Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Management 74
- Information technology 39
- Computer networks 26
- Security measures 26
- Computer security 24
- Contracting out 21
- Strategic planning 21
- Engineering & Applied Sciences 20
- Business & Economics 19
- Data processing 19
- Subcontratación 19
- Business logistics 18
- Computer Science 18
- Computer software 17
- Development 17
- Business 16
- Business enterprises 15
- Project management 14
- New business enterprises 13
- Management information systems 12
- Marketing 12
- Entrepreneurship 11
- Software engineering 11
- Cloud computing 10
- Economics 10
- Electronic commerce 10
- Examinations 10
- Personnel management 10
- Certification 9
- Commerce 9
-
261por Molnar, Margit“…As liberalisation leads to a greater role for the market in allocating resources, service industries are expected to become more competitive and therefore it may become cheaper to outsource services than to produce them in-house. Liberalisation will likely also lead to greater specialisation to remain competitive, thereby making specialised services available for outsourcing. …”
Publicado 2015
Capítulo de libro electrónico -
262Publicado 2016“…Historically, IT organizations have outsourced their service provision to a single managed service provider. …”
Libro electrónico -
263Publicado 2015“…13+ Hours of Video Instruction Requirements: The Masterclass LiveLessons—Agile, Traditional, Outsourcing is a video course covering requirements, whether they are the requirements for software, a service, or a product. …”
-
264Publicado 2018“…SCC'18 gives researchers and practitioners a unique opportunity to share their perspectives with others interested in the topics of cloud security and privacy such as secure cloud architecture, cloud cryptography, cloud access control and key management, identification and privacy in cloud, integrity assurance for data outsourcing, integrity and verifiable computation, computation over encrypted data, and many others. …”
Libro electrónico -
265Publicado 2005“…Your learning will be focused on the skills and qualities of effective project managers, leadership styles and project trends, including information technology, outsourcing and virtual teams. Let Absolute Beginner's Guide to Project Management help you take your project from start to finish…”
Libro electrónico -
266Publicado 2014“…CSCMP and Thomas Goldsby introduce crucial concepts including transportation modes, execution, and control; outsourcing, modal and carrier selection, and 3PLs; TMS technologies; ocean shipping, international air, customs, and regulation; and much more. …”
Libro electrónico -
267Publicado 2022“…The complete Certified Cloud Security Professional video course with CCSK extras by Dean Bushmiller Domain 1 Cloud Concepts, Architecture and Design 1.1 Understand cloud computing concepts Cloud computing definitions Cloud computing roles and responsibilities Key cloud computing characteristics Building block technologies 1.2 Describe cloud reference architecture Cloud computing activities Cloud service capabilities Cloud service categories IaaS, PaaS, SaaS Cloud deployment models Cloud shared considerations , auditability, regulatory, outsourcing 1.3 Understand security concepts relevant to cloud computing Cryptography and key management Identity and access control Data and media sanitization Network security Virtualization security Common threats Security hygiene 1.4 Understand design principles of secure cloud computing Cloud secure data lifecycle Cloud-based business continuity and disaster recovery plan Business impact analysis Functional security requirements Security considerations and responsibilities for different cloud categories Cloud design patterns Enterprise Architecture DevOps security 1.5 Evaluate cloud service providers Verification against criteria System/subsystem product certifications Domain 2 Cloud Data Security 2.1 Describe cloud data concepts Cloud data life cycle phases Data dispersion Data flows 2.2 Design and implement cloud data storage architectures Storage types Threats to storage types 2.3 Design and apply data security technologies and strategies Encryption and key management Hashing Data obfuscation Tokenization Data loss prevention Keys, secrets and certificates management 2.4 Implement data discovery Structured data Unstructured data Semi-structured data Data location 2.5 Plan and implement data classification Data classification policies Data mapping Data labeling 2.6 Design and implement Information Rights Management Legal hold 2.7 Design and implement auditability, traceability and accountability of data events Definition of event sources and requirement of event attributes address, geolocation Logging, storage and analysis of data events Chain of custody and non repudiation Domain 3 Cloud Platform and Infrastructure Security 3.1 Comprehend cloud infrastructure and platform components Physical environment Network and communications Compute Virtualization Storage Management plane 3.2 Design a secure data center Logical design Physical design Environmental design Design resilient 3.3 Analyze risks associated with cloud infrastructure and platforms Risk assessment Cloud vulnerabilities, threats and attacks Risk mitigation strategies 3.4 Plan and implementation of security controls Physical and environmental protection System, storage and communication protection Identification, authentication and authorization in cloud environments Audit mechanisms correlation, packet capture 3.5 Plan business continuity and disaster recovery Business continuity and disaster recovery strategies Business requirements , Recovery Point Objective Creation, implementation and testing of plan Domain 4 Cloud Application Security 4.1 Advocate training and awareness for application security Cloud development basics Common pitfalls Common cloud vulnerabilities OWASP Top 10 4.2 Describe the Secure Software Development Life Cycle process Business requirements Phases and methodologies 4.3 Apply the Secure Software Development Life Cycle Cloud specific risks Threat modeling STRIDE and DREAD Avoid common vulnerabilities during development Secure coding Application Security Verification Standard Software configuration management and versioning 4.4 Apply cloud software assurance and validation Functional and non functional testing Security testing methodologies SAST DAST Quality assurance Abuse case testing 4.5 Use verified secure software Securing application programming interfaces Supply chain management Third party software management Validated open source software 4.6 Comprehend the specifics of cloud application architecture Supplemental security components , Database Activity Monitoring, Extensible Markup Language firewalls, application programming interface gateway Cryptography Sandboxing Application virtualization and orchestration 4.7 Design appropriate identity and access management solutions Federated identity Identity providers Single sign on Multi factor authentication Cloud access security broker Secrets management Domain 5 Cloud Security Operations 5.1 Build and implement physical and logical infrastructure for cloud environment Hardware specific security configuration requirements and Trusted Platform Module Installation and configuration of management tools Virtual hardware specific security configuration requirements , Hypervisor types Installation of guest operating system virtualization toolsets 5.2 Operate and maintain physical and logical infrastructure for cloud environment Access controls for local and remote access , secure terminal access, Secure Shell, console based access mechanisms, jumpboxes, virtual client Secure network configuration , Transport Layer Security, Dynamic Host Configuration Protocol, Domain Name System Security Extensions, virtual private network Network security controls , intrusion prevention systems, honeypots, vulnerability assessments, network security groups, bastion host Operating system hardening through the application of baselines, monitoring and remediation Patch management Infrastructure as Code strategy Availability of clustered hosts Availability of guest operating system Performance and capacity monitoring Hardware monitoring Configuration of host and guest operating system backup and restore functions Management plane 5.3 Implement operational controls and standards Change management Continuity management Information security management Continual service improvement management Incident management Problem management Release management Deployment management Configuration management Service level management Availability management Capacity management 5.4 Support digital forensics Forensic data collection methodologies Evidence management Collect, acquire, and preserve digital evidence 5.5 Manage communication with relevant parties Vendors Customers Partners Regulators Other stakeholders 5.6 Manage security operations Security operations center Intelligent monitoring of security controls , intrusion prevention systems, honeypots, network security groups, artificial intelligence Log capture and analysis , log management Incident management Vulnerability assessments Domain 6 Legal, Risk and Compliance 6.1 Articulate legal requirements and unique risks within the cloud environment Conflicting international legislation Evaluation of legal risks specific to cloud computing Legal framework and guidelines eDiscovery Forensics requirements 6.2 Understand privacy issues Difference between contractual and regulated private data , personally identifiable information Country specific legislation related to private data , personally identifiable information Jurisdictional differences in data privacy Standard privacy requirements Privacy Impact Assessments 6.3 Understand audit process, methodologies, and required adaptations for a cloud environment Internal and external audit controls Impact of audit requirements Identify assurance challenges of virtualization and cloud Types of audit reports Restrictions of audit scope statements Gap analysis Audit planning Internal information security management system Internal information security controls system Policies Identification and involvement of relevant stakeholders Specialized compliance requirements for highly regulated industries Impact of distributed information technology model 6.4 Understand implications of cloud to enterprise risk management Assess providers risk management programs Difference between data owner/controller vs. data custodian/processor Regulatory transparency requirements , General Data Protection Regulation Risk treatment Different risk frameworks Metrics for risk management Assessment of risk environment 6.5 Understand outsourcing and cloud contract design Business requirements , master service agreement, statement of work Vendor management Contract management Supply chain management…”
Video -
268por Rai, Vinay“…The buzzword of the twenty-first century is India-and it's not just a story of software, outsourcing, and faraway call centers. With the economy soaring at 8 percent a year, India is a medical and pharmaceutical front-runner, an R & D powerhouse, a rising manufacturing hub, and an up-and-coming cultural trendsetter in areas from fashion to film. …”
Publicado 2007
Grabación no musical -
269Publicado 2017“…SCC'17 gives researchers and practitioners a unique opportunity to share their perspectives with others interested in the topics of cloud security and privacy such as secure cloud architecture, cloud storage security, cloud cryptography, cloud access control and key management, identification and privacy in cloud, secure computation outsourcing, trusted computing, and many others. The call for papers attracted 27 submissions from total 22 countries and regions. …”
Libro electrónico -
270por Florida, Richard L.“…Burgeoning global technology hotspots, from Sydney, Shanghai, and Amsterdam to Dublin, Bangalore, and Toronto; the outsourcing of ingenuity; rising intolerance; a faltering education system; cities torn by inequality; disconnected political leadership--all point to the looming creativity crisis that is causing the decline of American economic might. …”
Publicado 2007
Biblioteca Universidad de Deusto (Otras Fuentes: Biblioteca de la Universidad de Navarra)Libro -
271por Bruin, Boudewijn de, 1974-“…Drawing on insights from economics, psychology and philosophy, de Bruin develops a novel theory of epistemic virtue and applies it to racist and sexist lending practices, subprime mortgages, CEO hubris, the Madoff scandal, professionalism in accountancy and regulatory outsourcing of epistemic responsibility. With its multidisciplinary reach, Ethics and the Global Financial Crisis will appeal to scholars working in philosophy, business ethics, economics, psychology and the sociology of finance. …”
Publicado 2015
Libro -
272por Rushkoff, Douglas“…In many ways, this was the goal of digital technology--outsourcing our memory was supposed to free us up to focus on the present. …”
Publicado 2013
Libro -
273Publicado 2010Tabla de Contenidos: “…3.2.4 Production Possibilities Schedule -- 3.2.5 Static and Dynamic Gains from Tradere-Examined -- 3.3 Factor Proportions Theory -- 3.3.1 Heckscher-Ohlin Theorem -- 3.3.2 Factor Price Equalisation -- 3.3.3 Leontief Paradox -- 3.3.4 Distribution of Income -- 3.4 Neo-Factor Proportions Theories -- 3.5 Country Similarity Theory -- 3.6 Intra-Industry Trade -- 3.6.1 Nature of Intra-Industry Trade -- 3.6.2 Measures of Intra-Industry Trade -- 3.6.3 Gains from Intra-Industry Trade -- 3.7 Trade in Intermediate Products and Services: Outsourcing -- 3.7.1 Outsourcing and Off-Shoring -- 3.7.2 Bases of Outsourcing -- 3.7.3 Gains from Outsourcing -- 3.7.4 Outsourcing of Services -- 3.8 the National Competitive Advantage -- 3.9 Terms of Trade -- Summary -- Review Questions -- Objective Type Questions -- Case Study -- Study Topic -- References -- Chapter 4: Theoretical Framework of Foreign Direct Investment -- 4.1 Theories of FDI -- 4.1.1 Macdougall-Kemp Hypothesis -- 4.1.2 Industrial Organisation Theory -- 4.1.3 Location-Specific Theory -- 4.1.4 Product Cycle Theory -- 4.1.5 Internalisation Approach -- 4.1.6 Eclectic Paradigm -- 4.1.7 Currency Based Approaches -- 4.1.8 Politico-Economic Theories -- 4.1.9 Modified Theories for Third World Firms -- 4.2 Benefits and Costs of FDI -- 4.2.1 Benefits to the Host Country -- 4.2.2 Benefits for Home Country -- 4.2.3 Cost to the Host Country -- 4.2.4 Cost to Home Country -- 4.3 M&as and the Value of the Firm -- 4.4 Control of MNCs -- 4.4.1 Conflicts with Home Country and Measures of Control -- 4.4.2 Conflict with the Host Government and the Measures of Control -- 4.4.3 Code for Control At the International Level -- Summary -- Review Questions -- Objective Type Questions -- Case Study 1 -- Case Study 2 -- References -- Select Further Readings -- Chapter 5: Balance of Payments -- 5.1 Structure of Balance of Payments…”
Libro electrónico -
274Publicado 2021Tabla de Contenidos: “…History of Facilities Management -- Key Drivers of Facilities Management -- Activities in Facilities Management -- Delivering Facilities Management -- Strategy -- Outsourcing -- Financial Management -- Property and Estates Management -- Property Legislation and Leases -- Developing New Buildings -- Project Management -- Space Management -- Workplace and Accommodation Management -- Procurement -- Contracts and Contract Management -- Legislation -- Legislation Affecting Facilities Management Activities -- Fire Safety and Legislation -- Electrical Supplies and Electrical Safety -- Accessibility and Inclusive Built Environments -- First Aid at Work -- Asbestos -- Water Supplies and Water Safety -- Construction (Design and Management) Regulations -- Business Continuity -- Maintenance -- Definitions and Strategies -- Mechanical and Electrical Systems and Their Maintenance -- Information and Communications Technology -- Grounds and External Areas -- Fabric Maintenance -- Energy Management -- Front of House -- Housekeeping and Cleaning Services -- Security Management -- Customer and Stakeholder Relations -- Waste Management -- Catering and Hospitality Services -- Quality Management -- Document Management Services -- Sustainability and Environmental Issues -- Management of the Facilities Management Function…”
Libro electrónico -
275por Schniederjans, Marc J.Tabla de Contenidos: “…Developing supply chain strategies -- Designing supply chains -- Staffing supply chains -- Managing supply chains -- Social, ethical and legal considerations -- Sustainable supply chains -- Aligning supply chains to meet life cycle customer demands -- Negotiating -- Building an agile and flexible supply chain -- Developing partnerships in supply chains -- Risk management -- Lean and other cost reduction strategies in supply chain management -- Strategic planning in outsourcing -- Interview with Mr. Mike Orr of Genuine Parts Company -- Interview with Mr. …”
Publicado 2013
Libro electrónico -
276por National Research Council (U.S.)Tabla de Contenidos: “…""Standards of Veterinary Care for Laboratory Animals""""STATE OF LABORATORY ANIMAL MEDICINE AROUND THE WORLD""; ""A PATH FORWARD""; ""INTERNATIONAL APPROACHES AND PRINCIPLES FOR DISTRESS, PAIN, AND EUTHANASIA""; ""INTERNATIONAL APPROACHES AND PRINCIPLES FOR HUMANE ENDPOINTS""; ""Coordination of International Rodent Resources""; ""International Coordination of Nonhuman Primates""; ""Framing the Issues""; ""SUPPLY AND USE OF NHP AROUND THE WORLD""; ""CHALLENGES IN OUTSOURCING STUDIES""; ""Abbreviations""; ""Appendix A: Workshop Agenda""; ""Appendix B: Steering Committee Bios""…”
Publicado 2011
Libro electrónico -
277Publicado 2024Tabla de Contenidos: “…Frontmatter -- Contents -- Illustrations -- Preface -- Introduction — Value at the End of the Cycle: On Frontlines and Regimes -- Chapter 1 — Special Economic Zones: The Global Frontlines of Neoliberalism’s Value Regime -- Chapter 2 — On Difference and Devaluation in Contemporary Capitalism: Notes on Exploitation in a Myanmar Squatter Settlement -- Chapter 3 — Carbon as Value: Four Short Stories of Ecological Civilization in China -- Chapter 4 — Enclosing Gurugram: Vernacular Valorization on India’s Urban Frontline -- Chapter 5 — Construction, Labor, and Luxury in Kathmandu’s Post-conflict Tourism Economy -- Chapter 6 — Dispossession as a Manifold: Frontlines of Authoritarian Populist Politics in Turkey -- Chapter 7 — “Scraps from the Bourgeois Kitchen” On the Romanian Frontline of Outsourced Creativity -- Chapter 8 — “As Much Value as Possible” Construction, Universities, Finance, and the “Greater Good” in the North East of England -- Chapter 9 — Labor, Value, and Frontlines in Reading and Berks County, Pennsylvania, United States -- Afterword — Reflections on Value, Objectivi ty, and Death -- Index…”
Libro electrónico -
278por Willcocks, LeslieTabla de Contenidos: “…5.9 In-depth case study: the balanced business scorecard at GenBank5.10 Key learning points; 5.11 Practical action guidelines; 6 Sink or swim: evaluation as the key to IT outsourcing; 6.1 Introduction; 6.2 Outsourcing: patterns of assessment; 6.3 The centrality of the contract; 6.4 Setting up a measurement system; 6.5 Outsourced: anticipating evaluation issues; 6.6 Staffing: a vital resource; 6.7 Summary; 6.8 Key learning points; 6.9 Practical action guidelines; 7 E-valuation (1): not business as usual?…”
Publicado 2001
Libro electrónico -
279por Cummins, FredTabla de Contenidos: “…GovernanceEnterprise Models; Chapter 2: Service-Oriented Architecture; SOA for the Enterprise; Service Ownership; Service Implementation Management; SOA Electronic Infrastructure; Reliable Messaging; Registry Services; Portal Support; Billing for Services; Service Unit Specifications; Outsourcing; Role of Industry Frameworks; Robust Value Chain Analysis; Abstract Activities; Information Systems Transformations; Chapter 3: Business Process Management; Organizational Context; Modeling Languages; Operating Modes; Rule-Driven Mode; Product Configuration; Multiple Services of a Service Unit…”
Publicado 2009
Libro electrónico -
280Publicado 2015Tabla de Contenidos: “…""Mechanical and Electrical Engineering""""Software""; ""Outsourcing Versus Insourcing""; ""Outsourcing""; ""Insourcing""; ""Integrated Circuits""; ""Connectivity""; ""Software Platforms""; ""Software Security and Privacy""; ""Glossary of Terms""; ""Prototyping and Manufacturing Processes""; ""Electrical Components""; ""Sensors""; ""Chapter 6. …”
Libro electrónico