Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
11361Publicado 2020“…With this report, developers and site reliability engineers will explore the basic components of Google’s launch plan and learn practical methods to reduce risks when introducing your company’s products. These lessons are adaptable for consumer-oriented services regardless of company size or product user base. …”
Libro electrónico -
11362Publicado 2013“…Companies face a variety of risks resulting from cost reduction strategies, rationalization measures, global sourcing, and outsourcing activities. …”
Libro electrónico -
11363Publicado 2022“…It presents a socio-technical framework, which includes the key aspects of supply chain relationships, the supply chain business environment, overall supply chain competitiveness, supply chain sustainability, and supply chain risks. The book works through the recruitment, training and development of leaders as well as obstacles and risks, to offer a fresh, people-centred approach. …”
Libro electrónico -
11364por Woloshin/Schwartz, author“…Every day we are bombarded by television ads, public service announcements, and media reports warning of dire risks to our health and offering solutions to help us lower those risks. …”
Publicado 2009
Libro electrónico -
11365Publicado 2022“…Join security pros for four hours of sessions on how to better assess threats and develop a security-aware mindset and how to detect and prevent risks and find inflection points. You'll also explore pragmatic approaches for recovering files without paying a ransom, defending against and responding to attacks, handling pitfalls if you do pay, and more. …”
Video -
11366Publicado 2023“…This title reviews and synthesizes the research on economic methods for evaluating regulations that improve air quality, save energy, and reduce climate risks. It also offers perspective on the relevance and limitations of current research for applied benefit-cost analysis…”
Libro electrónico -
11367por Barré-Sinoussi, Françoise“…Due to the numerous factors involved in the risks of transmission, and the social and cultural complexity of maternity in India, all these contributions show the necessity of initiating and conducting research in the fields of the social sciences. …”
Publicado 2021
Electrónico -
11368Publicado 2015“…Offers tips on how to minimize the risk of investment gambles Covers the FCA's more stringent risk analysis for investors using advisers Contains new sections on pensions, ISAs, the DIY/self-directed investor, and ultra-low interest rates Includes new online templates to help simplify the investing process If you want to go it alone in the investment arena, but need the support of a straightforward, reassuring guide to help you make the best decisions—and get the highest returns from your investments—this is the book for you…”
Libro electrónico -
11369por BCS, The Chartered Institute for IT.“…This ebook looks at ways to embrace the benefits of BYOD while offering advice on how to minimise the risks…”
Publicado 2013
Libro electrónico -
11370Publicado 2010“…This title considers the risks of tears in public and private spaces; the way tears implicate us in tragedy, comedy, and horror…”
Libro -
11371Publicado 2015“…This work presents the outcome of fifteen years of research financed by the French Ministry of Ecology on the reduction in environmental risks from using pesticides. It emphasises especially the transfer of results to support public decisions…”
Libro electrónico -
11372Publicado 2015“…SOIs seek new opportunities, risks, and operational behavior that needs to be reported or have action taken to optimize business outcomes. …”
Libro electrónico -
11373por Al-Turjman, FadiTabla de Contenidos: “…1.8.1 Customer Verifications -- 1.8.2 Safeguarding Data -- 1.8.3 Data Violation, Loss, and Destruction -- 1.8.4 Storage Topography -- 1.8.5 Public Cloud versus Private Cloud -- 1.8.6 Version Awareness and Backup Execution -- 1.8.7 Security of Data and Encoding -- 1.9 Potential Hazards of Cloud BI Adoption -- 1.9.1 Security Difficulties -- 1.9.2 Threats and Risks in Cloud Computing -- 1.9.3 Privacy and Security -- 1.10 Discussion and Open Research -- 1.11 Conclusion -- Acknowledgments -- References -- Chapter 2 Resource Allocation in Volunteered Cloud Computing and Battling COVID-19 -- 2.1 Introduction -- 2.1.1 Comparison to Other Surveys -- 2.1.2 Scope of the Paper and Contributions -- 2.2 Roles of Any Entity in the Cloud -- 2.2.1 Provider -- 2.2.2 User -- 2.2.3 Vendor -- 2.3 Resources in Cloud Volunteer Computing -- 2.3.1 Storage-Based Resource -- 2.3.1.1 Network Storage -- 2.3.1.2 Hard Disk -- 2.3.2 Network-Based Resource -- 2.3.2.1 Reliable Communications -- 2.3.2.2 Efficient Communications -- 2.3.2.3 Virtual Networking -- 2.3.3 Service Model as a Resource -- 2.3.3.1 Infrastructure as a Service (IaaS) -- 2.3.3.2 Software as a Service (IaaS) -- 2.3.3.3 Platform as a Service (PaaS) -- 2.3.4 Server as a Resource -- 2.3.4.1 Cloud Server -- 2.3.4.2 Dedicated Server -- 2.3.5 MapReduce as a Resource -- 2.3.6 Intelligence and Resource Allocation -- 2.3.6.1 Supervised Learning -- 2.3.6.2 Unsupervised Learning -- 2.3.6.3 Reinforcement Learning (Semi-Supervised) -- 2.4 Scheduling of Resources in the Cloud -- 2.4.1 Cloud Service Scheduling -- 2.4.2 Customer Side Scheduling -- 2.4.3 Static and Dynamic Scheduling -- 2.4.4 Heuristic Scheduling -- 2.4.5 Workflow Scheduling -- 2.4.6 Real-Time Scheduling -- 2.4.7 Dynamic Dedicated Server Scheduling (DDSS) -- 2.5 Algorithms of Resource Allocation -- 2.5.1 Ant Colony Optimization Algorithm -- 2.5.2 Bees Algorithm…”
Publicado 2021
Libro electrónico -
11374Publicado 2019Tabla de Contenidos: “…Front Cover -- Half Title Page -- RIVER PUBLISHERS SERIES IN AUTOMATION, CONTROL AND ROBOTICS -- Title Page -- Copyright Page -- Dedication Page -- Contents -- Acknowledgments -- Foreword -- List of Contributors -- List of Figures -- List of Tables -- List of Abbreviations -- Chapter 1 - Introduction -- 1.1 Maintenance Today -- 1.2 The Path to Proactive Maintenance -- 1.3 Why to Read this Book -- References -- Chapter 2 - Business Drivers of a Collaborative, Proactive Maintenance Solution -- 2.1 Introduction -- 2.1.1 CBM-based PM in Industry -- 2.1.2 CBM-based PM in Service Business -- 2.1.3 Life Cycle Cost and Overall Equipment Effectiveness -- 2.1.4 Integrating IoT with Old Equipment -- 2.1.5 CBM Strategy as a Maintenance Business Driver -- 2.2 Optimization of Maintenance Costs -- 2.3 Business Drivers for Collaborative Proactive Maintenance -- 2.3.1 Maintenance Optimisation Models -- 2.3.2 Objectives and Scope -- 2.3.3 Maintenance Standards -- 2.3.4 Maintenance-related Operational Planning -- 2.4 Economic View of CBM-based PM -- 2.5 Risks in CBM Plan Implementation -- 2.5.1 Technology -- 2.5.2 People -- 2.5.3 Processes -- 2.5.4 Organizational Culture -- References -- Chapter 3 - The MANTIS Reference Architecture -- 3.1 Introduction -- 3.1.1 MANTIS Platform Architecture Overview -- 3.2 The MANTIS Reference Architecture -- 3.2.1 Related Work and Technologies -- 3.2.1.1 Reference architecture for the industrial internet of things -- 3.2.1.2 Data processing in Lambda -- 3.2.1.3 Maintenance based on MIMOSA -- 3.2.2 Architecture Model and Components -- 3.2.2.1 Edge tier -- 3.2.2.2 Platform tier -- 3.2.2.3 Enterprise tier -- 3.2.2.4 Multi stakeholder interactions -- 3.3 Data Management -- 3.3.1 Data Quality Considerations -- 3.3.2 Utilization of Cloud Technologies -- 3.3.3 Data Storages in MANTIS -- 3.3.4 Storage Types -- 3.3.4.1 Big data file systems…”
Libro electrónico -
11375Building the hyperconnected society IoT research and innovation value chains, ecosystems and marketsPublicado 2015Tabla de Contenidos: “…. -- 3.8.3 Components of a QoS Security Framework -- 3.8.3.1 Authentication -- 3.8.3.2 Authorization -- 3.8.3.3 Network -- 3.8.3.4 Trust Management -- 3.9 Discussion -- Acknowledgments -- Bibliography -- Chapter 4 - Internet of Things Application Scenarios, Pilots and Innovation -- 4.1 Introduction -- 4.2 IoT Projects -- 4.2.1 ALMANAC -- 4.2.1.1 Application Areas -- 4.2.1.2 Pilots and Demonstrators -- 4.2.1.2.1 SmartWaste Collection Field Trial -- 4.2.1.2.2 SmartWater Capillary Network -- 4.2.1.2.3 Collaborative Citizen-centric application -- 4.2.2 ClouT -- 4.2.2.1 Application Areas -- 4.2.2.2 Pilots and Demonstrators -- 4.2.2.2.1 Fujisawa field trial: Surfboard + Smile Coupon -- 4.2.2.2.2 Mitaka field trial: Paw collection -- 4.2.2.2.3 Genova field trial: "I don't risk" (SEM1 application context) -- 4.2.2.2.4 Santander field trial:Traffic Mobility Management -- 4.2.2.2.5 Sensorized garbage collection cars -- 4.2.2.2.6 Pace of the city -- 4.2.3 OSMOSE -- 4.2.3.1 Application Areas -- 4.2.3.2 Pilots and Demonstrators -- 4.2.3.2.1 OSMOsis applications for Aerospace Domain -- 4.2.3.2.2 OSMOsis applications for Automotive Domain -- 4.2.4 RERUM -- 4.2.4.1 Application Areas…”
Libro electrónico -
11376Publicado 2019Tabla de Contenidos: “…Front Cover -- Software Engineering for Embedded Systems -- Copyright -- Contents -- Contributors -- Acknowledgments -- 1 Software Engineering for Embedded and Real-Time Systems -- 1 Software Engineering -- 2 Embedded Systems -- 2.1 Embedded Systems Are Reactive Systems -- 3 Real-Time Systems -- 3.1 Types of Real-Time Systems-Soft and Hard -- 3.2 Differences Between Real-Time and Time-Shared Systems -- 4 Example of a Hard Real-Time System -- 4.1 Based on Signal Sample, Time to Perform Actions Before Next Sample Arrives -- 4.2 Hard Real-Time Systems -- 5 Real-Time Event Characteristics -- 5.1 Real-Time Event Categories -- 5.2 Efficient Execution and the Execution Environment -- 5.2.1 Efficiency Overview -- 5.2.2 Resource Management -- 6 Challenges in Real-Time System Design -- 6.1 Response Time -- 6.2 Recovering From Failures -- 7 The Embedded System's Software Build Process -- 8 Distributed and Multiprocessor Architectures -- 9 Software for Embedded Systems -- 9.1 Super Loop Architecture -- 9.2 Power-Saving Super Loop -- 9.3 Window Lift Embedded Design -- 10 Hardware Abstraction Layers for Embedded Systems -- 2 Software Development Process -- 1 Getting Started -- 1.1 Project Planning -- 1.2 Risk Management -- 1.3 Kicking Off the Project -- 2 Requirements -- 2.1 User Requirements -- 2.2 System Requirements -- 3 Architecture -- 3.1 Safety-Critical Elements -- 3.2 Operating Performance -- 3.3 Security -- 3.4 Reliability and Availability -- 4 Design -- 4.1 Object-Oriented Programming -- 4.1.1 System Context -- 4.1.2 Class Identification -- 4.1.3 Design Modeling -- 4.2 Real-Time Design -- 5 Implementation -- 6 Testing -- 6.1 Validation and Verification -- 6.2 Integration Testing -- 6.3 Release Testing -- 6.4 Performance Testing -- 7 Rolling It Together: Agile Development…”
Libro electrónico -
11377por Prakash, Kolla BhanuTabla de Contenidos: “…-- 9.2 Model Selection Strategies -- 9.3 Types of Model Selection -- 9.3.1 Methods of Re-Sampling -- 9.3.2 Random Separation -- 9.3.3 Time Divide -- 9.3.4 K-Fold Cross-Validation -- 9.3.5 Stratified K-Fold -- 9.3.6 Bootstrap -- 9.3.7 Possible Steps -- 9.3.8 Akaike Information Criterion (AIC) -- 9.3.9 Bayesian Information Criterion (BIC) -- 9.3.10 Minimum Definition Length (MDL) -- 9.3.11 Building Risk Reduction (SRM) -- 9.3.12 Excessive Installation (Overfitting) -- 9.4 The Principle of Parsimony -- 9.5 Examples of Model Selection Criterions -- 9.6 Other Popular Properties -- 9.7 Key Considerations -- 9.8 Model Validation -- 9.8.1 Why is Model Validation Important? …”
Publicado 2024
Libro electrónico -
11378por Allison, SteveTabla de Contenidos: “…Security design -- 2.1 Overview of security challenges -- 2.1.1 Assessing and managing security risks -- 2.1.2 Evolving with emerging technologies and trends -- 2.2 Finding the right level of security for your enterprise…”
Publicado 2005
Libro electrónico -
11379por Putte, Geert van deTabla de Contenidos: “…Implementing a firewall -- 13.1 Network services and vulnerability -- 13.1.1 Minimizing security risk: Introducing the firewall…”
Publicado 2005
Libro electrónico -
11380Publicado 2024Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface to the Second Edition -- Author -- Part I Introduction to Cellular and Molecular Biology -- 1 The Cellular System and the Code of Life -- 1.1 The Cellular Challenge -- 1.2 How Cells Meet the Challenge -- 1.3 Molecules in Cells -- 1.4 Intracellular Structures Or Spaces -- 1.4.1 Nucleus -- 1.4.2 Cell Membrane -- 1.4.3 Cytoplasm -- 1.4.4 Endosome, Lysosome, and Peroxisome -- 1.4.5 Ribosome -- 1.4.6 Endoplasmic Reticulum -- 1.4.7 Golgi Apparatus -- 1.4.8 Cytoskeleton -- 1.4.9 Mitochondrion -- 1.4.10 Chloroplast -- 1.5 The Cell as a System -- 1.5.1 The Cellular System -- 1.5.2 Systems Biology of the Cell -- 1.5.3 How to Study the Cellular System -- References -- 2 DNA Sequence: The Genome Base -- 2.1 The DNA Double Helix and Base Sequence -- 2.2 How DNA Molecules Replicate and Maintain Fidelity -- 2.3 How the Genetic Information Stored in DNA Is Transferred to Protein -- 2.4 The Genomic Landscape -- 2.4.1 The Minimal Genome -- 2.4.2 Genome Sizes -- 2.4.3 Protein-Coding Regions of the Genome -- 2.4.4 Non-Coding Genomic Elements -- 2.5 DNA Packaging, Sequence Access, and DNA-Protein Interactions -- 2.5.1 DNA Packaging -- 2.5.2 Sequence Access -- 2.5.3 DNA-Protein Interactions -- 2.6 DNA Sequence Mutation and Polymorphism -- 2.7 Genome Evolution -- 2.8 Epigenome and DNA Methylation -- 2.9 Genome Sequencing and Disease Risk -- 2.9.1 Mendelian (Single-Gene) Diseases -- 2.9.2 Complex Diseases That Involve Multiple Genes -- 2.9.3 Diseases Caused By Genome Instability -- 2.9.4 Epigenomic/Epigenetic Diseases -- References -- 3 RNA: The Transcribed Sequence -- 3.1 RNA as the Messenger -- 3.2 The Molecular Structure of RNA -- 3.3 Generation, Processing, and Turnover of RNA as a Messenger -- 3.3.1 DNA Template -- 3.3.2 Transcription of Prokaryotic Genes…”
Libro electrónico