Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 551
- Computer networks 496
- Cloud computing 484
- Application software 478
- Management 457
- Engineering & Applied Sciences 381
- Security measures 363
- Taxation 355
- Examinations 283
- Database management 281
- Computer security 268
- Data processing 248
- Economic conditions 245
- Computer Science 243
- Historia 241
- Operating systems (Computers) 240
- Law and legislation 239
- Computer programs 215
- Certification 201
- Computer software 184
- Information technology 175
- Politics and government 171
- Electronic data processing personnel 168
- Artificial intelligence 167
- Medicine 161
- History 158
- Technology: general issues 154
- Ecology 153
- Economic history 143
- Linux 140
-
8541por Chorafas, Dimitris N.Tabla de Contenidos: “…Classification, identification and monitoring of operational risk; 2.1 Introduction; 2.2 Basel Committee directives in understanding operational risk; 2.3 Classification of operational risks and the Basel Committee; 2.4 A classification and identification system for operational risks; 2.5 The Chorafas parallel code system as an organizational infrastructure; 2.6 Quantitative and qualitative approaches to operational risk identification; 2.7 A framework for monitoring operational risk…”
Publicado 2004
Libro electrónico -
8542por Bull, Andy, 1956-Tabla de Contenidos: “…How Richard Branson has built his personal brand Section 4: Measuring the results of your brand journalism strategy Introduction to Section 4 25. Social media monitoring and analytics tools 26. Monitoring and analysing your branded websites, blogs and ebulletins 27. …”
Publicado 2013
Libro -
8543por Russinovich, Mark E.Tabla de Contenidos: “…Page Files -- Stacks -- User Stacks -- Kernel Stacks -- DPC Stack -- Virtual Address Descriptors -- Process VADs -- Rotate VADs -- NUMA -- Section Objects -- Driver Verifier -- Page Frame Number Database -- Page List Dynamics -- Page Priority -- Modified Page Writer -- PFN Data Structures -- Physical Memory Limits -- Windows Client Memory Limits -- Working Sets -- Demand Paging -- Logical Prefetcher -- Placement Policy -- Working Set Management -- Balance Set Manager and Swapper -- System Working Set -- Memory Notification Events -- Proactive Memory Management (SuperFetch) -- Components -- Tracing and Logging -- Scenarios -- Page Priority and Rebalancing -- Robust Performance -- ReadyBoost -- ReadyDrive -- Conclusion -- Cache Manager -- Key Features of the Cache Manager -- Single, Centralized System Cache -- The Memory Manager -- Cache Coherency -- Virtual Block Caching -- Stream-Based Caching -- Recoverable File System Support -- Cache Virtual Memory Management -- Cache Size -- Cache Virtual Size -- Cache Working Set Size -- Cache Physical Size -- Cache Data Structures -- Systemwide Cache Data Structures -- Per-File Cache Data Structures -- File System Interfaces -- Copying to and from the Cache -- Caching with the Mapping and Pinning Interfaces -- Caching with the Direct Memory Access Interfaces -- Fast I/O -- Read Ahead and Write Behind -- Intelligent Read-Ahead -- Write-Back Caching and Lazy Writing -- Write Throttling -- System Threads -- Conclusion -- File Systems -- Windows File System Formats -- CDFS -- UDF -- FAT12, FAT16, and FAT32 -- exFAT -- NTFS -- File System Driver Architecture -- Local FSDs -- Remote FSDs -- File System Operation -- File System Filter Drivers -- Troubleshooting File System Problems -- Process Monitor Basic vs. Advanced Modes -- Process Monitor Troubleshooting Techniques -- Common Log File System…”
Publicado 2009
Libro electrónico -
8544Publicado 2017Tabla de Contenidos: “…8.2.3 - Manufacturing Information Monitor Technology -- 8.3 - Overall architecture of real-time information-driven production scheduling system -- 8.4 - Equipment agent -- 8.5 - Capability evaluation agent model -- 8.6 - Real-time scheduling agent model -- 8.7 - Production execution monitor agent model -- 8.8 - GA-based production scheduling algorithm -- References -- Chapter 9 - IoT-MS Prototype System -- 9.1 - Configuration of a smart shop floor -- 9.1.1 - Formation of the Production Task -- 9.1.2 - Layout of the Shop Floor -- 9.1.3 - Deployment of Hardware Devices -- 9.2 - The framework of the prototype system -- 9.2.1 - System Architecture -- 9.2.2 - Information Model -- 9.3 - The logical flow of the prototype system -- 9.4 - Task driven manufacturing resource configuration module -- 9.4.1 - Phase 1: MC Optimal Configuration -- 9.4.2 - Phase 2: CMS Optimal Configuration -- 9.5 - Production scheduling/rescheduling module -- 9.5.1 - Quantifying the Tasks -- 9.5.2 - The Scheduling and the Rescheduling Method -- 9.6 - IoT-enabled smart material handling module -- 9.6.1 - Task Description -- 9.6.2 - Calculations for the Moving Tasks -- 9.6.3 - User Interfaces of the Prototype System -- 9.7 - IoT-enabled smart station -- 9.7.1 - The Case Scenario -- 9.7.2 - Operation Guidance From the System -- 9.7.3 - Real-Time Queuing Under Exceptions -- 9.8 - Real-time manufacturing information track and trace -- 9.9 - Real-time key production performances monitor module -- 9.9.1 - Details of the Case -- 9.9.2 - The Hierarchy Timed Color Petri Net Model -- References -- Chapter 10 - Conclusions and Future Works -- 10.1 - Conclusions -- 10.2 - Future works -- Index -- Back cover…”
Libro electrónico -
8545Publicado 2017Tabla de Contenidos: “…. -- There's more... -- Chapter 6: Monitoring and Troubleshooting Azure Serverless Services -- Introduction -- Monitoring your Azure Functions -- Getting ready -- How to do it... -- There's more... -- Monitoring Azure Functions using Application Insights -- Getting ready -- How to do it... -- How it works... -- There's more ... -- Pushing custom telemetry details to analytics of Application Insights -- Getting ready -- How to do it... -- Creating AI function -- Configuring access keys -- Integrating and testing AI query -- Configuring the custom derived metric report -- How it works... -- See also -- Sending application telemetry details via email -- Getting ready -- How to do it... -- How it works... -- There's more... -- See also -- Integrating real-time AI monitoring data with Power BI using Azure Functions -- Getting ready -- How to do it... -- Configuring Power BI with dashboard, dataset, and push URI -- Creating Azure AI real-time Power BI - C# function -- How it works... -- There's more…”
Libro electrónico -
8546Publicado 2023Tabla de Contenidos: “…-- The risks of traditional software development -- Software bugs -- Slow development -- Resource exhaustion -- Lack of resiliency and fault tolerance -- Failing to estimate usage patterns -- Lack of proper monitoring and risk management -- Unclear priorities, accountability, and ownership -- Security approach -- Lost source code -- How modern software development mitigates risks -- Software bugs -- Resource exhaustion and slow development -- Lack of resiliency and fault tolerance -- Failure to estimate usage patterns -- Lack of proper monitoring and risk management -- Unclear priorities, accountability, and ownership -- Security approach -- The benefits of implementing modern software development on Google Cloud -- Built for agility, elasticity, and reliability -- Security at the core -- Built for developers -- Google Cloud toolbox for developers -- Migration and development paths to run your code on Google Cloud -- Migration checklist -- Migrate or refactor? …”
Libro electrónico -
8547Publicado 2016Tabla de Contenidos: “…Front Cover -- Hiding Behind the Keyboard -- Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis -- Copyright -- Contents -- Foreword -- INTRODUCTION -- Introduction -- WHAT THIS BOOK IS AND IS NOT -- THE INTENDED AUDIENCE -- Duration of Relevance for This Guide -- SUMMARY -- About the Authors -- BRETT SHAVERS -- JOHN BAIR -- Acknowledgments -- 1 - Laying the Foundation of Covert Communications -- INTRODUCTION -- A BRIEF HISTORY OF COVERT COMMUNICATION -- COVERT COMMUNICATION OVERLOAD -- Investigative Goals -- COVERT COMMUNICATION GOALS -- SUMMARY -- REFERENCES -- 2 - The Tor Browser -- INTRODUCTION -- HISTORY AND INTENDED USE OF THE ONION ROUTER -- Two Ways of Looking at The Onion Router -- HOW THE ONION ROUTER WORKS -- A Few Important Points About Tor -- From a Tor User's Perspective -- So What's the Big Deal? …”
Libro electrónico -
8548por Honiball, GlennTabla de Contenidos: “…Hardware and Software Choices; 1.1.4. Output Choices: Monitors and Printers; 1.1.5. Other Necessary Equipment; 1.2. …”
Publicado 2005
Libro electrónico -
8549Publicado 2021Tabla de Contenidos: “…Manage Physical and Logical Infrastructure for Cloud Environment -- Access Controls for Remote Access -- Operating System Baseline Compliance Monitoring and Remediation -- Patch Management -- Performance and Capacity Monitoring -- Hardware Monitoring -- Configuration of Host and Guest Operating System Backup and Restore Functions -- Network Security Controls -- Management Plane -- Implement Operational Controls and Standards -- Change Management -- Continuity Management -- Information Security Management -- Continual Service Improvement Management -- Incident Management -- Problem Management -- Release Management -- Deployment Management -- Configuration Management -- Service Level Management -- Availability Management -- Capacity Management -- Support Digital Forensics -- Forensic Data Collection Methodologies -- Evidence Management -- Collect, Acquire, and Preserve Digital Evidence -- Manage Communication with Relevant Parties -- Vendors -- Customers -- Partners -- Regulators -- Other Stakeholders -- Manage Security Operations -- Security Operations Center -- Monitoring of Security Controls -- Log Capture and Analysis -- Incident Management -- Summary -- Domain 6 Legal, Risk, and Compliance -- Articulating Legal Requirements and Unique Risks Within the Cloud Environment -- Conflicting International Legislation -- Evaluation of Legal Risks Specific to Cloud Computing -- Legal Frameworks and Guidelines That Affect Cloud Computing -- Forensics and eDiscovery in the Cloud -- Understanding Privacy Issues -- Difference between Contractual and Regulated Private Data -- Country-Specific Legislation Related to Private Data -- Jurisdictional Differences in Data Privacy -- Standard Privacy Requirements -- Understanding Audit Process, Methodologies, and Required Adaptations for a Cloud Environment -- Internal and External Audit Controls…”
Libro electrónico -
8550Publicado 2022Tabla de Contenidos: “…Patch Management -- Performance and Capacity Monitoring -- Hardware Monitoring -- Configuration of Host and Guest Operating System Backup and Restore Functions -- Network Security Controls -- Management Plane -- Implement Operational Controls and Standards -- Change Management -- Continuity Management -- Information Security Management -- Continual Service Improvement Management -- Incident Management -- Problem Management -- Release Management -- Deployment Management -- Configuration Management -- Service Level Management -- Availability Management -- Capacity Management -- Support Digital Forensics -- Forensic Data Collection Methodologies -- Evidence Management -- Collect, Acquire, and Preserve Digital Evidence -- Manage Communication with Relevant Parties -- Vendors -- Customers -- Partners -- Regulators -- Other Stakeholders -- Manage Security Operations -- Security Operations Center -- Monitoring of Security Controls -- Log Capture and Analysis -- Incident Management -- Summary -- Chapter 6 Legal, Risk, and Compliance -- Articulating Legal Requirements and Unique Risks within the Cloud Environment -- Conflicting International Legislation -- Evaluation of Legal Risks Specific to Cloud Computing -- Legal Frameworks and Guidelines -- eDiscovery -- Forensics Requirements -- Understand Privacy Issues -- Difference between Contractual and Regulated Private Data -- Country-Specific Legislation Related to Private Data -- Jurisdictional Differences in Data Privacy -- Standard Privacy Requirements -- Privacy Impact Assessments -- Understanding Audit Process, Methodologies, and Required Adaptations for a Cloud Environment -- Internal and External Audit Controls -- Impact of Audit Requirements -- Identify Assurance Challenges of Virtualization and Cloud -- Types of Audit Reports -- Restrictions of Audit Scope Statements -- Gap Analysis -- Audit Planning…”
Libro electrónico -
8551Publicado 2024Tabla de Contenidos: “…-- Building conversational guidelines -- Web guidelines -- A sample guideline set for hybrid chat/GUI experiences -- Some specific style and tone guidelines with examples -- Flow order can reduce interactions -- Case study -- Handling errors - repair and disfluencies -- Summary -- References -- Chapter 10: Monitoring and Evaluation -- Evaluate using RAGAs -- The RAGAs process -- Synthesizing data -- Evaluation metrics -- User experience metrics -- Other metrics -- Monitoring and classifying the types of hallucination errors -- OpenAI's case study on quality and how to measure it -- Systematic testing processes -- Testing matrix approach -- Improving retrieval -- The wide range of LLM evaluation metrics -- Monitor with usability metrics -- Net Promoter Score (NPS) -- SUS -- Refine with heuristic evaluation -- Summary -- References -- Chapter 11: Process -- Incorporating design thinking into development -- Find a sponsor -- Find the right tools and integrate Generative AI -- Be religious... at first -- Avoid "unknown unknowns" -- Always evolve and improve -- Agile does not mean "no requirements" -- Team composition and location matters -- Manage Work in Progress (WIP) and technical debt -- Focus on customer value -- Incorporate the design process into the dev process -- Designing a content improvement life cycle -- Inputs for conversational AIs -- Inputs for recommender UIs -- Inputs for backend AIs -- Monitoring Monday -- Analysis Tuesday (and Wednesday's workup) -- Treatment Thursday and fault-finding Friday -- What doesn't fit into a week is still important -- Conclusion -- References -- Chapter 12: Conclusion -- Applying learnings to the new frontier -- Double-checking what feels right -- Set clear goals -- Know your processes -- Know the data -- Align and be accountable -- Prioritize thoughtfully…”
Libro electrónico -
8552Publicado 2018Tabla de Contenidos: “…The lab setup -- Python Scapy -- Installing Scapy -- Interactive examples -- Sniffing -- The TCP port scan -- The ping collection -- Common attacks -- Scapy resources -- Access lists -- Implementing access lists with Ansible -- MAC access lists -- The Syslog search -- Searching with the RE module -- Other tools -- Private VLANs -- UFW with Python -- Further reading -- Summary -- Chapter 7: Network Monitoring with Python - Part 1 -- Lab setup -- SNMP -- Setup -- PySNMP -- Python for data visualization -- Matplotlib -- Installation -- Matplotlib - the first example -- Matplotlib for SNMP results -- Additional Matplotlib resources -- Pygal -- Installation -- Pygal - the first example -- Pygal for SNMP results -- Additional Pygal resources -- Python for Cacti -- Installation -- Python script as an input source -- Summary -- Chapter 8: Network Monitoring with Python - Part 2 -- Graphviz -- Lab setup -- Installation -- Graphviz examples -- Python with Graphviz examples -- LLDP neighbor graphing -- Information retrieval -- Python parser script -- Final playbook -- Flow-based monitoring -- NetFlow parsing with Python -- Python socket and struct -- ntop traffic monitoring -- Python extension for ntop -- sFlow -- SFlowtool and sFlow-RT with Python -- Elasticsearch (ELK stack) -- Setting up a hosted ELK service -- The Logstash format -- Python helper script for Logstash formatting -- Summary -- Chapter 9: Building Network Web Services with Python -- Comparing Python web frameworks -- Flask and lab setup -- Introduction to Flask -- The HTTPie client -- URL routing -- URL variables -- URL generation -- The jsonify return -- Network resource API -- Flask-SQLAlchemy -- Network content API -- Devices API -- The device ID API -- Network dynamic operations -- Asynchronous operations -- Security -- Additional resources -- Summary -- Chapter 10: AWS Cloud Networking…”
Libro electrónico -
8553Publicado 2018Tabla de Contenidos: “…Log Analytics for your network -- Performance monitoring -- Displaying Linux processes with top -- Top alternatives -- Sysstat - a collection of performance-monitoring tools -- dstat -- Network stats with iproute2 -- Network monitoring with IPTraf-NG -- tcpdump -- Summary -- Questions -- Further reading -- Assessments -- Other Books You May Enjoy -- Index…”
Libro electrónico -
8554Publicado 1988Tabla de Contenidos: “…Photochemical Products and Unregulated Emittants -- INDOOR CONCENTRATIONS -- Principal Trace Gases -- Minor Emittants and Products -- EMITTANTS WITH POTENTIAL GLOBAL INFLUENCE -- Carbon Dioxide -- Carbon Monoxide -- Methane -- SUMMARY -- Data Adequacy -- Trends -- Concentrations -- SUMMARY OF RESEARCH RECOMMENDATIONS -- ACKNOWLEDGMENTS -- References -- Mathematical Modeling of the Effect of Emission Sources on Atmospheric Pollutant Concentrations -- DEVELOPMENT OF AIR QUALITY MODELS -- Components of Exposure -- Source/Receptor Relationships -- Historical Perspective -- EMISSION SOURCE CHARACTERISTICS -- CATEGORIES OF AIR QUALITY MODELS -- Empirical/Statistical Models -- Deterministic Models -- Temporal and Spatial Resolution of Empirical and Analytical Models -- MODELING APPROACHES FOR INDIVIDUAL PROCESSES -- Turbulent Transport and Diffusion -- Complex Terrain: Street Canyons -- Removal Processes -- Representation of Atmospheric Chemistry Through Chemical Mechanisms -- Aerosol Dynamics -- MODEL EVALUATION -- Approaches for Testing Model Performance -- Data Requirements -- Analysis of Model Performance -- APPLICATION OF AIR QUALITY MODELS -- Population Exposure Calculations -- Source Apportionment and Control Strategies -- Future Uses -- SPECIAL TOPICS AND EMERGING ISSUES IN AIR QUALITY MODELING -- Modeling Large-Scale Processes -- Modeling Small-Scale Processes -- Indoor/Outdoor Pollutant Relationships -- CONCLUSION -- SUMMARY OF RESEARCH RECOMMENDATIONS -- ACKNOWLEDGMENTS -- References -- Assessment of Human Exposure to Air Pollution: Methods, Measurements, and Models -- HUMAN EXPOSURE: INTRODUCTION -- DEFINITIONS -- Concentration, Exposure, and Dose -- Components of Exposure -- Types of Exposure Information -- Individual Exposure Versus Population Exposure -- METHODS -- Air Monitoring -- Biological Monitoring -- Research Recommendations…”
Libro electrónico -
8555Publicado 2023Tabla de Contenidos: “…3.2.2 Indirect Method Sensors -- 3.2.3 Dynamometer -- 3.2.4 Accelerometer -- 3.2.5 Acoustic Emission Sensor -- 3.2.6 Current Sensors -- 3.3 Other Sensors -- 3.3.1 Temperature Sensors -- 3.3.2 Optical Sensors -- 3.4 Interaction of Sensors During Machining Operation -- 3.4.1 Milling Machining -- 3.4.2 Turning Machining -- 3.4.3 Drilling Machining Operation -- 3.5 Sensor Fusion Technique -- 3.6 Interaction of Internet of Things -- 3.6.1 Identification -- 3.6.2 Sensing -- 3.6.3 Communication -- 3.6.4 Computation -- 3.6.5 Services -- 3.6.6 Semantics -- 3.7 IoT Technologies in Manufacturing Process -- 3.7.1 IoT Challenges -- 3.7.2 IoT-Based Energy Monitoring System -- 3.8 Industrial Application -- 3.8.1 Integrated Structure -- 3.8.2 Monitoring the System Related to Service Based on Internet of Things -- 3.9 Decision Making Methods -- 3.9.1 Artificial Neural Network -- 3.9.2 Fuzzy Inference System -- 3.9.3 Support Vector Mechanism -- 3.9.4 Decision Trees and Random Forest -- 3.9.5 Convolutional Neural Network -- 3.10 Conclusion -- References -- Chapter 4 Application of Internet of Things (IoT) in the Automotive Industry -- 4.1 Introduction -- 4.2 Need For IoT in Automobile Field -- 4.3 Fault Diagnosis in Automobile -- 4.4 Automobile Security and Surveillance System in IoT-Based -- 4.5 A Vehicle Communications -- 4.6 The Smart Vehicle -- 4.7 Connected Vehicles -- 4.7.1 Vehicle-to-Vehicle (V2V) Communications -- 4.7.2 Vehicle-to-Infrastructure (V2I) Communications -- 4.7.3 Vehicle-to-Pedestrian (V2P) Communications -- 4.7.4 Vehicle to Network (V2N) Communication -- 4.7.5 Vehicle to Cloud (V2C) Communication -- 4.7.6 Vehicle to Device (V2D) Communication -- 4.7.7 Vehicle to Grid (V2G) Communications -- 4.8 Conclusion -- References -- Chapter 5 IoT for Food and Beverage Manufacturing -- 5.1 Introduction -- 5.2 The Influence of IoT in a Food Industry…”
Libro electrónico -
8556Publicado 2023Tabla de Contenidos: “…3.2.2 Indirect Method Sensors -- 3.2.3 Dynamometer -- 3.2.4 Accelerometer -- 3.2.5 Acoustic Emission Sensor -- 3.2.6 Current Sensors -- 3.3 Other Sensors -- 3.3.1 Temperature Sensors -- 3.3.2 Optical Sensors -- 3.4 Interaction of Sensors During Machining Operation -- 3.4.1 Milling Machining -- 3.4.2 Turning Machining -- 3.4.3 Drilling Machining Operation -- 3.5 Sensor Fusion Technique -- 3.6 Interaction of Internet of Things -- 3.6.1 Identification -- 3.6.2 Sensing -- 3.6.3 Communication -- 3.6.4 Computation -- 3.6.5 Services -- 3.6.6 Semantics -- 3.7 IoT Technologies in Manufacturing Process -- 3.7.1 IoT Challenges -- 3.7.2 IoT-Based Energy Monitoring System -- 3.8 Industrial Application -- 3.8.1 Integrated Structure -- 3.8.2 Monitoring the System Related to Service Based on Internet of Things -- 3.9 Decision Making Methods -- 3.9.1 Artificial Neural Network -- 3.9.2 Fuzzy Inference System -- 3.9.3 Support Vector Mechanism -- 3.9.4 Decision Trees and Random Forest -- 3.9.5 Convolutional Neural Network -- 3.10 Conclusion -- References -- Chapter 4 Application of Internet of Things (IoT) in the Automotive Industry -- 4.1 Introduction -- 4.2 Need For IoT in Automobile Field -- 4.3 Fault Diagnosis in Automobile -- 4.4 Automobile Security and Surveillance System in IoT-Based -- 4.5 A Vehicle Communications -- 4.6 The Smart Vehicle -- 4.7 Connected Vehicles -- 4.7.1 Vehicle-to-Vehicle (V2V) Communications -- 4.7.2 Vehicle-to-Infrastructure (V2I) Communications -- 4.7.3 Vehicle-to-Pedestrian (V2P) Communications -- 4.7.4 Vehicle to Network (V2N) Communication -- 4.7.5 Vehicle to Cloud (V2C) Communication -- 4.7.6 Vehicle to Device (V2D) Communication -- 4.7.7 Vehicle to Grid (V2G) Communications -- 4.8 Conclusion -- References -- Chapter 5 IoT for Food and Beverage Manufacturing -- 5.1 Introduction -- 5.2 The Influence of IoT in a Food Industry…”
Libro electrónico -
8557Publicado 2003Tabla de Contenidos: “…Integration with Tivoli Monitoring -- 11.1 Introduction to IBM Tivoli Monitoring -- 11.2 Tivoli Monitoring with Tivoli Storage Resource Manager -- 11.3 Daemons to monitor and restart actions -- Part 6 Appendices -- Appendix A. …”
Libro electrónico -
8558Publicado 2021Tabla de Contenidos: “…Antidiscrimination Laws -- Privacy Before, During, and After Employment -- Employee Background Screening -- Employee Monitoring -- Investigation of Employee Misconduct -- Termination of the Employment Relationship -- Summary -- Exam Essentials -- Review Questions -- Chapter 8 State Privacy Laws -- Federal vs. …”
Libro electrónico -
8559por Organisation for Economic Co-operation and Development.Tabla de Contenidos: “…Development beyond aid -Progress since the last peer review -An explicit legal commitment to policy coherence for development -Clear priorities and awareness at headquarters -Making Spain’s development strategy known in the field – beyond ODA -Policy co-ordination mechanisms to resolve conflicts or inconsistencies -New institutional mechanisms for policy coherence -The need to ensure sub-national policies respect coherence with Spain’s development goals -Progress in monitoring, analysing and reporting policy coherence for development -Strengthening links between reporting and policy responses -Improving monitoring to enhance transparency -Using whole-of-government approaches -More progress needed in inter-ministerial co-operation on fragile states -Looking forward: the "beyond aid" agenda for the whole Spanish government -Future considerations Chapter 3. …”
Publicado 2013
Libro electrónico -
8560Publicado 2015Tabla de Contenidos: “…-- Management System Planning -- Leadership and Commitment -- Policy -- Process Approach -- Risks -- Global Citizenship-Western Digital's Commitment -- Legal Commitment-Compliance -- Best Practices -- Compliance Costs -- Compliance Costs-Employee Penalties -- Strategic Planning-Objectives and Programs -- Good to Great -- Assess/Reflect/Act -- Notes -- CHAPTER 13 Step Two: Insure -- Implementation of Plans -- Agent for Innovation -- InnovationPoint-Leapfrogging -- Support-Resources -- Organizational Roles, Responsibilities, and Authorities -- Role of the Boss -- Employees-Engagement and Innovation -- Recognition -- Building Employee Relationships -- Future Competencies in Demand -- Resources-Training-Competence-Awareness -- Work Environment -- Communication -- Documented Information -- Documented Procedures -- Operation -- Sarbanes‐Oxley -- Due Diligence -- Operational Clauses -- Quality Control Plan -- Management System Control Plan -- Goods and Service Risk Questions -- Production and Service Provision -- Innovation -- Emergency Preparedness and Response -- Notes -- CHAPTER 14 Step Three: Improve -- Performance Evaluation -- Monitor, Measure, Analyze, and Evaluate -- Objectives -- Supply Chain -- Monitoring-Compliance -- Monitoring and Measurement of Processes…”
Libro electrónico