Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
10761Publicado 2011Tabla de Contenidos: “…Beresford Hartwell -- The judicialization of international arbitration : does the increasing introduction of litigation-style practices, regulations, norms and structures into international arbitration risk a denial of justice in international business disputes? …”
Libro electrónico -
10762Publicado 2024Tabla de Contenidos: “…-- Why API security is important -- The growth of the API economy -- APIs are popular with developers -- APIs are increasingly popular with attackers -- Your existing tools do not work well for APIs -- Developers often lack an understanding of API security -- Exploring API building blocks -- Rate limiting -- Cryptography -- Hashes, HMACs, and signatures -- Transport security -- Encoding -- Examining API data formats -- Understanding the elements of API security -- DevOps -- SAST, DAST, SCA, and WAFs -- API management and gateways -- API security platforms -- Setting API security goals -- The three pillars of security -- Abuse and misuse cases -- Data governance -- A positive security model -- Risk-based methodology -- Summary -- Further reading -- Chapter 2: Understanding APIs -- Understanding HTTP fundamentals -- Uniform Resource Locator -- Requests -- Responses -- Methods -- Status codes -- Sessions -- Exploring the types of APIs -- REST -- GraphQL -- RPC -- SOAP -- WebSockets -- Access control -- No authentication -- HTTP authentication -- AWS keyed-HMAC authentication -- Session cookies -- API keys -- OAuth 2.0 -- Access control best practices and methods -- Using JWTs for claims and identity -- Summary -- Further reading -- Chapter 3: Understanding Common API Vulnerabilities -- The importance of vulnerability classification -- Exploring the Open Worldwide Application Security Project API Security Top 10 -- Object-level vulnerabilities -- Authentication vulnerabilities -- Function-level vulnerabilities -- Data vulnerabilities -- Configuration vulnerabilities -- Implementation vulnerabilities -- Vulnerabilities versus abuse cases -- Exploring abuse cases…”
Libro electrónico -
10763Publicado 2017Tabla de Contenidos: “…-- Scope Concept for the Corruption Project -- Plan Question Two: How Will the Fraud Risk Assessment Impact the Fraud Data Analytics Plan? …”
Libro electrónico -
10764Publicado 2017Tabla de Contenidos: “…Intro -- TITLE PAGE -- COPYRIGHT PAGE -- CONTENTS -- ABOUT THE EDITORS -- LIST OF CONTRIBUTORS -- FOREWORD TO THE FIRST EDITION -- PREFACE -- ACGIH POLICY STATEMENT -- ACGIH STATEMENT OF POSITION -- PART I PHYSICAL HAZARDS -- CHAPTER 1 INTRODUCTION to PHYSICAL HAZARDS -- MECHANICS -- ELECTROMAGNETIC RADIATION -- WORKER PROTECTION -- FURTHER READING -- I WORKER-MATERIAL INTERFACES -- CHAPTER 2 ERGONOMICS and UPPER EXTREMITYMUSCULOSKELETAL DISORDERS -- OCCUPATIONAL SETTING -- MEASUREMENT-ASSESSMENT -- EXPOSURE GUIDELINES -- NORMAL PHYSIOLOGY AND ANATOMY -- PATHOPHYSIOLOGY AND PATHOGENESIS -- DIAGNOSIS AND TREATMENT -- SURVEILLANCE -- PREVENTION -- REFERENCES -- CHAPTER 3 MANUAL MATERIALS HANDLING -- OCCUPATIONAL SETTING -- NORMAL ANATOMY AND PHYSIOLOGY OF THE SPINE -- PATHOPHYSIOLOGY OF INJURY AND RISK FACTORS -- MEASUREMENT ISSUES -- GUIDELINES AND STANDARDS -- DIAGNOSIS AND TREATMENT -- MEDICAL SURVEILLANCE -- PREVENTION -- SUMMARY -- REFERENCES -- CHAPTER 4 OCCUPATIONAL VIBRATION EXPOSURE -- OCCUPATIONAL SETTING -- OCCUPATIONAL VIBRATION MEASUREMENTS -- OCCUPATIONAL VIBRATION GUIDELINES USED IN THE UNITED STATES -- WHOLE-BODY VIBRATION AND LOW BACK PROBLEMS -- PREVENTION -- HAND-ARM VIBRATION MEDICAL EFFECTS -- DIAGNOSIS -- PATHOPHYSIOLOGY -- TREATMENT AND MANAGEMENT -- HAND-ARM VIBRATION CONTROL -- REFERENCES -- CHAPTER 5 MECHANICAL ENERGY -- OCCUPATIONAL SETTING -- MEASUREMENT ISSUES -- EXPOSURE GUIDELINES -- PATHOPHYSIOLOGY OF INJURY -- TREATMENT -- SURVEILLANCE PROGRAMS -- PREVENTION -- SUMMARY -- REFERENCES -- II THE PHYSICAL WORK ENVIRONMENT -- HOT ENVIRONMENTS -- OCCUPATIONAL SETTING -- MEASUREMENT ISSUES -- EXPOSURE GUIDELINES -- ACGIH GUIDELINES -- NIOSH GUIDELINES -- NORMAL PHYSIOLOGY -- PATHOPHYSIOLOGY OF ILLNESS AND TREATMENT -- MEDICAL SURVEILLANCE -- HEAT EXPOSURE AND REPRODUCTION -- PREVENTION -- REFERENCES…”
Libro electrónico -
10765Publicado 2025Libro electrónico
-
10766por Iosifescu, MariusTabla de Contenidos: “…Renewal reward processes; 4.6. The risk problem of an insurance company; 4.7. Counter models; 4.7.1. …”
Publicado 2010
Libro electrónico -
10767por Celko, JoeTabla de Contenidos: “…Degree of Trust Versus Risk of Error; CHAPTER 2 Validation; 2.1. Look-Up Tables…”
Publicado 2009
Libro electrónico -
10768Publicado 2014Tabla de Contenidos: “…Making your RAW photos look more like JPEGs -- Seeing befores and afters -- Applying changes made to one photo to other photos -- Virtual copies: the "no risk" way to experiment -- Editing a bunch of photos at once using auto sync -- Using one-click presets (and making your own!) …”
Libro electrónico -
10769Publicado 2023Tabla de Contenidos: “…No Accountability -- No or Low Compensation and Recognition for DEI Work -- Not Listening to Employees -- No Transparency -- "Copying and Pasting" DEI Initiatives from Other Organizations -- Going Alone -- The Consequences of Ineffective DEI Initiatives -- Conclusion -- Summary -- Chapter 3 The Virtuous Cycle of Innovation and Diversity -- The Power of Innovation -- Why Companies Get Stuck -- Innovation Is Simply Not Prioritized -- Inertia Is the Mortal Enemy of Original Thinking -- The Power of Humility Is Overlooked and Undervalued -- Diversity Drives Innovation -- Innovation Principles -- Courage -- Risk-Taking -- Trust -- Collaboration -- Leadership -- Conclusion -- Summary -- Chapter 4 Innovating the Apprenticeship Model to Advance Diversity in Tech -- The Problem: Recruiting and retaining more tech talent from diverse and military backgrounds. -- "It's time to get creative!" …”
Libro electrónico -
10770por Windley, Phillip J., 1958-Tabla de Contenidos: “…Trust and Evidence; 3.3. Trust and Risk…”
Publicado 2005
Libro electrónico -
10771Publicado 2014Tabla de Contenidos: “…-- Causes of Failed Governance -- Measuring Governance -- Managing Governance -- Governance Tools -- Business Process Layer -- Oracle Enterprise Governance, Risk, and Compliance (eGRC) -- Managing Customization and Personalization -- Functional Features -- Configuration Management -- Change Management -- Data Governance -- Oracle Diagnostic Framework -- Applications Technology Layer -- Technical Customization Governance -- User Management -- Security Concepts -- Platform Technology Layer -- Authentication Through Identity Management -- Technical Security Best Practices -- Database Governance Options -- Auditing -- Networking -- Integration -- Enterprise Manager Compliance Standards -- Summary -- Chapter 10: Getting and Staying Healthy -- Application Health Viewpoints -- The Principals -- The Layers -- The Priorities -- Monitoring -- Understanding Health Resources -- The Past Is the Key to the Future -- Capacity Planning and Forecasting -- Resource Profiles -- Service Usage Profiles -- Elastic Capacity -- Good Health Saves Money -- Healthy Processes and Procedures -- Be a Superhero, Not a Target -- Quality Information In and Out…”
Libro electrónico -
10772Publicado 2012Tabla de Contenidos: “…6.2.1 Malvertising6.2.2 Impersonation; 6.2.3 Appropriate Use; 6.2.4 Cyber Crime; 6.2.5 Geolocation; 6.2.6 Privacy; 6.3 Cyber Conflict Issues; 6.3.1 Intellectual Property Theft; 6.3.2 Cyber Espionage; 6.3.3 Cyber Sabotage; 6.3.4 Cyber Warfare; 6.4 Cyber Management Issues; 6.4.1 Fiduciary Responsibility; 6.4.2 Risk Management; 6.4.3 Professional Certification; 6.4.4 Supply Chain; 6.4.5 Security Principles; 6.4.6 Research and Development; 6.5 Cyber Infrastructure Issues; 6.5.1 Banking and Finance; 6.5.2 Health Care; 6.5.3 Industrial Control Systems…”
Libro electrónico -
10773Publicado 2012Tabla de Contenidos: “…5.1 Introduction5.2 Case study: Updating a known risk-adjustment model for local use; 5.3 Models and methods; 5.4 Data analysis and results; 5.4.1 Updating using the training data; 5.4.2 Updating the model yearly; 5.5 Discussion; References; 6 A Bayesian regression model with variable selection for genome-wide association studies; 6.1 Introduction; 6.2 Case study: Case-control of Type 1 diabetes; 6.3 Case study: GENICA; 6.4 Models and methods; 6.4.1 Main effect models; 6.4.2 Main effects and interactions; 6.5 Data analysis and results; 6.5.1 WTCCC TID; 6.5.2 GENICA; 6.6 Discussion…”
Libro electrónico -
10774por Varma, SumatiTabla de Contenidos: “…Endnotes -- Unit II: Global Business Environment -- Chapter 3: Economic Environment -- Introduction -- Economic Systems -- Free Market Economy -- Command Economy -- Mixed Economy -- Transition Economy -- Asian Capitalism -- Japan -- East Asian Countries -- China -- Economic Indicators -- Income Level and Distribution -- Economic Growth: GDP -- International Business in Action: Daimler Expands in India -- Alternatives to GDP -- Inflation -- Infrastructure -- Region Focus: the Making of a Global Giant -- Population -- Economic Stability -- Industry Focus: Internationalization of Argentina's Manufacturing Sector -- Closing Case: Index of Economic Freedom -- Summary -- Key Terms -- Discussion Questions -- Mini Projects -- Endnotes -- Chapter 4: Political and Legal Environment -- Introduction -- Political Environment -- Political Ideologies and Systems -- Political Risk -- International Business in Action: Google in China -- Legal Environment -- Legal Systems -- Legal Jurisdiction -- Region Focus: Industrial Carnage in Bhopal -- Ethics in International Business -- Human Rights -- Industry Focus: Articulating Corporate Values -- Environmental Issues -- Corruption and Bribery -- Closing Case: Ethical Survival of TNCs -- Summary -- Key Terms -- Discussion Questions -- Mini Projects -- Endnotes -- Chapter 5: Cultural Environment -- Introduction -- Culture and its Relevance for International Business -- Cultural Environment -- Elements of Culture -- Language -- Non-verbal Communication -- Religion -- Values and Attitudes -- International Business in Action: Islamic Banking -- Customs and Manners -- Aesthetics -- Industry Focus: Emergence of the Creative Industry -- Cultural Dimensions in International Business -- Hofstede's Dimensions of Culture -- Schwartz's Classification -- Trompenaars' and Hampden-Turner's Classification…”
Publicado 2012
Libro electrónico -
10775Publicado 2012Tabla de Contenidos: “…8.5 LTE Applications 149 -- References 155 -- 9 Voice Over LTE 157 -- 9.1 Introduction 157 -- 9.2 CS Fallback for Evolved Packet System 158 -- 9.3 SMS Over SGs 159 -- 9.4 Voice and Other CS Services than SMS 164 -- 9.5 Voice and SMS Over IP 169 -- 9.6 Summary 186 -- References 187 -- 10 Functionality of LTE/SAE 189 -- 10.1 Introduction 189 -- 10.2 States 189 -- 10.3 End-to-End Functionality 199 -- 10.4 LTE/SAE Roaming 200 -- 10.5 Charging 216 -- References 219 -- 11 LTE/SAE Security 221 -- 11.1 Introduction 221 -- 11.2 LTE Security Risk Identification 222 -- 11.3 LTE/SAE Service Security -- Case Example 234 -- 11.4 Authentication and Authorization 238 -- 11.5 Customer Data Safety 239 -- 11.6 Lawful Interception 239 -- References 242 -- 12 Planning and Deployment of SAE 243 -- 12.1 Introduction 243 -- 12.2 Network Evolution from 2G/3G PS Core to EPC 243 -- 12.3 Entering Commercial Phase: Support for Multi-Mode LTE/3G/2G Terminals with Pre-Release 8 SGSN 245 -- 12.4 SGSN/MME Evolution 248 -- 12.5 Case Example: Commercial SGSN/MME Offering 249 -- 12.6 Mobile Gateway Evolution 250 -- 12.7 Case Example: Commercial GGSN/S-GW/P-GW Offering 251 -- 12.8 EPC Network Deployment and Topology Considerations 252 -- 12.9 LTE Access Dimensioning 254 -- 13 Radio Network Planning 257 -- 13.1 Introduction 257 -- 13.2 Radio Network Planning Process 257 -- 13.3 Nominal Network Planning 260 -- 13.4 Capacity Planning 263 -- 13.5 Coverage Planning 264 -- 13.6 Self-Optimizing Network 271 -- Reference 272 -- 14 LTE/SAE Measurements 273 -- 14.1 Introduction 273 -- 14.2 General 273 -- 14.3 Principles of Radio Interface Measurements 273 -- 14.4 LTE Field Measurements 282 -- 14.5 Evolution Changes the Rules of Testing 289 -- 14.6 General Test Requirements and Methods for the LTE Air Interface 292 -- 14.7 Test Requirements in SAE 298 -- 14.8 Throughput Testing 300 -- 14.9 Self-Organizing Network Techniques for Test and Measurement 306 -- 14.10 Field Testing 309 -- References 323 -- 15 Recommendations 325.…”
Libro electrónico -
10776Publicado 2018Tabla de Contenidos: “…1.6.3 Intuitive Interaction1.7 Potential for Product, Process, and Business Model Innovations; 1.7.1 Product Innovation; 1.7.2 Process Innovation; 1.7.3 Business Model Innovation; 1.8 Implications and Challenges; 1.8.1 New Markets; 1.8.2 Changed Value Creation; 1.8.3 Increased Awareness for Information Spaces; 1.8.4 Social, Ethical, Legal, and Risk Aspects; 1.9 Conclusion; References; Chapter 2: Environment, People, and Time as Factors in the Internet of Things Technical Revolution; 2.1 Introduction; 2.2 Technical Revolutions; 2.2.1 Past Experience…”
Libro electrónico -
10777Publicado 2019Tabla de Contenidos: “…Agile Life Cycle WBS Example -- 5.2.7. Risk Management Example -- 5.2.8. Earned Value Management Example -- 5.3. …”
Libro electrónico -
10778Publicado 2012Tabla de Contenidos: “…Supply Chain Security -- Physical Security -- Information Technology Continuity and Recovery -- Chapter Summary -- Chapter Quiz -- Notes -- Chapter 18 Public Awareness and Personal, Family, and Community Preparedness: Challenges and Solutions -- Chapter Overview -- Chapter Learning Objectives -- The Preparedness Challenge -- Risk Communications -- Individual, Family, and Community Antiterrorism Measures -- Principles of Emergency Preparedness Planning -- Next Steps in Individual and Community Response -- Indications of a Terrorist Attack -- Chapter Summary -- Chapter Quiz -- Notes -- Chapter 19 The Nation Responds: Volunteer, Faith-based, Business, and Nongovernmental Assets -- Chapter Overview -- Chapter Learning Objectives -- Grassroots Response -- Issues in Volunteer Response -- A National Network of Volunteers -- Lessons of Katrina -- Faith-based and Community Organizations -- Business Support for Homeland Security -- Government-sponsored Volunteers -- State Defense Forces -- Chapter Summary -- Chapter Quiz -- Notes -- Chapter 20 Domain Security: Border, Maritime, and Aviation Security -- Chapter Overview -- Chapter Learning Objectives -- Principle of Layered Security -- Border Security -- Maritime Security -- Aviation Security -- Chapter Summary -- Chapter Quiz -- Notes -- Chapter 21 Cybersecurity: Protecting Cyberspace and Digital Technology -- Chapter Overview -- Chapter Learning Objectives -- The Threat -- Insider Attacks -- Outsider Attacks -- Malicious Software -- Human Engineering -- Terrorist Use of Cyberspace -- Cyber Defense -- The Role of the Private Sector -- Resilience and Prospects for the Future -- Chapter Summary -- Chapter Quiz -- Notes -- Appendix A: Significant Foiled U.S. …”
Libro electrónico -
10779Publicado 2014Tabla de Contenidos: “…4-3 Calculating Local Volatilities4-3.1 Dupire's Equation; 4-3.2 From Implied Volatility to Local Volatility; 4-3.3 Hedging with Local Volatility; 4-4 Stochastic Volatility; 4-4.1 Hedging Theory; 4-4.2 Connection with Local Volatility; 4-4.3 Monte Carlo Method; 4-4.4 Pricing and Hedging Forward Start Options; 4-4.5 A Word on Stochastic Volatility Models with Jumps; References; Problems; 4.1 From Implied to Local Volatility; 4.2 Market Price of Volatility Risk; 4.3 Local Volatility Pricing; Appendix 4.A: Derivation of Dupire's Equation; Chapter 5 Volatility Derivatives; 5-1 Volatility Trading…”
Libro electrónico -
10780Publicado 2016Tabla de Contenidos: “…WISC-V Sex, Ethnic, and SES Differences -- Chapter 6. The Creation of New Risk Scales for school failure and Juvenile Delinquency: The Child and Adolescent Academic and Behavior Questionnaires / Jennie Kaufman Singer, Alan S. …”
Libro electrónico