Mostrando 621 - 640 Resultados de 823 Para Buscar '"Disclosure"', tiempo de consulta: 0.09s Limitar resultados
  1. 621
    por Shearer, Robert
    Publicado 2007
    Tabla de Contenidos: “…IP Impact on ResearchExamples of the Unplanned Benefits of Research; New Challenges to the Managing Executives; Next Steps; Chapter 4: The Economic Infrastructure, Standards, Regulations, and Capital Markets; IP Management's Two Dimensions-Internal and External; Intangible IP; SEC and FASB Initiatives; Why Disclosure Is Important to Growth; IP Savvy Commands a Premium on Wall Street; Measuring Intangibles; New Capabilities Requirements; IP Influence on the Private Enterprise; What Can We Do?…”
    Libro electrónico
  2. 622
    por Photopoulos, Constantine
    Publicado 2008
    Tabla de Contenidos: “…Chapter 6: Detection and ReportingChapter 7: Evaluation and Response; Chapter 8: Disclosure and Notification; Chapter 9: Closure; Appendix A: Relevant Legislation; Chapter 2: Data Classification; Introduction; Security Objectives; Potential Impact; Low; Moderate; High; Classification Levels; Confidential; Internal; Public; Data Ownership and Usage; Owner; Custodian; User; User Manager; Information Security Officer; Chief Information Officer; Data Sharing; Metadata; Classification Project; Create an Information Asset Inventory; Specify the Classification Criteria; Classify the Data…”
    Libro electrónico
  3. 623
    por Collings, Steve
    Publicado 2011
    Tabla de Contenidos: “…22 ISA 520 (redrafted) Analytical Procedures23 ISA 530 (redrafted) Audit Sampling; 24 ISA 540 (revised and redrafted) Auditing Accounting Estimates, Including Fair Value Accounting Estimates, and Related Disclosures; 25 ISA 550 (revised and redrafted) Related Parties; 26 ISA 560 (redrafted) Subsequent Events; 27 ISA 570 (redrafted) Going Concern; 28 ISA 580 (revised and redrafted) Management Representations; 29 ISA 600 (revised and redrafted) Special Considerations - Audits of Group Financial Statements (Including the Work of Component Auditors)…”
    Libro electrónico
  4. 624
    por Makan, Keith
    Publicado 2013
    Tabla de Contenidos: “…Determining application attack surfacesLaunching activities; Writing a drozer module - a device enumeration module; Writing an application certificate enumerator; Chapter 4: Exploiting Applications; Introduction; Information disclosure via logcat; Inspecting network traffic; Passive intent sniffing via the activity manager; Attacking services; Attacking broadcast receivers; Enumerating vulnerable content providers; Extracting data from vulnerable content providers; Inserting data into content providers; Enumerating SQL-injection vulnerable content providers; Exploiting debuggable applications…”
    Libro electrónico
  5. 625
    por Lockshin, Steven D.
    Publicado 2013
    Tabla de Contenidos: “…Disarming ComplexityMesmerizing Optics; The VIP Racket; Key Points; Chapter 4: Hold Your Nose: Other Advisor Options; Bank-Based Advisors; Private Banking and Trust Departments; Asset Managers; Insurance Salesmen; Fee-Only Planners; Other Options; Technology's Triumph; Key Points; Chapter 5: The Case for Independent RIAs; The Trouble with Fee-Only Advisors; The Case for Independent RIAs; Buyer Beware; Do All RIAs Live Up to Their Title?; Disorienting Disclosure; Soft Dollar Practices; RIAs: A Good Place to Start; Key Points…”
    Libro electrónico
  6. 626
    Publicado 2015
    Tabla de Contenidos: “…; The auditor's role; How accountants record transaction data; Historical Cost; Accounting Standards as Applied to Revenue Realization; The Matching Principle; Consistency; Disclosure; Objectivity; The significance of footnotes; Accounting for contingencies…”
    Libro electrónico
  7. 627
    Publicado 2014
    Tabla de Contenidos: “…Part 2: Preparing for Your Crowdfunding Campaign Chapter 5: Business Planning in Preparation for a Crowdfunding Campaign; Writing a Business Plan Disclosure Document; Basic Information; Description of the Business; Description of Financial Condition; Use of Proceeds and Offering Amount; Valuing Your Company: Pricing Securities and Understanding Capital Structure; Reviewed versus Audited Financial Statements; Budgeting, Projections, and Forecasting; Conclusion; Chapter 6: Protecting Your Intellectual Property; The Importance of Protecting IP on Crowdfunding Platforms; Patents: Protecting Ideas…”
    Libro electrónico
  8. 628
    Publicado 2015
    Tabla de Contenidos: “…; GENERAL COMPLIANCE: DISCLOSURES; GENERAL COMPLIANCE: DISCLAIMERS; GENERAL COMPLIANCE: HUMAN RESOURCES; FINANCIAL INSTITUTIONS; HEALTH CARE AND MEDICAL INSTITUTIONS; HIGHER EDUCATION (FERPA); PROFESSIONAL TRADE OVERSIGHT AND ORGANIZATIONS: MOBILE; OTHER FEDERAL AGENCIES; FEDERAL LEGISLATION; STATE LEGISLATION; COMPLIANCE OVERSIGHT…”
    Libro electrónico
  9. 629
    por Loughran, Maire Ducation
    Publicado 2012
    Tabla de Contenidos: “…Working with WorksheetsPart II: Preparing and Using Financial Statements; Chapter 5: Posting Income Statement Profit and Loss; Making a Statement; Everything in Its Right Place: Formatting the Income Statement; Managing the Misfits: Examining Irregular Items; Watching Out for Special Income Statement Items; Arriving at the Final Product; Chapter 6: Reporting Assets and Claims: Keeping Your Balance ( Sheet); Classifying the Balance Sheet; Counting Your Assets; Reporting Debt and Other Liabilities; Reporting Equity; Studying Advanced Balance Sheet Issues; Balance Sheet Disclosure Issues…”
    Libro electrónico
  10. 630
    por Wilson, Patrick G.
    Publicado 2011
    Tabla de Contenidos: “…Medical TerminologyColor Codes; Healthcare Terminology; Terms to Know; Review Questions; Chapter 4: HIPAA Regulations; HIPAA Overview; HIPAA Elements; Title II: Administrative Simplification and Fraud Prevention; Electronic Data Interchange; Terms to Know; Review Questions; Chapter 5: HITECH Regulations; HITECH Background; Business Associates; Breach Notification; Penalties; Accounting of Disclosures; Minimum Necessary; Marketing and Sale of PHI; How HITECH Affects Different CE Scenarios; National Health Information Network; Personal Health Records; Terms to Know; Review Questions…”
    Libro electrónico
  11. 631
    por Lee, Wei-Meng
    Publicado 2012
    Tabla de Contenidos: “…Adding IndexingAdding Search Capability; Disclosures and Checkmarks; Navigating to Another View; Summary; Chapter 9: Using Application Preferences; Creating Application Preferences; Programmatically Accessing the Settings Values; Loading the Settings Values; Resetting the Preferences Settings Values; Saving the Settings Values; Summary; Chapter 10: File Handling; Understanding the Application Folders; Using the Documents and Library Folders; Storing Files in the Temporary Folder; Which Folder Should You Use: Documents or tmp?…”
    Libro electrónico
  12. 632
    por Devine, Tom
    Publicado 2011
    Tabla de Contenidos: “…Building PartnershipsGathering More Information; Corporate Filings; Other Information in the Public Record; Freedom of Information Act; Public Interest Organizations and the Media; A Note on Defamation; Public Figures versus Private Citizens; Truth as an Absolute Defense; CHAPTER 4 Where to Go When You Want to Blow; Whistle Where You Work: The Corporate Channels; In-House Disclosure Programs; Going up the Chain of Command; Pointers for Taking It up the Chain; Whistleblowing to Regulators and Law Enforcement; The Problem of Regulatory Capture; Pointers for Taking It to an Agency…”
    Libro electrónico
  13. 633
    por Falcone, Paul
    Publicado 2010
    Tabla de Contenidos: “…#12 Leaving the Work Site During a Regularly Scheduled Shift#13 Disclosure of Confidential Information About the Company or Its Customers; #14 Failure to Follow Company Dress Code; #15 Lack of Cleanliness and Substandard Personal Hygiene; #16 Smoking on Company Grounds; #17 E-Mail Misuse; #18 Off-Duty Conduct and "Moonlighting"; #19 Failure to Disclose a Conflict of Interest/Personal Relationship (Code of Conduct Violation); Part IV: Performance Transgressions; #20-26 Substandard Work Performance; #27 Substandard Customer Service; #28, 29 Safety Infractions; #30 Lack of Sales Production…”
    Libro electrónico
  14. 634
    Publicado 2011
    Tabla de Contenidos: “…Fair Value of Assets Under FASB (GAAP) and IASB (IFRS)Valuing Intangible Assets on the Balance Sheet; Valuing Intangible Assets That Are Not on the Balance Sheet; Using the MD&A for Insights on Assets; Improvements in Fair Value Disclosures: A Checklist for Investors; Asset-Based Valuation by Industry; Special Topics in Asset Valuations: Valuing Assets in Pension Plans; Lens Check; Conclusion: Asset Values in Bailouts; Appendix 2.1: Common Ratios, Multiples, Averages, and Algorithms Based on Assets - and Examples of Their Use…”
    Libro electrónico
  15. 635
    Publicado 2013
    Tabla de Contenidos: “…-- Defer Secondary Information to Secondary Screens -- Example 1 Mobile Coupons -- Example 2 Progressive Disclosure in Wikipedia -- Deferring Information = Initial Info Read More -- Mini-IA: Structuring the Information About a Concept -- Linear Paging? …”
    Libro electrónico
  16. 636
    Publicado 2012
    Tabla de Contenidos: “…Reaching an Agreement Historical M&A Trends; Conclusion; CHAPTER 7: Legal Considerations in Sale Transactions; Introduction; Sale Transactions; Prior to the Sale Transaction; Use of an Investment Banker; Marketing Process; Due Diligence; Negotiations Phase; Key Deal Issues; Valuation and Pricing Issues; Special Issues in Sales of Private Equity Fund-Owned Businesses; Sale and Acquisition Structure; Merger; Asset Purchase; Stock Purchase; Employee Incentive Issues; Cash Retention Bonus; Stock Bonuses; Recapitalizations; The Sale Transaction Process; Letter of Intent; Disclosure of Acquisitions…”
    Libro electrónico
  17. 637
    Publicado 2011
    Tabla de Contenidos: “…Dimitrov -- International Health Partnership and IHP+ / Anna Holzscheiter -- Multistakeholder involvement in UN conferences / Kathrin Böhling -- World Commission on Dams / Navroz K. Dubash -- Carbon Disclosure Project / Eun-Hee Kim and Thomas P. Lyon -- Codex Alimentarius Commission / Tim Büthe and Nathaniel Harris -- The Equator Principles / Christopher Wright -- Extractive Industries Transparency Initiative / Helmut Weider -- Fair Labor Association / Kate MacDonald -- The Fair Trade System / Kate MacDonald -- Clean Clothes Campaign / Niklas Egels-Zandén -- Forest Stewardship Council / Philipp Pattberg -- Global Corporate Governance Principles / Andrew Baker -- Global Reporting initiative / Halina Szejnwald Brown -- International Organization for Standardization 14001 / Matthew Potoski and Elizabeth Elwakeil -- Kimberly Process / Carola Kantz -- Marine Stewardship Council / Thomas Hale -- OECD Guidelines for Multinational Enterprises / Elisa Morgera -- Partnering against Corruption Initiative and the Business Principles for Countering Bribery / David Hess -- Responsible Care / Ivan Montiel -- Rugmark / Mathias Koenig-Archibugi -- Social Accountability International / Rainer Braun -- International Council of Toy Industries Code of Conduct / Reinhard Biedermann -- United Nations Global Compact / Thomas Hale -- Voluntary Principles on Security and Human Rights / Chip Pitts -- Worker Rights Consortium / Robert J.S. …”
    Libro
  18. 638
    Publicado 2020
    Tabla de Contenidos: “…Neely and Mitzi Lewis -- From Magic Lantern slides to virtual reality : tracing the visual in and around American literary journalism / Jacqueline Marino and Susan Jacobson -- Literary journalism and ecocriticism / Robert Alexander -- The disclosure of difference : literary journalism and the postmodern / Pascal Sigg -- Beyond comparison : American literary journalism in a global context / Isabelle Meuret -- Literary journalism in the digital age / David O. …”
    Libro
  19. 639
    Publicado 2018
    Tabla de Contenidos: “…Fuzzing web requests using the Intruder tab -- Intruder attack types -- Practical examples -- Installing third-party apps using Burp Extender -- Summary -- Chapter 5: Understanding Web Application Vulnerabilities -- File Inclusion -- Local File Inclusion -- Remote File Inclusion -- Cross-Site Scripting -- Reflected XSS -- Stored XSS -- Exploiting stored XSS using the header -- DOM XSS -- JavaScript validation -- Cross-Site Request Forgery -- Step 01 - victim -- Step 02 - attacker -- Results -- SQL Injection -- Authentication bypass -- Extracting the data from the database -- Error-based SQLi enumeration -- Blind SQLi -- Command Injection -- OWASP Top 10 -- 1 - Injection -- 2 - Broken Authentication -- 3 - Sensitive Data -- 4 - XML External Entities -- 5 - Broken Access Control -- 6 - Security Misconfiguration -- 7 - Cross-Site Scripting (XSS) -- 8 - Insecure Deserialization -- 9 - Using Components with Known Vulnerabilities -- 10 - Insufficient Logging &amp -- Monitoring -- Summary -- Chapter 6: Application Security Pre-Engagement -- Introduction -- The first meeting -- The day of the meeting with the client -- Non-Disclosure Agreement -- Kick-off meeting -- Time and cost estimation -- Statement of work -- Penetration Test Agreement -- External factors -- Summary -- Chapter 7: Application Threat Modeling -- Software development life cycle -- Application Threat Modeling at a glance -- Application Threat Modeling in real life -- Application Threat Modeling document parts -- Data Flow Diagram -- External dependencies -- Trust levels -- Entry points -- Assets -- Test strategies -- Security risks -- Practical example -- xBlog Threat Modeling -- Scope -- Threat Modeling -- Project information -- Data Flow Diagram -- External dependencies -- Trust levels -- Entry points -- Assets -- Threats list -- Spoofing - authentication -- Tampering - integrity…”
    Libro electrónico
  20. 640
    Publicado 2015
    Tabla de Contenidos: “…Confidentiality and Non-Disclosure Agreements -- I. Antiboycott Compliance -- J. …”
    Libro electrónico