roles…”
Libro electrónico -
10604por Kolawole, Michael O.Tabla de Contenidos: “…Decision theory; 9.1 Tests of significance; 9.2 Error probabilities and decision criteria; 9.3 Maximum likelihood rule; 9.4 Neyman-Pearson rule; 9.5 Minimum error probability rule; 9.6 Bayes minimum risk rule; 9.7 Summary; Problems; Chapter 10. Signal-peak detection; 10.1 Signal processing; 10.2 Peak detection; 10.3 Matched filter; 10.4 Summary; Problems…”
Publicado 2003
Libro electrónico -
10605por Neftci, Salih N.“…Poised among intuition, actual events, and financial mathematics, this book can be used to solve problems in risk management, taxation, regulation, and above all, pricing.* The Second Edition pr…”
Publicado 2008
Libro electrónico -
10606por Graham, Lynford“…The new edition reflects the new FASB Codification, and includes expanded coverage of fair value and guidance on developing fair value estimates, fraud risk and exposure…”
Publicado 2012
Libro electrónico -
10607por Muniz, JosephTabla de Contenidos: “…Penetration Testing and Setup -- Web application Penetration Testing concepts -- Penetration Testing methodology -- Calculating risk -- Kali Penetration Testing concepts -- Step 1 - Reconnaissance -- Step 2 - Target evaluation -- Step 3 - Exploitation -- Step 4 - Privilege Escalation -- Step 5 - maintaining a foothold -- Introducing Kali Linux -- Kali system setup -- Running Kali Linux from external media -- Installing Kali Linux -- Kali Linux and VM image first run -- Kali toolset overview -- Summary -- 2. …”
Publicado 2013
Libro electrónico -
10608Publicado 2020Tabla de Contenidos: “…Risikomanagement entspricht nicht der Risikokultur -- Weniger schlechtes Risikomanagement -- Risikoidentifikation -- No Plan, No Risk -- Fach-Know-how = Risiko-Know-how -- Risikomanagement im Verhältnis zum Projekt -- Risikomanagement und Organisation -- Kapitel 8: Alles nach Plan? …”
Libro electrónico -
10609por Kuhn, Darl“…Database administration is about applying the right solution at the right time, about avoiding risk, about making robust choices that get you home each night in time for dinner with your family. …”
Publicado 2013
Libro electrónico -
10610Publicado 2014Tabla de Contenidos: “…Chapter 6 - Submarine Pipelines and Pipeline Cable Engineering -- 6.1 Overview -- 6.2 Process and Strength Design of Submarine Pipelines -- 6.3 Stability Design of Submarine Pipelines -- 6.4 The Subsea Pipeline Riser -- 6.5 Construction and Corrosion of Submarine Pipelines -- 6.6 Submarine Pipeline Cable Engineering -- Chapter 7 - Safety System Engineering for Offshore Oil -- 7.1 Safety and Reliability Analysis of Offshore Oil Engineering's Configuration -- 7.2 Reliability Analysis of Steel Configurations for Ice Offshore -- 7.3 Fuzzy Reliability Analysis of the Submarine Pipeline System -- 7.4 Fault Tree Analysis of Offshore oil Engineering -- 7.5 Offshore Oil Engineering Safety Evaluation and Risk Analysis -- 7.6 Offshore Oil Engineering Safety Production Management -- Appendix -- APPENDIX 1: NUMERICAL TABLE OF NORMAL DISTRIBUTION -- APPENDIX 2: UNIT CONVERSION TABLE -- Bibliography -- Index…”
Libro electrónico -
10611por Sapp, MartyTabla de Contenidos: “…5.10 Applications of the Mean and Standard Deviation to the Normal Curve5.11 Moments: Measures of Skewness and Kurtosis; 5.12 Summary; 5.13 Exercises; PART II: MEASUREMENT ISSUES; Chapter 6: Measurement Issues; 6.1 Measurement Issues; 6.2 Testing the Dimensionality of the Worry Component of the Test Anxiety Inventory with Economically and Educationally At-Risk High School Students: Employing Item Response Theory Analysis and Principal Components Analysis; Chapter 7: Introduction to Structural Equation Modeling Using EQS; 7.1 Overview of Structural Equation Models…”
Publicado 2014
Libro electrónico -
10612Publicado 2016Tabla de Contenidos: “…De Jong2; Prevalence, risk factors and bacterial species associated with non-healing white line disorders; E. …”
Libro electrónico -
10613Publicado 2024“…It had long been fashionable to describe people as a company's greatest asset -- when this asset was put at risk, decision makers all around the world suddenly realized that this was not just an HR slogan. …”
Libro electrónico -
10614Publicado 2023Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1 - Getting Started -- Chapter 1: The Impact of Data Quality on Organizations -- The value of this book -- Importance of executive support -- Detailed definition of bad data -- Bad data versus perfect data -- Impact of bad data quality -- Quantification of the impact of bad data -- Impacts of bad data in depth -- Process and efficiency impacts -- Reporting and analytics impacts -- Compliance impacts -- Data differentiation impacts -- Causes of bad data -- Lack of a data culture -- Prioritizing process speed over data governance -- Mergers and acquisitions -- Summary -- References -- Chapter 2: The Principles of Data Quality -- Data quality in the wider context of data governance -- Data governance as a discipline -- Data governance tools and MDM -- How data quality fits into data governance and MDM -- Generally accepted principles and terminology of data quality -- The basic terms of data quality defined -- Data quality dimensions -- Stakeholders in data quality initiatives -- Different stakeholder types and their roles -- The data quality improvement cycle -- Business case -- Data discovery -- Rule development -- Monitoring -- Remediation -- Embedding into BAU -- Summary -- References -- Chapter 3: The Business Case for Data Quality -- Activities, components, and costs -- Activities in a data quality initiative -- Early phases -- Planning and business case phase -- Developing quantitative benefit estimates -- Example - the difficulty of calculating quantitative benefits -- Strategies for quantification -- Developing qualitative benefits -- Surveys and focus groups -- Outlining data quality qualitative risks in depth -- Anticipating leadership challenges -- The "Excel will do the job" challenge…”
Libro electrónico -
10615por Cameron, Brian H.Tabla de Contenidos: “…Chapter 9 Strategy Execution Trends and the Application of Strategic Business Architecture -- More Focus on Developing Executable Strategy -- Alignment of Projects with Strategy -- Continuous Monitoring and Adaptation -- Agile Strategy Execution -- Data-Driven Strategy Execution -- Technology Integration and Transformation -- Collaborative and Inclusive Leadership in a Digital World -- Dynamic Organizational Structures -- Culture of Continual Innovation -- Stakeholder Understanding and Management -- Enhanced Strategic Risk Management -- Increased Focus on Sustainability -- Increased Workforce Diversity and Complexity -- The Evolution of Strategic Business Architecture as a Separate and Distinct Discipline -- Strategy Execution Evolves into a Distinct Discipline -- Summary -- Endnotes -- Acknowledgments -- About the Authors -- Index -- EULA…”
Publicado 2024
Libro electrónico -
10616Publicado 2023Tabla de Contenidos: “…Chapter 11 Cybercrime Task Force -- The Cryptocurrency Intelligence Program -- Cyber Fraud Task Force -- The DOJ's Cryptocurrency Enforcement Framework -- Joint Cybercrime Action Taskforce -- The EU's Proposed Digital Asset Legislation -- Notes -- Chapter 12 Money Laundering -- Shuttering of Bulgaria-Based BTC-e Bitcoin Exchange-FinCEN's First Action Against a Foreign-Located MSB and Second-Highest Penalty of 110 Million -- Suex, 2021 -- BitMEX -- Tian Yinyin and Li Jiadong -- Helix13 -- Notes -- Chapter 13 Theft Hacking and Ransom Payments -- Notes -- Chapter 14 Cryptocurrency Bribes -- Notes -- Chapter 15 Corruption -- Notes -- Chapter 16 US Tax Evasion -- Bob Brockman -- John McAfee -- Notes -- Chapter 17 Intellectual Property Espionage and Cryptocurrency -- Notes -- Chapter 18 The US Government Implements Blockchain Programs to Improve Transparency and Efficiency -- The General Services Administration (GSA) -- Department of the Treasury -- US State Department -- Department of Defense (DOD) -- Department of Homeland Security (DHS) -- National Aeronautics and Space Administration (NASA) -- Notes -- Chapter 19 Supply Chain Management with Blockchain Amid the COVID Pandemic -- Blockchain Adoption by US Federal Food and Disease Regulators -- Blockchain Adoption to Track Meat Supply Chain in Australia -- Operation Carne Fraca and Other Violations in the Meat Industry -- Blockchain for Tracking Corruption in Government Funds and Grants -- Tracing Fishy Risks with Blockchain Tech Amid the COVID-19 Pandemic -- Seafood Industry-Related Malpractices -- COVID-19-Related Risks in Seafood Supply Chains -- Seafood Safety in the United States -- Seafood Fraud in the United States -- Mislabeling, Fraud, and Tax Evasion -- Price Fixing and Collusion -- Notes -- Chapter 20 Are NFTs Here to Stay? …”
Libro electrónico -
10617Publicado 2025Tabla de Contenidos: “…-- Consequences of Age Diversity at the Individual Level -- Impact of Age Diversity at Team and Firm Level -- HR Strategies for Retaining Aging Workers and Reducing Age Diversity Risks…”
Libro electrónico -
10618por Zilberman, DavidTabla de Contenidos: “…Intro -- Preface and Acknowledgments -- Contents -- Introduction -- Part I Forestry -- Peter Berck's Contributions to Forestry Economics -- References -- Integrated Management of Bark Beetles: Economic Contributions of Peter Berck and Foundational EntomologicalResearch -- 1 Introduction -- 2 System Structure -- 3 Treatment Strategies and Tactics -- 3.1 Stand Treatments: Thinning -- 3.2 Pest Population Treatments -- 3.2.1 Insecticides -- 3.2.2 Semiochemicals -- 4 Synthesis and Future Research -- References -- Assessing the Potential of Eucalyptus Plantation to Supply Timber for Greener Development in China -- 1 Introduction -- 2 Industrial Policies and Forest Production in China -- 3 Assessment of Eucalyptus Plantation in Southern China -- 3.1 Historical Trend of Eucalyptus Plantation Forests (Guangxi) -- 3.1.1 Area, Volume, and Timber Production -- 3.2 Comparison of Timber Yield Curves: Eucalyptus, Chinese Fir, and Masson Pine -- 3.3 Comparison of Carbon Sequestration Potential Among Main Species -- 3.4 Expected Land Value -- 3.5 The Private Sector in Eucalyptus Development -- 4 Conclusion -- References -- Hedging with a Housing Start Futures Contract -- 1 Background -- 2 Introduction -- 3 Theory -- 3.1 Optimal Hedging -- 3.2 Materials Supplier -- 3.3 The Builder -- 4 General Equilibrium -- 5 Pricing of the Futures Contract -- 5.1 Predicting Starts -- 6 Constructing the Contract -- 7 Value of Contract -- 8 Hedging -- 9 The Relationship Between Building Materials Output and Construction Output -- 10 Earnings -- 11 Predicting Earnings -- 12 Aggregate Production Regressions -- 13 Basis and Basis Risk -- 14 Regional Basis Risk -- 15 Survey of Potential Users of Housing Start Futures as a Hedge -- References -- Part II Agriculture and Fisheries -- The Future of Agriculture -- 1 Transition from Hunting to Farming…”
Publicado 2023
Libro electrónico -
10619Publicado 2001Tabla de Contenidos: “…-- RFCs and SNMP Versions -- Managers and Agents -- The Structure of Management Information and MIBs -- Host Management -- A Brief Introduction to Remote Monitoring (RMON) -- The Concept of Network Management -- Fault Management -- Configuration Management -- Accounting Management -- Performance Management -- Security Management -- Applying the Concepts of Network Management -- Business Case Requirements -- Levels of Activity -- Reporting of Trend Analysis -- Response Time Reporting -- Alarm Correlation -- Trouble Resolution -- Change Management -- Planning for Change -- Managing Change -- High-Level Process Flow for Planned Change Management -- Scope -- Risk assessment -- Test and validation -- Change planning -- Change controller -- Change management team -- Communication -- Implementation team -- Test evaluation of change -- Network management update -- Documentation -- High-Level Process Flow for Emergency Change Management -- Issue determination -- Limited risk assessment -- Communication and documentation -- Implementation -- Test and evaluation -- Before and After SNMP -- Staffing Considerations -- Getting More Information -- SNMPv1 and SNMPv2 -- SNMP and UDP -- SNMP Communities -- The Structure of Management Information -- Naming OIDs -- Defining OIDs -- Extensions to the SMI in Version 2 -- A Closer Look at MIB-II -- SNMP Operations -- The get Operation -- The getnext Operation -- The getbulk Operation -- The set Operation…”
Libro electrónico -
10620por Richards, MarkTabla de Contenidos: “…Applikationsdienste -- Infrastrukturdienste -- Orchestrierungs-Engine -- Nachrichtenfluss -- Wiederverwendbarkeit und Kopplung -- Bewertung der architektonische Eigenschaften -- Kapitel 17: Microservices-Architekturstil -- Geschichte -- Topologie -- Verteilt -- Bounded Context -- Granularität -- Datenisolation -- API-Schicht -- Betriebliche Wiederverwendung (Operational Reuse) -- Frontends -- Kommunikation -- Choreografie und Orchestrierung -- Transaktionen und Sagas -- Bewertung der architektonischen Eigenschaften -- Weiterführende Referenzen -- Kapitel 18: Den richtigen Architekturstil auswählen -- Architekturstile als »Modeerscheinungen« -- Entscheidungskriterien -- Monolith-Fallstudie: Silicon Sandwiches -- Modularer Monolith -- Microkernel -- Verteilte Architektur, Fallstudie: Going, Going, Gone -- Teil III: Techniken und Soft Skills -- Kapitel 19: Architekturentscheidungen -- Antipatterns für Architekturentscheidungen -- Antipattern: Covering your Assets -- Antipattern: Groundhog Day -- Antipattern: Email-Driven Architecture -- Architektonisch wichtig -- Architecture Decision Records (ADR) -- Grundstruktur -- ADRs speichern -- ADRs als Dokumentation -- ADRs für Standards verwenden -- Beispiel -- Kapitel 20: Architektonische Risiken analysieren -- Matrix zur Risikobewertung -- Risikobewertung -- Risk Storming -- Identifizierung -- Konsens -- Risikoanalyse von Agile Stories -- Risk-Storming-Beispiele -- Verfügbarkeit -- Elastizität -- Sicherheit -- Kapitel 21: Architektur in Diagrammen und Präsentationen visualisieren -- Diagramme -- Werkzeuge -- Standards für Diagramme: UML, C4 und ArchiMate -- Richtlinien für die Erstellung von Diagrammen -- Präsentieren -- Zeit manipulieren -- Inkrementeller Aufbau -- Infodecks im Vergleich mit Präsentationen -- Folien sind nur die Hälfte des Vortrags -- Unsichtbarkeit -- Kapitel 22: Effektive Teams schaffen…”
Publicado 2020
Libro electrónico