Books on the topic 'Risk assessment - Data processing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Risk assessment - Data processing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
The security risk assessment handbook: A complete guide for performing security risk assessments. Auerbach Publications, 2005.
Find full textThe security risk assessment handbook: A complete guide for performing security risk assessments. 2nd ed. CRC Press, 2010.
Find full textC, Davis John, and Wendebourg Johannes, eds. Computing risk for oil prospects: Principles and programs. Pergamon, 1995.
Find full textRobert, Stack. Risk assessments: Microcomputer protection : a bankwide assessment of risks associated with traditional and nontraditional services and new business opportunities. American Bankers Association, 1985.
Find full textSmith, C. L. Development and use of a train-level probabilistic risk assessment. Division of Safety Issue Resolution, Office of Nuclear Regulatory Research, U.S. Nuclear Regulatory Commission, 1993.
Find full textMaderbacher, Michael. Früherkennung von Kreditrisken: Dynamische Kontendatenanalyse zur Risikofrüherkennung. Orac, 1998.
Find full textGheorghe, Adrian V. Integration von Fuzzy-Logic für eine regionale Umweltrisiko-Analyse: Modellierung komplexer Zusammenhänge in der regionalen Sicherheitsplanung. VDF, Hochschulverlag an der ETH, 1996.
Find full textA, Levatino Joseph, ed. Knowledge at risk: Protecting business strategies in an information-driven environment. McWains Chelsea, 1992.
Find full textHeino, Perttu. Fluid property reasoning in knowledge-based hazard identification. Technical Research Centre of Finland, 1999.
Find full textK, Rand G., ed. Auditing the IT environment: Assessing and measuring risk and control. Financial Times/Pitman Pub., 1994.
Find full textGraham, Rand, ed. Auditing the IT environment: Assessing and measuring risk and control. Management Audit Ltd, 1997.
Find full textKikō, Genshiryoku Anzen Kiban. Dejitaru anzen hogokei no shinraisei hyōka moderu no kairyō: Heisei 21-nendo. Genshiryoku Anzen Kiban Kikō, 2010.
Find full textAgency, International Atomic Energy, ed. Use and development of coupled computer codes for the analysis of accidents at nuclear power plants: Proceedings of a technical meeting held in Vienna, 26-28 November 2003. International Atomic Energy Agency, 2007.
Find full textCyber-risk informatics: Engineering evaluation with data science. John Wiley & Sons, 2016.
Find full textServices, Oregon Dept of Administrative. Department of Administrative Services: Computing and networking infrastructure consolidation (CNIC) risk assessment. Secretary of State, Audits Division, 2006.
Find full textCoderre, David G. Internal audit: Efficiency through automation. John Wiley & Sons, 2009.
Find full textPetr, Berka, Rauch Jan, and Zighed Djamel A. 1955-, eds. Data mining and medical knowledge management: Cases and applications. Information Science Reference, 2009.
Find full text-J, Wingender H., and European Reliability Data Banking Association., eds. Reliability data collection and use in risk and availability assessment: Proceedings of the 5th EuReDatA Conference, Heidelberg, Germany, April 9-11, 1986. Springer-Verlag, 1986.
Find full textOffice, General Accounting. Adverse drug events: The magnitude of health risk is uncertain because of limited incidence data : report to Congressional requesters. The Office, 2000.
Find full textOffice, General Accounting. Adverse drug events: The magnitude of health risk is uncertain because of limited incidence data : report to Congressional requesters. The Office, 2000.
Find full textOffice, General Accounting. Adverse drug events: The magnitude of health risk is uncertain because of limited incidence data : report to Congressional requesters. The Office, 2000.
Find full textMei kuang an quan sheng chan jian kong xi tong ji cheng guan jian ji shu ji ying yong. Mei tan gong ye chu ban she, 2012.
Find full textRadvanovsky, Robert, and Jacob Brodsky. Handbook of SCADA/control systems security. CRC Press, Taylor & Francis Group, 2016.
Find full textRadvanovsky, Robert. Handbook of SCADA/control systems security. CRC Press, Taylor & Francis Group, 2013.
Find full textKortekaas, Jan. Risicoanalyse georganiseerde criminaliteit: Uitwerking instrumentarium en toepassing op de ICT-ontwikkelingen. Elsevier Overheid, 2005.
Find full textKnowledge-based risk management in engineering: A case study in human-computer cooperative systems. Wiley, 1989.
Find full textBirsen, Karpak, Zionts Stanley 1937-, and North Atlantic Treaty Organization. Scientific Affairs Division., eds. Multiple criteria decision making and risk analysis using microcomputers. Springer-Verlag, 1989.
Find full textEpidemiology in hazard and risk assessment: A partial review of the "London Principles", with recommendations for revisions and additions, by an expert panel : based on a review of studies of possible relationship between induced abortion and breast cancer. Federal Focus, Inc., 1999.
Find full textIman, Ronald L. PARTITION, a program for defining the source term/consequence analysis interface in the NUREG-1150 probabilistic risk assessments: User's guide. Division of Systems Research, Office of Nuclear Regulatory Research, U.S. Nuclear Regulatory Commission, 1990.
Find full textA, Donati, Rossi C, Brebbia C. A, and International Conference on Brownfield Sites: Assessment, Rehabilitation, and Development (2nd : 2004 : Siena, Italy), eds. Brownfield sites II: Assessment, rehabilitation and development. WIT Press, 2004.
Find full textMezhdunarodnai︠a︡ konferent︠s︡ii︠a︡ "Obrabotka informat︠s︡ii i upravlenie v chrezvychaĭnykh i ėkstremalʹnykh situat︠s︡ii︠a︡kh" (5th 2006 Minsk, Belarus). Pi︠a︡tai︠a︡ Mezhdunarodnai︠a︡ konferent︠s︡ii︠a "Obrabotka informat︠s︡ii i upravlenie v chrezvychaĭnykh i ėkstremalʹnykh situat︠s︡ii︠a︡kh": 24-26 okti︠a︡bri︠a︡ 2006 goda, Minsk : doklady. Obʺedinennyĭ institut problem informatiki Nat︠s︡ionalʹnoĭ akademii nauk Belarusi, 2006.
Find full textWilliams, Donald Charles. Mitigation of direct containment heating and hydrogen combustion events in ice condenser plants: Analyses with the CONTAIN code and NUREG-1150 PRA methodology. Division of Safety Issue Resolution, Office of Nuclear Regulatory Research, U.S. Nuclear Regulatory Commission, 1990.
Find full textMezhdunarodnai︠a︡ konferent︠s︡ii︠a︡ "Obrabotka informat︠s︡ii i upravlenie v chrezvychaĭnykh i ėkstremalʹnykh situat︠s︡ii︠a︡kh" (5th 2006 Minsk, Belarus). Pi︠a︡tai︠a︡ Mezhdunarodnai︠a︡ konferent︠s︡ii︠a "Obrabotka informat︠s︡ii i upravlenie v chrezvychaĭnykh i ėkstremalʹnykh situat︠s︡ii︠a︡kh": 24-26 okti︠a︡bri︠a︡ 2006 goda, Minsk : doklady. Obʺedinennyĭ institut problem informatiki Nat︠s︡ionalʹnoĭ akademii nauk Belarusi, 2006.
Find full textPress, IOS, ed. Making sense of virtual risks: A quasi-experimental investigation into game-based training. IOS Press, 2012.
Find full textG, Whelan, Wessex Institute of Technology, and Università di Siena, eds. Brownfields: Multimedia modelling and assessment. WIT Press, 2004.
Find full textLandoll, Douglas. Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments. Taylor & Francis Group, 2021.
Find full textLandoll, Douglas. Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments. Taylor & Francis Group, 2021.
Find full textLandoll, Douglas. Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments. Taylor & Francis Group, 2021.
Find full textLandoll, Douglas J. Security Risk Assessment Handbook. Taylor & Francis Group, 2021.
Find full textLandoll, Douglas J. Security Risk Assessment Handbook. Taylor & Francis Group, 2021.
Find full textLandoll, Douglas J. Security Risk Assessment Handbook. Taylor & Francis Group, 2020.
Find full textLandoll, Douglas J. Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments. Taylor & Francis Group, 2010.
Find full textLandoll, Douglas J., and Douglas Landoll. Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments. Taylor & Francis Group, 2005.
Find full textLandoll, Douglas. Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition. Taylor & Francis Group, 2016.
Find full textLandoll, Douglas. Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition. Taylor & Francis Group, 2016.
Find full text