Browse Results

Showing 92,476 through 92,500 of 100,000 results

Securing Corporate Viability and Creating Transferable Wealth: How to make your business more profitable and valuable—while reclaiming a personal life

by Art Mcneil

A strategic map for the owners of small to midsize businesses to help them survive and prosper in the "Shift-Age"...the post industrial era. Explains how to implement and balance inspirational leadership and process-

Securing Development: Public Finance and the Security Sector

by Bernard Harborne Paul M. Bisca William Dorotinsky

Securing Development: Public Finance and the Security Sector highlights the role of public finance in the delivery of security and criminal justice services. This book offers a framework for analyzing public financial management, financial transparency, and oversight, as well as expenditure policy issues that determine how to most appropriately manage security and justice services. The interplay among security, justice, and public finance is still a relatively unexplored area of development. Such a perspective can help security actors provide more professional, effective, and efficient security and justice services for citizens, while also strengthening systems for accountability. The book is the result of a project undertaken jointly by staff from the World Bank and the United Nations, integrating the disciplines where each institution holds a comparative advantage and a core mandate. The primary audience includes government officials bearing both security and financial responsibilities, staff of international organizations working on public expenditure management and security sector issues, academics, and development practitioners working in an advisory capacity.

Securing Digital Video: Techniques for DRM and Content Protection

by Eric Diehl

Content protection and digital rights management (DRM) are fields that receive a lot of attention: content owners require systems that protect and maximize their revenues; consumers want backwards compatibility, while they fear that content owners will spy on their viewing habits; and academics are afraid that DRM may be a barrier to knowledge sharing. DRM technologies have a poor reputation and are not yet trusted. This book describes the key aspects of content protection and DRM systems, the objective being to demystify the technology and techniques. In the first part of the book, the author builds the foundations, with sections that cover the rationale for protecting digital video content; video piracy; current toolboxes that employ cryptography, watermarking, tamper resistance, and rights expression languages; different ways to model video content protection; and DRM. In the second part, he describes the main existing deployed solutions, including video ecosystems; how video is protected in broadcasting; descriptions of DRM systems, such as Microsoft's DRM and Apple's FairPlay; techniques for protecting prerecorded content distributed using DVDs or Blu-ray; and future methods used to protect content within the home network. The final part of the book looks towards future research topics, and the key problem of interoperability. While the book focuses on protecting video content, the DRM principles and technologies described are also used to protect many other types of content, such as ebooks, documents and games. The book will be of value to industrial researchers and engineers developing related technologies, academics and students in information security, cryptography and media systems, and engaged consumers.

Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure

by Margot P. Weijnen Zofia Lukszo Geert Deconinck

The electricity infrastructure is one of society's most critical infrastructures. The complexity of the electricity infrastructure system is increasing quickly, due to the increasing intensity of market-based power exchanges between electricity systems, the associated market restructuring and an increasing share of decentralized generation. As a consequence, the organizational complexity of power systems has exploded. At the same time, there is a shift in public and societal goals towards low-carbon and sustainable power generation. This will eventually require a drastic transformation of the industry. Increasingly, ICT is being depended upon for managing this infrastructure, for technical control and operation and for facilitating markets. A recent example is demand-side management, based on detailed metering of consumption and decentralized electricity generation. The mutual dependence of the electricity and the ICT infrastructures raises challenging questions in the areas of dependability, security and resilience. Examples include vulnerability to (cyber) attacks, avoiding and repairing technical failures and protecting data confidentiality, while guaranteeing accessibility. Therefore, better models and methods for protection against exploits of system vulnerabilities, whether accidental or intentional such as in cyber attacks, are called for. To address the above mentioned problems an advanced research workshop: "Electricity security in the cyber age: Managing the increasing dependence of the electricity infrastructure on ICT" was organized in the Netherlands in May 2009. The objective of the workshop was to contribute to the security of current and future electricity infrastructures by analyzing the risks that are caused by the increasing reliance upon ICT and investigating options for managing these risks. The book presents the contributions to the workshop by distinguished invited keynote speakers and participants from the international scientific and industrial community.

Securing Finance, Mobilizing Risk: Money Cultures at the Bank of England (RIPE Series in Global Political Economy)

by John Morris

Drawing on the history of modern finance, as well as the sociology of money and risk, this book examines how cultural understandings of finance have contributed to the increased capitalization of the UK financial system following the Global Financial Crisis. Providing both a geographically-inflected analysis and re-appraisal of the concept of performativity, it demonstrates that financial risk management has a spatiality that helps to inform understandings and imaginaries of the risks associated with money and finance. The book traces the development of understandings of risk at the Bank of England, with an analysis that spans some 1,000 reports, documents and speeches alongside elite interviews with past and present employees at the central bank. The author argues that the Bank has moved from a relatively broad-brush approach to the risks being managed in the financial sector, to a greater preoccupation with the understanding and mapping of the mobilization of financial risk. The study of financial practices from a critical social sciences and humanities perspective has grown rapidly since the Global Financial Crisis and this book will be of interest to multiple subject areas including IPE, economic geography, sociology of finance and critical security studies.

Securing Hadoop

by Sudheesh Narayanan

This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

Securing Land Rights in Africa

by Tor A. Benjaminsen Christian Lund

This collection of research papers from across the African continent illustrates the complex and ever-changing rules of the land tenure game, and how government legislation and reform (formalization) interact with local innovations (informalization) to form land tenure systems.

Securing Office 365: Masterminding MDM and Compliance in the Cloud

by Matthew Katzer

Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.Data breaches, compliance fines, and distribution of personally identifiable information (PII) without encryption or safeguards place businesses of all types at risk. In today’s electronic world, you must have a secure digital footprint that is based on business processes that are designed to protect information. This book is written for business owners, chief information security officers (CISO), and IT managers who want to securely configure Office 365. You will follow the Microsoft cybersecurity road map through a progressive tutorial on how to configure the security services in Office 365 to protect and manage your business.What You’ll LearnManage security with the Azure Security Center and the Office 365 Compliance CenterConfigure information protection for document and electronic communicationsMonitor security for your business in the cloudUnderstand Mobile Application Management (MAM) and Mobile Device Management (MDM)Prevent data loss in Office 365Configure and manage the compliance manager tools for NIST and GDPRWho This Book Is ForIT managers and compliance and cybersecurity officers who have responsibility for compliance and data security in their business

Securing Our Natural Wealth: A Policy Agenda for Sustainable Development in India and for Its Neighboring Countries (South Asia Economic and Policy Studies)

by Debashis Bandyopadhyay

This book explores various aspects of Intellectual Property Rights (IPR) regimes with regard to plant-variety protection and farmers’ rights; traditional knowledge; geographical indications, genetically modified crops; and access to genetic resources within the broad ambit of Trade-Related Aspects of Intellectual Property Rights (TRIPS), the Convention of Biological Diversity and other treaties/protocols. Enumerating the governance provisions for India and some of its neighboring countries, including Nepal, Sri Lanka, Bangladesh, Bhutan, Thailand and Myanmar, the book synthesizes a policy agenda to drive sustainable development. Further, it assesses and interprets the status quo, and discusses key issues and implications. By comparing various governance frameworks in South Asian countries, it attempts to bridge policy issues concerning development, IPR and international studies.

Securing Paradise: Tourism and Militarism in Hawai'i and the Philippines

by Gonzalez Vernadette Vicuña

In Securing Paradise, Vernadette Vicuña Gonzalez shows how tourism and militarism have functioned together in Hawaii and the Philippines, jointly empowering the United States to assert its geostrategic and economic interests in the Pacific. She does so by interpreting fiction, closely examining colonial and military construction projects, and delving into present-day tourist practices, spaces, and narratives. For instance, in both Hawaii and the Philippines, U. S. military modes of mobility, control, and surveillance enable scenic tourist byways. Past and present U. S. military posts, such as the Clark and Subic Bases and the Pearl Harbor complex, have been reincarnated as destinations for tourists interested in World War II. The history of the U. S. military is foundational to tourist itineraries and imaginations in such sites. At the same time, U. S. military dominance is reinforced by the logics and practices of mobility and consumption underlying modern tourism. Working in tandem, militarism and tourism produce gendered structures of feeling and formations of knowledge. These become routinized into everyday life in Hawaii and the Philippines, inculcating U. S. imperialism in the Pacific.

Securing Pension Provision: The Challenge of Reforming the Age of Entitlement

by Catherine Blair

By comparing Germany, France, the UK and the USA this study explores how governments have tackled the increased pressure of financing state pensions. Specifically, it looks at the approach of each of these countries to raising the age of entitlement in order to understand the ways in which this policy was introduced in different countries.

Securing Prosperity: The American Labor Market: How It Has Changed and What to Do about It

by Paul Osterman

We live in an age of economic paradox. The dynamism of America's economy is astounding--the country's industries are the most productive in the world and spin off new products and ideas at a bewildering pace. Yet Americans feel deeply uneasy about their economic future. The reason, Paul Osterman explains, is that our recent prosperity is built on the ruins of the once reassuring postwar labor market. Workers can no longer expect stable, full-time jobs and steadily rising incomes. Instead, they face stagnant wages, layoffs, rising inequality, and the increased likelihood of merely temporary work. In Securing Prosperity, Osterman explains in clear, accessible terms why these changes have occurred and lays out an innovative plan for new economic institutions that promises a more secure future. Osterman begins by sketching the rise and fall of the postwar labor market, showing that firms have been the driving force behind recent change. He draws on original surveys of nearly 1,000 corporations to demonstrate that firms have reorganized and downsized not just for the obvious reasons--technological advances and shifts in capital markets--but also to take advantage of new, team-oriented ways of working. We can't turn the clock back, Osterman writes, since that would strip firms of the ability to compete. But he also argues that we should not simply give ourselves up to the mercies of the market. Osterman argues that new policies must engage on two fronts: addressing both higher rates of mobility in the labor market and a major shift in the balance of power against employees. To deal with greater mobility, Osterman argues for portable benefits, a stronger Unemployment Insurance system, and new labor market intermediaries to help workers navigate the labor market. To redress the imbalance of power, Osterman assesses the possibilities of reforming corporate governance but concludes the best approach is to promote "countervailing power" through innovative unions and creative strategies for organizing employee voice in communities. Osterman gives life to these arguments with numerous examples of promising institutional experiments.

Securing the Belt and Road Initiative

by Alessandro Arduino Xue Gong

This collection explores the expansion of Chinese outbound investments, aimed to sustain the increased need for natural resources, and how they have amplified the magnitude of a possible international crisis that the People's Republic of China may face in the near future by bringing together the views of a wide range of scholars. President Xi's Belt and Road initiative (BRI), aimed to promote economic development and exchanges with China for over 60 countries, necessitates a wide range of security procedures. While the threats to Chinese enterprises and Chinese workers based on foreign soil are poised to increase, there is an urgent need to develop new guidelines for risk assessment, special insurance and crisis management. While the Chinese State Owned Enterprises are expanding their international reach capabilities, they still do not have the capacity to assure adequate security. In such a climate, this collection will be of profound value to policy makers, those working in the financial sector, and academics.

Securing the City: Neoliberalism, Space, and Insecurity in Postwar Guatemala

by Kevin Lewis O'Neil Kedron Thomas

Unprecedented crime rates have made Guatemala City one of the most dangerous cities in the world. Following a peace process that ended Central America's longest and bloodiest civil war and impelled the transition from a state-centric economy to the global free market, Guatemala's neoliberal moment is now strikingly evident in the practices and politics of security. Postwar violence has not prompted public debates about the conditions that permit transnational gangs, drug cartels, and organized crime to thrive. Instead, the dominant reaction to crime has been the cultural promulgation of fear and the privatization of what would otherwise be the state's responsibility to secure the city. This collection of essays, the first comparative study of urban Guatemala, explores these neoliberal efforts at security. Contributing to the anthropology of space and urban studies, this book brings together anthropologists and historians to examine how postwar violence and responses to it are reconfiguring urban space, transforming the relationship between city and country, and exacerbating deeply rooted structures of inequality and ethnic discrimination. Contributors. Peter Benson, Manuela Camus, Avery Dickins de Girn, Edward F. Fischer, Deborah Levenson, Thomas Offit, Kevin Lewis O'Neill, Kedron Thomas, Rodrigo Jos Vliz

Securing the Cloud: Security Strategies for the Ubiquitous Data Center

by Curtis Franklin Jr. Brian Chee

This book provides solutions for securing important data stored in something as nebulous sounding as a cloud. A primer on the concepts behind security and the cloud, it explains where and how to store data and what should be avoided at all costs. It presents the views and insight of the leading experts on the state of cloud computing security and its future. It also provides no-nonsense info on cloud security technologies and models. Securing the Cloud: Security Strategies for the Ubiquitous Data Center takes the position that cloud security is an extension of recognized, established security principles into cloud-based deployments. It explores how those principles can be put into practice to protect cloud-based infrastructure and data, traditional infrastructure, and hybrid architectures combining cloud and on-premises infrastructure. Cloud computing is evolving so rapidly that regulations and technology have not necessarily been able to keep pace. IT professionals are frequently left to force fit pre-existing solutions onto new infrastructure and architectures for which they may be very poor fits. This book looks at how those "square peg/round hole" solutions are implemented and explains ways in which the pegs, the holes, or both may be adjusted for a more perfect fit.

Securing the Future: Globally Preempting Competitors

by C. K. Prahalad Gary Hamel

When several companies are tracking the same broad opportunity and striving to build roughly similar competencies, the issue is how to maximize one's share of worldwide revenues when the market finally takes off. This chapter discusses the keys to global preemption, the final milestone on the road to competing for the future.

Securing the Nation’s Critical Infrastructures: A Guide for the 2021-2025 Administration

by Drew Spaniel

Securing the Nation’s Critical Infrastructures: A Guide for the 2021–2025 Administration is intended to help the United States Executive administration, legislators, and critical infrastructure decision-makers prioritize cybersecurity, combat emerging threats, craft meaningful policy, embrace modernization, and critically evaluate nascent technologies. The book is divided into 18 chapters that are focused on the critical infrastructure sectors identified in the 2013 National Infrastructure Protection Plan (NIPP), election security, and the security of local and state government. Each chapter features viewpoints from an assortment of former government leaders, C-level executives, academics, and other cybersecurity thought leaders. Major cybersecurity incidents involving public sector systems occur with jarringly frequency; however, instead of rising in vigilant alarm against the threats posed to our vital systems, the nation has become desensitized and demoralized. This publication was developed to deconstruct the normalization of cybersecurity inadequacies in our critical infrastructures and to make the challenge of improving our national security posture less daunting and more manageable. To capture a holistic and comprehensive outlook on each critical infrastructure, each chapter includes a foreword that introduces the sector and perspective essays from one or more reputable thought-leaders in that space, on topics such as: • The State of the Sector (challenges, threats, etc.) • Emerging Areas for Innovation • Recommendations for the Future (2021–2025) Cybersecurity Landscape ABOUT ICIT The Institute for Critical Infrastructure Technology (ICIT) is the nation’s leading 501(c)3 cybersecurity think tank providing objective, nonpartisan research, advisory, and education to legislative, commercial, and public-sector stakeholders. Its mission is to cultivate a cybersecurity renaissance that will improve the resiliency of our Nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders. ICIT programs, research, and initiatives support cybersecurity leaders and practitioners across all 16 critical infrastructure sectors and can be leveraged by anyone seeking to better understand cyber risk including policymakers, academia, and businesses of all sizes that are impacted by digital threats.

Securing the Peace: The Durable Settlement of Civil Wars

by Monica Duffy Toft

Timely and pathbreaking, Securing the Peace is the first book to explore the complete spectrum of civil war terminations, including negotiated settlements, military victories by governments and rebels, and stalemates and ceasefires. Examining the outcomes of all civil war terminations since 1940, Monica Toft develops a general theory of postwar stability, showing how third-party guarantees may not be the best option. She demonstrates that thorough security-sector reform plays a critical role in establishing peace over the long term. Much of the thinking in this area has centered on third parties presiding over the maintenance of negotiated settlements, but the problem with this focus is that fewer than a quarter of recent civil wars have ended this way. Furthermore, these settlements have been precarious, often resulting in a recurrence of war. Toft finds that military victory, especially victory by rebels, lends itself to a more durable peace. She argues for the importance of the security sector--the police and military--and explains that victories are more stable when governments can maintain order. Toft presents statistical evaluations and in-depth case studies that include El Salvador, Sudan, and Uganda to reveal that where the security sector remains robust, stability and democracy are likely to follow. An original and thoughtful reassessment of civil war terminations, Securing the Peace will interest all those concerned about resolving our world's most pressing conflicts.

Securing the ‘Rice Bowl’: China and Global Food Security

by Hongzhou Zhang

This book offers a snappy but comprehensive investigation of how the resource needs of today could become the resource conflicts of tomorrow. As the most populous country in the world, the security of China’s “rice bowl” is not only a top political priority for China’s policymakers but increasingly a critical global concern as the country emerges as a leading food importer and a major player in outward agricultural investment. This book sheds light on China’s efforts, both at home and abroad, to safeguard its food security and how these efforts will affect global food systems. This book will be of interest to industry analysts, institutional investors, and scholars of China's global rise.

Securing the Virtual Environment: How to Defend the Enterprise Against Attack

by Davi Ottenheimer Matthew Wallace

A step-by-step guide to identifying and defending against attacks on the virtual environment As more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companion DVD is included with recipes and testing scripts. Examines the difference in a virtual model versus traditional computing models and the appropriate technology and procedures to defend it from attack Dissects and exposes attacks targeted at the virtual environment and the steps necessary for defense Covers information security in virtual environments: building a virtual attack lab, finding leaks, getting a side-channel, denying or compromising services, abusing the hypervisor, forcing an interception, and spreading infestations Accompanying DVD includes hands-on examples and code This how-to guide arms IT managers, vendors, and architects of virtual environments with the tools they need to protect against common threats.

Securing Your Organization's Future: A Complete Guide to Fundraising Strategies

by Michael Seltzer

A step-by-step approach to creating and sustaining a network of funding sources through a discussion of: Major organizational tasks to address before applying for funding How to determine the best mix of funding resources for the long term The use of special events, direct mail, the telephone, planned giving, the Internet, and earned and venture income to obtain support from individual donors How to secure funding support from institutional sources such as foundations, corporations and businesses, government, religious institutions, and others A blueprint for designing and implementing fundraising strategies How to capitalize on the uniqueness of your organization to secure funding

Securing Your Superannuation Future

by Daryl Dixon

Find Out if an SMSF is Right for You Are you thinking about setting up a self managed superannuation fund but unsure where to start? Are you worried that you're not maximising all the benefits an SMSF offers? In Securing Your Superannuation Future, Daryl Dixon offers practical, easy-to-understand tools and strategies to help you set up and run your own super fund. More Australians than ever are deciding to take control of their super, and Daryl's insights go beyond the standard requirements for running an SMSF. He reveals many tax-saving tips and practical steps to work through important decisions such as: Do you need professional assistance to run your fund? Who should be the trustees and members of your SMSF? What steps should you take to build your super in a tax-effective way? How do you construct your SMSF investment portfolio? When and how should you access your super? How can you maximise the amount of super you pass on to your beneficiaries?

Securities Fraud

by Louis L. Straney

The first complete, expert guide to securities and investment fraud Filled with expert guidance for detection and prevention of all kinds of securities fraud and investment misconduct, Securities Fraud helps you identify red flags of fraud and offers practical ways to detect and prevent it. Written by a Wall Street professional with three decades of experience spanning the most critical period of our financial markets This book challenges classic fraud theories, describing how to dismantle information silos that permit fraudsters to conceal their activities. Begins with an overview of the evolution of securities regulation and the impact of securities fraud Offers real cases and examples which illustrate recurring themes and red flags Provides the first guide of its kind to offer a complete look at the various kinds of securities fraud and investment misconduct Securities Fraud is the essential guide you need for a bird's-eye view of fraud that may be taking place even now within your own organization and with your portfolio.

Securities Industry Essentials Exam 2023-2024 For Dummies with Online Practice

by Steven M. Rice

Knock out the SIE on your first try Securities Industry Essentials Exam 2023-2024 For Dummies is this year’s definitive study guide for prospective securities industry professionals—that means you! FINRA administers this notoriously difficult exam as a prerequisite to the Series 7 and other series level exams, so you’ll need to know your stuff in order to get where you're going. Securities professionals are in high demand, and this study guide can help you become one of them. You'll have access to two complete practice tests, plus two more online! With this trusted Dummies guide, you have everything you need to get a high score on the SIE. Hundreds of practice questions help you internalize the must-know info, and we explain the content in a way you can easily grasp. You’ll go into your securities exam feeling, well, secure! Review all the content tested on the Security Industry Professionals exam Get prepared with two in-book practice tests and two more online tests Launch your dream career in the growing field of securities, commodities, and financial services Take an in-depth look at how the SIE exam is structured and how you can improve your score Let employers see how well you know your stuff—this friendly study guide is your ticket to passing the SIE.

Securities Law and Private Financing

by Howard H. Stevenson Michael J. Roberts

Describes the issues an entrepreneur faces in the process of raising private funds, and the securities laws which impact the process. Based in part on a note by R.E. Floor of the law firm of Goodwin, Procter & Hoar.

Refine Search

Showing 92,476 through 92,500 of 100,000 results