Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
12341Publicado 2013“…You’ll find a complete decision framework and practical tools, insights, and guidance for systematically mitigating new risks and building long-term competitive advantage. …”
Libro electrónico -
12342Executive's guide to personal securityExecutive's Guide to Personal SecurityExecutive's Guide to Personal SecurityPublicado 2020“…You will learn how to analyze risks, prepare for emergencies, travel safely, and utilize counter-surveillance techniques to enable you to recognize if you are being followed or targeted. …”
Libro electrónico -
12343Publicado 2020“…You’ll learn: how GE became the largest company on earth—only for a culture of arrogance to set in motion the largest collapse in history how Boeing reassessed risks, raised profits—and tragically lost its balance how Danaher avoided the pitfalls of tremendous success—by continually reinventing itself how Honeywell experienced a near-fatal cultural breakdown—and executed a flawless turnaround how Caterpillar relied too much on forecasting, lost billions—and rallied by recommitting to the basics Filled with illuminating case studies and brilliant in-depth analysis, this invaluable book provides a multitude of insights that will help you weather market upheavals, adapt to disruptions, and optimize your resources to your best advantage. …”
Libro electrónico -
12344Publicado 2020“…Next, the book shows you how RBAC and Azure AD Identity Protection can be used to help you detect risks and secure information in your organization. …”
Libro electrónico -
12345Your Credit Score How to Improve the 3-Digit Number That Shapes Your Financial Future, Fifth EditionPublicado 2015“…Weston thoroughly covers brand-new laws and rules surrounding credit scoring — including some surprising good news and some frightening new risks. Don’t settle for an out-of-date guide to credit scoring, when Your Credit Score, Fifth Edition offers brand-new coverage of all this, and more: Recent consumer-friendly reforms in lending, credit score calculation, and credit bureau behavior — and how to take advantage of them How you can finally get your credit disputes reviewed by an actual human being Why recent medical debts shouldn’t impact your score anymore How to get a legitimately free FICO score without getting ripped off How lenders have recently loosened their criteria, making it easier to get loans even if your credit isn’t perfect Important new options for student loan borrowers — including brand-new ways to dramatically limit your payments How tax refund fraud is soaring — and the one little-known way to avoid becoming a victim The disappearance of "manual underwriting": why it’s now virtually impossible to get a mortgage without credit scores Weston updates her guidance on raising your FICO score... fighting lower limits or higher rates... maintaining the right mix of cards and balances... bouncing back from bad credit... choosing credit "solutions" that help, not hurt... explodes both new and old myths about credit scoring... and much more. …”
Libro electrónico -
12346Publicado 2017“…It covers the legal aspects of ethical hacking and the associated risks. This course additionally reviews many different tools that can be used to penetrate a wired or wireless network and the systems within that network. …”
-
12347Publicado 2019“…—how it will look in the coming years, the countless business opportunities it will offer, the risks that come with it—and delivers the knowledge you need to navigate it all in real and practical ways. …”
Libro electrónico -
12348Publicado 2017“…This course explains DL's core concepts, demystifies the math and science underlying the technology, and reviews its strengths, weaknesses, challenges, and risks from a strategic perspective. Business executives seeking a market-focused introduction to this technology will come away with the ability to articulate DL's core concepts and an understanding of how they fit together to produce business value. …”
-
12349Publicado 2012“…Although the rewards associated with rebuilding mature applications are high, so are the risks and customers that are embarking on a migration need that migration done quickly. …”
Libro electrónico -
12350Publicado 2018“…Although some occupations and work-related activities are more hazardous than others and face higher rates of injuries, illness, disease, and fatalities, workers in all occupations face some form of work-related safety and health concerns. Understanding those risks to prevent injury, illness, or even fatal incidents is an important function of society. …”
Libro electrónico -
12351Publicado 2015“…The aim of this book is to study the constraints and emancipatory potentials of new media and to assess to what extent digital and social media can contribute to strengthen the idea of the communication and network commons, and a commons-based information society. ã Based on a critical theory and political economy approach, this book explores: the foundational concepts of a critical theory of media, technology, and society usersâ knowledge, attitudes, and practices towards the antagonistic character and the potentials and risks of social media whether technological and/or social changes are required in order to bring about real social media and human liberation. …”
Libro electrónico -
12352por McDonald, Kelly“…The author's clear, "real talk" style makes it easy to learn: the costs and risks you're incurring if your organization lacks diversity; how people who don't consider themselves to be racist may still have diversity blind spots; how to start the hard conversations you may not know how to approach; the STARTING Method-an eight-step framework that shows you how to ensure your diversity and inclusion efforts are effective; how to recognize the excuses people use to avoid taking action on diversity and inclusion; and more…”
Publicado 2021
Grabación no musical -
12353Publicado 2024“…Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. …”
Libro electrónico -
12354Publicado 2021“…Though visibility can secure rights for the disenfranchised, it also risks subjecting them to the biopolitical and capitalist arrangements of space. …”
Libro electrónico -
12355Publicado 2024“…A comprehensive guide for professionals who want to move from Zero Trust theory to implementation Overview Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. …”
Grabación no musical -
12356por Guijarro, Jordi“…Connected vehicles will soon become a reality on our roads, bringing along new services and capabilities, but also technical challenges and security threats. To overcome these risks, the CARAMEL project has developed several anti-hacking solutions for the new generation of vehicles. …”
Publicado 2022
Libro electrónico -
12357Publicado 2019“…"Adrian Lungu and Serban Teodorescu (Adobe) explain how, inspired by the green-blue deployment technique, the Adobe Audience Manager team developed an active-passive database migration procedure that allows them to test database clusters in production, minimizing the risks without compromising the innovation. It was successfully applied twice to upgrade the entire database technology stack, but it's never a smooth move when your databases are 200-node Cassandra clusters with hundreds of terabytes of data and downtime is not an option. …”
Vídeo online -
12358Publicado 2023“…The development and release of ChatGPT and other state-of-the-art large language models (LLMs) has renewed interest in the concept of AI agents, a term that evokes a range of assumptions about their potential as applications to independently automate many tasks along with the risks they present if not constrained. In simple terms, an AI agent is an AI entity that is given a description of a task, autonomously retrieves the tools it needs to execute the task, and then executes it. …”
Video -
12359Publicado 2024“…What you'll learn and how you can apply it Understand the possibilities and risks of AI so you can judge when and how to use it Learn how GenAI mechanisms can influence core SaaS architecture strategies and how you can implement this in your SaaS solution Explore the use of prompt engineering for architectural tasks and leverage generative AI to improve their work This live event is for you because... …”
Video -
12360Publicado 2024“…But companies should understand the risks along with the potential. Implementing AI without clear use cases or business goals can lead to wasted resources, and a lack of expertise or attention to ethical considerations can bring powerful consequences. …”
Video