Catalog Search Results
Author
Pub. Date
2023.
Language
English
Description
Money laundering is endemic. As much as 5 percent of global GDP ($3.6 trillion) is laundered by criminals each year. It's no wonder that every financial institution in the United States must comply with complex requirements mandated by a welter of federal anti-money laundering (AML) laws. Financial institutions and businesses that unknowingly serve as conduits for money laundering are no less liable to prosecution and fines than those that condone...
Author
Pub. Date
2023.
Language
English
Description
Many companies lose significant revenue to counterfeiters who sell fake products that look identical to the real thing and unscrupulous supply chain partners who divert legitimate products for unauthorized sale on the black market. To effectively combat illicit trade, leaders need to embrace a multilayered approach that includes keeping tabs on the upstream supply chain, using traceable packaging, and educating consumers.
Author
Pub. Date
[2023]
Language
English
Description
"In an era of sky-high burnout, Educating with Passion and Purpose gives veteran teachers everything they need to thrive in their profession. Experienced educators themselves, authors Meredith Matson and Rebekah Shoaf speak the truth about what today's K-12 teachers confront--and how they can navigate the changing landscape to face the challenges and opportunities we encounter. Readers will find opportunities for self-reflection on the topics that...
Author
Pub. Date
[2023]
Language
English
Description
Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization and individual with an email account is susceptible to deceptive emails sent by attackers with nefarious intentions. This activity, known as phishing, involves...
Author
Pub. Date
[2006]
Language
English
Description
Security and risk management are principally concerned with the protection and conservation of corporate assets and resources. The task of protection continues to be an increasingly complex one in a time when technology is creating new products (and thus risk) at an explosive rate. Add this to the crime rate -- now aggravated by domestic and international terrorism -- and the importance of risk analysis and evaluation to design proper protection becomes...
Author
Pub. Date
2023.
Language
English
Description
New research shows that factors unrelated to employees’ knowledge, capabilities, and behavior — such as who they report to, their access to (3z(Baccelerator(3y (Broles, and whether they take advantage of flexible working arrangements — play a leading role in who gets promoted. When managers understand the circumstances that contribute to or block paths to promotion for women and people of color, they can apply proactive career...
Author
Pub. Date
2022
Language
English
Description
The second publication in the Create, Protect, and Deliver Digital Business value series provides practitioners with detailed guidance on creating a NIST Cybersecurity Framework risk management program using NIST Special Publication 800-53, the DVMS Institute's CPD Model, and existing digital business systems.
Author
Series
Pub. Date
[2024]
Language
English
Description
These shortcuts delve into generative AI, where algorithms and models create synthetic data, detect anomalies, and help confirm statistical properties. They explore how generative AI is reshaping risk management, fraud detection, and data simulation, and they offer a unique synthesis of theory and practical applications.
Author
Series
Pub. Date
[2024]
Language
English
Description
These shortcuts delve into generative AI, where algorithms and models create synthetic data, detect anomalies, and help confirm statistical properties. They explore how generative AI is reshaping risk management, fraud detection, and data simulation, and they offer a unique synthesis of theory and practical applications.
Author
Pub. Date
2016.
Language
English
Description
"Transportation is the lifeline of any nation, connecting people, supporting the economy, and facilitating the delivery of vital goods and services. The 9/11 attacks--and other attacks on surface transportation assets, including the bombings in Madrid, London, Moscow, and Mumbai--demonstrate the vulnerability of the open systems to disruption and the consequences of the attacks on people, property, and the economy. Now more than ever, it has become...
Author
Pub. Date
2022.
Language
English
Description
Cyber risk is the highest perceived business risk according to risk managers and corporate insurance experts. Cybersecurity typically is viewed as the boogeyman: it strikes fear into the hearts of non-technical employees. Enterprise Cybersecurity in DigitalBusiness:Building a Cyber Resilient Organization provides a clear guide for companies to understand cyber from a business perspective rather than a technical perspective, and to build resilience...
Author
Language
English
Appears on list
Description
"PlantYou laid the foundation for eating a healthy and simple whole foods, plant based diet. PlantYou Scrappy Cooking takes this one step further. As people are looking more and more to reducing meat consumption as a way to curb environmental impact, the need for easy, delicious recipes only grows. Add to that equation Carleigh Bodrug's emphasis on reducing food waste, and you have the recipe for a delicious and ridiculously easy way to make tater...
Pub. Date
2023.
Language
English
Description
Welcome to the fourth part of our comprehensive course on cybersecurity for beginners. The course begins by exploring browser security and introduces you to two popular browsers, Mozilla Firefox, and Brave Browser. You will delve into the concepts of HTTP and HTTPS protocols, understand the role of cookies in tracking your online activities, and learn how to mitigate their impact on your privacy. Next, you will learn about the significance of Virtual...
Pub. Date
2023.
Language
English
Description
This course is specifically designed to equip both Android and iOS users with practical skills and techniques to safeguard their mobile devices. You will start to distinguish between legitimate applications and malicious programs disguising themselves as genuine apps. App permissions are another critical aspect of mobile device security. You will uncover the truth behind app permissions and discover methods to restrict unnecessary access to your personal...
Pub. Date
[2024]
Language
English
Description
In the final season of Tom Clancy2s Jack Ryan, Jack is promoted to the new CIA Acting Deputy Director and finds himself on his most dangerous mission yet! He is appointed with the daunting task of unearthing internal corruption. As he investigates, Jack discovers the convergence of a drug cartel with a terrorist organization, ultimately revealing a conspiracy much closer to home and testing our hero's belief in the system he has always fought to protect....
Author
Pub. Date
[2023]
Language
English
Description
This book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and information technology in the mid-1980s. Forty years later, it's time to leverage your ECRM program and cybersecurity strategy in the same way. The main topics covered include the case for...
Pub. Date
[2023]
Language
English
Description
The majority of workers will experience burnout at some point in their career. To help restore balance to their work and home lives, those suffering from burnout need to know what it is and how to identify it, as well as the most common ways individuals burn out. Those watching this video will learn resiliency-building tools and techniques, and they will be able to take actionable steps to improve their everyday life and make work manageable again....
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request