Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
11701Publicado 2016“…The remaining chapters focus exclusively on EDM’s emerging role in helping to advance educational research—from identifying at-risk students and closing socioeconomic gaps in achievement to aiding in teacher evaluation and facilitating peer conferencing. …”
Libro electrónico -
11702Publicado 2021“…This popular book offers step-by-step guidance on choosing an online broker, accessing and making best use of online share investing resources, planning trades, identifying profit-making opportunities, timing of and placing online orders, managing investment risks, and much more. Bestselling author and successful trader Roger Kinsky provides a step-by-step process for harnessing the power of the internet to make informed and profitable trading and investment decisions. …”
Libro electrónico -
11703Publicado 2023“…An exciting new title from bestselling author Cyndi Snyder Dionisio on a top trending topic in the field, sample topics covered in Hybrid Project Management include: Variables to consider when choosing a development approach Project roles such as sponsors, product owners, project managers, scrum masters, and the project team Launching a hybrid project (vision statements and charters) and structuring the project (development approach, delivery cadence, lifecycle, and roadmap) Project scope requirements, backlogs, and user stories Hybrid scheduling that combines Gantt charts and release plans Leadership in a hybrid project, covering servant leadership, bias, critical thinking, emotional intelligence, motivation, and developing high-performing teams Managing risk on hybrid projects including estimating reserve and using a risk-adjusted backlog Identifying metrics and reports for predictive and adaptive project work, such as burn charts, variance analysis, forecasts, and cumulative flow diagrams With over fifty percent of projects today being managed using a hybrid approach, Hybrid Project Management serves as an important guide to hybrid project management methods for project management professionals and academia. …”
Libro electrónico -
11704por Senik, Claudia“…The first type of aversion to income inequality derives from self-centred motives, such as risk-aversion and prospects for upward mobility (POUM). …”
Publicado 2009
Capítulo de libro electrónico -
11705Publicado 2018“…The book also contains recipes for assessing remote services and the security risks that they bring to a network infrastructure. …”
Libro electrónico -
11706Publicado 2024“…This report reveals: The most common data security use cases and their potential challenges What to look for in a data security solution that's built for speed and scale Why increasingly decentralized data architectures require centralized, dynamic data security mechanisms How to implement the steps required to put common use cases into production Methods for assessing risks--and controls necessary to mitigate those risks How to facilitate cross-functional collaboration to put data security into practice in a scalable, efficient way You'll examine the most common data security use cases that global enterprises across every industry aim to achieve, including the specific steps needed for implementation as well as the potential obstacles these use cases present. …”
Libro electrónico -
11707por Ciravegna, Luciano, 1978-“…Thus it should assist current and future managers in navigating these high-potential but high-risk countries." --S. Tamer Cavusgil, Callaway Professorial Chair and Executive Director, CIBER, J. …”
Publicado 2013
Libro electrónico -
11708Publicado 2019“…Emails can build or destroy credibility, clarify or confuse situations for our coworkers and customers, and reduce or increase security risks and legal liabilities. This book will help you master your emails and stand out as a clear, credible communicator. …”
Libro electrónico -
11709por Horine, Greg“…Here’s a small sample of what you’ll learn: • Master the key skills and qualities every project manager needs • Lead projects, don’t just “manage” them • Avoid 15 most common mistakes new project managers make • Learn from troubled, successful, and “recovered” projects • Set the stage for success by effectively defining your project • Build a usable project plan and an accurate work breakdown structure (WBS) • Create budgets and schedules that help you manage risk • Use powerful control and reporting techniques, including earned value management • Smoothly manage project changes, issues, risks, deliverables, and quality • Manage project communications and stakeholder expectations • Organize and lead high-performance project teams • Manage cross-functional, cross-cultural, and virtual projects • Work successfully with vendors and Project Management Offices • Make the most of Microsoft Project and new web-based alternatives • Get started with agile and “critical chain” project management…”
Publicado 2013
Libro electrónico -
11710Publicado 2023“…This course in the CASP series covers the following topics: Operations Perform threat management activities Intelligence types Actor types Threat actor properties Intelligence collection methods Frameworks Analyze indicators of compromise and formulate an appropriate response Indicators of compromise Response Rules Perform vulnerability management activities Vulnerability scans Security Content Automation Protocol Self-assessment or third party vendor assessment Patch management Information sources Use appropriate vulnerability assessment and penetration testing methods and tools Methods Tools Dependency management Requirements Analyze vulnerabilities and recommend risk mitigations Vulnerabilities Inherently vulnerable system or application Attacks Use processes to reduce risk Proactive and detection Security data analytics Preventive Application control Security automation Physical security Given an incident, implement appropriate response Event classifications Triage event Preescalation tasks Incident response process Specific response playbooks Communication plan Stakeholder management Explain importance of forensic concepts Legal versus internal corporate purposes Forensic process Integrity preservation Cryptanalysis Steganalysis Use forensic analysis tools File carving tools Binary analysis tools Analysis tools Imaging tools Hashing utilities Live collection versus post-mortem tools…”
Video -
11711por Foreman, Park“…Completely updated, the second edition provides a fundamental understanding of technology risks--including a new chapter on cloud vulnerabilities and risk management--from an interloper's perspective. …”
Publicado 2019
Libro electrónico -
11712Publicado 2019“…Any digital technology has its own risks such as Cyber Security, Data Privacy Protection, apart from protecting the interests and careers of the human workforce. …”
Vídeo online -
11713Publicado 2021“…This book asks: what if the same level of boldness - the boldness that set inspirational goals, took risks and explicitly recognized that this requires large spending but will be worthwhile in terms of long-term growth - was applied to the biggest problems of our time, climate change, disease and inequality, to name only a few? …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca Universidad de Deusto)Libro -
11714Publicado 2019“…Understanding macroeconomic developments and policies in the twenty-first century is daunting: policy-makers face the combined challenges of supporting economic activity and employment, keeping inflation low and risks of financial crises at bay, and navigating the ever-tighter linkages of globalization. …”
Libro -
11715por Sabadell-Bosch, Mar“…It highlights the new risks associated with increased digital connectivity and the need for enhanced legal protections for workers. …”
Publicado 2024
Libro electrónico -
11716Publicado 2018“…Corticosteroids will only be prescribed if the potential benefits of treatment outweigh the risks. They will also be prescribed at the lowest effective dose for the shortest possible time. …”
Libro electrónico -
11717por Baldi, Francesco“…Such a framework involves: mapping (and selecting one of) the various staged paths envisioned for the start-up and development of the alliance in terms of strategic options exercisable over the lifetime of the cooperative venture; assessing the incremental, synergistic value of those options (if exercised on the net, tangible and intangible, assets of the venture); anticipating the potential impact of risks on the success/failure of the venture and associated synergistic value erosion; defining the optimal option map for implementing the strategic alliance via potential, successive adjustments to the initial strategy (information loop is closed)…”
Publicado 2013
Libro electrónico -
11718“…Improved volunteer deployment may avoid these risks and present opportunities for sustainable systems change. …”
Libro electrónico -
11719por Organisation for Economic Co-operation and Development.“…It provides viable policy options and a step-by-step road map on how to address typical difficulties, risks and hurdles that may be encountered. It also provides concrete examples of good practices that can serve as a reference and inspiration. …”
Publicado 2010
Libro electrónico -
11720por Organisation for Economic Co-operation and Development.“…What are the gains and risks of modern alternatives to current education systems? …”
Publicado 2003
Libro electrónico