Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 590
- Security measures 537
- Computer security 507
- Risk management 402
- Computer networks 400
- Finance 372
- Prevention 270
- Economics 253
- Business & Economics 243
- Information technology 236
- Project management 228
- Development 219
- Artificial intelligence 214
- Investments 208
- Risk assessment 204
- Examinations 184
- Medicine 178
- Data processing 176
- Technological innovations 162
- Engineering & Applied Sciences 159
- Social aspects 155
- Economic aspects 150
- Law and legislation 148
- Data protection 146
- Economic conditions 139
- Cloud computing 130
- Certification 127
- Computer software 127
- Gestió del risc 124
- Government policy 123
-
13121Publicado 2024“…This study guide helps you master all the topics on the Project+ PK0-005 exam, deepening your knowledge of: Project management concepts: Project characteristics, methodologies, and frameworks; team and resource management; change control; risk and issue management; schedule development and management; quality, cost, and performance management; communication and meeting management; project procurement and vendor selection Project life cycle phases: Project life cycles; discovery/concept preparation phase; initiating, planning, executing, and closing phase activities Project tools and documentation: Project management tools; quality and performance charts IT and governance: Environmental, social, and governance (ESG) factors and compliance; data security and privacy considerations; foundational IT concepts and operational change control for IT project management…”
Libro electrónico -
13122Publicado 2023“…What you will learn Grasp the psychological concepts and principles used in social engineering attacks Distinguish the different types of social engineering attacks Examine the impact of social engineering on social networks Find out how attackers leverage OSINT tools to perform more successful attacks Walk through the social engineering lifecycle Get a glimpse of the capabilities of Social Engineering Toolkit (SET) Who this book is for This book is for cybersecurity enthusiasts, ethical hackers, penetration testers, IT administrators, cybersecurity analysts, or anyone concerned with cybersecurity, privacy, and risk management. It will serve as a valuable resource for managers, decision makers, and government officials to understand the impact and importance of social engineering and how to protect against this threat…”
Libro electrónico -
13123Publicado 2008“…The latest systematic review on elderly patients with hip fracture shows that patients who received multi-disciplinary rehabilitation were at lower risk of dying or being admitted to a nursing home, compared to those who received usual orthopaedic care. …”
Libro electrónico -
13124por Klingebiel, Stephan“…Geography of Environmental Risks and Human Security at the United Nations University (UNU-EHS). …”
Publicado 2024
Libro electrónico -
13125Publicado 2019“…As too many of us eventually learn, being afraid to take risks, to use our voice to take a stand or ask for what we want, even to make mistakes, leads to a lot of disappointment and regret. …”
Libro -
13126Publicado 2020“…At a critical time in this fast-moving debate, thirty leading academics and researchers at the forefront of AI technology development come together to explore these existential questions, including Aaron James (UC Irvine), Allan Dafoe (Oxford), Andrea Loreggia (Padova), Andrew Critch (UC Berkeley), Azim Shariff (Univ. of British Columbia), Carrick Flynn (Oxford), Cathy O'Neil (O'Neil Risk Consulting & Algorithmic Auditing), Eliezer Yudkowsky (Machine Intelligence Research Institute), Eric Schwitzgebel (UC Riverside), Frances Kamm (Rutgers), Francesca Rossi (IBM), Hanna Gunn (UC Merced), Iyad Rahwan (MIT), Jessica Taylor (Median Group), JF Bonnefon (Centre National de la Recherche Scientifique), K. …”
Libro -
13127por Ferrigno, Robert, 1947-“…When Sarah suddenly goes missing, the security chief of the Islamic republic calls upon Rakkim Epps, her secret lover and a former elite warrior, to find her -- no matter what the risk. But as Rakkim searches for Sarah, he is tracked by Darwin, a brilliant psychopathic killer trained in the same secretive unit as Rakkim. …”
Publicado 2006
Acceso a las primeras páginas
Libro -
13128Publicado 2022“…Two large observational studies in a screen-relevant population demonstrated an association of the initiation of LAMA or LABA with the risk of a serious cardiovascular event in treatment-naïve patients and an association of ICS use with the risk of developing diabetes. …”
Libro electrónico -
13129Publicado 2024“…Managing Resources focuses on the foundational skills for managing the project's budget and costs, its associated risks, both positive and negative, and the quality of the project outputs. …”
Video -
13130por Hernández Castellano, Pedro“…Hence, companies can reduce or eliminate their capital investment in fixed assets and, in this way, the products can be brought to market faster, with a much lower cost and less risk. This is an innovative technique publication which intends to not only collects the description of the various RM technologies on market, but also as a practical guide that affords companies to select the technologies that offer the most suitable process based on customer needs…”
Publicado 2013
Texto completo en Odilo
Otros -
13131Publicado 2022“…The reality that most waste pickers in Colombia face is one in which they live day by day conditions in which their job puts them at risk and where they also do not have conceptual tools that allow them to manage and manage in the best possible way. shape your business. …”
Biblioteca de la Universidad Pontificia de Salamanca (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca Universitat Ramon Llull)Acceso restringido con credenciales UPSA
Libro electrónico -
13132Publicado 2016“…Who are the top or bottom performers, and why? Who is at risk to quit, and why? Analytics can provide these answers, and give you insights based on quantifiable data instead of gut feeling and subjective assessment. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
13133Publicado 2009“…Vector control has the objective of bringing down to a minimum the risks of endemization or epidemization, reducing pathogen transmission by vectors and managing epidemics in a clearly formulated strategic framework. …”
Libro electrónico -
13134Publicado 2018“…A loss of flexibility may be uncovered also by imposing changing rules on the subject, such as requiring an attentional shift between different perceptual features of a complex stimulus, as in the attentional set shifting task which was recently adapted to rodents. Working memory is at risk during transition phases, although it remains to be determined whether withdrawal-induced alterations are observed also during protracted abstinence. …”
Libro electrónico -
13135Publicado 2018“…About This Book Identify and mitigate security risks in your Windows Server 2016 infrastructure Learn how to build a PKI and use it to issue certificates within your network In-depth information for setting up Microsoft DirectAccess Who This Book Is For If you are a Windows Server administrator interested in learning the key security and networking functions available in Windows Server 2016, keep this book close at hand. …”
Libro electrónico -
13136Publicado 2018“…What you will learn Implement machine learning techniques to solve investment and trading problems Leverage market, fundamental, and alternative data to research alpha factors Design and fine-tune supervised, unsupervised, and reinforcement learning models Optimize portfolio risk and performance using pandas, NumPy, and scikit-learn Integrate machine learning models into a live trading strategy on Quantopian Evaluate strategies using reliable backtesting methodologies for time series Design and evaluate deep neural networks using Keras, PyTorch, and TensorFlow Work with reinforcement learning for trading strategies in the OpenAI Gym Who this book is for Hands-On M..…”
Libro electrónico -
13137Publicado 2021“…Moreover, you'll develop a clear understanding of how to identify different attack vectors and mitigate risks.By the end of this book, you'll be well-versed with implementing multi-layered security to protect identities, networks, hosts, containers, databases, and storage in Azure.What You Will Learn:Manage users, groups, service principals, and roles effectively in Azure ADExplore Azure AD identity security and governance capabilitiesUnderstand how platform perimeter protection secures Azure workloadsImplement network security best practices for IaaS and PaaSDiscover various options to protect against DDoS attacksSecure hosts and containers against evolving security threatsConfigure platform governance with cloud-native toolsMonitor security operations with Azure Security Center and Azure SentinelWho this book is for:If you are a newly qualified or experienced security professional, cloud administrator, architect, or developer who wants to understand how to secure your Azure environment and workloads, this book is for you. …”
Libro electrónico -
13138Publicado 2022“…What you will learn Find out how to conceptualize the system administrator role Understand the key values of risk assessment in administration Apply technical skills to the IT business context Discover best practices for working with Linux specific system technologies Understand the reasoning behind system administration best practices Develop out-of-the-box thinking for everything from reboots to backups to triage Prioritize, triage, and plan for disasters and recoveries Discover the psychology behind administration duties Who this book is for This book is for anyone looking to fully understand the role and practices of being a professional system administrator, as well as for system engineers, system administrators, and anyone in IT or management who wants to understand the administration career path. …”
Libro electrónico -
13139Publicado 2017“…. • Ecology, populations and risks to birds, sea turtles and marine mammals in the Gulf of Mexico. • A final chapter extensively illustrated with original images on diseases and mortalities of fish and other animals that inhabit the Gulf of Mexico. …”
Libro electrónico -
13140Publicado 2017“…. • Ecology, populations and risks to birds, sea turtles and marine mammals in the Gulf of Mexico. • A final chapter extensively illustrated with original images on diseases and mortalities of fish and other animals that inhabit the Gulf of Mexico. …”
Libro electrónico