Mostrando 741 - 760 Resultados de 823 Para Buscar '"Disclosure"', tiempo de consulta: 0.10s Limitar resultados
  1. 741
    Publicado 2022
    Tabla de Contenidos: “…Employment Laws and Regulations -- Exam Notables -- The SHRM Exam Objectives -- The Regulatory Environment -- Laws Enforced by the Equal Employment Opportunity Commission -- Americans with Disabilities Act -- Civil Rights Act of 1964 -- Genetic Information Nondiscrimination Act -- Laws Enforced/Administered by the Occupational Safety and Health Administration -- Occupational Safety and Health Act -- National Institute for Occupational Safety and Health -- Whistleblower Protection -- Laws Administered by the Office of Workers' Compensation Programs -- Federal Employees' Compensation Act -- Longshore and Harbor Workers' Compensation Act -- Laws Administered by the National Labor Relations Board and the Office of Labor-Management Standards -- National Labor Relations Act -- Labor Management Relations Act -- Labor-Management Reporting and Disclosure Act -- Laws Administered by the Wage and Hour Division -- Davis-Bacon Act -- Employee Polygraph Protection Act -- Fair Labor Standards Act -- Family and Medical Leave Act -- Walsh-Healey Public Contracts Act -- Laws Administered by the Mine Safety and Health Administration -- Federal Mine Safety and Health Act -- The Mine Improvement and New Emergency Response Act -- Laws Administered by the Employee Benefits Security Administration…”
    Libro electrónico
  2. 742
    Publicado 2016
    Tabla de Contenidos: “…Concepts, Rules, and Examples -- Accounts to be Remeasured Using Historical Exchange Rates -- Chapter 52: ASC 835 Interest -- Perspective and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- Chapter 53: ASC 840 Leases -- Perspective and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- Chapter 54: ASC 845 Nonmonetary Transactions -- Perspective and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- Chapter 55: ASC 850 Related-Party Disclosures -- Perspective and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- Chapter 56: ASC 852 Reorganizations -- Perspective and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- Chapter 57: ASC 853 Service Concession Arrangements -- Perspective and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- Chapter 58: ASC 855 Subsequent Events -- Perspective and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- Chapter 59: Asc 860 Transfers and Servicing -- Perspective and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- Chapter 60: ASC 900S Specialized Industry GAAP -- Contractors-Federal Government (ASC 912) -- Perspective and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- Development Stage Enterprises (ASC 915) -- Entertaintment-Broadcasters (ASC 920) -- Perspective and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- Entertainment-Cable Television (ASC 922) -- Perspective and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- Entertainment-Casinos (ASC 924) -- Perspective and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- Entertainment-Film (ASC 926) -- Perspective and Issues -- Definitions of Terms -- Concepts, Rules, and Examples -- Entertainment-Music (ASC 928) -- Perspective and Issues -- Definitions of Terms…”
    Libro electrónico
  3. 743
    Publicado 2018
    Tabla de Contenidos: “…4 Discretionary properties of the impairment-only approach -- 4.1 Chapter overview -- 4.2 Main provisions of SFAS 141 and 142 -- 4.3 Frequency -- 4.3.1 Annual testing -- 4.3.1.1 Rule -- 4.3.1.2 Exception -- 4.3.2 Unscheduled testing when circumstances warrant -- 4.4 Level of aggregation -- 4.5 Existence -- 4.5.1 Reporting unit fair value -- 4.5.1.1 Quoted market prices -- 4.5.1.2 Present value techniques -- 4.5.1.2.1 Measuring fair value as the objective -- 4.5.1.2.2 Measurement techniques -- 4.5.1.3 Multiples -- 4.5.1.4 Preliminary conclusion -- 4.5.2 Carrying value of reporting unit net assets -- 4.5.2.1 Allocating assets and liabilities -- 4.5.2.2 Allocating goodwill -- 4.5.3 Disposal -- 4.6 Measurement -- 4.6.1 Fair value of reporting unit net assets -- 4.6.1.1 Fictitious purchase price allocation -- 4.6.1.2 Recognition -- 4.6.1.3 Measurement -- 4.6.2 Inclusion of estimates -- 4.7 Transition -- 4.7.1 Effective date and initial application -- 4.7.2 Transitional impairment test -- 4.7.3 Transitional presentation and disclosures -- 4.7.4 Reclassification of goodwill and intangible assets -- 4.8 Intermediate results -- 5 Empirical investigation of write-off determinants -- 5.1 Chapter overview -- 5.2 Hypothesis development -- 5.2.1 Overview -- 5.2.2 Economic factors -- 5.2.3 Financial reporting incentives -- 5.2.3.1 Economic-consequences incentives -- 5.2.3.1.1 Compensation -- 5.2.3.1.2 Debt covenants -- 5.2.3.1.3 Political costs -- 5.2.3.2 Capital market-related incentives -- 5.2.3.2.1 Target accounting -- 5.2.3.2.1.1 General decision model -- 5.2.3.2.1.2 Firms exceeding earnings targets -- 5.2.3.2.1.3 Firms falling short of earnings targets -- 5.2.3.2.2 Rating -- 5.2.4 Control variables -- 5.3 Research design and descriptive information -- 5.3.1 Variable definition -- 5.3.2 Sample selection -- 5.3.3 Descriptive statistics and comparative analyses…”
    Tesis
  4. 744
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Advanced Infrastructure Penetration Testing -- Information security overview -- Confidentiality -- Integrity -- Availability -- Least privilege and need to know -- Defense in depth -- Risk analysis -- Information Assurance -- Information security management program -- Hacking concepts and phases -- Types of hackers -- Hacking phases -- Reconnaissance -- Passive reconnaissance -- Active reconnaissance -- Scanning -- Port scanning -- Network scanning -- Vulnerability scanning -- Gaining access -- Maintaining access -- Clearing tracks -- Penetration testing overview -- Penetration testing types -- White box pentesting -- Black box pentesting -- Gray box pentesting -- The penetration testing teams -- Red teaming -- Blue teaming -- Purple teaming -- Pentesting standards and guidance -- Policies -- Standards -- Procedures -- Guidance -- Open Source Security Testing Methodology Manual -- Information Systems Security Assessment Framework -- Penetration Testing Execution Standard -- Payment Card Industry Data Security Standard -- Penetration testing steps -- Pre-engagement -- The objectives and scope -- A get out of jail free card -- Emergency contact information -- Payment information -- Non-disclosure agreement -- Intelligence gathering -- Public intelligence -- Social engineering attacks -- Physical analysis -- Information system and network analysis -- Human intelligence -- Signal intelligence -- Open source intelligence -- Imagery intelligence -- Geospatial intelligence -- Threat modeling -- Business asset analysis -- Business process analysis -- Threat agents analysis -- Threat capability analysis -- Motivation modeling -- Vulnerability analysis -- Vulnerability assessment with Nexpose -- Installing Nexpose…”
    Libro electrónico
  5. 745
    Publicado 2021
    Tabla de Contenidos: “…-- Nailing the Value Proposition for Potential Acquirers -- Defining Transition Plans for Potential Buyers -- Crafting the Marketing Plan -- Identifying a Powerful Flow and Structure -- Acquisition Memorandum Template -- Cover Slide -- Disclosures -- Table of Contents -- Executive Summary -- Market Opportunity -- Solution -- Target Market -- Competition and Advantages -- Market Traction -- Financial Results and Projections -- Executive Team -- Technology Platform -- Marketing and Sales -- Business History -- Reason for the Sale -- Buyer Qualifications -- Directions for the LOI -- Chapter 6 Putting Your Finances in Order -- Understanding Financials -- The Importance of Key Metrics -- Burn Rate -- Hard Costs -- EBITDA -- Gross Revenues -- Gross Profit Margins -- Sales Units -- Customer Acquisition Costs -- Growth Rate -- Debt to Equity -- Why Growth and Operating Assumptions Are Critical -- Assumptions Are the Basis for All of Your Other Financials -- Credibility -- Earnouts -- Modeling Out a Powerful Five-Year Projection -- Anticipating Questions on Numbers -- Chapter 7 Understanding Your Valuation -- Variables Affecting Your Startup's Value -- Common Methods of Business Valuation -- Your Number -- Earnings Multiples -- The Comparables Approach -- Cost to Replicate -- Discounted Cash Flow Method -- Additional Valuation Methods -- How to Value Pre-revenue Startups -- The Berkus Method -- Venture Capital Method -- The Scorecard Method…”
    Libro electrónico
  6. 746
    Publicado 2022
    Tabla de Contenidos: “…Establish Processes for Handling Vulnerability Disclosures -- III. Mitigation -- A. Take Steps to Contain the Incident -- B. …”
    Libro electrónico
  7. 747
    Publicado 2019
    Tabla de Contenidos: “…Federal Election Commission -- 1.5 The Stock Market -- The Largest Stock Markets -- Primary Versus Secondary Markets -- Traditional Trading Venues -- INTERVIEW WITH Frank Hatheway -- New Competition and Market Changes -- Dark Pools -- Listing Standards -- Other Financial Markets -- NYSE, BATS, DJIA, S&amp -- P 500: Awash in Acronyms -- 1.6 Financial Institutions -- The Financial Cycle -- Types of Financial Institutions -- Role of Financial Institutions -- Summary -- Problems -- Chapter 2 Introduction to Financial Statement Analysis -- 2.1 Firms' Disclosure of Financial Information -- Preparation of Financial Statements -- International Financial Reporting Standards -- INTERVIEW WITH Ruth Porat -- Types of Financial Statements -- 2.2 The Balance Sheet -- Assets -- Liabilities -- Stockholders' Equity -- Market Value Versus Book Value -- Market-to-Book Ratio -- Enterprise Value -- 2.3 The Income Statement -- Earnings Calculations -- EBITDA…”
    Libro electrónico
  8. 748
    Publicado 2016
    Tabla de Contenidos: “…5.1 Key Sarbanes-Oxley Act (SOx) Elements -- Title I: Public Company Accounting Oversight Board -- Title II: Auditor Independence -- Title III: Corporate Responsibility -- Title IV: Enhanced Financial Disclosures -- Title V: Analyst Conflicts of Interest -- Titles VI through X: Fraud Accountability and White‐Collar Crime -- Title XI: Corporate Fraud Accountability -- 5.2 Performing Section 404 Reviews under AS5 -- 5.3 AS5 Rules and Internal Audit -- 5.4 Impact of the Sarbanes-Oxley Act -- Notes -- Chapter 6: COBIT and Other ISACA Guidance -- 6.1 Introduction to COBIT -- 6.2 COBIT Framework -- 6.3 Principle 1: Meeting Stakeholder Needs -- 6.4 Principle 2: Covering the Enterprise End to End -- 6.5 Principle 3: A Single Integrated Framework -- 6.6 Principle 4: Enabling a Holistic Approach -- 6.7 Principle 5: Separating Governance from Management -- 6.8 Using COBIT to Assess Internal Controls -- 6.9 Mapping COBIT to COSO Internal Controls -- Notes -- Chapter 7: Enterprise Risk Management: COSO ERM -- 7.1 Risk Management Fundamentals -- Risk Identification -- Key Risk Assessments -- Probability and Uncertainty -- Risk Interdependencies -- Risk Ranking -- Quantitative Risk Analysis: Expected Values and Response Planning -- Quantitative Risk Analysis: Risk Monitoring -- 7.2 COSO ERM: Enterprise Risk Management -- 7.3 COSO ERM Key Elements -- COSO ERM: The Internal Environment Component -- COSO ERM Objective Setting -- COSO ERM Event Identification -- COSO ERM Risk Assessment -- COSO ERM Risk Response Elements -- COSO ERM Control Activities -- COSO ERM Information and Communication -- COSO ERM Monitoring -- 7.4 Other Dimensions of COSO ERM: Enterprise Risk Objectives -- Operations Risk Management Objectives -- Reporting Risk Management Objectives -- Legal and Regulatory Compliance Risk Objectives -- 7.5 Entity-Level Risks…”
    Libro electrónico
  9. 749
    Publicado 2023
    Tabla de Contenidos: “…5.4.3 Entity Behaviour Analytics -- 5.5 Transforming Data into Intelligence -- 5.5.1 Structured Geospatial Analytical Method -- 5.5.2 Analysis of Competing Hypotheses -- 5.5.3 Poor Practices -- 5.6 Sharing Intelligence -- 5.6.1 Machine Readable Intelligence -- 5.7 Measuring the Effectiveness of Generated Intelligence -- Summary -- References -- Chapter 6 Attribution -- 6.1 Holding Perpetrators to Account -- 6.1.1 Punishment -- 6.1.2 Legal Frameworks -- 6.1.3 Cyber Crime Legislation -- 6.1.4 International Law -- 6.1.5 Crime and Punishment -- 6.2 Standards of Proof -- 6.2.1 Forensic Evidence -- 6.3 Mechanisms of Attribution -- 6.3.1 Attack Attributes -- 6.3.1.1 Attacker TTPs -- 6.3.1.2 Example - HAFNIUM -- 6.3.1.3 Attacker Infrastructure -- 6.3.1.4 Victimology -- 6.3.1.5 Malicious Code -- 6.3.2 Asserting Attribution -- 6.4 Anti-Attribution Techniques -- 6.4.1 Infrastructure -- 6.4.2 Malicious Tools -- 6.4.3 False Attribution -- 6.4.4 Chains of Attribution -- 6.5 Third Party Attribution -- 6.6 Using Attribution -- Summary -- References -- Chapter 7 Professionalism -- 7.1 Notions of Professionalism -- 7.1.1 Professional Ethics -- 7.2 Developing a New Profession -- 7.2.1 Professional Education -- 7.2.2 Professional Behaviour and Ethics -- 7.2.2.1 Professionalism in Medicine -- 7.2.2.2 Professionalism in Accountancy -- 7.2.2.3 Professionalism in Engineering -- 7.2.3 Certifications and Codes of Ethics -- 7.3 Behaving Ethically -- 7.3.1 The Five Philosophical Approaches -- 7.3.2 The Josephson Model -- 7.3.3 PMI Ethical Decision Making Framework -- 7.4 Legal and Ethical Environment -- 7.4.1 Planning -- 7.4.1.1 Responsible Vulnerability Disclosure -- 7.4.1.2 Vulnerability Hoarding -- 7.4.2 Collection, Analysis, and Processing -- 7.4.2.1 PRISM Programme -- 7.4.2.2 Open and Closed Doors -- 7.4.3 Dissemination -- 7.4.3.1 Doxxing -- 7.5 Managing the Unexpected…”
    Libro electrónico
  10. 750
    por Berk, Jonathan
    Publicado 2022
    Tabla de Contenidos: “…Introduction to Financial Statement Analysis -- 2.1 Firms' Disclosure of Financial Information -- Preparation of Financial Statements -- I nternational Financial Reporting Standards -- Interview With Ruth Porat -- Types of Financial Statements -- 2.2 The Balance Sheet -- Assets -- Liabilities…”
    Libro electrónico
  11. 751
    por Brooks, Raymond
    Publicado 2022
    Tabla de Contenidos: “…Financial Statements -- 2.1 Financial Statements -- The Balance Sheet -- The Income Statement -- Statement of Retained Earnings -- 2.2 Cash Flow Identity and the Statement of Cash Flows -- The First Component: Cash Flow from Assets -- The Second Component: Cash Flow to Creditors -- The Third Component: Cash Flow to Owners -- Putting It All Together: The Cash Flow Identity -- The Statement of Cash Flows -- Free Cash Flow -- 2.3 Financial Performance Reporting -- Regulation Fair Disclosure -- Notes to the Financial Statements -- 2.4 Financial Statements on the Internet -- Putting Finance To Work Look Before You Leap -- Key Terms -- Questions -- Prepping for Exams -- Problems…”
    Libro electrónico
  12. 752
    por Doggett, Frank A.
    Publicado 2019
    “…Reviews Stevens' disclosures of his creative intuitions, studies his theories and memories, and analyzes elements of his poetry…”
    Libro electrónico
  13. 753
    Tabla de Contenidos: “…Paying for quality and efficiency -- References -- Spain -- Abstract -- Table of Contents -- Glossary and abbreviations -- 1 Overview of the context, objective and actual use of prices to pay providers of care for older per -- 2 Providers of care for older persons -- 2.1 Definition, scope and components: hospitals, skilled nursing facilities, home and residential ca -- 2.2 Link to Universal Health Coverage entitlements -- 3 Financing and systems issues -- 3.1 Care coordination -- 3.2 Source of financing -- 3.3 Characteristics of purchasers and providers -- 3.4 Criteria for eligibility to care: entitlement, means-testing, characteristics of the individual -- 4 Base for payment by facility -- 4.1 Primary care -- 4.2 Outpatient services -- 4.3 Hospitals -- 4.4 Skilled nursing facilities -- 4.5 Residential facilities -- 4.6 Home-based care (health and social) -- 4.7 Day care -- 4.8 Hospice -- 5 Informal care linked to cash transfers to families for dependants -- 6 Process by which prices are determined (for the categories of facilities) -- 6.1 Unilateral administrative price setting -- 7 Technical process of price setting (for the categories of facilities) -- 7.1 Process of data collection from providers -- 7.2 Costing methods -- 7.3 From cost submission to price setting -- 8 Methods of adjustments -- 8.1 For health needs/beneficiary characteristics -- 8.2 Access, financial protection and quality -- 9 Mean price for base for payment by provider (in national currencies) -- 10 Infrastructure for costing and pricing -- 10.1 Institutional entities (to what extent existing bodies cover different aspects of care for olde -- 10.2 Stakeholder consultation -- 10.3 Information disclosure (prices and quality) -- 11 Review evidence on the effects of price setting and price regulation on stated objectives…”
    Libro electrónico
  14. 754
    por Bok, Kenneth
    Publicado 2023
    Tabla de Contenidos: “…Chapter 3 Activities and Applications -- 3.1 Trading / DEXs -- 3.1.1 Automated Market Makers (AMMs) -- 3.1.2 Aggregators -- 3.2 Overcollateralized Lending / Borrowing -- 3.3 Governance / DAOs -- 3.4 Undercollateralized Lending -- 3.4.1 Uncollateralized Lending to Real-world Borrowers -- 3.4.2 Uncollateralized Lending to Crypto Institutions -- 3.4.3 Real World Assets -- 3.4.4 Centrifuge -- 3.4.5 MakerDAO and RWA -- 3.4.6 SocGen Pilots and MakerDAO Collaboration -- 3.4.7 Smart Bonds -- 3.4.8 Credit Scoring -- 3.5 Investing -- 3.5.1 Index Products - Spot -- 3.5.2 Index Products - Perpetual Futures -- 3.5.3 Dashboards -- 3.6 Payments -- 3.6.1 Crypto Payment Gateways -- 3.6.2 Big Payments and Crypto -- 3.6.3 Crypto Debit / Credit Cards -- 3.6.4 On-off Ramps -- 3.6.5 Solana Pay and Circle -- 3.6.6 Bitcoin Payments -- 3.7 Insurance -- 3.8 Prediction Markets -- 3.9 Chapter Summary -- Notes -- Chapter 4 Risks and Mitigation -- 4.1 Types of Losses -- 4.2 Basic Terminology -- 4.3 Endogenous DeFi Risks -- 4.3.1 Smart Contract Risks: Code Exploit Example: The DAO Hack -- 4.3.2 Economic Exploit Example: Mango Markets -- 4.3.3 Operational Exploit Example: Ronin Bridge Hack -- 4.3.4 CeFi Contagion / Systemic Risk -- 4.4 Exogenous DeFi Risks -- 4.4.1 Financial Stability -- 4.4.2 Pronounced Risks in Developing Countries -- 4.4.3 Banking-to-Crypto Concentration Risks -- 4.4.4 Stablecoins -- 4.4.5 Market Integrity -- 4.4.6 Frontrunning -- 4.4.7 Market Manipulation -- 4.4.8 Money Laundering, Funding of Illicit Activity and Terrorism -- 4.4.9 Consumer Protection -- 4.4.10 Disclosure, or the Lack Thereof -- 4.4.11 Data Protection -- 4.5 Chapter Summary -- Notes -- Chapter 5 Regulation -- 5.1 Introduction -- 5.2 Global Nature of Crypto and DeFi -- 5.2.1 How this Chapter Is Organized -- 5.3 What Regulators Want -- 5.4 Are Tokens Securities? …”
    Libro electrónico
  15. 755
    Publicado 2009
    “…Key topics include the reliability of children's abuse disclosures, eyewitness testimony, interviews, and confessions; the evolving role of the expert witness; the psychological impact of trauma and of legal involvement; facto…”
    Libro electrónico
  16. 756
    “…In order to adapt consumer protection to the current environment and reinforce fair business practices, information disclosures, payment protections, dispute resolution, and education, the OECD has just revised its Recommendation on Consumer Protection in E-commerce. …”
    Libro electrónico
  17. 757
    “…The guidance addresses a number of key issues in the emerging mobile and online payment area, including the need to establish minimum levels of consumer protection across payment mechanisms, enhanced privacy and child protection, and standards for transparent and accessible information disclosures…”
    Capítulo de libro electrónico
  18. 758
    por Mirza, Abbas Ali
    Publicado 2013
    “…Wiley International Financial Reporting Trends provides copious examples of footnote disclosures and financial statement formats, carefully culled from the world's leading international companies (""Global 500"") that are already compliant with IFRS and report under IFRS standards promulgated by the International Accounting Standards Board, the IASB. …”
    Libro electrónico
  19. 759
    Publicado 2023
    “…BONUS: Online, downloadable Financial Statement Disclosure and Presentation Checklist, now including industry- specific disclosures!…”
    Libro electrónico
  20. 760
    Publicado 2014
    “…including Business Continuity and Disaster Recovery planning, Public Relations, Legal and Regulatory issues, and Notifications and Disclosures Provides steps for integrating cybersecurity into Strategy; Policy and Guidelines; Change Management and Personnel Management Identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information…”
    Libro electrónico