Mostrando 12,981 - 13,000 Resultados de 13,270 Para Buscar '"Risk"', tiempo de consulta: 0.11s Limitar resultados
  1. 12981
    “…The authors, international IT strategists and innovators, quantify the benefits and risks of IT innovation, survey and rank the myriad innovation opportunities from mature, new, and emerging technologies,and identify the organizational structures and processes that have been proven to deliver ongoing innovation. …”
    Libro electrónico
  2. 12982
    por Hurwitz, Judith
    Publicado 2019
    “…This book focuses on the requirement to clearly manage the foundational data used for augmented intelligence. It focuses on the risks of improper data use and delves into the ethics and governance of data in the era of augmented intelligence. …”
    Libro electrónico
  3. 12983
    por Beeres, Robert
    Publicado 2021
    “…CIIMT ties in with the Netherlands Defence Academy’s vision on scientific education, embedded in the reflective practitioners' paradigm uniting both management and leadership skills needed to decide and operate in high-tension and high-risk knowledge intensive environments. The Faculty of Military Sciences uses the reflective practitioners’ paradigm to refer to critical thinking, reflection and Bildung that characterize its thinking doers, the so-called Thinking Soldiers, either at the academic Bachelor’s or Master’s level. …”
    Libro electrónico
  4. 12984
    Publicado 2018
    “…An accord has to be struck between policy makers and regulators on the one hand, anxious to direct research and business incentives in effective and efficient directions, and developers, investors and businesses on the other, anxious to reduce the risks of such potentially profitable but innovative investments.The EU H2020 MARIBE (Marine Investment for the Blue Economy) funded project was designed to identify the key technical and non-technical challenges facing maritime industries and to place them into the social and economic context of the coastal and ocean economy. …”
    Libro electrónico
  5. 12985
    Publicado 2018
    “…Subsequent chapters discuss a broad range of topics, including retained surgical items, wrong site procedures, disruptive healthcare workers, interhospital transfers, risks of emergency department overcrowding, dangers of inadequate handoff communication, and the association between provider fatigue and medical errors. …”
    Libro electrónico
  6. 12986
    Publicado 2017
    “…Along with the increased use of mobile devices and apps to access and store sensitive, personally identifiable information (PII) has come an increasing need for the community to have a better understanding of the associated security and privacy risks. Drawing upon the expertise of world-renowned researchers and experts, this volume comprehensively discusses a range of mobile security and privacy topics from research, applied, and international perspectives, while aligning technical security implementations with the most recent developments in government, legal, and international environments. …”
    Libro electrónico
  7. 12987
    Publicado 2019
    “…Understand five elements that make blockchain so disruptive: transparency, immutability, security, consensus, and smart contracts Explore key use cases: cross-border payments, food and drug safety, provenance, trade finance, clinical trials, land registries, and more See how trusted blockchain networks are facilitating entirely new business models Compare blockchain types: permissioned, permissionless, private, public, federated, and hybrid Anticipate key technical, business, regulatory, and governance challenges Build blockchain financial models, investment rubrics, and risk frameworks Organize and manage teams to transform blockchain plans into reality Whether you're a senior decision maker, technical professional, customer, or investor, Blockchain for Business will help you cut through the hype and objectively assess blockchain's potential in your business. …”
    Libro electrónico
  8. 12988
    Publicado 2019
    “…What you will learn Identify key factors related to a vSphere design Mitigate security risks and meet compliance requirements in a vSphere design Create a vSphere conceptual design by identifying technical and business requirements Design for performance, availability, recoverability, manageability, and security Map the logical resource design into the physical vSphere design Create professional vSphere design documentation Who this book is for If you are an administrator or consultant interested in designing virtualized data center environments using VMware vSphere 6.x (or previous versions of vSphere and the supporting components), this book is for you…”
    Libro electrónico
  9. 12989
    Publicado 2019
    “…Shift your processes from reactive to proactive Base decisions on reality over belief Eliminate cognitive bias and reduce common mistakes Make better decisions with a systematic, objective approach Why do we begin managing risk only once it becomes apparent? Why do we react to the market instead of making the big decisions before emotion takes over? …”
    Libro electrónico
  10. 12990
    Publicado 2015
    “…. · Building processes for scale: process lessons from hyper-growth companies, from technical issue resolution to crisis management · How to manage risk and how to create effective change management in the age of continuous deployment. · Architecting scalable solutions: powerful proprietary models for identifying scalability needs and choosing the best approaches to meet them · How to practice “Agile” Architecture · Optimizing performance through caching, application and database splitting, and asynchronous design · New and updated scalability techniques for emerging technologies, including clouds and grids · Planning for rapid data growth and new data centers · Evolving monitoring strategies to tightly align with customer requirements…”
    Libro electrónico
  11. 12991
    “…Enterprise Information Architecture for a New Age: Big Data and The Internet of Things helps you gain an understanding of the following: Implications of Big Data from a variety of new data sources (including data from sensors that are part of the Internet of Things) upon an information architecture How establishing a vision for data usage by defining a roadmap that aligns IT with line-of-business needs is a key early step The importance and details of taking a step-by-step approach when dealing with shifting business challenges and changing technology capabilities How to mitigate risk when evaluating existing infrastructure and designing and deploying new infrastructure Enterprise Information Architecture for a New Age: Big Data and The Internet of Things combines practical advice with technical considerations. …”
    Libro electrónico
  12. 12992
    Publicado 2015
    “…Product overview Distilling the author’s fifteen years’ experience as a security practitioner, and incorporating the results of some fifty interviews with leading security practitioners and a review of a wide range of supporting business literature, The Security Consultant’s Handbook provides a wealth of knowledge for the modern security practitioner, covering: Entrepreneurial practice (including business intelligence, intellectual property rights, emerging markets, business funding, and business networking) Management practice (including the security function’s move from basement to boardroom, fitting security into the wider context of organizational resilience, security management leadership, adding value, and professional proficiency) Legislation and regulation (including relevant UK and international laws such as the Human Rights Act 1998, the Data Protection Act 1998 and the Geneva Conventions) Private investigations (including surveillance techniques, tracing missing people, witness statements and evidence, and surveillance and the law) Information and cybersecurity (including why information needs protection, intelligence and espionage, cybersecurity threats, and mitigation approaches such as the ISO 27001 standard for information security management) Protective security (including risk assessment methods, person-focused threat assessments, protective security roles, piracy, and firearms) Safer business travel (including government assistance, safety tips, responding to crime, kidnapping, protective approaches to travel security and corporate liability) Personal and organizational resilience (including workplace initiative..…”
    Libro electrónico
  13. 12993
    Publicado 2014
    “…Learn how to Apply core practices for securing the platform Protect code, algorithms, and business rules from reverse engineering Eliminate hardcoding of keys, APIs, and other static data Eradicate extraneous data from production APKs Overcome the unique challenges of mobile authentication and login Transmit information securely using SSL Prevent man-in-the-middle attacks Safely store data in SQLite databases Prevent attacks against web servers and services Avoid side-channel data leakage through third-party libraries Secure APKs running on diverse devices and Android versions Achieve HIPAA or FIPS compliance Harden devices with encryption, SELinux, Knox, and MDM Preview emerging attacks and countermeasures This guide is a perfect complement to Nolan’s AndroidTM Security Essentials LiveLessons (video training; ISBN-13: 978-0-13-382904-4) and reflects new risks that have been identified since the LiveLessons were released…”
    Libro electrónico
  14. 12994
    Publicado 2022
    “…Understand the platform architecture underlying Intersight's capabilities Establish a cohesive approach to securing all your services Explore Intersight's infrastructure operations capabilities, and integrate with other ops platforms Deploy, configure, operate, and update Cisco UCS servers and network infrastructure Centralize storage management, from Cisco HyperFlex to traditional storage Control virtualized compute infrastructure, on-premises or in the cloud Simplify deployment and management of Kubernetes clusters and service meshes Use Workload Optimization to continually assure performance, minimize cost, and maximize utilization Operationalize repeatable activities across the enterprise Get started with Intersight programmability, learning from easy examples Learn how "code-ifying" infrastructure can improve compliance and reduce risk…”
    Libro electrónico
  15. 12995
    Publicado 2018
    “…They must be able to select compatible process elements for a specific set of situational factors, to assess the risks in and forecast outcomes of a process design or improvement, to specify methods of implementation, and to monitor an enacted process quantitatively and identify needs for modifications. …”
    Libro electrónico
  16. 12996
    Publicado 2022
    “…With the increasing drive towards availability of data and services anytime and anywhere, security and privacy risks have increased. Vast amounts of privacy-sensitive data are being collected today by organizations for a variety of reasons. …”
    Libro electrónico
  17. 12997
    Publicado 2011
    “…Learn how to Identify the worst threats to your network and assess your risks Get inside the minds of hackers, so you can prevent their attacks Implement a proven layered approach to network security Use basic networking knowledge to improve security Resist the full spectrum of Internet-based scams and frauds Defend against today’s most common Denial of Service (DoS) attacks Prevent attacks by viruses, spyware, and other malware Protect against low-tech social engineering attacks Choose the best encryption methods for your organization Select firewalls and other security technologies Implement security policies that will work in your environment Scan your network for vulnerabilities Evaluate potential security consultants Understand cyberterrorism and information warfare Master basic computer forensics and know what to do after you’re attacked…”
    Libro electrónico
  18. 12998
    “…The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. …”
    Libro electrónico
  19. 12999
    “…What You Will Learn: Understand the value of time and trust in a cyber-warfare world Enable agile and intelligent organizations to minimize their risk of falling victim to the next attack Accelerate response time by adopting a holistic approach Eliminate friction across the threat defense lifecycle, from protection to detection to correction Gain a sustainable competitive advantage by seizing first mover advantage Deploy solutions across an open, integrated security framework Who This Book Is For: Senior-level IT decision makers concerned with ascribing business value to a robust security strategy. …”
    Libro electrónico
  20. 13000
    Publicado 2008
    “…You’ll learn how to: · Mitigate unique risks associated with Ajax, including overly granular Web services, application control flow tampering, and manipulation of program logic · Write new Ajax code more safely—and identify and fix flaws in existing code · Prevent emerging Ajax-specific attacks, including JavaScript hijacking and persistent storage theft · Avoid attacks based on XSS and SQL Injection—including a dangerous SQL Injection variant that can extract an entire backend database with just two requests · Leverage security built into Ajax frameworks like Prototype, Dojo, and ASP.NET AJAX Extensions—and recognize what you still must implement on your own · Create more secure “mashup” applications Ajax Security will be an indispensable resource for developers coding or maintaining Ajax applications; architects and development managers planning or designing new Ajax software, and all software security professionals, from QA specialists to penetration testers…”
    Libro electrónico