Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 1,382
- Management 690
- History 667
- Development 643
- Application software 580
- Engineering & Applied Sciences 564
- Computer networks 533
- Security measures 472
- Computer security 439
- Computer Science 380
- Filosofía 374
- Computer programs 368
- Operating systems (Computers) 354
- Database management 333
- Data processing 302
- Universidad Pontificia de Salamanca (España) 291
- Programming 280
- Design 267
- Derecho 263
- Information technology 262
- Computer programming 254
- Cloud computing 252
- Computer software 247
- Crítica e interpretación 242
- Web site development 235
- Novela norteamericana 232
- Web sites 226
- Leadership 215
- Documentales 199
- Photography 193
-
3781por Fabozzi, Frank J.Tabla de Contenidos: “…CHAPTER 1 Introduction -- CHAPTER 2 Interest Rate Derivatives -- CHAPTER 3 Credit Derivatives -- CHAPTER 4 Basic Principles of Securitization -- CHAPTER 5 Securitization Structures -- CHAPTER 6 Cash Flow Collateralized Debt Obligations -- CHAPTER 7 Synthetic Collateralized Debt Obligation Structures -- CHAPTER 8 Securitized and Synthetic Funding Structures -- CHAPTER 9 Credit-Linked Notes -- CHAPTER 10 Structured Notes -- CHAPTER 11 Large Ticket Leasing: Leasing Fundamentals -- CHAPTER 12 Leveraged Lease Fundamentals -- CHAPTER 13 Project Financing -- APPENDIX A The Basel II Framework and Securitization -- APPENDIX B Synthetic Securitization: Case of Mortgage-Backed Securities -- APPENDIX C Home Run! A Case Study of Financing the New Stadium for the St. …”
Publicado 2006
Libro electrónico -
3782Publicado 2014Materias: “…Asset-backed financing…”
Libro electrónico -
3783Publicado 1959Materias: “…Prescott, William Hickling, 1796-1859 estudios y conferencias…”
Libro -
3784
-
3785
-
3786
-
3787por Beck, Ulrich, 1944-2015
Publicado 2001Biblioteca Universidad Eclesiástica San Dámaso (Otras Fuentes: Red de bibliotecas Iglesia Navarra, Biblioteca de la Universidad de Navarra, Biblioteca del Seminario Diocesano de Vitoria-Gasteiz, Biblioteca del Instituto Superior de Teología de las Islas Canarias, Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro -
3788Publicado 2022Otros
-
3789Publicado 2019“…You will learn the key tenets and fundamentals of networking and security basics; cybersecurity management, monitoring and analysis; network security telemetry; digital forensics and incident response (DFIR); fundamentals of ethical hacking and penetration testing; advanced wireless hacking and pen testing; mobile device security, and IoT Security. …”
-
3790
-
3791
-
3792
-
3793
-
3794Publicado 2017Tabla de Contenidos: “…Visa 102 3 Cybersecurity Requirements for Specific Industries 105 3.1 Financial Institutions: Gramm-Leach-Bliley Act Safeguards Rule 106 3.1.1 Interagency Guidelines 106 3.1.2 Securities and Exchange Commission Regulation S-P 109 3.1.3 FTC Safeguards Rule 110 3.2 Financial Institutions and Creditors: Red Flag Rule 112 3.2.1 Financial Institutions or Creditors 116 3.2.2 Covered Accounts 116 3.2.3 Requirements for a Red Flag Identity Theft Prevention Program 117 3.3 Companies that use Payment and Debit Cards: Payment Card Industry Data Security Standard (PCI DSS) 118 3.4 Health Providers: Health Insurance Portability and Accountability Act (HIPAA) Security Rule 121 3.5 Electric Utilities: Federal Energy Regulatory Commission Critical Infrastructure Protection Reliability Standards 127 3.5.1 CIP-003-6: Cybersecurity - Security Management Controls 127 3.5.2 CIP-004-6: Personnel and Training 128 3.5.3 CIP-006-6: Physical Security of Cyber Systems 128 3.5.4 CIP-007-6: Systems Security Management 128 3.5.5 CIP-009-6: Recovery Plans for Cyber Systems 129 3.5.6 CIP-010-2: Configuration Change Management and Vulnerability Assessments 129 3.5.7 CIP-011-2: Information Protection 130 3.6 Nuclear Regulatory Commission Cybersecurity Regulations 130 4 Cybersecurity and Corporate Governance 133 4.1 Securities and Exchange Commission Cybersecurity Expectations for Publicly Traded Companies 134 4.1.1 10-K Disclosures: Risk Factors 135 4.1.2 10-K Disclosures: Management's Discussion and Analysis of Financial Condition and Results of Operations (MD&A) 137 4.1.3 10-K Disclosures: Description of Business 137 4.1.4 10-K Disclosures: Legal Proceedings 138 4.1.5 10-K Disclosures: Examples 138 4.1.5.1 Wal-Mart 138 4.1.5.2 Berkshire Hathaway 143 4.1.5.3 Target Corp 144 4.1.6 Disclosing Data Breaches to Investors 147 4.2 Fiduciary Duty to Shareholders and Derivative Lawsuits Arising from Data Breaches 150 4.3 Committee on Foreign Investment in the United States and Cybersecurity 152 4.4 Export Controls and the Wassenaar Arrangement 154 5 Anti-Hacking Laws 159 5.1 Computer Fraud and Abuse Act 160 5.1.1 Origins of the CFAA 160 5.1.2 Access without Authorization and Exceeding Authorized Access 161 5.1.2.1 Narrow View of "Exceeds Authorized Access" and "Without Authorization" 163 5.1.2.2 Broader View of "Exceeds Authorized Access" and "Without Authorization" 167 5.1.2.3 Attempts to Find a Middle Ground 169 5.1.3 The Seven Sections of the CFAA 170 5.1.3.1 CFAA Section (a)(1): Hacking to Commit Espionage 172 5.1.3.2 CFAA Section (a)(2): Hacking to Obtain Information 172 5.1.3.3 CFAA Section (a)(3): Hacking a Federal Government Computer 176 5.1.3.4 CFAA Section (a)(4): Hacking to Commit Fraud 178 5.1.3.5 CFAA Section (a)(5): Hacking to Damage a Computer 181 5.1.3.5.1 CFAA Section (a)(5)(A): Knowing Transmission that Intentionally Damages a Computer Without Authorization 181 5.1.3.5.2 CFAA Section (a)(5)(B): Intentional Access Without Authorization that Recklessly Causes Damage 184 5.1.3.5.3 CFAA Section (a)(5)(C): Intentional Access Without Authorization that Causes Damage and Loss 185 5.1.3.5.4 CFAA Section (a)(5): Requirements for Felony and Misdemeanor Cases 186 5.1.3.6 CFAA Section (a)(6): Trafficking in Passwords 188 5.1.3.7 CFAA Section (a)(7): Threatening to Damage or Obtain Information from a Computer 190 5.1.4 Civil Actions under the CFAA 193 5.1.5 Criticisms of the CFAA 195 5.2 State Computer Hacking Laws 198 5.3 Section 1201 of the Digital Millennium Copyright Act 201 5.3.1 Origins of Section 1201 of the DMCA 202 5.3.2 Three Key Provisions of Section 1201 of the DMCA 203 5.3.2.1 DMCA Section 1201(a)(1) 203 5.3.2.2 DMCA Section 1201(a)(2) 208 5.3.2.2.1 Narrow Interpretation of Section (a)(2): Chamberlain Group v. …”
Libro electrónico -
3795
-
3796
-
3797
-
3798
-
3799
-
3800