Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
10881Publicado 2022Tabla de Contenidos: “…Casino Games -- Tournament Games -- Security of Online Games Through a Web Portal -- Secure Code for Games -- Secure by Design -- Security Control -- Summary -- Chapter 7: Gamification in Human-Computer Interaction -- Gamification Strategy -- Gamification Examples -- Common Risks and Mistakes -- Gamification in Education -- Aspects of the Game's Foundation -- The Different Game Categories -- Psychology and Motivation in Gamification -- The Two Different Types of Motivation -- Playing and Learning -- Gamification in the Classroom -- Factors that Make Gamification in the Classroom Easier -- How Can Gamification Help with Learning? …”
Libro electrónico -
10882Publicado 2013Tabla de Contenidos: “…Reputation as a Matter of Issue Debate and Risk Management Robert Heath 34. Message Design for Managing Corporate Reputations: Form Following Function Peter Smudde and Jeffrey Courtright SECTION 4: Contexts of Reputation 35. …”
Libro electrónico -
10883por Flynn, SusanTabla de Contenidos: “…-- Virtual and algorithmic smart cities -- Broken infrastructures -- Just smart cities -- Conclusion -- References -- 2 Int 'smart':: cities (void) -- Introduction -- 'Smart' incongruences -- China: Kashgar, Xinjiang - the 'smart' prison -- India: Amaravati, Andhra Pradesh - the concrete on halt farm -- Canada: Quayside, Toronto - Google urbanism -- An imperative 'smart' comprehensive assessment -- References -- 3 Reading Lefebvre's Right to the City in the Age of the Internet -- Introduction -- Negotiating rights to the city in virtual space: The panopticon, agonism and the echo chamber -- The internet as two-way panopticon -- Popular culture, citizen power and the internet -- Agonism and the risk of the 'echo chamber' -- The form and the management of the smart city: Justice and the right to the city -- Reproducing inequalities: The real and the virtual city -- Conclusion -- Notes -- References -- 4 Universities, Equality and the Neo-Liberal City -- Introduction -- Universities: 'anchors' or 'ivory towers'? …”
Publicado 2021
Libro electrónico -
10884Publicado 2018Tabla de Contenidos: “…Preparing the project -- Adding user role -- Configuring AWS IoT -- Creating AWS Lambda -- Building Amazon Alexa skills -- Testing the project -- Making image and video analysis -- Introducing Amazon Rekognition -- Working with Pi Camera on Raspberry Pi -- Uploading images to Amazon S3 -- Performing image analysis -- Make predictive analytics for IoT data -- Build a simple predictive analytics for your IoT project -- Defining a machine learning model -- Preparing data -- Building a machine learning model -- Evaluating and testing the model -- Summary -- Chapter 8: Securing AWS IoT -- Introducing IoT security -- Understanding IoT risks -- Introducing AWS IoT identity and security -- Securing communication between AWS IoT and IoT devices -- Authentication and authorization -- Managing AWS IAM -- Building a secure AWS IoT for your IoT project -- Designing and implementing -- Performing regular security testing -- Working with security best practices -- Summary -- Other Books You May Enjoy -- Index…”
Libro electrónico -
10885Publicado 2002Tabla de Contenidos: “…An introduction to Linux -- 1.1 What is Linux -- 1.1.1 Standards -- 1.1.2 Minimum operating requirements -- 1.2 IBM and Linux -- 1.2.1 Linux as a server -- 1.2.2 Linux as a client -- 1.3 Linux in a business environment -- 1.3.1 Business use -- 1.3.2 Benefits and risks -- 1.4 Summary -- Chapter 2. Branch banking environment -- 2.1 The state of branch banking -- 2.1.1 Branch banking trends -- 2.2 Branch technology challenges -- 2.2.1 Total cost of ownership -- 2.2.2 Quality of Service -- 2.2.3 Speed to market -- 2.3 Branch transformation strategies -- 2.3.1 Branch software strategy overview -- 2.3.2 Multichannel context -- 2.4 Branch structure -- 2.4.1 Branch systems -- 2.4.2 Employees -- 2.5 Common branch banking scenarios -- 2.5.1 Host-centric scenario -- 2.5.2 Host-centric with local applications scenario -- 2.5.3 Distributed processing scenario -- 2.6 Component model for branch banking -- 2.6.1 Component diagram -- 2.6.2 Component definitions -- 2.7 Summary -- Chapter 3. …”
Libro electrónico -
10886Publicado 2022Tabla de Contenidos: “…-- Fear Isn't Unique -- Major Force -- Taming the Beast -- Take Action -- Overcome the Fear -- Face It Head On -- Self-Doubts -- Fear: The Default Emotion -- The Opposite of Fear: Love -- The Risk -- True Leadership -- Identifying Love and Fear -- Overwhelm -- Multidimensional Approach -- The 80 Percent Rule -- Don't Ignore Challenges -- Emotional Control -- Forget the Easy Way…”
Libro electrónico -
10887Publicado 2022Tabla de Contenidos: “…Quickly Mitigating Revenue and Profit Risks -- Future Outlook -- About the Contributor -- Conclusion -- Prepare at the First Signs -- Navigate Through the Crisis -- Rebound -- Developing a Moat of Defense Against Future Disruptions…”
Libro electrónico -
10888Publicado 2020Tabla de Contenidos: “…Analysis based on PISA 2018 -- Developing Paper Shadow Puppets as Media for History Learning at SHS's -- Employee Career Management for Sustainable HR Planning, Training, and Performance Measurement -- The Effect of Gender on Risk Taking among Indonesians -- Healthy Soul as Message Sublimation of Traveloka #Jalanbersama Indonesia Facing Pandemic Situation -- Strategic Marketing Communication in Promoting Ketep Pass -- Organizational Communication Impact of Banking Industry: Between Internal Branding and Employee Loyalty -- Gender Education and Gender Awareness: Gender Mainstreaming in Sustainable Development A Theoretical Overview -- The Environmental Awareness of Junior Highs School Students in Sleman Yogyakarta -- Cultural Discourse of Siasat Magazine at 1947-1961 -- Measuring the Achievement of the Unemployment and Poverty Target in the Sustainable Development Goals Program in Pandemi Covid-19 -- A Mindset Education Model for Character Building of the Students of Yogyakarta State University, Indonesia -- Construction of Al-Irsyad's Ideology -- Protection of Child Rights to Violence in the Elementary School in Sleman Regency -- Culture Transformation of Character Reinforcement Through Gerakan Sekolah Menyenangkan -- Humanitarian Tolerance in the Covid-19 Pandemic Era on Lampung's Local Cultural Values Piil Pesenggiri -- The Representation of Female Workers in Social Media of Instagram -- Islam and Culture in Southeast Asia: An Investigation of the Acculturative Modes in Indonesia and Brunei -- Shari'ah Governance Disclosure Index: An Ideal Indicator for Islamic Financial Institutions -- Testing McClelland's Theory of Needs with Feeling Individually Accountable and Informal Accountability for Others in the Social Security Organisation (SOCSO) Headquarters, Kuala Lumpur -- History for Fun: An Online History Learning Concept During Covid-19 Pandemic -- Social Justice education in the Infrastructure of Digital citizenship as a Vehicle for the Formation of National Identity -- Destination Branding on Indonesian Tourism (Analysis of Laura Oswald's Marketing Semiotic in @kemenparekraf.ri) -- Wellness Tourism Opportunities Amid Covid-19 Pandemic: Literature Study -- The Relation Between Self Concept and Student Achievement -- Independent Collaborative Journalism: How Local Journalists Cooperate to Cover in depth and Investigative News about Covid-19 in Yogyakarta -- The Relationship of School Environment to Student Tolerance in Indonesia -- Yogyakarta Women in the Public Spaces Struggle During 1945-1950 -- Using Inquiry Methods in Teaching Social Studies Education at Secondary High Schools of Indonesia…”
Libro electrónico -
10889por OECDTabla de Contenidos: “…Sub-Dimension 1.3.1 Coverage and Level of Development of ICT/Digital Infrastructures -- Sub-Dimension 1.3.2 Technological/E-Government Heritage and/or Legacy within the Public Sector -- Sub-Dimension 1.3.3 Integration of ICT/Digital into Governance and Business Processes -- Sub-Dimension 1.3.4 Government-Specific Technological Innovations -- Dimension 1.4 Environmental and Geographical Considerations -- Sub-Dimension 1.4.1 Local/Regional Variances -- Sub-Dimension 1.4.2 Environmental and Geological Risks and Hazards -- Sub-Dimension 1.4.3 Priority for Environmental Protection and the Green Transition -- 4 Governance Facet 2: Institutional Models -- The importance of institutional analysis -- Dimension 2.1 Macro-Structure -- Sub-Dimension 2.1.1 Institutional Set-Up of the Organisation-in-Charge -- Sub-Dimension 2.1.2 Institutional Approach to Digital Government -- Sub-Dimension 2.1.3 Roles and Responsibilities of the Organisation-in-Charge -- Dimension 2.2 Leadership: Position/Role -- Sub-Dimension 2.2.1 Chief Information Officer (CIO) and Chief Data Officer (CDO) -- Sub-Dimension 2.2.2 Hierarchical Importance and Legal Basis -- Dimension 2.3 Co-ordination and Co-operation -- Sub-Dimension 2.3.1 High-Level Co-ordination -- Sub-Dimension 2.3.2 Organisational and Technical Co-operation -- Dimension 2.4 Civic Participation and Collaboration -- Sub-Dimension 2.4.1 Citizen Participation and Collaboration -- Sub-Dimension 2.4.2 Industry Participation and Collaboration -- 5 Governance Facet 3: Policy Levers -- The importance of policy instrument analysis -- Dimension 3.1 Strategy and Plan -- Sub-Dimension 3.1.1 Autonomy and Alignment with other Policy Strategies -- Sub-Dimension 3.1.2 Collaborative and Inclusive Development -- Sub-Dimension 3.1.3 Action Plan and Investment Plan -- Sub-Dimension 3.1.4 Monitoring and Impact Assessment…”
Publicado 2022
Libro electrónico -
10890Publicado 2015Tabla de Contenidos: “…Consumer Privacy Bill of Rights -- 2012 EU Data Protection Reform -- 2013 California Department of Justice Agreement -- 2013 UK's Enterprise and Regulatory Reform Bill with Midata Rights -- 2013 Network Advertising Initiative (NAI) Code of Conduct -- 2012 EU Commission Cloud Computing Report -- 2013 California Department of Justice's "Privacy on the Go" -- 2013 EU's Article 29 Data Protection Working Party Opinion -- 2013 UK's Internet Advertising Bureau (IAB) -- 2013 European Interactive Digital Advertising Alliance Campaign -- Pivotal Business Event Time Line -- Notes -- CHAPTER 11 Future Consumer Data Ecosystem -- Consumer as Information Stakeholder -- Mature Consumer/Business Information Sharing Models -- The Collaborative Data Landscape -- Personal Data Flows in an Ecosystem -- Walking through the Model -- Personal Zone -- Personal Zone Connects Individual to Organizations -- Infomediaries Work on the Individual's Behalf for Businesses/Markets -- Data Aggregators in the Personal Data Ecosystem -- Three Key Components Enabling the Personal Data Ecosystem -- Frameworks: The Major Ecosystem Governance Mechanism -- Governance Manages Risk -- Recap -- Volunteered Customer Information Service Characteristics -- Personal Information as a Sovereign/Monetized Asset -- Personal Data Ecosystem -- PDE Data Elements -- PDE Roles and Flows -- PDE Data Sovereignty and Interoperability -- New Customer's Voice Feeds New Business Intelligence -- Notes -- About the Author -- Index -- EULA…”
Libro electrónico -
10891Publicado 2023Tabla de Contenidos: “…Romani The Relationship between Obesity and Pre-Eclampsia: Incidental Risks and Identification of Potential Biomarkers for Pre-Eclampsia -- Manuel S. …”
Libro electrónico -
10892Publicado 2023Tabla de Contenidos: “…Forward-facing responsibility: embracing control and being accountable to future generations -- Safeguarding the business and 'keeping the lights on' -- Five key skills required to lead responsibly -- The Responsible Leader Continuum: How to Stay on Track -- Leading Daringly: Being Willing to Take Risks and Push Boundaries -- The Five Ingredients of a Daring Mindset -- The Daring Leadership Continuum: How to Stay on Track -- Notes -- Chapter 8 Developing and Expanding Your Leadership Identity -- Why Identity Is Important in Relation to Paradoxical Mindsets -- What Identity Refers To -- The Troublesome Myth of 'True Self' -- The Ability to Integrate Multiple Identities Is a Predictor of Leadership Success -- Identity Is Not Fixed, but Continuously Created, Shaped, and Spotlighted -- Narratives: How Identity Is Built Through the Stories We Tell -- Quick Recap -- Embracing All Five Mindsets: How to Develop and Expand Your Leadership Identity -- Step 1: Find a Coach: start building insight into your current narratives and 'possible selves' -- Step 2: Identity undoing: shake it up, let it go, experiment -- Step 3: Repeat the Process -- Concluding Remarks: The Challenge of Being Adaptably Authentic -- Notes -- Index -- EULA…”
Libro electrónico -
10893Publicado 2020Tabla de Contenidos: “…About the Author xi Acknowledgements xiii About the Companion Site xv Introduction 1 The Rise of Private Markets (Alternative Assets) in the Investors' Allocation 2 The Rise of Private Markets as a Favoured Alternative Source of Company Financing 4 Private Equity 6 Private Debt 8 Deal Phases and Book Organisation 10 Chapter 1 Closed End Funds 13 A Close Up on Private Equity and Private Debt Partnerships 13 Cash Flows, J Curve, and Returns 16 Financial Returns 19 References and Further Reading 22 Suggested Cases 22 Chapter 2 Debt Products 23 Introduction 23 Definition and Some Useful Classifications 24 Pure Debt Instruments 29 High-yield Bonds 37 Mezzanine 39 Unitranche 43 A Close Up on Syndicated Lending 50 References and Further Reading 52 Suggested Cases 52 Chapter 3 Equity Products 53 Introduction 53 Ordinary Shares 54 Preference Shares 55 Convertibles 57 Other Equity Instruments 64 References and Further Reading 70 Suggested Cases 70 Chapter 4 Business Due Diligence 71 Introduction 71 Macro Factors 71 Industry Risk Analysis 73 Company Analysis 83 Summary Steps for a Strategic Analysis of a Business Plan 90 References and Further Reading 91 Suggested Cases 91 Chapter 5 Accounting Due Diligence 93 Introduction 93 Quality of Earnings 93 Ratio Analysis 101 Cash Flow Analysis 106 Creative Accounting 115 References and Further Reading 123 Suggested Cases 123 Chapter 6 Business Plan 125 Introduction 125 Pro-forma Financials 125 Profit and Loss Projections 126 Balance Sheet Projections 127 Putting it all Together: Modelling Cash, Short-term Debt, Net Income, and Shareholders' Equity 128 Sensitivity Analysis 128 Consistency Checks 129 References and Further Reading 133 Suggested Cases 133 Chapter 7 Valuation 135 Introduction 135 Fundamentals #1: Price and Value 135 Fundamentals #2: Enterprise Value and Equity Value 136 Fundamentals #3: Market Values vs. …”
Libro electrónico -
10894Publicado 2018Tabla de Contenidos: “…-- The Turing test -- The art and science of simulation -- An emotion state machine -- Playing the emotion game -- Creating a model of human behavior -- Integrating artificial personality into our robot -- Personality construction - building blocks -- Context -- Under construction -- The robot emotion engine -- The human emotion model -- Human information storage -- Context memory -- Questions -- Further reading -- Chapter 10: Conclusions and Reflections -- Conclusions about our journey -- Careers in robotics -- Issues in AI - real and not real -- Some very brief words about robots and AI phobia -- Understanding risk in AI -- Final words -- Summary -- Questions -- Further reading -- Appendix: Assessments -- Other Books You May Enjoy -- Index…”
Libro electrónico -
10895Publicado 2023Tabla de Contenidos: “…Intro -- Foreword -- Acknowledgements -- Executive summary -- 1 Assessing social protection needs for people with disability in Italy -- 1.1. Poverty risks of people with disability are relatively low in Italy -- 1.2. …”
Libro electrónico -
10896Publicado 2009Tabla de Contenidos: “…-- AJAX FAQ -- Life Without AJAX -- AJAX Coding -- Role of XML in Ajax - Case Study -- Key Terms and Concepts -- Chapter Summary -- Practice Set -- XML Security -- Introduction -- Threats and Risks -- Cryptography -- Symmetric and asymmetric key Cryptography -- Symmetric key Cryptography -- Asymmetric key Cryptography -- The RSA Algorithm -- Digital Signature -- XML Security -- XML Encryption -- XML Digital Signature -- XML key Management Specification -- Key Terms and Concepts -- Chapter Summary -- Practice Set -- Appendix - Miscellaneous Topics -- XML and Javascript -- VoiceXML -- XML and Databases -- Security Assertion Markup Language -- How SAML Works? …”
Libro electrónico -
10897por Modi, DevTabla de Contenidos: “…-- After They Walk In, They Sit Down at That Bar to Talk with You -- Acknowledgments -- About the Authors -- Section 1 Building Understanding -- Chapter 1 From Language Barriers to Guiding Principles -- Let's Start by Building a Shared Language-Our Definitions -- The Inclusion Multiplier -- So Now That You Have Some Shared Language, What Are the Risks to Using It? -- Defeating Myths and Building Principles -- Chapter 2 Fixing a Broken Society -- What's Broken? …”
Publicado 2024
Libro electrónico -
10898por Albrecht, Karl, 1941-Tabla de Contenidos: “…Mega-Skill 4: "Viscerational" Thinking The Rational-Emotive Polarity:The R-E Axis First We Decide-Then We Justify: Irrational Thinking Explained We're All Neurotic, and That's OK The Five Primal Fears We Live By: The Psychology of Risk Signal Reactions: Disconnecting Your Hot Buttons Emotions and Health: If It's on Your Mind, It's on Your Body Can You Motivate Yourself? …”
Publicado 2007
Libro electrónico -
10899Publicado 2014Tabla de Contenidos: “…Graduation Day -- Securing remote access to your system -- The SSH public key -- Analyzing the risks of default settings -- Populating the keystore -- Public key authentication -- Root logins -- Conclusion -- Best practices of OpenLDAP -- Best practices of Nginx -- Mastering Puppet -- What's new in CentOS 7 -- Locale -- Time and date information -- Managing services -- Additional ways to repair your machine than just using the single user mode -- Remote management -- Systemd and nonstandard subcommands -- The Samba 4.1 package -- Filesystem changes -- Password policies -- Summary -- Index…”
Libro electrónico -
10900por Liyanage, MadhusankaTabla de Contenidos: “…Cover; Title Page; Copyright; Contents; About the Editors; List of Contributors; Preface; Acknowledgments; Part I IoT Overview; Chapter 1 Introduction to IoT; 1.1 Introduction; 1.1.1 Evolution of IoT; 1.2 IoT Architecture and Taxonomy; 1.3 Standardization Efforts; 1.4 IoT Applications; 1.4.1 Smart Home; 1.4.2 Smart City; 1.4.3 Smart Energy; 1.4.4 Healthcare; 1.4.5 IoT Automotive; 1.4.6 Gaming, AR and VR; 1.4.7 Retail; 1.4.8 Wearable; 1.4.9 Smart Agriculture; 1.4.10 Industrial Internet; 1.4.11 Tactile Internet; 1.4.12 Conclusion; Acknowledgement; References; Chapter 2 Abstract; 2.1 Introduction2.2 Attacks and Countermeasures; 2.2.1 Perception Layer; 2.2.1.1 Perception Nodes; 2.2.1.2 Sensor Nodes; 2.2.1.3 Gateways; 2.2.2 Network Layer; 2.2.2.1 Mobile Communication; 2.2.2.2 Cloud Computing; 2.2.2.3 Internet; 2.2.3 Application Layer; 2.2.3.1 Smart Utilities -- Smart Grids and Smart Metering; 2.2.3.2 Consumer Wearable IoT (WIoT) Devices for Healthcare and Telemedicine; 2.2.3.3 Intelligent Transportation; 2.2.3.4 Smart Agriculture; 2.2.3.5 Industrial IoT (IIoT); 2.2.3.6 Smart Buildings, Environments, and Cities; 2.3 Authentication and Authorization; 2.3.1 Authentication; 2.3.2 Authorization2.3.3 Authentication at IoT Layers; 2.3.3.1 Perception Layer; 2.3.3.2 Network Layer; 2.3.3.3 Application Layer; 2.4 Other Security Features and Related Issues; 2.4.1 The Simplified Layer Structure; 2.4.2 The Idea of Middleware; 2.4.3 Cross-Layer Security Problem; 2.4.4 Privacy; 2.4.5 Risk Mitigation; 2.5 Discussion; 2.6 Future Research Directions; 2.6.1 Blockchain; 2.6.2 5G; 2.6.3 Fog and Edge Computing; 2.6.4 Quantum Security, AI, and Predictive Data Analytics; 2.6.5 Network Slicing; 2.7 Conclusions; References; Part II IoT Network and Communication Authentication; Chapter 3 Symmetric Key-Based Authentication with an Application to Wireless Sensor Networks3.1 Introduction; 3.2 Related Work; 3.3 System Model and Assumptions; 3.3.1 Design Goals; 3.3.2 Setting; 3.3.3 Notations; 3.3.4 Attack Model; 3.4 Scheme in Normal Mode; 3.4.1 Installation Phase; 3.4.1.1 Installation of CH; 3.4.1.2 Installation of CN; 3.4.2 Group Node Key; 3.4.3 Individual Cluster Key; 3.4.3.1 CN to CH; 3.4.3.2 CH to CN; 3.4.4 Pairwise Key Derivation; 3.4.5 Multicast Key; 3.4.5.1 Initiation by CH; 3.4.5.2 Derivation by CNs; 3.4.6 Group Cluster Key; 3.5 Authentication; 3.5.1 Authentication by CN3.5.2 Authenticated Broadcast by the CH; 3.5.3 Authenticated Broadcast by the BS; 3.6 Scheme in Change Mode; 3.6.1 Capture of CN; 3.6.2 Capture of CH; 3.6.3 Changes for Honest Nodes; 3.6.3.1 Key Update for Honest Node Replacement; 3.6.3.2 Node Removal and Addition; 3.7 Security Analysis; 3.7.1 Resistance Against Impersonation Attack; 3.7.2 Resistance Against Node Capture; 3.7.3 Resistance Against Replay Attacks; 3.8 Efficiency; 3.8.1 Number of Communication Phases; 3.8.2 Storage Requirements; 3.8.3 Packet Fragmentation; 3.9 Conclusions; Acknowledgement; References; Chapter 4 Public Key Based Protocols -- EC Crypto…”
Publicado 2020
Libro electrónico