Mostrando 13,021 - 13,040 Resultados de 13,270 Para Buscar '"Risk"', tiempo de consulta: 0.08s Limitar resultados
  1. 13021
    Publicado 2022
    “…What you'll learn and how you can apply it Reduce security breaches during your cloud migration with an AppSec program Apply cloud native principles to help your organization move to a zero trust model Use cloud mitigation strategies to avoid the specific risks blockchain and cryptocurrencies face from large-scale quantum computers This recording of a live event is for you because... …”
    Video
  2. 13022
    por Friedman, Benjamin M.
    Publicado 2005
    “…But he also warns that the democratic values of countries even as wealthy as our own are at risk whenever incomes stagnate for extended periods. …”
    Libro
  3. 13023
    Publicado 2020
    “…The leading Russian heart surgeons and cardiologists had asked this Houston team to come to Moscow to assess the risks and provide recommendations as to how to proceed. …”
    Libro
  4. 13024
    Publicado 2009
    Seriada digital
  5. 13025
    Publicado 2023
    “…You'll start with a quick overview of cybersecurity risks that modern organizations face, such as ransomware and APT attacks, how Microsoft is making massive investments in security today, and gain an understanding of how to deploy Microsoft Defender for Endpoint by diving deep into configurations and their architecture. …”
    Libro electrónico
  6. 13026
    Publicado 2015
    “…Understanding the conditions required to generate complete protection in a vaccinated individual will bring us closer to our ultimate goal, namely to develop a safe, scalable, and affordable malaria vaccine capable of inducing sustained high-level protective immunity in the large proportion of the world’s population constantly at risk of malaria…”
    Libro electrónico
  7. 13027
    Publicado 2015
    “…Today, for the present, that optimism has faded as economic troubles have accumulated in the Euro-zone, political tensions have been increased on issues such as immigration and armed conflict has broken out in Ukraine. There is clearly a risk that, against this troubled background, the Bologna process itself may falter. …”
    Libro electrónico
  8. 13028
    Publicado 2018
    “…Investigating the Cyber Breach The Digital Forensics Guide for the Network Engineer Understand the realities of cybercrime and today’s attacks Build a digital forensics lab to test tools and methods, and gain expertise Take the right actions as soon as you discover a breach Determine the full scope of an investigation and the role you’ll play Properly collect, document, and preserve evidence and data Collect and analyze data from PCs, Macs, IoT devices, and other endpoints Use packet logs, NetFlow, and scanning to build timelines, understand network activity, and collect evidence Analyze iOS and Android devices, and understand encryption-related obstacles to investigation Investigate and trace email, and identify fraud or abuse Use social media to investigate individuals or online identities Gather, extract, and analyze breach data with Cisco tools and techniques Walk through common breaches and responses from start to finish Choose the right tool for each task, and explore alternatives that might also be helpful The professional’s go-to digital forensics resource for countering attacks right now Today, cybersecurity and networking professionals know they can’t possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. …”
    Libro electrónico
  9. 13029
    “…What You’ll Learn: Know the methodology of targeted attacks and why they succeed Master the cybersecurity risk management process Understand why cybersecurity capabilities are the foundation of effective cyberdefenses Organize a cybersecurity program's policy, people, budget, technology, and assessment Assess and score a cybersecurity program Report cybersecurity program status against compliance and regulatory frameworks Use the operational processes and supporting information systems of a successful cybersecurity program Create a data-driven and objectively managed cybersecurity program Discover how cybersecurity is evolving and will continue to evolve over the next decade…”
    Libro electrónico
  10. 13030
    Publicado 2016
    “…To do this, the authors present an effective, proven, four-phase Organizational Portfolio Management (OPM) system: Phase I: Developing the Organizational Portfolio involves selecting the right mix of projects/programs based upon resource limitations and risks involved. Phase II: Creating the OPM System Implementation Plan is the development of a plan to minimize the resources consumed, reduce cycle time, and increase the ability of the projects to meet their projected value-added content to the organization. …”
    Libro electrónico
  11. 13031
    Publicado 2015
    “…In this session, you’ll learn theoretical tradeoffs between statistical risk, amount of data, and “externalities” such as computation, communication, and privacy. …”
    Video
  12. 13032
    Publicado 2015
    “…Provides clear descriptions of who should do what in a project to prevent communication and control problems Presents the latest concepts in project management techniques Discusses how to keep risks under control during the project Includes access to online project management templates and checklists to aid in learning If you're a manager taking on a project for the first time or a more experienced project professional looking to get up to speed on the latest thinking and techniques, Project Management For Dummies equips you for project management success…”
    Libro electrónico
  13. 13033
    por Molnar, Margit
    Publicado 2011
    “…This way, the categorising of banks that boost their loan portfolio by excessive risk-taking - i.e. produce large amounts of bad loans - as efficient can be partly avoided. …”
    Capítulo de libro electrónico
  14. 13034
    Publicado 2018
    “…  Digital forensics is a key competency in meeting the growing risks of cybercrime, as well as for criminal investigation generally. …”
    Libro electrónico
  15. 13035
    Publicado 2014
    “…Some poorly planned projects not only jeopardize environmental quality but pose severe risks to society as well. Perhaps no example better illustrates this problem than the case study described in Chapter 1 in which the Nuclear Regulatory Commission has prepared deficient EISs to justify its mission of relicensing the nation's fleet of antiquated nuclear reactors. …”
    Libro electrónico
  16. 13036
    Publicado 2019
    “…Andrew and Adam always focus on what matters in production: solving the problems that offer the highest return on investment, using the simplest, lowest-risk approaches that work. Leverage agile principles to maximize development efficiency in production projects Learn from practical Python code examples and visualizations that bring essential algorithmic concepts to life Start with simple heuristics and improve them as your data pipeline matures Avoid bad conclusions by implementing foundational error analysis techniques Communicate your results with basic data visualization techniques Master basic machine learning techniques, starting with linear regression and random forests Perform classification and clustering on both vector and graph data Learn the basics of graphical models and Bayesian inference Understand cor..…”
    Libro electrónico
  17. 13037
    Publicado 2018
    “…Remediating team issues reduces legal and safety risks, but it goes deeper than that. Solving problems before they become public or impact other areas of the business improves the team’s respect for managers and leadership, reducing unnecessary turnover and resignations of good staff. …”
    Libro electrónico
  18. 13038
    Publicado 2017
    “…Adopt new data-backed tactics that help ensure success. Avoid litigation risk and the high cost of failures. Examine practical models and illustrative high-profile case studies. …”
    Libro electrónico
  19. 13039
    Publicado 2008
    “…The authors illustrate how not taking advantage of what both initiatives have to offer puts an organization at risk of sinking time, energy, and money into "inventing" a solution that already exists. …”
    Libro electrónico
  20. 13040
    Publicado 2010
    “…Miles , author, The Warren Buffett CEO "If you want to mitigate your risks while leveraging your long-term sources for growth, read every page of this book and invest accordingly. …”
    Libro electrónico