intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Managing security risks

Xem 1-20 trên 221 kết quả Managing security risks
  • Welcome to the second book from RSA Press, RSA Security’s Official Guide to Cryptography! As the Internet becomes a more pervasive part of daily life, the need for e-security becomes even more critical. Any organization engaged in online activity must assess and manage the e-security risks associated with this activity. Effective use of cryptographic techniques is at the core of many of these risk-management strategies.

    pdf449p zizaybay1103 29-05-2024 3 2   Download

  • In this volume the methodological aspects of the scenario logic and probabilistic (LP) non-success risk management are considered. The theoretical bases of scenario non-success risk LP-management in business and engineering are also stated. Methods and algorithms for the scenario risk LP-management in problems of classification, investment and effectiveness are described.

    pdf15p vimeyers 29-05-2024 3 2   Download

  • Ebook "Threats to global water security" aims are: (1) to promote efforts to full fill recent international commitments, especially in the Millennium Goals, (2) to advance towards a truly integrated, int- national approach to sustainable water management, and (3) to put special emphasis on the role of women in these efforts.

    pdf386p giangdongdinh 28-05-2024 3 1   Download

  • Ebook "Risk management of water supply and sanitation systems" is based on the discussions and papers prepared for the NATO Advanced Research Workshop that took place in Ohrid, Macedonia under the auspices of the NATO Security Through Science Programme and addressed problems Risk management of water supply and sanitation systems impaired by operational failures, natural disasters and war conflicts.

    pdf324p giangdongdinh 28-05-2024 3 1   Download

  • Based on the interview result, this study introduces a list of pushes and pulls to the supply chain security standard. This contributes to implementation of ISO 28000 in mining industry of Malaysia, specifically Pahang. In the industry, the result of this study is beneficial for supply chain managers and policymakers to ease the ISO implementation and reduce supply chain risks.

    pdf4p longtimenosee10 26-04-2024 6 1   Download

  • This paper is objective to examine the barrier of ISO28000 implementation. As more and more supply chain process faced disruption and delay due to accident, importance of supply chain security management attract the concern from top management of organization. ISO 28000 is a standard that released in 2007 which specify requirement for security management system for the supply chain. However, there are still many organization didn’t apply for this standard.

    pdf8p longtimenosee10 26-04-2024 8 1   Download

  • Part 2 book "Computer security - Principles and practice" includes content: Operating system security, human resources security, security auditing, legal and ethical aspects, internet security protocols and standards, symmetric encryption and message confidentiality, trusted computing and multilevel security, it security management and risk assessment, physical and infrastructure security, it security controls, plans, and procedures,... and other contents.

    pdf402p muasambanhan10 11-04-2024 2 1   Download

  • One of the main trends in the law development is its digitalization under the supply chain strategies, which is manifested both in the digitalization of legal regulation, legal technologies, legal processes and law enforcement. In the emergence of regulations affecting the issues of the digital economy, electronic state, information security.

    pdf6p longtimenosee09 08-04-2024 5 0   Download

  • The objective of the study is to analyze existing personnel risks and develop an adaptive, universal methodology for assessing their likelihood, with further modeling of possible risk scenarios. In the framework of the study, a two-stage method for estimating the probability of occurrence of 30 personnel risks characteristic of different types of personnel flows was tested. Possible scenarios were simulated using the Scenario Manager method.

    pdf9p longtimenosee09 08-04-2024 8 1   Download

  • Part 1 book "It governance - A managers guide to data security" includes content: Why is information security necessary the combined code; the turnbull report and sarbanes–oxley; organizing information security; information security policy and scope; the risk assessment and statement of applicability; external parties; asset management; human resources security, physical and environmental security, equipment security, communications and operations management, controls against malicious software (malware) and back-ups.

    pdf205p longtimenosee08 31-03-2024 3 1   Download

  • This book presents an overview and critique of online business security systems with emphasis on common electronic commerce activities and payment systems. It discusses legal, compliance and ethical issues that affect management and administration of online business systems. The book introduces the reader to concepts underlying online business systems, as well as technologies that drive online business processes.

    pdf231p longtimenosee05 31-03-2024 0 0   Download

  • The aim of study "Coronavirus (COVID-19): How to secure the supply chain? – A case study" is to address this question performing an analysis of the current KPIs in the main affected countries in Europe (Italy) and Asia (China). After a review of the literature on Supply Chain Risk Management (SCRM) and published official statistics in China, Italy and Germany, a case study focused on a set of interviews with practitioners based on a firm located in Germany was used to generate uncaptured insights in previous research of the area.

    pdf8p longtimenosee07 29-03-2024 3 2   Download

  • Ebook "Environmental and food safety and security for South-East Europe and Ukraine" covers important aspects of the field of food security and safety, ranging from fundamental production, through advanced water treatment technologies and detection of novel pollutants, to management and policy making. The discussion strives to develop an integrated approach to solving the associated problems by simultaneously considering sociological, ecological and economic aspects.

    pdf277p coduathanh1122 27-03-2024 5 1   Download

  • Ebook "The new financial order: Risk in the 21st century" proposes a radically new risk management infrastructure to help secure the wealth of nations: to preserve the billions of minor and not so minor economic gains that sustain people around the world. Most of these gains seldom make the news or even evoke much public discussion, but they can enrich hard-won economic security and without them any semblance of progress is lost.

    pdf385p tuongnhuoclan 28-11-2023 10 4   Download

  • Part 1 of ebook "Financial institutions management: A risk management approach" provides readers with contents including: financial services depository institutions; financial services securities brokerage and investment banking; financial services mutual funds and hedge funds; interest rate risk; credit risk individual loan risk; credit risk: loan portfolio and concentration risk;...

    pdf559p tuongnhuoclan 27-11-2023 11 7   Download

  • Continued part 1, part 2 of ebook "The internet supply chain: Impact on accounting and logistics" provides readers with contents including: the changing responsibilities of senior management in a modern firm; one of the big challenges with electronic commerce; getting our company ready for shifts in market power; the real revolution in computers and communications is in logistics; operational risk with supply chain: privacy and security;...

    pdf150p mocthanhdao0210 19-11-2023 10 2   Download

  • Continued part 1, part 2 of ebook "Advances in quantitative analysis of finance and accounting (New series) - Volume 1" provides readers with contents including: the impact of the introduction of index securities on the underlying stocks - the case of the diamonds and the dow 30; hedging with foreign-listed single stock futures; asset pricing with higher moments - empirical evidence from the taiwan stock market; listing switches from NASDAQ to the NYSE/AMEX - is New York issuance a motive;...

    pdf116p mocthanhdao0210 19-11-2023 8 4   Download

  • Ebook Big data - A business and legal guide: Part 2 presents the following content: Chapter 6: big data and risk assessment; chapter 7: licensing big data; chapter 8: the antitrust laws and big data; chapter 9: the impact of big data on insureds, insurance coverage, and insurers; chapter 10: using big data to manage human resources; chapter 11: big data discovery.

    pdf126p haojiubujain08 01-11-2023 10 3   Download

  • Continued part 1, part 2 of ebook "Understanding personal security and risk: A guide for business travelers" provides readers with contents including: Chapter 6 - Hotel and residential security; Chapter 7 - Cybersecurity on the road; Chapter 8 - Shopping malls, sports stadiums, theaters; Chapter 9 - Risk assessment for personal security; Chapter 10 - Personal security and transportation; Chapter 11 - Managing your team’s personal security;...

    pdf130p dangsovu 20-10-2023 6 5   Download

  • Part 1 of ebook "Multinational finance: Evaluating opportunities, costs, and risks of operations" provides readers with contents including: the international financial environment; derivative securities for financial risk management; world trade and the international monetary system; foreign exchange and eurocurrency markets; the international parity conditions and their consequences; currency futures and futures markets; currency options and options markets;...

    pdf218p dangsovu 20-10-2023 8 5   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2