Search Results - "securities"

  1. 41
  2. 42
  3. 43
  4. 44

    United States Securities Law

    Published 2014
    Table of Contents: “…Due to the volume of the material, it has been divided up into eight volumes. -- Volume 1 -The Securities Act of 1933 and The Securities and Exchange Act of 1934 -- Volume 2 -The Investment Company Act of 1940 and The Investment Advisors Act of 1940 -- Volume 3 -Sarbanes-Oxley Act of 2002, Dodd-Frank Wall Street Reform Act and Consumer Protection Act of 2010 and Jumpstart our Business Startups Act of 2012 -- Volume 4 -Title 17 of the Code of Federal Regulations, Parts 200, 201, 202 and 203 -- Volume 5 -Title 17 of the Code of Federal Regulations, Parts 210 and 229 -- Volume 6 -Title 17 of the Code of Federal Regulations, Part 230 -- Volume 7 -Title 17 of the Code of Federal Regulations, Part 240 and 250 -- Volume 8 -Title 17 of the Code of Federal Regulations, Part 260, 270 and 275…”
    Access online version
    Electronic eBook
  5. 45
  6. 46
  7. 47

    Chapter 4 Albania Moving from Security Receiver to Security Provider by Jano, Dorian

    Published 2023
    Subjects: “…Albania, NATO, EU, security policy, domestic vulnerabilities…”
    DOAB: download the publication
    DOAB: description of the publication
    Electronic Book Chapter
  8. 48
  9. 49
  10. 50

    Chapter 4 Albania Moving from Security Receiver to Security Provider by Jano, Dorian

    Published 2023
    Subjects: “…Albania, NATO, EU, security policy, domestic vulnerabilities…”
    OAPEN Library: download the publication
    OAPEN Library: description of the publication
    Electronic Book Chapter
  11. 51
  12. 52

    México y la economía Atlántica (siglos XVIII-XX) by Pietschmann, Horst

    Published 2006
    Subjects: “…Investment & securities bicssc…”
    DOAB: download the publication
    DOAB: description of the publication
    Electronic Book Chapter
  13. 53

    Principles of Security and Trust 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings /

    Published 2019
    Table of Contents: “…Foundations for parallel information ow control runtime systems -- A Formal Analysis of Timing Channel Security via Bucketing -- A Dependently Typed Library for Static Information-Flow Control in Idris -- Achieving Safety Incrementally with Checked C -- Wys*: A DSL for Verified Secure Multi-party Computations -- Generalised Differential Privacy for Text Document Processing -- Symbolic verification of distance bounding protocols -- On the formalisation of Ʃ-Protocols and Commitment Schemes -- Orchestrating Layered Attestations -- Verifying liquidity of Bitcoin contracts.…”
    Link to Metadata
    Electronic eBook
  14. 54

    Security in an Interconnected World A Strategic Vision for Defence Policy /

    Published 2020
    Subjects: “…Security systems.…”
    Link to Metadata
    Electronic eBook
  15. 55

    The Coupling of Safety and Security Exploring Interrelations in Theory and Practice /

    Published 2020
    Table of Contents: “…1. Safety and Security: The Challenges of Bringing them Together -- 2. …”
    Link to Metadata
    Electronic eBook
  16. 56

    Principles of Security and Trust 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings /

    Published 2018
    Table of Contents: “…Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.…”
    Link to Metadata
    Electronic eBook
  17. 57

    Computer Systems Security Planning for Success by Tolboom, Ryan

    Table of Contents: “…Protocols -- 5 Attacks -- 6. Security Solutions -- 7. Access Controls -- 8. Vulnerability Management and Compliance -- 9. …”
    Access online version
    Electronic eBook
  18. 58
  19. 59
  20. 60