Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
12861Publicado 2015“…You’ll learn how to: ¿ Move from "campaigning" to storytelling and authentic conversations ¿ Achieve true ‘real-time marketing" and greater agility throughout the marketing function ¿ Migrate from big TV buys to a pervasive multi-channel/omni-channel approach ¿ Accelerate marketing processes, eliminate bureaucracy, and optimize agility ¿ Mitigate risk when everything’s moving at lightspeed ¿ And much more Johnson supports his recommendations by taking you behind the scenes with some of the world’s top marketing teams, at companies including L’Oreal, Old Navy, Time Warner, Adidas, HP, McDonalds, Wells Fargo, and Universal. …”
Libro electrónico -
12862Publicado 2015“…In no time, you'll be managing deliverables, assessing risks, maintaining communications, making the most of your resources and utilising time-saving technologies like a project management ninja! …”
Libro electrónico -
12863Publicado 2016“…This study guide helps you master all the topics on the latest CISSP exam, including: Access control Telecommunications and network security Information security governance and risk management Software development security Cryptography Security architecture and design Operation security Business continuity and disaster recovery planning Legal, regulations, investigations, and compliance Physical (environmental) security…”
Libro electrónico -
12864Publicado 2006“…Using this book’s techniques and examples, you can reduce waste, rework, risk, and cost—and build database systems capable of evolving smoothly, far into the future…”
Libro electrónico -
12865Publicado 2018“…Improve processes by determining your metrics Choose the right software and implement appropriate automation Evaluate and mitigate risks at all steps in the supply chain Help your business function as a system to more effectively meet customer needs We tend to think of the supply chain as suppliers, logistics, and warehousing—but it's so much more than that. …”
Libro electrónico -
12866Publicado 2018“…You have to make good decisions while balancing inevitable tensions and knowing when to take risks. You need to keep your values in sight regardless of the pressures around you and stay calm in the storms that arise. …”
Libro electrónico -
12867Publicado 2023“…Rather, it is a matter of pointing out how the mimetic blurring with the positions of the alleged prophet of doom, in the name of the West's self-love and its exceptionalism, risks confirming the prognosis of the decline, testifying to the misery, or impotence, of the critique aimed at opposing its fulfilment…”
Libro electrónico -
12868Publicado 2016“…Three Microsoft Azure experts show you how to: • Understand cloud security boundaries and responsibilities • Plan for compliance, risk management, identity/access management, operational security, and endpoint and data protection • Explore Azure’s defense-in-depth security architecture • Use Azure network security patterns and best practices • Help safeguard data via encryption, storage redundancy, rights management, database security, and storage security • Help protect virtual machines with Microsoft Antimalware for Azure Cloud Services and Virtual Machines • Use the Microsoft Azure Key Vault service to help secure cryptographic keys and other confidential information • Monitor and help protect Azure and on-premises resources with Azure Security Center and Operations Management Suite • Effectively model threats and plan protection for IoT systems • Use Azure security tools for operations, incident response, and forensic investigation…”
Libro electrónico -
12869por Lucas, Julie, 1964-“…Inside, readers will find information on: Formulating reactive or preventative operational strategy Forming, training, and marketing the CIRT Selecting penetration-testing, intrusion-detection, network-monitoring, and forensics tools Recognizing and responding to computer incidents and attacks, including unauthorized access, denial-of-service attacks, port scans, and viruses Tracking, storing, and counting incident reports and assessing the cost of an incident Working with law enforcement and the legal community Benefiting from shared resources Scrutinizing closed incidents to further prevention Offering services such as user-awareness training, vulnerability and risk assessments, penetration testing, and architectural reviews Communicating the CIRT's return on investment through management reporting 0201761750B10062003…”
Publicado 2004
Libro electrónico -
12870Publicado 2009“…Understand your role as a project manager...gain the skills and discover the personal qualities of great project managers...learn how to organize, estimate, and schedule projects effectively...manage deliverables, issues, changes, risks, quality, vendors, communications, and expectations...make the most of technology...manage virtual teams...avoid the problems that trip up new project managers! …”
Libro electrónico -
12871por Snyder, Scott A. 1965-“…You’ll discover how these changes will affect you...how to innovate around 4G wireless to build profitability and market share... how to anticipate and manage business risks you’ve never even imagined before... how to harness the relentless “digital swarms” that are now rising to power in your company and your marketplace!…”
Publicado 2009
Libro electrónico -
12872Publicado 2011“…You'll discover how to systematically prepare to make better decisions...how to get the right information, without getting buried in useless data...how to minimize your risks, and then act decisively...how to make better group decisions...profit from mistakes...and a whole lot more. …”
Libro electrónico -
12873por CIMORELLI, STEPHEN“…This edition presents a wealth of new tools and techniques useful across the broad spectrum of manufacturing environments, including: A statistical data cleansing technique to remove questionable or irrelevant data from kanban calculations Correlation analysis based on simple Excel techniques to guide the decisions around which part numbers "qualify" for kanban An alternative "stair-step analysis" approach for those who are unable to generate correlation data and prefer to use more readily available monthly demand history An approach to analyze supplier performance data vs. lead time and lot size expectations, with risk mitigation strategies for poor performing suppliers This book is for those who are ready to stop thinking about a conversion from materials requirements planning push techniques to kanban pull techniques and want to make it happen now. …”
Publicado 2017
Libro electrónico -
12874Publicado 2022“…This book is important to demonstrate the use of remote sensing techniques for revealing climate-related risks and vulnerabilities. Meanwhile, results reported in this book provide a good understanding of the climate emergency situations, drivers, and solutions. …”
Libro electrónico -
12875por Langenhan, Daniel“…You will learn how to automate vCloud easily and quickly with the API, and also learn how to isolate a vApp and still fully access it without risking the network. Design considerations that need to be addressed while deploying the vCloud and more will also be looked into. …”
Publicado 2013
Libro electrónico -
12876por Agarwal, Ankush“…If you need a concise handbook for a complete understanding of the metrics, challenges and risks of ITSM, then you have found the right book. …”
Publicado 2013
Libro electrónico -
12877Publicado 2020“…This important resource: Presents new and advanced approaches, methodologies, and tools for designing, testing, deploying, and maintaining advanced complex systems Explores effective evidence-based risk management practices Describes an integrated approach to safety, reliability, and cyber security based on system theory Discusses entrepreneurship as a multidisciplinary system Emphasizes technical merits of systems engineering concepts by providing technical models Written for systems engineers, Systems Engineering in the Fourth Industrial Revolution offers an up-to-date resource that contains the best practices and most recent research on the topic of systems engineering…”
Libro electrónico -
12878Publicado 2019“…With this book, you’ll explore the risks, considerations, trade-offs, and constraints for pursuing an AI initiative. …”
Libro electrónico -
12879Publicado 2020“…Quickly master modern JavaScript's implementation of fundamental programming constructs Avoid legacy techniques that create unnecessary complexity and risk Make the most of functional, object-oriented, and asynchronous techniques Use modules to efficiently organize and run complex programs Write more powerful, flexible, and concise programs with metaprogramming Extend JavaScript's power via JavaScript libraries, frameworks, and platforms Whether you're just getting started with JavaScript or you're an experienced developer, this guide will help you write tomorrow's most robust, efficient, and secure JavaScript code. …”
Libro electrónico -
12880Publicado 2020“…Reshape the design of your code quickly, with less risk and less fear…”
Libro electrónico