Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Informes financieros 82
- Accounting 46
- Law and legislation 46
- Empresas 40
- Computer security 36
- Standards 31
- Security measures 28
- Corporate governance 26
- Finance 26
- balance social 23
- Computer networks 18
- contabilidad 17
- Disclosure of information 16
- Financial statements 16
- Management 16
- Data protection 14
- Corporations 13
- Derecho 13
- Finance and Investment 12
- Contabilidad 11
- Development 11
- Examinations 11
- Research 11
- entorno medioambiental 11
- Auditing 10
- Governance 10
- Moral and ethical aspects 10
- Application software 9
- Business & Economics 9
- Prevention 9
-
801por Meiselles, Michala“…This expert guide to the complex world of international licensing agreements brings together all the essential materials needed when dealing with such agreements and covers the following : business models that may be used by the contracting parties ; standard provisions encountered in an array of international licensing agreements ; analysis of the key clauses in various international licensing agreements inter alia trademark, software, franchise and technology licences with provisions as affected by jurisdiction ; effect of competition law in a variety of jurisdictions ; ensuring tradmark protection at both national and international levels ; clear explanation of key franchising terminology and disclosure rules ; and effect of international dispute resolution rules in a range of jurisdictions. …”
Publicado 2018
Libro -
802Publicado 2012“…They show how the imagination, according to Thoreau, might be related to the disclosure of truth; they illuminate the nuances of embodied consciousness and explore the links between moral character and scientific knowledge. …”
Libro -
803Publicado 2014“…Placing their discussion in the broader context of regulatory issues, the contributors consider banking reform; the regulation of derivatives; the Volcker Rule, and whether or not banks should be forced to stop proprietary trading; the establishment of the Consumer Financial Protection Bureau, and possible flaws in its conception; the law and "too-big-to-fail" institutions; mortgage reform, including qualification requirements and securitization; and new disclosure requirements regarding CEO compensation and conflict minerals. …”
Libro -
804Publicado 2019“…This reference provides guidance on the latest developments in eligibility for tax exemption, the private inurement and private benefit doctrines, nonprofit governance, lobbying, political campaign activity, public charities, private foundations, donor-advised funds, unrelated business activities, reporting, disclosure requirements, and more. Understand the tax code, regulations, and case law pertaining to all categories of tax-exempt organizations Access the nonprofit law standard reference guide, written by the leading legal expert on tax-exempt organizations Prepare yourself to make well-founded strategic decisions about the current and future actions of your organization Review annual supplements that provide plain-English information on changes for each tax year Written in a practical format that’s accessible to lawyers and non-lawyers alike, The Law of Tax-Exempt Organizations, Twelfth Edition , is a trustworthy resource for anyone involved in advising or managing charitable organizations, social welfare entities, associations, clubs, or any other type of tax-exempt entity…”
Libro electrónico -
805Publicado 2021“…Vast amounts of privacy-sensitive data are being collected today by organizations for a variety of reasons. Unauthorized disclosure, modification, usage, or denial of access to these data and corresponding services may result in high human and financial costs. …”
Libro electrónico -
806Publicado 2013“…Both regimes are covered simultaneously, i.e. when a topic is discussed, including the relevant journal entries and disclosures, the discussion applies equally to GAAP companies and to IFRS companies. …”
Libro electrónico -
807por Orloff, Erica“…The authors gently, through their own self disclosure, support the reader in a realistic commitment to a balance of the 'self.'" …”
Publicado 2004
Libro electrónico -
808Publicado 2022Tabla de Contenidos: “…Logging Levels/Severity Levels -- 00-FMindd 18 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Interface Statistics/Status -- Link State (Up/Down) -- Speed/Duplex -- Send/Receive Traffic -- Cyclic Redundancy Checks (CRCs) -- Protocol Packet and Byte Counts -- Interface Errors or Alerts -- CRC Errors -- Giants -- Runts -- Encapsulation Errors -- Environmental Factors and Sensors: Temperature, Humidity, Electrical, Flooding -- Baselines -- NetFlow Data -- Uptime/Downtime -- REVIEW -- 31 QUESTIONS -- 31 ANSWERS -- Objective 32 Explain the purpose of organizational documents -- and policies -- Plans and Procedures -- Change Management -- Incident Response Plan -- Disaster Recovery Plan -- Business Continuity Plan -- System Life Cycle -- Standard Operating Procedures -- Hardening and Security Policies -- Password Policy -- Acceptable Use Policy -- Bring Your Own Device (BYOD) Policy -- Remote Access Policy -- Onboarding and Offboarding Policy -- Security Policy -- Data Loss Prevention -- Common Documentation -- Physical Network Diagram -- Logical Network Diagram -- Wiring Diagram -- Site Survey Report -- 00-FMindd 19 22/04/22 11:12 AM -- xx Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Audit and Assessment Report -- Baseline Configurations -- Common Agreements -- Non-Disclosure Agreement (NDA) -- Service-Level Agreement (SLA) -- Memorandum of Understanding (MOU) -- REVIEW -- 32 QUESTIONS -- 32 ANSWERS -- Objective 33 Explain high availability and disaster recovery -- concepts and summarize which is the best solution -- Load Balancing -- Multipathing -- Network Interface Card (NIC) Teaming -- Redundant Hardware/Clusters -- Switches -- Routers -- Firewalls -- Facilities and Infrastructure Support -- Uninterruptible Power Supply (UPS) -- Power Distribution Units (PDUs) -- Generator -- HVAC -- Fire Suppression -- Redundancy and High Availability (HA) Concepts -- Cold Site -- Warm Site -- Hot Site -- Cloud Site -- Active-Active vs Active-Passive -- Mean Time to Repair (MTTR) -- Mean Time Between Failure (MTBF) -- Recovery Time Objective (RTO) -- Recovery Point Objective (RPO) -- Network Device Backup/Restore -- Configuration -- State -- REVIEW -- 33 QUESTIONS -- 33 ANSWERS -- 00-FMindd 20 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- 40 Network Security -- Objective 41 Explain common security concepts -- Confidentiality, Integrity, Availability (CIA) -- Threats -- Internal -- External -- Vulnerabilities -- Common Vulnerabilities and Exposures (CVE) -- Zero-Day -- Exploits -- Least Privilege -- Role-Based Access -- Zero Trust -- Defense in Depth -- Network Segmentation Enforcement -- Screened Subnet [Previously Known as Demilitarized Zone (DMZ)] -- Separation of Duties -- Network Access Control -- Honeypot -- Authentication Methods -- Multifactor -- Terminal Access Controller Access-Control System Plus (TACACS+) -- Remote Authentication Dial-in User Service (RADIUS) -- Single Sign-On (SSO) -- LDAP -- Kerberos -- Local Authentication -- Extensible Authentication Protocol (EAP) -- 8021X -- Risk Management -- Security Risk Assessments -- Business Risk Assessments -- Security Information and Event Management (SIEM) -- REVIEW -- 41 QUESTIONS -- 41 ANSWERS -- Objective 42 Compare and contrast common types of attacks -- Technology-Based -- Denial-of-Service (DoS)/Distributed Denial-of-Service (DDoS) -- On-Path Attack (Previously Known as Man-in-the-Middle Attack) -- 00-FMindd 21 22/04/22 11:12 AM -- xxii Mike Meyers' CompTIA Network+ Certification Passport -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- ARP Spoofing -- DNS Poisoning -- VLAN Hopping -- Rogue DHCP -- Rogue Access Point (AP) -- Evil Twin -- Ransomware -- Password Attacks -- MAC Spoofing -- IP Spoofing -- Deauthentication -- Malware -- Human and Environmental -- Social Engineering -- REVIEW -- 42 QUESTIONS -- 42 ANSWERS -- Objective 43 Given a scenario, apply network -- hardening techniques -- Best Practices -- Secure SNMP -- Router Advertisement (RA) Guard -- Port Security -- Dynamic ARP Inspection -- Control Plane Policing -- Private VLANs -- Disable Unneeded Switchports -- Disable Unneeded Network Services -- Change Default Passwords -- Password Complexity/Length -- Enable DHCP Snooping -- Change Default VLAN -- Patch and Firmware Management -- Access Control List -- Firewall Rules -- Role-Based Access -- Wireless Security -- MAC Filtering -- Antenna Placement -- Power Levels -- Wireless Client Isolation -- Guest Network Isolation -- 00-FMindd 22 22/04/22 11:12 AM -- Contents -- Passport_2019 / Mike Meyers' CompTIA Network+" Certification Passport / Weissman / 896-3 / FM -- Preshared Keys (PSKs) -- EAP -- Geofencing -- Captive Portal -- IoT Access Considerations -- REVIEW -- 43 QUESTIONS -- 43 ANSWERS -- Objective 44 Compare and contrast remote access methods -- and security implications -- Site-to-Site VPN -- Client-to-Site VPN -- Clientless VPN -- Split Tunnel vs Full Tunnel -- Remote Desktop Connection -- Remote Desktop Gateway -- SSH -- Virtual Network Computing (VNC)…”
Libro electrónico -
809Publicado 2020“…The book provides an unprecedented long-term view of the global threat landscape by examining the twenty-year trend in vulnerability disclosures and exploitation, nearly a decade of regional differences in malware infections, the socio-economic factors that underpin them, and how global malware has evolved. …”
Libro electrónico -
810por Leech, Beth L.“…As an authority on lobbying respected in Washington for her impartiality, Professor Beth Leech elicits frank disclosures, career tips, and riveting stories about the good, the bad, and the ambivalent on both sides of the symbiotic relationship between government officials and lobbyists…”
Publicado 2013
Libro electrónico -
811por Prag, Andrew“…For crediting mechanisms, three options are presented for deciding which units may be eligible to count towards national emissions targets: i) only units issued from a centralised mechanism regulated by the UNFCCC would be eligible, ii) units issued from country-led systems would be eligible provided that they are verified to meet internationally-agreed eligibility criteria and iii) a transparency approach whereby all units would be accepted provided that countries meet minimum disclosure requirements. For unit tracking systems, three further options are presented: i) a continuation of the existing International Transaction Log (ITL) that performs both technical and policy-related checks, ii) a ITL or similar tool that performs only technical compatibility checks, and iii) a decentralised system with no central hub. …”
Publicado 2011
Capítulo de libro electrónico -
812Publicado 2022“…Vast amounts of privacy-sensitive data are being collected today by organizations for a variety of reasons. Unauthorized disclosure, modification, usage, or denial of access to these data and corresponding services may result in high human and financial costs. …”
Libro electrónico -
813Publicado 2013“…John Martin sifts Montaigne's skepticism about contemporaneous strategies for self-disclosure andself-discipline. Stressing the significance of grammar, Constantin Fasolt helps us recapture theRenaissance's and the early modern religious reformations' disagreements with antiquity. …”
Libro electrónico -
814por National Research Council (U.S.).“…This report has been determined to contain information exempt from disclosure under 5 U.S.C. 552(b). Section 15 of the Federal Advisory Committee Act provides that the National Academies shall make its final report available to the public unless the National Academies determines that the report would disclose matters described in one or more of the exemption provisions under the Freedom of Information Act (FOIA). …”
Publicado 2015
Libro electrónico -
815Publicado 2009“…The full list of green gurus include: Ray Anderson , founder and chairman of Interface Inc, one of TIME Magazine's 'Heroes of the Environment' James Cameron , founder of Executive Director and Vice-Chairman of Climate Change Capital (CCC) Paul Dickinson , CEO of the Carbon Disclosure Project John Elkington , founding partner and director of Volans, co-founder of SustainAbility, world authority of sustainable development, author of The Green Consumer Guide John Grant , author of The Green Marketing Manifesto, frequent conference speaker and prolific blogger Denis Hayes , President and CEO of The Bullitt Foundation, Chair of the International Earth Day Network Gary Hirshberg , President and Chief Executive Officer of Stonyfield Farm, the world's largest producer of organic yogurt Tony Juniper , former Executive Director of Friends of the Earth (FoE), environmental campaigner, author and commentator Professor Sir David King , Director of the Smith School of Enterprise and the Environment at the University of Oxford Amory B. …”
Libro electrónico -
816por McClure, Stuart“…sections show how and why different attacks succeed, including: Cyber graffiti and Web site defacements e-Shoplifting Database access and Web applications JavaTM application servers; how to harden your JavaTM Web Server Impersonation and session hijacking Buffer overflows, the most wicked of attacks Automated attack tools and worms Appendices include a listing of Web and database ports, cheat sheets for remote command execution, and source code disclosure techniques. Web Hacking informs from the trenches. …”
Publicado 2002
Libro electrónico -
817Publicado 2024“…You'll explore the methodology for threat modeling--Spoofing, Tampering, Repudiation, Information Disclosure, and Elevation of Privilege (S.T.R.I.D.E.) with Privacy deck and the T.R.I.M. extension pack. …”
Libro electrónico -
818Publicado 2019“…Vast amounts of privacy-sensitive data are being collected today by organizations for a variety of reasons. Unauthorized disclosure, modification, usage or denial of access to these data and corresponding services may result in high human and financial costs. …”
Libro electrónico -
819Publicado 2018“…Vast amounts of privacy-sensitive data are being collected today by organizations for a variety of reasons. Unauthorized disclosure, modification, usage or denial of access to these data and corresponding services may result in high human and financial costs. …”
Libro electrónico -
820Wealth management unwrapped, revised and expanded unwrap what you need to know and enjoy the presentPublicado 2017“…By stripping away industry tech-speak and the all-too-common self-promotion, you will: Understand the difference between advisor and money manager Learn the best questions to ask when interviewing an advisor Dissect fee disclosure statements and conflicts of interest Find out if you might be a do-it-yourself investor and learn why that might make sense for your personality The wealth management industry has undergone massive change over the past 25 years. …”
Libro electrónico