Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
13041Publicado 2009“…Coverage includes • Viewing virtualization from the attacker’s perspective, and understanding the new security problems it can introduce • Discovering which security threats the vmkernel does (and doesn’t) address • Learning how VMsafe enables third-party security tools to access the vmkernel API • Understanding the security implications of VMI, paravirtualization, and VMware Tools • Securing virtualized storage: authentication, disk encryption, virtual storage networks, isolation, and more • Protecting clustered virtual environments that use VMware High Availability, Dynamic Resource Scheduling, Fault Tolerance, vMotion, and Storage vMotion • Securing the deployment and management of virtual machines across the network • Mitigating risks associated with backup, performance management, and other day-to-day operations • Using multiple security zones and other advanced virtual network techniques • Securing Virtual Desktop Infrastructure (VDI) • Auditing virtual infrastructure, and conducting forensic investigations after a possible breach informit.com/ph www.Astroarch.com…”
Libro electrónico -
13042Publicado 2014“…This guide will help you • Mitigate the business and engineering risk associated with poor system performance • Specify system performance requirements in business and engineering terms • Identify metrics for comparing performance requirements with actual performance • Verify the accuracy of measurements • Use simple mathematical models to make predictions, plan performance tests, and anticipate the impact of changes to the system or the load placed upon it • Avoid common performance and scalability mistakes • Clarify business and engineering needs to be satisfied by given levels of throughput and response time • Incorporate performance engineering into agile processes • Help stakeholders of a system make better performance-related decisions • Manage stakeholders’ expectations about system performance throughout the software life cycle, and deliver a software product with..…”
Libro electrónico -
13043por Castaneda, H. David“…To determine when and how to effectively deploy WLANs, business managers, project managers, and IT executives need a clear, holistic evaluation of the business benefits and risks behind this complex technology solution. The Business Case for Enterprise-Class Wireless LANs helps you make the right decisions by explaining the business value and cost of investing in a WLAN—from security and architecture to deployment and application. …”
Publicado 2005
Libro electrónico -
13044Publicado 2007“…The topics discussed here include: determining when outsourcing is and is not appropriate; developing acquisition strategies and aligning organizational structure with them; capturing accurate requirements; specifying realistic design constraints; writing effective RFPs; selecting, managing, and collaborating with suppliers; negotiating contracts; managing risk; and "measuring for success." CMMI for Outsourcing ® will be valuable to any organization that wants to achieve better results from technology acquisition. …”
Libro electrónico -
13045por Humphrey, Watts S., 1927-“…Failure to recognize the importance of software, and to take charge of its development process, runs the risk of damaging the entire business. By contrast, Humphrey relates the substantial benefits real organizations have obtained from such awareness and control, and he concludes with an analysis of the impressive financial returns the recommended transformations typically yield. …”
Publicado 2002
Libro electrónico -
13046“…Coverage includes Assessing the business value of a cloud adoption strategy based on 10 specific expectations Gaining more value by incorporating cloud into enterprise architecture Implementing cloud when you don’t already have an enterprise architecture Fully understanding the financial implications of cloud-based strategies and technologies Incorporating cloud in environments that have already adopted Service Oriented Architecture (SOA) Selecting components of your cloud portfolio, including elements of larger outsourced or managed solutions Governing cloud as part of your overall organizational landscape Systematically recognizing and mitigating cloud adoption risks, including security, cost, and performance Planning the transition: retiring legacy applications, transforming business processes, and selecting partners Anticipating and guidi..…”
Libro electrónico -
13047Publicado 2014“…. • Understand how your choices of technologies and design paradigms will impact your business • Customize designs to improve workflows, support BYOD, and ensure business continuity • Use modularity, simplicity, and network management to prepare for rapid change • Build resilience by addressing human factors and redundancy • Design for security, hardening networks without making them brittle • Minimize network management pain, and maximize gain • Compare topologies and their tradeoffs • Consider the implications of network virtualization, and walk through an MPLS-based L3VPN example • Choose routing protocols in the context of business and IT requirements • Maximize mobility via ILNP, LISP, Mobile IP, host routing, MANET, and/or DDNS • Learn about the challenges of removing and changing services hosted in cloud environments • Understand the opportunities and risks presented by SDNs • Effectively design data center control planes and topologies…”
Libro electrónico -
13048Publicado 2014“…Winners convince buyers that they can achieve maximum return, that the risks are acceptable, and that the seller is the best choice among all options. …”
Libro electrónico -
13049Publicado 2012“…For each area, the authors present noncompliant examples and corresponding compliant solutions, show how to assess risk, and offer references for further information. …”
Libro electrónico -
13050Publicado 2012“…If your job is to create and commercialize products, it provides the information you need to: Balance breakthroughs and line extensions Create business cases—including competitive assessment, market requirements, and risk reduction Conduct gate reviews and beta testing and manage scope creep Get everything in order for a smooth product launch For those who manage existing lines, this guide provides: Specific tips for each of the 4Rs of product life-cycle management Brand guidelines Approaches to customer message management Advice on working with sales and the channel Clear, easy-to-read charts show you how to manage each crucial step from conception to completion, and practical checklists help you evaluate progress at every stage. …”
Libro electrónico -
13051Publicado 2019“…An essential resource for anyone interested in financial markets, the second edition of Boombustology: Adopts multiple lenses to understand the dynamics of booms, busts, bubbles, manias, crashes Utilizes the common characteristics of past bubbles to assist in identifying future financial extremes Presents a set of practical indicators that point to a financial bubble, enabling readers to gauge the likelihood of an unsustainable boom Offers two new chapters that analyze the long-term prospects for Indian markets and the distortions being caused by the passive investing boom Includes a new foreword by James Grant, legendary editor of Grant's Interest Rate Observer A comprehensive exploration of how bubbles form and why they burst, Boombustology, 2nd Edition is packed with a wealth of new and updated information for individual and institutional investors, academics, students, policymakers, risk-managers, and corporate managers alike…”
Libro electrónico -
13052Publicado 2018“…Review security standards, create security policies, and organize security with Cisco SAFE architecture Understand and mitigate threats to network infrastructure, and protect the three planes of a network device Safeguard wireless networks, and mitigate risk on Cisco WLC and access points Secure the network perimeter with Cisco Adaptive Security Appliance (ASA) Configure Cisco Next-Generation Firewall Firepower Threat Defense (FTD) and operate security via Firepower Management Center (FMC) Detect and prevent intrusions with Cisco Next-Gen IPS, FTD, and FMC Configure and verify Cisco IOS firewall features such as ZBFW and address translation Deploy and configure the Cisco web and email security appliances to protect content and defend against advanced threats Implement Cisco Umbrella Secure Internet Gateway in the cloud as your first line of defense against internet threats Protect against new malware with Cisco Advanced Malware Protection and Cisco ThreatGrid…”
Libro electrónico -
13053Publicado 2017“…Master Excel’s most useful descriptive and inferential statistical tools Understand how values cluster together or disperse, and how variables move or classify jointly Tell the truth with statistics—and recognize when others don’t Infer a population’s characteristics from a sample’s frequency distribution Explore correlation and regression to learn how variables move in tandem Use Excel consistency functions such as STDEV.S( ) and STDEV.P( ) Test differences between two means using z tests, t tests, and Excel’s Data Analysis Add-in Identify skewed distributions using Excel’s new built-in box-and-whisker plots and histograms Evaluate statistical power and control risk Explore how randomized block and split plot designs alter the derivation of F-ratios Use coded multiple regression analysis to perform ANOVA with unbalanced factorial designs Analyze covariance with ANCOVA, and properly use multiple covariance Take advantage of Recommended PivotTables, Quick Analysis, and other Excel 2016 shortcuts…”
Libro electrónico -
13054Publicado 2020“…Success in today’s hyper-competitive, fast-paced business landscape, characterized by the risk of black swan events, such as the 2020 COVID-19 global pandemic, requires the reimagination and the digitalization of complex demand-supply systems, more collaborative and connected processes, and smarter, more dynamic data-driven decision making―which can only be achieved through a fully integrated Digital Supply Network…”
Libro electrónico -
13055Publicado 2008“…Key topics covered include: variable selection, identification of the scale of continuous covariates, the role of interactions in the model, assessment of fit and model assumptions, regression diagnostics, recurrent event models, frailty models, additive models, competing risk models, and missing data. Features of the Second Edition include: Expanded coverage of interactions and the covariate-adjusted survival functions The use of the Worchester Heart Attack Study as the main modeling data set for illustrating discussed concepts and techniques New discussion of variable selection with multivariable fractional polynomials Further exploration of time-varying covariates, complex with examples Additional treatment of the exponential, Weibull, and log-logistic parametric regression models Increased emphasis on interpreting and using results as well as utilizing multiple imputation methods to analyze data with missing values New examples and exercises at the end of each chapter Analyses throughout the text are performed using Stata® Version 9, and an accompanying FTP site contains the data sets used in the book. …”
Libro electrónico -
13056Publicado 2014“…Part 4 addresses the question of the management of risk and Part 5 discusses the question of market power. …”
Libro electrónico -
13057Publicado 2012“…You also gain new insight into broader themes, including risk analysis, usability, trust, privacy, ethics, and forensics. …”
Libro electrónico -
13058por Symposium on Building the Ohio Innovation Economy“…They believe that the rising costs and risks associated with new potentially high-payoff technologies, and the growing global dispersal of technical expertise, underscore the need for national R&D programs to support new and existing high-technology firms within their borders. …”
Publicado 2013
Libro electrónico -
13059Publicado 2016“…Part V looks at Non-Classical MCDA Approaches, with chapters on risk and uncertainty in MCDA, the decision rule approach to MCDA, the fuzzy integral approach, the verbal decision methods, and a tentative assessment of the role of fuzzy sets in decision analysis. …”
Libro electrónico -
13060Publicado 2006“…The capability to mitigate security and reliability risks and transactional support is critical to interoperability. …”
Libro electrónico