Mostrando 701 - 720 Resultados de 823 Para Buscar '"Disclosure"', tiempo de consulta: 0.12s Limitar resultados
  1. 701
    por Huber, Peter J.
    Publicado 2011
    Tabla de Contenidos: “…2.5.1 Inspection2.5.2 Error checking; 2.5.3 Modification; 2.5.4 Comparison; 2.5.5 Modeling and Model fitting; 2.5.6 Simulation; 2.5.7 What-if analyses; 2.5.8 Interpretation; 2.5.9 Presentation of conclusions; 2.6 Tools required for strategy reasons; 2.6.1 Ad hoc programming; 2.6.2 Graphics; 2.6.3 Record keeping; 2.6.4 Creating and keeping order; 3 Massive Data Sets; 3.1 Introduction; 3.2 Disclosure: Personal experiences; 3.3 What is massive? …”
    Libro electrónico
  2. 702
    Publicado 2011
    Tabla de Contenidos: “…Cleveland -- Communicating employee benefits programs -- Appendix to Chapter 27: key reporting and disclosure requirements of the patient protection and Affordable Care Act of 2010 / Serafina Maniaci -- Group and health benefit plan financial management -- Federal tax law requirements for group welfare benefit plans / Everett T. …”
    Libro electrónico
  3. 703
    Publicado 2018
    Tabla de Contenidos: “…Testing SSL configuration using Nmap -- Exploiting Heartbleed -- POODLE -- Custom encryption protocols -- Identifying encrypted and hashed information -- Hashing algorithms -- hash-identifier -- Frequency analysis -- Entropy analysis -- Identifying the encryption algorithm -- Common flaws in sensitive data storage and transmission -- Using offline cracking tools -- Using John the Ripper -- Using Hashcat -- Preventing flaws in cryptographic implementations -- Summary -- Chapter 9: AJAX, HTML5, and Client-Side Attacks -- Crawling AJAX applications -- AJAX Crawling Tool -- Sprajax -- The AJAX Spider - OWASP ZAP -- Analyzing the client-side code and storage -- Browser developer tools -- The Inspector panel -- The Debugger panel -- The Console panel -- The Network panel -- The Storage panel -- The DOM panel -- HTML5 for penetration testers -- New XSS vectors -- New elements -- New properties -- Local storage and client databases -- Web Storage -- IndexedDB -- Web Messaging -- WebSockets -- Intercepting and modifying WebSockets -- Other relevant features of HTML5 -- Cross-Origin Resource Sharing (CORS) -- Geolocation -- Web Workers -- Bypassing client-side controls -- Mitigating AJAX, HTML5, and client-side vulnerabilities -- Summary -- Chapter 10: Other Common Security Flaws in Web Applications -- Insecure direct object references -- Direct object references in web services -- Path traversal -- File inclusion vulnerabilities -- Local File Inclusion -- Remote File Inclusion -- HTTP parameter pollution -- Information disclosure -- Mitigation -- Insecure direct object references -- File inclusion attacks -- HTTP parameter pollution -- Information disclosure -- Summary -- Chapter 11: Using Automated Scanners on Web Applications -- Considerations before using an automated scanner -- Web application vulnerability scanners in Kali Linux -- Nikto -- Skipfish…”
    Libro electrónico
  4. 704
    Publicado 2015
    Tabla de Contenidos: “…; 1.2 How to Manage Enterprise Value: Enlarging the Performance Measurement Toolkit; 1.3 Why to Manage Enterprise Value: A Multistakeholder Perspective; 1.3.1 Enterprise Stakeholders; 1.3.1.1 Shareholders; 1.3.1.2 Debtholders; 1.3.1.3 Other Stakeholders; 1.3.1.4 Financial Analysts; 1.3.2 External Accountability; 1.3.2.1 Disclosure; 1.3.2.2 Corporate Governance; 1.3.3 Internal Accountability; 1.3.3.1 Decision Making and Indicators…”
    Libro electrónico
  5. 705
    Publicado 2017
    Tabla de Contenidos: “…-- Why People Don't Listen -- Four Principles of Effective Sales Conversations -- The Fine Art of Listening -- Active Listening -- Listen Deeply -- Activating the Self-Disclosure Loop -- Notes -- Chapter 23: Discovery: Sales Is a Language of Questions -- The Tour -- Alpha and Omega -- Joe the Interrogator -- Ask Easy Questions First -- The Power of Open-Ended Questions -- Avoid the Pump and Pounce -- Fluid Dual Process Discovery -- Developing Go-To Questions -- Notes -- Chapter 24: Do You Make Me Feel Important? …”
    Libro electrónico
  6. 706
    Publicado 2017
    Tabla de Contenidos: “…-- Gender Progress Disclosure -- Gender Diversity Targets -- Gender Diversity Statement -- Board Selection Process -- Secret Campaigns to Increase Gender Diversity Will Not Be Successful -- Constructing a New Gender Propensity Index© -- What Happens Next? …”
    Libro electrónico
  7. 707
    por Cossin, Didier
    Publicado 2024
    Tabla de Contenidos: “…-- Overseeing Risk -- Chapter 24 The Intricacies of Subsidiary/Holding Governance -- Structures -- Culture -- Chapter 25 Fostering Entrepreneurship from the Board -- 'Best Practice' Governance vs Entrepreneurship -- Boards Should Actively Encourage Entrepreneurship -- Innovativeness and Autonomy -- Passion and Risk Taking -- Chapter 26 The Board's Oversight Framework for M&amp -- As -- Creating a Deal-making Mindset -- Seeing the Bigger Picture -- Staging Deals with Maximum Precision -- Strategy Fit Review -- Risk Analysis -- Due Diligence -- Deal Structure and Pricing -- Integration -- Post-integration Analysis -- Confronting Litigation Involving M&amp -- As -- Conflicts of Interest -- Lack of Disclosure -- Hostile and Friendly Takeover -- Pre-acquisition Mismanagement -- Post-acquisition Mismanagement -- Acknowledgement -- Chapter 27 Boards and Oversight of KPIs -- KPIs are a Language - and are Indispensable for Boards -- KPIs Need to be Credible to be Useful -- Zooming in on the KPIs that Matter - and that Tell a Story of How the Company Creates Value -- KPIs Should Measure What is Critical -- A Keen Focus on Value Creation -- KPIs Help Diminish Substantial Business Risks Linked to ESG -- KPIs and Human Capital -- A Dynamic Approach to KPIs -- Hi-tech Display and Review of KPIs -- A Renaissance of the Balanced Scorecard -- KPIs for Board Members -- Appendix 27A -- Checklist -- Chapter 28 The Talent Pipeline -- The Board's Responsibility for Talent Management -- From succession plans to transitioning leaders, boards have a role to play…”
    Libro electrónico
  8. 708
    por Saleem, Shaikh
    Publicado 2011
    Tabla de Contenidos: “…Price Movement During the 1980s -- Price Situation During the 1990s -- Objectives of Price Policy -- Prices of Industrial Products -- Control of Expenditure -- International Prices of Select Commodities -- Challenges and Outlook -- Key Words -- Questions -- References -- Chapter 6: Stock Exchanges in India -- Concept and Meaning of Stock Exchange -- List of Stock Exchanges in India -- Types of Financial Markets -- SEBI and Its Role in the Secondary Market -- Security Exchange Board of India (SEBI) -- Role of SEBI in Regulating Trading in the Secondary Market -- Products Available in the Secondary Market -- Regulatory Requirements Specified by SEBI for Corporate Debt Securities -- Broker and Sub-broker in the Secondary Market -- Broker -- Sub-broker -- Agreement with the Broker or Sub-broker -- Risk Disclosure Document -- Placing Orders with the Broker or Sub-broker -- Brokerage that a Broker or Sub-broker Can Charge -- Charges Levied on the Investor by a Stockbroker/Sub-broker -- Securities Transaction Tax (STT) -- Rolling Settlement -- SEBI Risk Management System -- Redressing Investor Grievances -- Investor Protection Fund (IPF)/Customer Protection Fund (CPF) at Stock Exchanges -- The Securities Contracts (Regulation) Act of 1956 -- The Securities and Exchange Board of India Act of 1992 -- Foreign Institutional Investors (FIIs) -- Functions of Security Exchange Board of India -- Powers of Security Exchange Board of India -- Investigation -- Cease and Desist Proceedings -- Consolidate Market Regulation Under SEBI -- Reduce Costs -- Regulatory Overlaps -- Growth of Stock Market in India -- Stock Market in India and China Underperforms -- India's Premium over Other EMs Plunges -- Where to Invest Now -- Key Words -- Questions -- References -- Chapter 7: National Income -- Meaning and Definition of National Income -- Concepts of National Income…”
    Libro electrónico
  9. 709
    Publicado 2024
    Tabla de Contenidos: “…The role of the attacker's mindset in strengthening cybersecurity -- Ethical considerations and legal boundaries -- Ethical hacking and responsible disclosure -- The role of innovation in cybersecurity -- The benefits of and need for innovation -- Driving innovation within organizations -- Emerging technologies and future trends -- Summary -- Chapter 4: Assessing Your Organization's Security Posture -- The components of a comprehensive security posture -- Evaluating security technologies -- Understanding the role of security processes -- The human factor in a security posture -- Effective metrics for security programs and teams -- Understanding the importance of security metrics -- Selecting the right metrics -- Implementing and tracking security metrics -- Asset inventory management and its role in security posture -- Understanding asset inventory in cybersecurity -- Building a comprehensive asset inventory -- Maintaining and updating asset inventory -- Continuously monitoring and improving your security posture -- Implementing continuous monitoring practices -- Responding to incidents and implementing remediation measures -- The technological landscape in security posture -- Summary -- Chapter 5: Developing a Comprehensive Modern Cybersecurity Strategy -- Key elements of a successful cybersecurity strategy -- Foundational principles and components -- Setting objectives and goals -- The role and significance of each element -- Aligning cybersecurity strategy with business objectives -- Correlation of organizational goals and cybersecurity endeavors -- Prioritizing cybersecurity based on business impact -- Communicating cybersecurity's value to stakeholders -- Risk management and cybersecurity strategy -- Integrating risk management methodologies in strategy formulation -- Conducting comprehensive risk assessments…”
    Libro electrónico
  10. 710
    Publicado 2017
    Tabla de Contenidos: “…chapter 1 Supporting factors and the effect of an Initial Public Offering (IPO) on an Islamic bank: The first case in Indonesia / chapter 2 Analysis of behavior and determinants of cost stickiness in manufacturing companies in Indonesia / chapter 3 The effect of ownership structure, board of commissioners’ effectiveness and audit committee effectiveness on firm value: An empirical study of listed companies in the Indonesia stock exchange 2014 / chapter 4 Perception of accounting students and alumni of the influence of internships on skill development / chapter 5 Characteristics of local government as Zakat (tithe) collector / chapter 6 Internal audit’s role as a coordinator of combined assurance implementation / chapter 7 Islamic accountability index of cash waqf institution in Indonesia / chapter 8 Sustainability of the productive cash waqf institutions in Indonesia from an N-Helix perspective / chapter 9 Do accrual accounting practice and the supreme audit institution role improve government financial disclosure? Cross-country empirical studies / chapter 10 Player’s value, field performance, financial performance and stock performance of European football clubs / chapter 11 Portfolio formation using the Fama-French five-factor model with modification of a profitability variable: An empirical study on the Indonesian stock exchange / chapter 12 Analysing the impact of the double taxation treaty on foreign direct investment in Indonesia / chapter 13 The determinants of working capital requirements of manufacturing firms in Indonesia / chapter 14 Audit opinion, internal control system, bureaucracy reform, political background and the level of corruption in government institutions / chapter 15 The effect of corporate governance mechanisms and managerial incentives on corporate tax avoidance in Indonesia / chapter 16 CEO tenure period and earnings management in the banking industry in Indonesia / chapter 17 Factors affecting business lending of regional development banks in Indonesia / chapter 18 The impact of competition on bank stability in ASEAN-5 / chapter 19 Making sense of an airline’s logo makeover: The case of garuda Indonesia / chapter 20 Reminiscent bundling and product type influence on intention to purchase: A case in music industry / chapter 21 The measurement of operational risk capital costs with an advanced measurement approach through the loss distribution approach (A case study in one of the Indonesia’s state-owned banks) / chapter 22 Hijab phenomenon in Indonesia: Does religiosity matter? …”
    Electrónico
  11. 711
    Publicado 2021
    Tabla de Contenidos: “…Data Infrastructures and the (Ambivalent) Effects of Rising Data Interoperability: Insights from Germany -- Introduction -- The German "Context" of Datafying and Digitalizing Education -- Understanding the "Disruptive" Potential of Data Infrastructures: Three Examples from Germany -- The Transforming Infrastructures of Standardized Assessments -- The Transforming Infrastructures of State School Monitoring -- The Transforming Infrastructure of School Platforms and Learning Management Systems -- Conclusion and Outlook -- Disclosure Statement -- 9. Datafication and Surveillance Capitalism: The Texas Teacher Evaluation and Support System (T-TESS)…”
    Libro electrónico
  12. 712
    Publicado 2014
    Tabla de Contenidos: “…Linux Environments -- Differences between Linux and Microsoft -- The setup -- Scenario 1 - learn Samba and other dance forms -- Setup -- Configuration -- Testing -- Variations -- Information disclosure -- File upload -- Scenario 2 - turning on a LAMP -- Setup -- The PHP -- Variations -- Out-of-date versions -- Login bypass -- SQL injection -- Dangerous PHP -- PHPMyAdmin -- Scenario 3 - destructible distros -- Setup -- Variations -- Scenario 4 - tearing it up with Telnet -- Setup -- Variations -- Default credentials -- Buffer overflows -- Flag placement and design…”
    Libro electrónico
  13. 713
    por Kunz, Christopher
    Publicado 2008
    Tabla de Contenidos: “…; 1.7 Wichtige Informationsquellen; 1.7.1 Mailinglisten; 1.7.2 Full Disclosure; 1.7.3 BugTraq; 1.7.4 WebAppSec; 1.8 OWASP; 1.9 PHP-Sicherheit.de; 2 Informationsgewinnung; 2.1 Grundlagen; 2.2 Webserver erkennen; 2.2.1 Server-Banner erfragen; 2.2.2 Webserver-Verhalten interpretieren; 2.2.3 Tools für Webserver-Fingerprinting; 2.3 Betriebssystem erkennen; 2.4 PHP-Installation erkennen; 2.5 Datenbanksystem erkennen…”
    Libro electrónico
  14. 714
    Publicado 1991
    Tabla de Contenidos: “…GOTTSCHALK -- Commentary -- STANLEY JOEL REISER -- Deliberations of the Human Fetal Tissue Transplantation Research Panel -- BACKGROUND AND CONTEXT -- PROCESS -- THE MORAL STATUS OF THE FETUS AND THE MORALITY OF ABORTION -- COMPLICITY, COLLABORATION, AND COOPERATION IN MORAL EVIL -- INCREASE IN THE NUMBER OF ABORTIONS -- General Altruism -- Specific Altruism -- Incentives of Financial Gain -- SOCIETAL LEGITIMATION OF ABORTION DECISIONS AND PRACTICES -- DISPOSITIONAL AUTHORITY OVER FETAL REMAINS -- LIMITS ON DISCLOSURE OF INFORMATION AND DECISION MAKING -- OTHER ISSUES AND RECOMMENDATIONS -- OTHER DEVELOPMENTS AND PUBLIC POLICY RESPONSES -- CONCLUSION -- APPENDIX A -- APPENDIX B -- Human Fetal Tissue Transplantation Research Panel -- REFERENCES -- ADDITIONAL BIBLIOGRAPHY -- Commentary -- PATRICIA A. …”
    Libro electrónico
  15. 715
    Publicado 2017
    Tabla de Contenidos: “…Intro -- Foreword -- Preface -- Contents -- Editors and Contributors -- List of Figures -- List of Tables -- List of Photos -- 1 Implementing the Nordic Barnahus Model: Characteristics and Local Adaptions -- Introduction -- The Barnahus Idea -- A Multi-professional Approach -- The One Door Principle -- Avoiding Secondary Victimisation -- A Safe Place for Disclosure and Neutral Place for Professional Interventions -- A Broad Target Group and Definition of Child Abuse -- The Nordic Welfare State Context -- The Child Welfare System -- The Criminal Justice System -- Child-Friendly Justice -- The Child Rights Perspective -- The Nordic Barnahus Model(s) -- Comparing Key Characteristics and Local Adaptions -- Types of Abuse and Target Groups -- Implementation and Regulation -- Central Coordination and Collaboration -- Concluding Remarks -- Outline of the Book -- Themes and Chapters -- References -- Part I Child-Friendliness, Support and Treatment -- 2 Staging a Caring Atmosphere: Child-Friendliness in Barnahus as a Multidimensional Phenomenon -- Introduction -- Staging Atmospheres: Articulations of Child-Friendliness in Key Texts -- Perceived Atmospheres: Children and Caretaker Experiences of Barnahus -- Concluding Thoughts -- Afterword -- References -- 3 To Be Summoned to Barnahus: Children's Perspectives -- Introduction -- Routines in Swedish Barnahus -- Methods -- Barnahus from Children's Perspectives: A House of Police -- Scary but Necessary: To Be Summoned Without Parent's Knowledge -- Discussion and Conclusions -- References -- 4 Treatment in Barnahus: Implementing Combined Treatment for Children and Parents in Physical Abuse Cases -- Introduction -- Combined Parent-Child Cognitive Behavioural Therapy (CPC-CBT) -- Child Treatment -- Parent Treatment -- Joint Sessions -- Implementation and Adaptions to the Swedish Context -- Results…”
    Libro electrónico
  16. 716
    Publicado 2014
    Tabla de Contenidos: “…SOVEREIGN SUKUK -- SUKUK -- DEBT CAPITAL MARKETS -- REGULATORY ISSUES -- CROSS-BORDER FINANCING -- CONCLUSION -- ABOUT THE AUTHORS -- Chapter 8: Hong Kong -- ASSET MANAGEMENT -- TAX -- RETAIL AND MICROFINANCE -- ISLAMIC BANKING -- Risk Management -- Adherence to Islamic Law -- Binding Documentation -- Disclosure of Risk and Return to Depositors -- SUKUK AND RENMINBI BUSINESS -- DEBT CAPITAL MARKETS AND EQUITY CAPITAL MARKETS -- REGULATORY ISSUES -- CROSS-BORDER FINANCING -- CONCLUSION -- ABOUT THE AUTHORS -- Chapter 9: India -- ASSET MANAGEMENT -- Alternative Investment Funds -- Real Estate Investment Trusts -- Structured Products -- TAX AND ACCOUNTING -- RETAIL AND MICROFINANCE -- TAKAFUL AND RE- TAKAFUL -- SOVEREIGN SUKUK -- DEBT CAPITAL MARKETS -- Tax and Stamp Duties -- Investor Perception and Documentation Challenge -- REGULATORY ISSUES -- CROSS-BORDER FINANCING -- CONCLUSION -- ABOUT THE AUTHOR -- Chapter 10: Indonesia -- MACROECONOMIC PERFORMANCE AND ASSET MANAGEMENT -- Public Response As Indicated by Liquidity Behavior -- Monetary Policy and Interest Rate Responses -- The Indonesian Islamic Banking Industry: Funding Activities -- The Indonesian Islamic Banking Industry: Financing Activities -- MICROFINANCE -- TAKAFUL AND RE- TAKAFUL -- SUKUK -- REGULATORY ISSUES -- CONCLUSION -- NOTES -- REFERENCES -- ABOUT THE AUTHOR -- Chapter 11: Iran -- THE HISTORY OF IRANIAN BANKING -- Modern Banking: 1887-1925 -- Establishment of Iranian Banks and the Central Bank: 1925-1979 -- Nationalization and Merger of Iranian Banks: 1979-1981 -- Demand for Riba-Free Banking: 1981-1983 -- Development of the Banking System Since 1983 -- THE RIBA-FREE BANKING ACT -- Objectives and Duties -- Mobilization of Financial Resources -- DEPOSITS -- Qard Hasan Deposits -- Current Accounts -- Savings Accounts -- Term Investment Deposits ( Wakalah Accounts)…”
    Libro electrónico
  17. 717
    Publicado 2023
    Tabla de Contenidos: “…-- References -- Chapter 2: Domain 1: Security and Risk Management -- Unique Terms and Definitions -- Introduction -- Cornerstone Information Security Concepts -- Confidentiality, Integrity, and Availability -- Confidentiality -- Integrity -- Availability -- Tension Between the Concepts -- Disclosure, Alteration, and Destruction -- Identity and Authentication, Authorization, and Accountability (AAA) -- Identity and Authentication -- Authorization -- Accountability -- Non-repudiation -- Least Privilege and Need to Know -- Subjects and Objects -- Defense-in-Depth -- Due Care and Due Diligence -- Gross Negligence -- Legal and Regulatory Issues -- Compliance With Laws and Regulations -- Major Legal Systems -- Civil Law (Legal System) -- Common Law -- Religious Law -- Other Systems -- Criminal, Civil, and Administrative Law -- Criminal Law -- Civil Law -- Administrative Law -- Liability -- Due Care -- Due Diligence -- Legal Aspects of Investigations -- Evidence -- Real Evidence -- Direct Evidence -- Circumstantial Evidence -- Corroborative Evidence -- Hearsay -- Best Evidence Rule -- Secondary Evidence -- Evidence Integrity -- Chain of Custody -- Reasonable Searches -- Entrapment and Enticement -- Computer Crime -- Intellectual Property -- Trademark -- Patent -- Copyright -- Copyright Limitations -- Licenses -- Trade Secrets -- Intellectual Property Attacks -- Privacy -- European Union Privacy -- OECD Privacy Guidelines…”
    Libro electrónico
  18. 718
    Publicado 2022
    Tabla de Contenidos: “…(d) The Appropriate Representatives -- (e) A Structured Process for the Selection of Data -- (f) High-Quality Documentation Which Provides Clear Reasoning and Evidence Supporting the Scenario Output -- (g) Independent Challenge and Oversight -- (h) A Process That Is Responsive to Changes -- (i) Mechanisms for Mitigating Biases -- Scenario Analysis Output -- Key Points -- Review Questions -- Notes -- Chapter 12 Capital Modeling -- Operational Risk Capital -- Basic Indicator Approach -- Standardized Approach -- Alternative Standardized Approach -- Future of the Basic and Standardized Approaches -- Advanced Measurement Approach -- Quantitative Requirements of an AMA Model -- Loss Distribution Approach to Modeling Operational Risk Capital -- Scenario Analysis Approach to Modeling Operational Risk Capital -- Hybrid Approach to Modeling Operational Risk Capital -- Insurance -- Future of Capital Requirements: Basel III -- Basel III Standardized Approach -- Disclosure -- Key Points -- Review Questions -- Notes -- Chapter 13 Reporting -- Role of Reporting -- Operational Risk Event Reporting -- Impact of Gains on Internal Event Reporting -- Trends in Internal Losses -- Internal Losses by Risk Category -- Timeliness -- External Loss Data Reporting -- Risk and Control Self-Assessment Reporting -- Key Risk Indicator Reporting -- Scenario Analysis Reporting -- Capital Reporting -- Action Tracking Reporting -- A Consolidated View -- Dashboards -- Key Points -- Review Question -- Chapter 14 Risk Appetite -- The Role of Risk Appetite -- Regulatory Expectations -- Implementing a Risk Appetite Framework -- The Risk Appetite Framework as a Strategic Decision-Making Tool -- Appetite Governance: The Board, "C-Suite," and Business Lines -- Promoting a Firmwide Risk Appetite Framework -- Monitoring the Firm's Risk Profile within the Risk Appetite Framework…”
    Libro electrónico
  19. 719
    Publicado 2024
    Tabla de Contenidos: “…Account provisioning and deprovisioning -- Directory services -- Privileged access management -- Data and media sanitization -- Network security -- Zero trust networking -- Virtualization security -- Common threats -- Insufficient identity, credential, access, and key management -- Insecure interfaces and APIs -- Misconfiguration and inadequate change control -- Lack of cloud security architecture and strategy -- Insecure software development -- Unsecure third-party resources -- System vulnerabilities -- Accidental cloud data disclosure -- Misconfiguration and exploitation of serverless and container workloads -- Organized crime/hackers/APT -- Cloud storage data exfiltration -- Security hygiene -- Baselining -- Patching -- Comprehending Design Principles of Secure Cloud Computing -- Cloud secure data lifecycle -- Cloud based business continuity (BC) and disaster recovery (DR) planning -- Cost benefit analysis -- Functional security requirements -- Security considerations for different cloud categories -- IaaS security concerns -- PaaS security concerns -- SaaS security concerns -- Evaluating Cloud Service Providers -- Verifying against certification criteria -- ISO/IEC 27001 -- ISO/IEC 27002 -- ISO/IEC 27017 and ISO/IEC 27018 -- SOC 1, SOC 2, and SOC 3 -- Payment Card Industry Data Security Standard (PCI DSS) -- NIST SP 800-53 and FedRAMP -- Meeting system/subsystem product certifications -- Common Criteria -- FIPS 140-2 and FIPS 140-3 -- Chapter 5 Domain 2: Cloud Data Security, Part 1 -- Describing Cloud Data Concepts -- Cloud data lifecycle phases -- Create -- Store -- Use -- Share -- Archive -- Destroy -- Data dispersion -- Data flows -- Designing and Implementing Cloud Data Storage Architectures -- Storage types -- IaaS -- PaaS -- SaaS -- Threats to storage types -- Designing and Applying Data Security Technologies and Strategies…”
    Libro electrónico
  20. 720
    Publicado 2023
    Tabla de Contenidos: “…Protective failure -- Continuous protection -- Redundancy -- Use of standardized cryptography -- Summary -- Further reading -- Chapter 3: Threat Landscape against Vehicle Components -- Threats against external vehicle interfaces -- Backend-related threats -- Connectivity threats -- Threats against the E/E topology -- Highly distributed E/E architecture -- Domain-centralized E/E architecture -- Central vehicle computer architecture -- Threats against in-vehicle networks -- CAN -- FlexRay -- Ethernet -- The Unified Diagnostic Services (UDS) protocol -- SAE J1939 protocols -- SAE J2497 (PLC4TRUCKS) -- Threats against sensors -- Common ECU threats -- Debug ports -- Flash programming -- Power and mode manipulation -- Tampering with machine learning algorithms -- Software attacks -- Disclosure and tampering of cryptographic keys -- Summary -- References -- Part 2: Understanding the Secure Engineering Development Process -- Chapter 4: Exploring the Landscape of Automotive Cybersecurity Standards -- Primary standards -- UNECE WP.29 -- Chinese regulation and standardization -- Secondary standards -- IATF 16949:2016 -- Automotive SPICE (ASPICE) -- Trusted Information Security Assessment Exchange (TISAX) -- SAE J3101 - hardware-protected security for ground vehicles -- Coding and software standards -- NIST cryptographic standards -- Supporting standards and resources -- MITRE Common Weakness Enumeration (CWE) -- US DoT NHTSA Cybersecurity Best Practices for the Safety of Modern Vehicles -- ENISA good practices for the security of smart cars -- SAE J3061 - cybersecurity guidebook for cyber-physical vehicle systems -- ISO/IEC 27001 -- NIST SP 800-160 -- Uptane -- Summary -- References -- Chapter 5: Taking a Deep Dive into ISO/SAE21434 -- Notations -- At a glance - the ISO 21434 standard -- Organizational cybersecurity management -- Management systems…”
    Libro electrónico