Mostrando 11,161 - 11,180 Resultados de 13,276 Para Buscar '"Risk"', tiempo de consulta: 0.13s Limitar resultados
  1. 11161
    Publicado 2024
    Tabla de Contenidos: “…-- How much work from a client -- Type of work -- The schedule -- Balancing time -- Intensity of work -- Financial reward -- The risk/comfort factor…”
    Libro electrónico
  2. 11162
    por Tyson, Eric
    Publicado 2024
    Tabla de Contenidos: “…-- Understanding Why to Buy a Business -- To reduce start-up hassles and headaches -- To lessen your risk -- To increase profits by adding value -- To establish cash flow -- To capitalize on someone else's good idea -- To open locked doors -- To inherit an established customer base -- Knowing When You Shouldn't Buy -- You dislike inherited baggage -- You're going to skimp on inspections -- You lack capital -- You think you'll miss out on the satisfaction of creating a business -- Recognizing Prepurchase Prerequisites -- Business experience and training -- Down payment money -- Do You Have the Right Stuff? …”
    Libro electrónico
  3. 11163
    por Millett, Scott
    Publicado 2024
    Tabla de Contenidos: “…Strategic Work -- Methods of Prioritization -- Highest Value for Lowest Complexity -- Weighted Shortest Job First or CD3 -- Technical Debt and Risks -- Using Judgement as Well as Data -- Measurement: Defining and Cascading Value and Measures -- Types of Value -- Types of Measure -- Cascading Value into the Work -- Defining Value -- Strategic Level: Business Goals and Strategic Objectives -- Tactical Level: Business Outcomes -- Operational Level: Sub-Outcomes, Programs, and Projects -- Investment: Funding for Outcomes…”
    Libro electrónico
  4. 11164
    Publicado 2024
    Tabla de Contenidos: “…Dead-letter queues (DLQs) -- Event sourcing -- Command query responsibility segregation (CQRS) -- Securing Lambda functions -- Code integrity -- Secure environment variables -- Runtime protection -- Lambda function versioning and aliases -- Access control -- Networking -- Execution limits -- Monitoring and logging -- Summary -- Questions -- Answers -- Further reading -- Chapter 8: Secure Design Patterns for Multi-tenancy in Shared Environments -- Understanding multi-tenancy concepts and challenges -- Definition and importance of multi-tenancy -- Challenges in multi-tenancy -- Multi-tenancy design patterns -- The silo model -- The pool model -- The bridge model -- Choosing the right design pattern -- Implementing secure data isolation techniques -- Network-level isolation -- Database-level Isolation -- Compute-level Isolation -- Application-level isolation -- Encryption-level isolation -- Managing access control for tenants -- Tenant authentication -- Implementing access control -- Tenant-managed access control -- Summary -- Questions -- Answers -- Further readings -- Chapter 9: Automate-Everything to Build Immutable and Ephemeral Resources -- From manual to programmatic management -- Manual and programmatic management defined -- Risks of manual resource management -- Shift to programmatic management -- Snowflake versus Phoenix systems -- IaC frameworks -- Benefits of adopting IaC -- Automated security testing -- Treating infrastructure as software -- Security testing in IaC pipelines -- Tools for automated security scanning -- Security best practices for IaC -- Apply least privileges -- Handle secrets securely -- Ensure compliance -- The Automate-Everything approach -- Summary -- Questions -- Answers -- Further reading -- Part 3: Monitoring, Automation and Continuous Improvement -- Chapter 10: Advanced Logging, Auditing, and Monitoring in AWS…”
    Libro electrónico
  5. 11165
    Publicado 2023
    Tabla de Contenidos: “…Heijunka and standardized work: Craftsmanship in an industrial setting -- Conclusion on the technical element of TPS -- Note -- Section 3 Managerial innovation: Industrial craftsmanship by reconciling the creative nature of people with the mundane requirements of industrial work -- Chapter 5 Management based on a vision of the ideal-true north -- The purpose of the ideal -- Application of the ideal -- Focused attention -- Grasping the gap between the current and the target condition -- Images of the ideal -- Characteristic of the ideal condition -- Technical characteristics of the ideal condition -- Zero defect (highest quality) -- 100% value-added, (lowest cost) -- On-demand and in sequence, (lowers cost and shortest lead-time) -- One-by-one (shortest lead-time) -- Human characteristics of the ideal condition -- Physical safety -- Mental safety -- Human development -- Note -- Chapter 6 Kaizen, a scientific problem-solving activity -- Observation (plan) -- Using our senses -- Grasping point-of-cause and root-cause deeply -- Cultivate expertise at all levels -- Hypothesizing (do) -- Testing (check) -- Draw a conclusion (act) -- Chapter 7 Institutionalization of problem-solving by developing experts: Learning problem-solving and solving learning-problems -- Humility -- Management shares in success and failure with others -- No problem is too small to solve -- Confirm by yourself -- "Go-see" -- Reach for the standard and the standardized work -- An intimate relationship between learning new tasks and scientific problem-solving -- Progressive learning -- Types of excess capacity to mitigate learning risk -- Teamwork -- Demonstrate results by realizing true efficiencies -- Chapter 8 Practical principle-based performance indicators -- Managing by total efficiency through the elimination of unevenness, overburden, and waste to achieve true efficiency…”
    Libro electrónico
  6. 11166
    Publicado 2021
    Tabla de Contenidos: “…-- Sorting out equipment -- Taking the Make-or-Buy Decision -- Making it yourself - pros and cons -- Outsourcing - a low investment option -- Setting quality standards -- Choosing a Supplier -- Evaluating trading terms -- Building a relationship -- Buying online -- Minimising Risk and Assessing Liability -- Protecting your employees -- Covering yourself against an employee suing -- Protecting assets -- Covering loss of profits -- Goods in transit -- Protecting yourself -- Guaranteeing goods and services -- Dissecting Directors -- Finding and Choosing Business Advisers -- Tallying up an accountant -- Investing in a bank -- Soliciting for a lawyer -- Managing a consultant -- Taking Cyber Security Seriously -- Recognising common types of cyber crime -- Adopting preventative measures -- Making a Virtue Out of Going Green -- Chapter 13 Keeping Track of Finances -- Keeping the Books -- Recording financial information -- Starting simple with single entry -- Dealing with double entry…”
    Libro electrónico
  7. 11167
    Publicado 2024
    Tabla de Contenidos: “…-- Algorithm efficiency metrics -- Exploring the Big O notation -- Exploring the Big Ω notation -- Common sorting algorithms -- Exploring bubble sort -- Exploring insertion sort -- Challenge - Merge sort -- Final project - cement bag sorter -- Requirements -- Analysis -- Implementation -- Summary -- Questions -- Further reading -- Chapter 15: Secure PLC Programming - Stopping Cyberthreats -- Technical requirements -- What cybersecurity is and why it's important -- The basics of cybersecurity -- Vulnerabilities, threats, and risk -- Threat actors -- Exploring AAA -- Air-gapped systems -- Common cyberattacks -- Exploring information gathering -- Exploring social engineering -- Exploring password hacking -- Malware -- Attack prevention methods -- Stopping social engineering -- Defending against password crackers -- Password length -- Malware defense -- Final project - a PLC-based activation system -- Design -- Certifications -- Summary -- Questions -- Further reading -- Chapter 16: Troubleshooting PLCs - Fixing Issues -- Technical requirements -- Common causes of PLC issues -- Broken software…”
    Libro electrónico
  8. 11168
    Libro electrónico
  9. 11169
    Libro electrónico
  10. 11170
    Libro electrónico
  11. 11171
    por Casado-Asensio, Juan
    Publicado 2014
    “…Green growth recognises and integrates the value of natural capital into economic decision-making and development planning, which is critical to avoid natural capital depletion, the worst of climate change and social and national security risks (OECD, 2013). This is particularly true for developing countries, because of their dependence on natural assets and acute exposure and vulnerability to environmental risks, ranging from air, water and soil pollution, as well as natural resource scarcity and extreme weather events exacerbated by climate change. …”
    Capítulo de libro electrónico
  12. 11172
    por Gunlake, J.H
    Publicado 1939
    Libro
  13. 11173
    Publicado 2022
    Tabla de Contenidos: “…-- VALIDACIÓN DE LA ESCALA DE MUSCULARIDAD FEMENINA EN UNA MUESTRA DE JÓVENES ESPAÑOLAS -- PREDICTIVE MODEL OF THE RISK OF EATING DISORDERS IN UNIVERSITY STUDENTS IN QUITO, GUAYAQUIL, CUENCA -- MEDIATING MECHANISMS OF PERFECTIONISM: CLINICAL COMORBIDITY OF OBSESSIVE COMPULSIVE DISORDER AND EATING DISORDERS -- DISFUNCIONES SEXUALES -- CONTEXTO NORMATIVO Y MOTIVOS SEXUALES: ¿INFLUYEN EN CÓMO SE PERCIBE A HOMBRES Y MUJERES? …”
    Libro electrónico
  14. 11174
    Libro electrónico
  15. 11175
    “…It also includes a special section based on the 2018 OECD Risks That Matter Survey on people's perceptions of social and economic risks and the extent to which they think governments address those risks. …”
    Libro electrónico
  16. 11176
    “…Indeed, drought and flood risks are likely to become a major policy concern as increasing population will increase the demand for food, feed, fibre, and energy, not to mention the competition for water resources, and urbanisation will increase the demand for flood protection and mitigation, raising the issue of the allocation of flood risks across sectors and areas…”
    Libro electrónico
  17. 11177
    por Adalet McGowan, Müge
    Publicado 2013
    “…However, more needs to be done to better manage near-term risks and ensure that growth remains sustainable in the longer run. …”
    Capítulo de libro electrónico
  18. 11178
    Publicado 2014
    “…The variety of data now poses new privacy and security risks. The high volume of information in all places makes it harder to find where these issues, risks, and even useful information to drive new value and revenue are. …”
    Libro electrónico
  19. 11179
    Publicado 2015
    “…--Categorize types of attacks, threats, and risks to your systems --Secure devices, communications, and network infrastructure -- Troubleshoot issues related to networking components -- Effectively manage risks associated with a global business environment -- Differentiate between control methods used to secure the physical domain -- Identify solutions to secure hosts, data, and applications -- Compare techniques to mitigate risks in static environments -- Determine relevant access control, authorization, and authentication procedures -- Select appropriate mitigation techniques in response to attacks and vulnerabilities -- Apply principles of cryptography and effectively deploy related solutions --Implement security practices from both a technical and an organizational standpoint…”
    Libro electrónico
  20. 11180
    por OECD
    Publicado 2021
    “…In the wake of the COVID-19 pandemic, governments face both old and new fraud risks, some at unprecedented levels, linked to spending on relief and recovery. …”
    Libro electrónico