Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
10841Publicado 2017Tabla de Contenidos: “…5.6.3 Simulation of Bivariate Normal -- 5.7 Statistical Dependence and Financial Risks -- 5.7.1 A Story of Three Loans -- 5.7.2 Independent Defaults -- 5.7.3 Correlated Defaults -- References -- 6 Copula Models of Dependence -- 6.1 Introduction -- 6.2 Definitions -- 6.2.1 Quasi-Monotonicity -- 6.2.2 Definition of Copula -- 6.2.3 Sklar's Theorem -- 6.2.4 Survival Copulas -- 6.3 Simplest Pair Copulas -- 6.3.1 Maximum Copula -- 6.3.2 Minimum Copula -- 6.3.3 FGM Copulas -- 6.4 Elliptical Copulas -- 6.4.1 Elliptical Distributions -- 6.4.2 Method of Inverses -- 6.4.3 Gaussian Copula -- 6.4.4 The t-copula -- 6.5 Archimedean Copulas -- 6.5.1 Definitions -- 6.5.2 One-Parameter Copulas -- 6.5.3 Clayton Copula -- 6.5.4 Frank Copula -- 6.5.5 Gumbel-Hougaard Copula -- 6.5.6 Two-Parameter Copulas -- 6.6 Simulation of Joint Distributions -- 6.6.1 Bivariate Elliptical Distributions -- 6.6.2 Bivariate Archimedean Copulas -- 6.7 Multidimensional Copulas -- References -- 7 Statistics of Copulas -- 7.1 The Formula that Killed Wall Street -- 7.2 Criteria of Model Comparison -- 7.2.1 Goodness-of-Fit Tests -- 7.2.2 Posterior Predictive p-values -- 7.2.3 Information Criteria -- 7.2.4 Concordance Measures -- 7.2.5 Tail Dependence -- 7.3 Parametric Estimation -- 7.3.1 Parametric, Semiparametric, or Nonparametric? …”
Libro electrónico -
10842Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Advanced Infrastructure Penetration Testing -- Information security overview -- Confidentiality -- Integrity -- Availability -- Least privilege and need to know -- Defense in depth -- Risk analysis -- Information Assurance -- Information security management program -- Hacking concepts and phases -- Types of hackers -- Hacking phases -- Reconnaissance -- Passive reconnaissance -- Active reconnaissance -- Scanning -- Port scanning -- Network scanning -- Vulnerability scanning -- Gaining access -- Maintaining access -- Clearing tracks -- Penetration testing overview -- Penetration testing types -- White box pentesting -- Black box pentesting -- Gray box pentesting -- The penetration testing teams -- Red teaming -- Blue teaming -- Purple teaming -- Pentesting standards and guidance -- Policies -- Standards -- Procedures -- Guidance -- Open Source Security Testing Methodology Manual -- Information Systems Security Assessment Framework -- Penetration Testing Execution Standard -- Payment Card Industry Data Security Standard -- Penetration testing steps -- Pre-engagement -- The objectives and scope -- A get out of jail free card -- Emergency contact information -- Payment information -- Non-disclosure agreement -- Intelligence gathering -- Public intelligence -- Social engineering attacks -- Physical analysis -- Information system and network analysis -- Human intelligence -- Signal intelligence -- Open source intelligence -- Imagery intelligence -- Geospatial intelligence -- Threat modeling -- Business asset analysis -- Business process analysis -- Threat agents analysis -- Threat capability analysis -- Motivation modeling -- Vulnerability analysis -- Vulnerability assessment with Nexpose -- Installing Nexpose…”
Libro electrónico -
10843Publicado 2016Tabla de Contenidos: “…Consumer Support Estimate by country, 1995-97 and 2013-15 (percentage of consumption expenditure at farm gate) -- Assessing support and reforms -- Box 1.7. Agricultural risk management: A holistic approach -- Notes -- References -- Chapter 2. …”
Libro electrónico -
10844Publicado 2019Tabla de Contenidos: “…Ingredient and Service Brands -- The Power of Brand Portfolios -- Stretching the Brand -- Expanding the Brand Portfolio -- The Characteristics of Strong Brand Portfolios -- Portfolio Problems -- Making Portfolio Decisions -- Brand Portfolio Models -- House of Brands -- Branded House -- Keys to Success -- Key to Success #1: Build and Extend Core Brands -- Key to Success #2: Add Brands to the Portfolio to Address Major Opportunities -- Key to Success #3: Proactively Prune Weak and Redundant Brands -- Key to Success #4: Keep Things Simple -- Key to Success #5: Involve Senior Management -- Summary -- Notes -- Chapter 4 Competitive Brand Strategies: Creating Pioneer, Fast-Follower, and Late-Mover Advantage -- Pioneering Advantage -- A Pioneer Is a Low-Risk Choice -- Consumers Remember Pioneers -- A Pioneer Sets Category Standards -- Fast Following: A Different Path to Success -- The Fast-Follower Advantage -- Catching the Wave: Growth-Stage Entrants -- Late Movers: Different but Not Disruptive -- Overlooked Value -- Just Different Enough -- Late Movers: The Power of Innovation -- The Innovation Challenge -- Strategic Innovation -- Summary -- Notes -- Chapter 5 Leading the Brand: Brand Strategy Orchestration and Implementation -- Leadership, Implementation, and Branding -- Pitfalls in Brand Strategy Implementation -- A Framework for Brand Strategy Orchestration and Implementation -- Company Strategy -- Brand Platform -- Culture -- Brand Governance System -- Tools -- Momentum -- Two Critical Roles -- Summary -- Notes -- Chapter 6 The Three Keys to Building Global Brands with Soul -- Finding the Common Threads: Winning with Global Insights -- Find the Common Thread -- Segment across Habits and Needs -- Enlist Local Managers -- Test and Adjust -- Going Glocal: Getting the Right Balance of Global and Local -- Decentralize to Find the Right Balance…”
Libro electrónico -
10845Publicado 2018Tabla de Contenidos: “…Tracking app conversions with Firebase -- AdMob -- Android Studio and initializing the SDK -- Summary -- Chapter 13: Flexible NoSQL and Cloud Firestore -- Cloud Firestore -- Adding and managing data -- Choosing a data structure for your Firestore project -- Querying data -- Securing data -- Offline data support -- Summary -- Chapter 14: Analytics Data, Clairvoyant, Firebase Predictions -- Firebase Predictions -- Setting up Firebase Predictions -- Optimizing monetization -- Optimizing promotions -- Preventing churn -- Predefined predictions -- Predictions and risk tolerance -- Summary -- Chapter 15: Training Your Code and ML Kit -- Firebase ML Kit -- Vision -- Recognizing text -- Setting up ML Kit for recognizing text -- On-device text recognition -- Cloud-Based text recognition -- Face detection -- Setting up ML Kit for face detection -- Barcode scanning -- Setting up ML Kit for barcode scanning -- Custom models -- ML Kit and text recognition -- Summary -- Other Books You May Enjoy -- Index…”
Libro electrónico -
10846Publicado 2017Tabla de Contenidos: “…-- Running PowerShell -- Reading the PowerShell language -- Getting and exploring help options -- Discovering cmdlets and aliases -- Learning cmdlets -- Risk mitigation parameters -- Working with output -- Running PowerShell remotely -- Building parameterized script -- Comment-based help -- Summary -- Chapter 2: The AWS Overview -- Disruptive innovations - AWS Cloud -- The benefits of AWS cloud computing -- Common challenges of shifting to the cloud -- The AWS global infrastructure -- Security and compliance -- AWS services -- Virtual Private Cloud -- Elastic Compute Cloud -- Simple Storage Service -- Glacier -- CloudWatch -- Simple Notification Service -- Relational Database Service -- CloudFormation -- Identify and Access Management -- CloudTrail -- AWS Config -- AWS Elastic Beanstalk -- Laying out foundations -- The AWS sign up -- The organization provided AWS account -- Get supported -- Summary -- Chapter 3: Installing PowerShell Core and AWS Tools -- AWS Tools for PowerShell -- Installing PowerShell 6 On Windows -- Installing PowerShell 6 on Linux -- Prerequisites for AWS Tools -- Downloading and installing AWS Tools -- Enabling script execution -- Finding the AWS Tool version -- Updating AWS Tools for PowerShell -- Summary -- Chapter 4: AWS Identity and Access Management -- The AWS-shared responsibility model -- Setting up AWS Tools for access -- Managing AWS credentials -- The AWS credential search order -- Creating IAM users -- Creating IAM groups -- Accessing the AWS console -- Accessing AWS via CLI -- Removing a policy from the group -- Revoking a policy from the user -- What are IAM roles? …”
Libro electrónico -
10847
-
10848Publicado 2024Tabla de Contenidos: “…Decision Analysis -- 3.1 The Six Steps in Decision Making -- 3.2 Types of Decision-Making Environments -- 3.3 Decision Making under Uncertainty -- Optimistic -- Pessimistic -- Criterion of Realism (Hurwicz Criterion) -- Equally Likely (Laplace Criterion) -- Minimax Regret -- 3.4 Decision Making under Risk -- Expected Monetary Value -- Expected Value of Perfect Information -- Expected Opportunity Loss -- Sensitivity Analysis -- A Minimization Example -- 3.5 Using Software for Payoff Table Problems -- QM for Windows -- Excel QM -- 3.6 Decision Trees -- Efficiency of Sample Information 103 Sensitivity Analysis -- 3.7 How Probability Values Are Estimated by Bayesian Analysis -- Calculating Revised Probabilities -- Potential Problem in Using Survey Results -- 3.8 Utility Theory -- Measuring Utility and Constructing a Utility Curve -- Utility as a Decision-Making Criterion -- Summary -- Glossary -- Key Equations -- Solved Problems -- Self-Test…”
Libro electrónico -
10849Publicado 2023Tabla de Contenidos: “…References -- Chapter 7 On New Joint Importance Measures for Multistate Reliability Systems -- 7.1 Introduction -- 7.2 New Joint Importance Measures -- 7.2.1 Multistate Differential Joint Reliability Achievement Worth (MDJRAW) -- 7.2.2 Multistate Differential Joint Reliability Reduction Worth (MDJRRW) -- 7.2.3 Multistate Differential Joint Reliability Fussel-Vesely (MDJRFV) Measure -- 7.3 Discussion -- 7.4 Illustrative Example -- 7.5 Conclusion -- References -- Chapter 8 Inferences for Two Inverse Rayleigh Populations Based on Joint Progressively Type-II Censored Data -- 8.1 Introduction -- 8.2 Model Description -- 8.3 Classical Estimation -- 8.3.1 Maximum Likelihood Estimation -- 8.3.2 Asymptotic Confidence Interval -- 8.4 Bayesian Estimation -- 8.4.1 Tierney-Kadane's Approximation -- 8.4.2 Metropolis-Hastings Algorithm -- 8.4.3 HPD Credible Interval -- 8.5 Simulation Study -- 8.6 Real-Life Application -- 8.7 Conclusions -- References -- Chapter 9 Component Reliability Estimation Through Competing Risk Analysis of Fuzzy Lifetime Data -- 9.1 Introduction -- 9.2 Fuzzy Lifetime Data -- 9.2.1 Fuzzy Set -- 9.2.2 Fuzzy Numbers and Membership Function -- 9.2.3 Fuzzy Event and its Probability -- 9.3 Modeling with Fuzzy Lifetime Data in Presence of Competing Risks -- 9.4 Maximum Likelihood Estimation with Exponential Lifetimes -- 9.4.1 Bootstrap Confidence Interval -- 9.5 Bayes Estimation -- 9.5.1 Highest Posterior Density Confidence Estimates -- 9.6 Numerical Illustration -- 9.6.1 Simulation Study -- 9.6.2 Reliability Analysis Using Simulated Data -- 9.7 Real Data Study -- 9.8 Conclusion -- References -- Chapter 10 Cost-Benefit Analysis of a Redundant System with Refreshment -- 10.1 Introduction -- 10.2 Notations -- 10.3 Average Sojourn Times and Probabilities of Transition States -- 10.4 Mean Time to Failure of the System -- 10.5 Steady-State Availability…”
Libro electrónico -
10850por Kryder-Reid, ElizabethTabla de Contenidos: “…Taking Care of Nuclear Waste -- Introduction -- From existential risk to global climate action -- The art of forgetting -- Taking a people-centred approach -- Uncertainty as an opportunity for care -- Toxicity of cultural heritage -- Acknowledgements -- References -- 18. …”
Publicado 2023
Libro electrónico -
10851Publicado 2024“…Discover how mastering Lean, Agile, and VSM principles and practices can enhance your product delivery performance, mitigate risk, and foster business agility, giving you a competitive edge Key Features Learn how to apply Lean practices to eliminate waste and delays, ensuring value for your customers Master Agile practices to address problems and create value-centric products and services Explore VSM methods and tools to identify and prioritize improvement opportunities that maximize value addition Purchase of the print or Kindle book includes a free PDF eBook Book Description In the fast-paced business and IT landscape, efficiency is key to success. …”
Libro electrónico -
10852por Wells, ChristopherTabla de Contenidos: “…Availability; 2.1.1.15. Trust; 2.2. Risk Analysis…”
Publicado 2007
Libro electrónico -
10853por Akin, ThomasTabla de Contenidos: “…What Can Go Wrong; 1.4. What Routers Are at Risk?; 1.5. Moving Forward; 2. IOS Version Security; 2.2. …”
Publicado 2002
Libro electrónico -
10854por Rountree, DerrickTabla de Contenidos: “…2.2 Authentication and Authorization2.2.1 Authentication; 2.2.1.1 Types of Authentication; 2.2.1.1.1 Username and Password; 2.2.1.1.2 Biometrics; 2.2.1.1.3 User Certificates; 2.2.1.1.4 Kerberos; 2.2.1.1.5 One-Time-Use Token; 2.2.1.1.6 Risk-Based Authentication; 2.2.1.1.7 Custom Authentication Tokens; 2.2.1.2 Other Authentication Concepts; 2.2.1.2.1 Mutual Authentication; 2.2.1.2.2 Multifactor Authentication; 2.2.2 Authorization; 2.3 Access Control; 2.3.1 Mandatory Access Control; 2.3.2 Discretionary Access Control; 2.3.3 Role-Based Access Control; 2.4 Federated Service Model…”
Publicado 2013
Libro electrónico -
10855por Pathak, Bharati V.Tabla de Contenidos: “…Development of the Stock Market in India -- Post-reforms Market Scenario -- Regulation of Stock Exchanges -- Organisation, Management and Membership of Stock Exchanges -- Demutualisation of Stock Exchanges -- Listing of Securities -- Central Listing Authority -- The SEBI (Central Listing Authority) Regulations, 2003 -- Risk Management -- Trading Rules and Regulations -- Circuit Breakers -- Trading Arrangements -- Trading and Settlement -- Dematerialisation of Securities -- Internet Trading -- Stock Market Index -- Methodologies for Calculating the Index -- Global Stock Market Indices -- Major Indices in India -- Stock Exchanges -- The Bombay Stock Exchange -- BSE Milestones -- Carry Forward Deals, or Badla -- Badla Mechanism -- Advantages -- Listing Categories -- BSE Indices -- Trends in Turnover on the BSE -- Conclusion -- The National Stock Exchange of India -- Membership Pattern on the NSE -- Indices -- National Securities Clearing Corporation Limited -- Margin Requirements -- Capital Market Segment of the NSE -- Conclusion -- The Over the Counter Exchange of India (OTCEI) -- Trading Documents on the OTCEI -- Advantages of OTCEI -- Steps to Improve Turnover on the OTCEI -- Conclusion -- The Inter-Connected Stock Exchange of India LTD -- Regional Stock Exchanges -- Indo Next -- Measures to Boost Liquidity in the Secondary Market -- Investment by Foreign Institutional Investors in the Indian Stock Market -- Depositories -- Buy Back of Shares -- Conclusion -- Market Making System -- Stock Lending and Borrowing (SLB) -- Conclusion -- Rolling Settlement -- Conclusion -- Straight Through Processing (STP) -- Margin Trading -- Conclusion -- Impact of Reforms and Measures on Secondary Market Activities -- Conclusion -- Key Terms -- Summary -- Review Questions -- References -- Chapter 9: The Derivatives Market -- Introduction…”
Publicado 2010
Libro electrónico -
10856Publicado 2017Tabla de Contenidos: “…-- Our security posture -- Virtualization - cloud's best friend -- Understanding the ring architecture -- Hardware virtualization -- Full virtualization with binary translation -- Paravirtualization -- Hardware-assisted virtualization -- Distributed architecture in virtualization -- Enterprise virtualization with oVirt -- Encapsulation -- Point in time snapshots -- Isolation -- Risk assessment in cloud -- Service Level Agreement -- Business Continuity Planning - Disaster Recovery (BCP/DR) -- Business Continuity Planning -- Disaster Recovery -- Recovery Time Objective -- Recovery Point Objective -- Relation between RTO and RPO -- Real world use case of Disaster Recovery -- Use case to understand BCP/DR -- Policies and governance in cloud -- Audit challenges in the cloud -- Implementation challenges for controls on CSP side -- Vulnerability assessment and penetration testing in the cloud -- Use case of a hacked server -- Summary -- Chapter 2: Defense in Depth Approach -- The CIA triad -- Confidentiality -- Integrity -- Availability -- A use case -- Understanding all three aspects -- The use case -- Introducing Defense in Depth -- First layer - network layer -- Second layer - platform layer -- Third layer - application layer -- Fourth layer - data layer -- Fifth layer - response layer -- Summary -- Chapter 3: Designing Defensive Network Infrastructure -- Why do we need cryptography? …”
Libro electrónico -
10857Publicado 2021Tabla de Contenidos: “…-- In Touch with Data and Research: Money in a Prisoner-of-War Camp -- The Functions of Money -- In Touch with Data and Research: Monetary Aggregates in the United Kingdom -- In Touch with Data and Research: The Effect of Dollarization on the United States and Other Nations -- 7.2 Portfolio Allocation and the Demand for Assets -- Expected Return -- Risk -- Liquidity -- Time to Maturity -- Types of Assets and Their Characteristics -- In Touch with Data and Research: The Housing Crisis of 2007 to 2011 -- Asset Demands -- 7.3 The Demand for Money -- The Price Level -- Real Income -- Interest Rates -- The Money Demand Function -- Other Factors Affecting Money Demand -- Application Bitcoin and Cryptocurrencies -- Velocity and the Quantity Theory of Money -- 7.4 Asset Market Equilibrium -- Asset Market Equilibrium: an Aggregation Assumption -- The Asset Market Equilibrium Condition -- 7.5 Money Growth and Inflation -- Application Money Growth and Inflation in European Countries in Transition -- The Inflation Rate and the Nominal Interest Rate -- Application Inflation Expectations and Linkers -- Part 3 Business Cycles and Macroeconomic Policy -- Chapter 8 Business Cycles -- 8.1 What Is a Business Cycle? …”
Libro electrónico -
10858Publicado 2022Tabla de Contenidos: “…-- Summary -- References -- Additional Resources -- 8 Data Governance and Data Management -- Introduction -- Data Governance - Policies, Procedure, and Process -- Goals of Data Governance -- Data Integrity -- Data Security -- Data Consistency -- Data Confidence -- Compliance to Regulations, Data Privacy Laws -- Adherence to Organizational Ethics and Standards -- Risk Management of Data Leakage -- Data Distribution -- Value of Good Data -- Moving Data Quality Upstream Reduces Costs -- Data Literacy Education -- Technology to Support Data Management and Governance -- Data Management -- Master Data -- Reference Data -- Data Quality -- Security -- Summary -- References -- Additional Resources -- Some Terms Related to This Chapter to Consider Exploring -- Data Quality Resource -- 9 Miscellanea - Curated, Purchased, Nascent, and Future Data -- Introduction -- Data Outside Your Organization -- Supplemental Data -- Meaningful Data -- Data for Free -- Publically Available Data -- Data Available from Commercial Entities and Universities -- Data for Sale -- Data Syndicators -- Data Brokers -- Data Exchange and Data Exchange Platforms -- Data Marketplaces -- Should You Monetize Your Data? …”
Libro electrónico -
10859Publicado 2023“…This not only presents a risk for business continuity but also removes the ability to make insightful improvements. …”
Libro electrónico -
10860Publicado 2004Tabla de Contenidos: “…4.2.1 Low TCO -- 4.2.2 Reduced sizing risk and cost -- 4.3 SAP BW on DB2: value details -- 4.3.1 Architecture and features -- 4.3.2 Database layout -- 4.3.3 Parallel processing on multiple database partitions -- 4.3.4 Intra-partition parallelism -- 4.3.5 SAP BW query processing on DB2 -- 4.3.6 Use of distribution statistics for query optimization -- 4.3.7 New features of the DBA Cockpit 6.40 -- Chapter 5. …”
Libro electrónico