Mostrando 12,681 - 12,700 Resultados de 13,276 Para Buscar '"Risk"', tiempo de consulta: 0.10s Limitar resultados
  1. 12681
    por Brook, Anne-Marie
    Publicado 2005
    “…The example of Slovakia is used to illustrate these points, and a number of policy guidelines are proposed to minimise the risks. This Working Paper relates to the 2005 OECD Economic Survey of the Slovak Republic (www.oecd.org/eco/surveys/slovakia)…”
    Capítulo de libro electrónico
  2. 12682
    por Kierzenkowski, Rafal
    Publicado 2010
    “…The reforms should aim to create strong institutions to ensure fiscal sustainability and an efficient counter-cyclical rules-based fiscal policy supported by an independent fiscal council; promote flexibility in labour and product markets; and head off the risk of a boom-bust cycle triggered by much lower real interest rates, too rapid credit expansion and overblown perceived permanent income gains. …”
    Capítulo de libro electrónico
  3. 12683
    por International Energy Agency
    Publicado 2016
    “…The result could be a sharp rise in oil prices that risks curtailing economic growth. In the 2016 edition of its Medium-Term Oil Market Report, the International Energy Agency analyses the key factors impacting the supply and demand for oil from today out to 2021. …”
    Libro electrónico
  4. 12684
    Publicado 2017
    “…This report explores: How multi-model database management systems support a data-driven approach to software development Why applications that support data integration and analytic use cases can break a relational data model Case studies of two Fortune 50 companies that successfully adopted multi-model databases Why a data-driven approach requires collaboration among DBAs, sysadmins, analysts, and compliance and risk managers…”
    Libro electrónico
  5. 12685
    Publicado 2017
    “…Discover a new approach that establishes governance at the data level versus the system level in order to reduce risk, facilitate operational decisions, and improve integrity…”
    Libro electrónico
  6. 12686
    Publicado 2017
    “…. •100% complete coverage of all official objectives for exam SY0-501 •Exam Watch notes call attention to information about, and potential pitfalls in, the exam •Inside the Exam sections in every chapter highlight key exam topics covered •Two-Minute Drills for quick review at the end of every chapter •Simulated exam questions—including performance-based questions—match the format, topics, and difficulty of the real exam Covers all exam topics, including: Networking Basics and Terminology • Security Terminology • Security Policies and Standards • Types of Attacks • System Security Threats • Mitigating Security Threats • Implementing System Security • Securing the Network Infrastructure • Wireless Networking and Security • Authentication • Access Control • Cryptography • Managing a Public Key Infrastructure • Physical Security • Risk Analysis • Disaster Recovery and Business Continuity • Computer Forensics • Security Assessments and Audits • Monitoring and Auditing Electronic Content Includes: • 50+ lab exercises and solutions •Complete practice exams •3+ hours of video training from the author •Secured book PDF…”
    Libro electrónico
  7. 12687
    Publicado 2015
    “…The elements covered in the book include tariff and non-tariff barriers, anti-dumping duties, subsidies and countervailing duties, entry and post-entry barriers to foreign direct investment, political risk, the General Agreement on Tariffs and Trade and other global instruments, the World Trade Organization and other global mechanisms, regional trade blocs (which include free trade areas and customs unions), bilateral trade and investment agreements, the conflict of laws, dispute settlement mechanisms, and systemic and cultural differences. …”
    Libro electrónico
  8. 12688
    Publicado 2017
    “…Enforce effective physical security throughout your organization Apply reliable authentication, authorization, and accountability Design security architectures that can be verified, certified, and accredited Understand the newest attacks and countermeasures Use encryption to safeguard data, systems, and networks Systematically plan and test business continuity/disaster recovery programs Protect today’s cloud, web, and database applications Address global compliance issues, from privacy to computer forensics Develop software that is secure throughout its entire lifecycle Implement effective security governance and risk management Use best-practice policies, procedures, guidelines, and controls Ensure strong operational controls, from background checks to security audits…”
    Libro electrónico
  9. 12689
    Publicado 2023
    “…His urgency identifies risks held in urban areas by 3.5 billion people. …”
    Libro electrónico
  10. 12690
    por European Investment Bank
    Publicado 2022
    “…Notably, support for female-led businesses can contribute to raising female labour force participation, thereby helping to reduce poverty risks. At the same time, framework conditions that make it easier for women to have professional careers, or establish and run a business successfully, are key to seeing more female-led businesses emerge and thrive…”
    Libro electrónico
  11. 12691
    Publicado 2023
    “…You'll also find: Explanations of why the six break-the-rules mindsets fly in the face of conventional business and business school wisdom Strategies for dealing with, skating around, or otherwise overcoming the daunting obstacles that stand in every innovator's way Ways to challenge assumptions and mitigate risk in order to take advantage of opportunities that present themselves along your entrepreneurial path Steps you can take now to make one or more of these mindsets your own. …”
    Libro electrónico
  12. 12692
    “…These guidelines are intended for health-care providers, HIV program managers, policy-makers, national treatment advisory boards, researchers, and other professionals involved in caring for people who either have or may be at risk of developing disseminated histoplasmosis…”
    Libro electrónico
  13. 12693
    por Bell, Christine
    Publicado 2024
    “…Against this backdrop – can digital peacebuilding be a force for good? Or do the risks outweigh the benefits? PeaceTech provides a 12-Step Manifesto laying out the types of practice and commitment needed for successful use of digital tools to support peace processes. …”
    Libro electrónico
  14. 12694
    por Bartoli, Stefano
    Publicado 2025
    “…This open access book provides a practical toolkit for surgeons and intensivists to improve their daily clinical practices in order to reduce the risk of SSIs…”
    Libro electrónico
  15. 12695
    Publicado 2016
    “…With this report, you’ll explore: How CDOs are moving from data governance to data strategy, driving business value through new products and services Expanding CDO responsibilities, such as advocating for data-driven approaches and setting priorities for data-driven projects The CDO’s challenge of keeping up with a rapidly shifting tech landscape while navigating politics in many divisions and departments The relationships between CDOs and CIOs, chief risk officers, and data stewards among different organizations How to find CDO candidates who have the technology chops, business thinking, political skills, and executive-level experience you need Julie Steele is Director of Communications at Silicon Valley Data Science and coauthor of Beautiful Visualization and Designing Data Visualizations (both O’Reilly)…”
    Libro electrónico
  16. 12696
    Publicado 2017
    “…Provides overviews that explain what tasks the services perform and how they relate to each other Offers specific paths to follow in order to obtain a particular installation result Gets you started without making a huge investment Reduces the risk of failure by ensuring you understand available options as part of the configuration and usage process Stop wasting time and resources on hardware and software that's quickly outdated. …”
    Libro electrónico
  17. 12697
    por Robbins, Stephen P., 1943-
    Publicado 2015
    “…In this Second Edition, he provides many new and updated examples, updated research, and new coverage, including these crucial new topics: Are you a Maximizer or a Satisficer – and what it means for your decision-making Overcoming the familiarity bias, adaptation bias, and fear-of-loss bias How to stop throwing good money after bad Knowing when doing nothing is your best option Accounting for gendered decision-making styles Decide and Conquer, Second Edition covers everything from goal-setting and risk-taking to overconfidence to procrastination, and offers indispensable insights for overcoming the multiple biases that are built into all human decision-makers. …”
    Libro electrónico
  18. 12698
    Publicado 2015
    “…Covers currency trading conventions and tools Provides an insider's look at key characteristics of successful currency traders Explains why it's important to be organized and prepared Offers guidance on trading pitfalls to avoid and risk management rules to live by Whether you're just getting started out in the foreign exchange market or an experienced trader looking to diversify your portfolio, Currency Trading For Dummies sets you up for trading success…”
    Libro electrónico
  19. 12699
    Publicado 2022
    “…The papers cover a wide range of topics, which include: - Principles of conservation, maintenance strategies, case histories - The knowledge: investigations and monitoring - Seismic risk, site effects, soil structure interaction - Effects of urban development and tunnelling on built heritage - Preservation of diffuse heritage: soil instability, subsidence, environmental damages The present volume aims at geotechnical engineers and academics involved in the preservation of monuments and historic sites worldwide…”
    Libro electrónico
  20. 12700
    Publicado 2019
    “…Provides a thorough overview of computer hardware, including the fundamentals of computer systems and the implications of security risks Includes discussion of the liability, safety and privacy implications of hardware and software security and interaction Gives insights on a wide range of security, trust issues and emerging attacks and protection mechanisms in the electronic hardware lifecycle, from design, fabrication, test, and distribution, straight through to supply chain and deployment in the field A full range of instructor and student support materials can be found on the authors' own website for the book: http://hwsecuritybook.org…”
    Libro electrónico