TECHNOLOGIES
FORUMS
JOBS
BOOKS
EVENTS
INTERVIEWS
Live
MORE
LEARN
Training
CAREER
MEMBERS
VIDEOS
NEWS
BLOGS
Sign Up
Login
No unread comment.
View All Comments
No unread message.
View All Messages
No unread notification.
View All Notifications
C# Corner
Post
An Article
A Blog
A News
A Video
An EBook
An Interview Question
Ask Question
About Risk
Share
facebook
twitter
linkedIn
Reddit
Topics
No topic found
Content Filter
Articles
Videos
Blogs
News
Complexity Level
Beginner
Intermediate
Advanced
Refine by Author
[Clear]
Chetan Sanghani (3)
Mahesh Chand (2)
Kanishk Kumar (1)
Janarthanan Selvaraj (1)
Ehsan Sajjad (1)
John Godel (1)
Nikhil Patil (1)
David Mccarter (1)
Shubhankar Banerjee (1)
Shaishav Desai (1)
Abdul Basith (1)
Hadshana Kamalanathan (1)
Tuhin Paul (1)
George (1)
Tamer Khalil (1)
Shweta Lodha (1)
Ojash Shrestha (1)
Abhishek Yadav (1)
Sandeep Mishra (1)
Jaymin Dangi (1)
Saleh Qadeer (1)
Max McCarty (1)
Pankaj Lohani (1)
Gaurav Chauhan (1)
Meet Agarwal (1)
Manikavelu Velayutham (1)
Related resources for Risk
No resource found
The Security Risks Of Using AI
7/3/2024 6:05:07 AM.
Investigate the pervasive security risks associated with deploying AI technologies. Explore vulnerabilities in machine learning algorithms, potential for data breaches, and ethical implications.
Techniques for Risk Management in Complex Projects
6/16/2024 8:37:27 AM.
This article outlines risk management strategies for complex projects, emphasizing the importance of identifying, categorizing, and prioritizing risks. It covers the development of mitigation plans, a
Effective Strategies for Handling Project Deadlines
6/4/2024 5:08:44 AM.
Managing client expectations and project deadlines involves establishing clear communication channels, setting realistic deadlines, defining milestones and deliverables, managing scope changes, antici
Mastering Technical Project Management: Strategies for Success
6/3/2024 9:41:18 AM.
Mastering Technical Project Management: Strategies for Success" delves into effective planning, execution, and leadership in technical projects. It covers tools, best practices, and risk manageme
Safeguard Your LLM Against Jailbreak Detection
5/27/2024 11:09:13 AM.
Protect your LLM from jailbreak detection by implementing robust security measures. Safeguard against vulnerabilities and employ anti-jailbreak techniques to ensure the integrity and confidentiality o
Story Of Equality In .NET - Part One
4/26/2024 12:15:39 PM.
This content outlines the complexities of equality and comparison in .NET, diving into topics like reference vs. value equality, the role of interfaces, and issues with floating-point arithmetic. It e
AI Governance and How to Implement and Apply it in Enterprise
4/22/2024 8:38:36 AM.
In this article, we will Explore the essential aspects of AI Governance and its application within enterprises. Learn how to navigate regulatory landscapes, mitigate risks, and ensure ethical AI pract
Streamlining Security: Managing Inactive Users in Microsoft 365
4/19/2024 9:55:36 AM.
In this edition, we'll guide you through Streamlining Security: Managing Inactive Users in Microsoft 365. Supercharge your team's collaboration with our curated insights, expert tips, and the
A Warning to Companies: Your Development Manager is Ineffective, and It’s Your Fault!
10/30/2023 3:41:26 PM.
In this article, I will weave a cautionary tale that demonstrates something I have been seeing in teams since the late 2000s. That something is companies are creating ineffective development managers.
Why is Smart Contract Auditing Important for Blockchain Security?
9/20/2023 4:52:47 AM.
Smart contract auditing enhances security, prevents losses, and builds trust in blockchain transactions.
Smart Testing with Risk Prioritization
9/19/2023 7:34:31 AM.
In the dynamic realm of software development, delivering top-notch products is paramount to meet customer demands and stay ahead of the competition. However, comprehensively testing every facet of com
Enhancing Security with Microsoft 365 Secure Score
5/18/2023 8:17:29 AM.
By identifying opportunities to strengthen security throughout your organization, Identity Secure Score gives organizations greater insight and control over their security posture.
Implement the Risk Policy in Azure AD
5/16/2023 6:05:35 AM.
Implement the risk policy in Azure AD
Understanding Proxy Servers and Anonymizers: Benefits and Risks
3/20/2023 10:19:28 AM.
In today's digital world, anonymity and privacy have become crucial considerations for many individuals and organizations. Proxy servers and anonymizers are two technologies that can help provide
Top 10 Web Application Security Risks
4/20/2022 4:14:01 AM.
This is a web app security discussion.
The Cost of poor software requirments document
3/18/2022 12:49:42 PM.
In this article, I will be discussing shortly and simply the cost of poor software requirements document.
Stock Risk Analysis App in Python
2/28/2022 4:27:47 PM.
In this article, I'll explain about how can we perform risk analysis for certain public listed stocks using Python.
Benefits And Risks Of Cloud Computing
8/30/2021 4:41:18 AM.
Various aspects of Cloud Computing, its major characteristics and a comparative analysis between different cloud computing platforms were discussed in the articles Major Characteristics of Cloud Compu
How To Implement Models Together With Variables And Dependencies In R
1/28/2021 2:47:32 PM.
In this article I am going to demonstrate how to add variables and dependencies between variables from dataset together in a model.
Cyber Security - What Is Risk?
8/17/2020 8:18:24 AM.
In this article, you will learn about risk in Cyber Security.
Overview Of IoT Security Risks Associated With The Healthcare Industry
4/8/2020 2:51:27 AM.
In this article, you will learn about Healthcare IoT Security Risks and Protection Mechanisms.
Show Asterisks Instead Of Characters For Password Input In Console Application
3/13/2020 8:42:25 AM.
In this article, you will learn how to show asterisks instead of characters for password input in console application.
Top 10 Web Application Security Risks In 2017
12/17/2017 9:07:33 AM.
List of Top 10 Web application security risks of 2017 and beyond.
Risk of being in Cloud
4/27/2015 1:07:36 PM.
Do you rely on the cloud? What if something goes wrong? Do you have a backup plan?
OWASP Top 10 Risks #2: Broken Authentication and Session Management
10/17/2014 12:12:58 AM.
Developers are frequently attempting to build authentication and session management systems. But doing it correctly and securely is hard. We'll look at some of the more prevalent areas where things can go wrong and how to prevent it.
SystemSounds Object in F#
11/3/2013 7:06:15 PM.
SystemSounds object is used to access the system sounds provided by the Windows operating system. The SystemSounds object has sounds such as asterisk, beep, hand, exclamation and question.
Matching Characters Using Regular Expressions in QTP in Testing
10/24/2012 2:37:59 PM.
In this article we discuss various matching techniques for matching characters using Regular Expressions.
Risk Analysis in Software Testing
6/21/2012 6:10:24 AM.
In software testing, risk analysis is the process of identifying risks in applications and prioritizing them to test.
Why Waterfall Model and Iterative Techniques are so risky
12/23/2010 5:20:05 AM.
Generally the software development methodologies are classified into either a Waterfall method or an Iterative method. First we will look into what Waterfall Method does.