Mostrando 12,881 - 12,900 Resultados de 13,270 Para Buscar '"Risk"', tiempo de consulta: 0.10s Limitar resultados
  1. 12881
    Publicado 2016
    “…This feature is especially interesting for financial analytics in which risk is a focus. This book teaches with examples. …”
    Libro electrónico
  2. 12882
    por Grossman, Kevin W.
    Publicado 2012
    “…Tech Job Hunt Handbook—for recent graduates, risk-taking innovators, and tech veterans alike—shows how to build a comprehensive online professional profile, identify the companies you’re interested in and who you know at those companies, approach interviews with confidence, uncover opportunities in your current company, and understand the new emerging technology markets that could lead to a career rebirth. …”
    Libro electrónico
  3. 12883
    por Whitenton, Linda
    Publicado 2013
    “…Discover how the MACE exam works, and the best ways to prepare for it Learn the role and responsibilities of the medication assistant as a member of the healthcare team Master all key medication administration concepts: pharmacology, drug orders, forms, measurements, storage, handling, and more Safeguard yourself and your patients from accidents, mistakes, and other risks Learn today’s most effective procedures and techniques for administering medications Understand how medication affects body systems, and how that affects care Review medication’s effects on the cardiovascular, respiratory, digestive, musculoskeletal, central nervous, and endocrine systems Understand medications for treating the eye and ear; cancer; and mental disorders MACE is a registered trademark of the National Council of State Boards of Nursing, Inc. …”
    Libro electrónico
  4. 12884
    Publicado 2013
    “…IBM Content Collector helps with the following tasks: Eliminating point solutions and lowering costs with a unified collection, management, and governance approach that works effectively across a broad range of source systems and information types Appraising, improving understanding of, culling, and properly selecting the information to archive Retaining, holding, and disposing of archived content efficiently and defensibly Eliminating the costs and risks inherent with over-retention This book covers the basic concepts of the IBM Content Collector product family. …”
    Libro electrónico
  5. 12885
    por Barley, Stephen R.
    Publicado 2004
    “…Readers learn how contractors find jobs, how agents negotiate, and what it is like to shoulder the risks of managing one's own "employability." The authors illustrate how the reality of flexibility often differs substantially from its promise. …”
    Libro electrónico
  6. 12886
    Publicado 2018
    “…Lindsey and Teles detail four of the most important cases: subsidies for the financial sector's excessive risk taking, overprotection of copyrights and patents, favoritism toward incumbent businesses through occupational licensing schemes, and the NIMBY-led escalation of land use controls that drive up rents for everyone else.Freeing the economy from regressive regulatory capture will be difficult. …”
    Grabación musical
  7. 12887
    Publicado 2022
    “…These outside actors include software companies that create vulnerable software, device companies that make insecure devices, government policymakers who write regulations that increase security risks, organizations that train people to engage in risky behaviors, and more. …”
    Grabación de sonido
  8. 12888
    Publicado 2022
    “…We will also cover high availability, disaster recovery, and a touch-up on risk management. In the fourth domain, we have network security at 19%. …”
    Video
  9. 12889
    Publicado 2018
    “…While bone mineral density (BMD) is the gold standard for assessing fracture risk, other factors such as bone structure, including trabecular thickness and separation, influence bone strength. …”
    Libro electrónico
  10. 12890
    por Cimperman, Rob
    Publicado 2006
    “…Chapter 1 Introduction Chapter 2 Defining UAT-What It Is...and What It Is Not Chapter 3 Test Planning-Setting the Stage for UAT Success Chapter 4 Building the Team-Transforming Users into Testers Chapter 5 Executing UAT-Tracking and Reporting Chapter 6 Mitigating Risk-Your Primary Responsibility …”
    Libro electrónico
  11. 12891
    por Rahman, Motiur
    Publicado 2013
    “…The multiple logistic regression model was used to identify important risk factors for a household’s vulnerability. In 2009, some of the basic characteristics of the chronically poor were: higher percentage and number of female-headed households, higher dependency ratio, lower levels of education, fewer years of schooling, and limited employment. …”
    Libro electrónico
  12. 12892
    por Braithwaite, John
    Publicado 2024
    “…Braithwaite argues that minimal sufficiency of deterrence, responsive regulation of risks, and restorative diplomacy offer superior theoretical foundations than realism in international relations theory and in organizational crime control. …”
    Libro electrónico
  13. 12893
    Publicado 2018
    “…You will learn more about: The best things you can do with acupuncture that will help you live a better life; Pain management, weight loss, migraine alleviation, and more benefits; All the basics, therapy techniques, and supplies you need to get started; The most important safety measures and the risks you need to know about; The difference between Chinese, Japanese, and Korean traditional acupuncture - there really is a difference. …”
    Libro electrónico
  14. 12894
    por World Health Organization
    Publicado 2018
    “…Proper and effective stewardship of opioid analgesics in the cancer treatment setting is essential to ensure the safety of patients and to reduce the risk of diversion of medicine into society. The goal of cancer pain management is to relieve pain to a level that allows for an acceptable quality of life. …”
    Libro electrónico
  15. 12895
    Publicado 2016
    “…Eight trials investigated the effect on risk factors. Structured data collection seems to have little or no effect on body weight (4 trials), but a small, positive effect on blood pressure (7 trials) and total cholesterol (3 trials). …”
    Libro electrónico
  16. 12896
    Publicado 2009
    “…According to the quality assessment tool used the studies were all evaluated to have unclear or high risk of bias. The quality of the documentation for the effect of the intervention is too low for us to draw conclusions on whether rehabilitation contributes to the patients social and community participation. …”
    Libro electrónico
  17. 12897
    Publicado 2012
    “…The documentation about the effect of multidisciplinary team-based rehabilitation is insufficient, and the conclusions are based on findings from small studies with unclear or high risk of bias. It is important to emphasize that no evidence of effect is not the same as evidence of no effect…”
    Libro electrónico
  18. 12898
    Publicado 2006
    “…Highlights include: Why conventional prescriptive planning fails and why agile planning works How to estimate feature size using story points and ideal days-and when to use each How and when to re-estimate How to prioritize features using both financial and nonfinancial approaches How to split large features into smaller, more manageable ones How to plan iterations and predict your team's initial rate of progress How to schedule projects that have unusually high uncertainty or schedule-related risk How to estimate projects that will be worked on by multiple teamsAgile Estimating and Planning supports any agile, semiagile, or iterative process, including Scrum, XP, Feature-Driven Development, Crystal, Adaptive Software Development, DSDM, Unified Process, and many more. …”
    Libro electrónico
  19. 12899
    Publicado 2023
    “…What You Will Learn Review the relevant technologies in a surveillance system Define and dissect the data pipeline with a focus on key criteria and understand the mapping of this pipeline to Intel hardware blocks Optimize the partition and future-proof it with security and manageability Understand threat modeling terminology, the assets pertinent to DSS, and emerging threats, and learn how to mitigate these threats using Intel hardware and software Understand the unique risks and threats to the intelligence in IMSS (machine learning training and inferencing, regulations, and standards) and explore the solution space for mitigations to these threats Sample applications illustrate how to design in security for several types of IMSS.— Explore ways to keep both yourself and your systems up to date in a rapidly changing technology and threat environment…”
    Libro electrónico
  20. 12900
    “…The committee concluded that the TI Research Program's strategic goals for the future were focused on major contributors to occupational injuries and deaths and are sensitive to populations and groups at disproportionate risk. In future iterations of its strategic goals, the TI Research Program should work toward focusing its efforts. …”
    Libro electrónico