02749nam 2200613 a 450 991078848780332120200520144314.01-283-06143-090-474-4054-4978661306143090-04-17819-810.1163/ej.9789004178199.i-406(CKB)3190000000000573(EBL)682310(OCoLC)706512082(SSID)ssj0000399521(PQKBManifestationID)11275099(PQKBTitleCode)TC0000399521(PQKBWorkID)10375837(PQKB)10143211(MiAaPQ)EBC682310(OCoLC)403858176(nllekb)BRILL9789047440543(Au-PeEL)EBL682310(CaPaEBR)ebr10461209(CaONFJC)MIL306143(PPN)170723143(EXLCZ)99319000000000057320090612d2009 uy 0engur|n|---|||||txtccrThe origin of the Samaritans[electronic resource] /by Magnar KartveitLeiden ;Boston Brill20091 online resource (420 p.)Supplements to Vetus Testamentum,0083-5889 ;v. 128Description based upon print version of record.Includes bibliographical references (p. [371]-392) and indexes.The legacy from Josephus --State of the question --Josephus and the origin of the Samaritans --Josephus' predecessors --Samaritan inscriptions and related texts --The Pentateuch that the Samaritans chose --The Samaritan attitude to the Prophets --The origin of the Samaritans.Many Bible readers will think that chapter 17 of the second book of Kings refers to the origin of the Samaritans. This understanding of the chapter has its earliest attestation in the works of Josephus. The present book evaluates the methods often used for finding the origin of the Samaritans, makes an assessment of well known and new material, and ventures into some uncharted territory. It is suggested that the moment of birth of the Samaritans was the construction of the temple on Mount Gerizim. This happened in the first part of the fourth century bornc.e. in accordance with the original commandment of Moses in Deut 27:4.Supplements to Vetus Testamentum ;v. 128.SamaritansOriginSamaritansOrigin.296.8/17Kartveit Magnar1946-1545714MiAaPQMiAaPQMiAaPQBOOK9910788487803321The origin of the Samaritans3800778UNINA05467nam 2200721Ia 450 991083081710332120170809151335.01-281-23758-297866112375851-118-26819-90-470-27840-4(CKB)1000000000412838(EBL)333733(SSID)ssj0000073879(PQKBManifestationID)11125446(PQKBTitleCode)TC0000073879(PQKBWorkID)10118048(PQKB)11658597(MiAaPQ)EBC333733(OCoLC)773301860(CaSebORM)9780470114780(EXLCZ)99100000000041283820070927d2008 uy 0engur|n|---|||||txtccrBuilding a world-class compliance program[electronic resource] best practices and strategies for success /Martin T. Biegelman ; with Daniel R. Biegelman1st editionHoboken, NJ John Wiley & Sonsc20081 online resource (320 p.)Description based upon print version of record.0-470-11478-9 Includes bibliographical references and index.Building a World-Class Compliance Program; Contents; Foreword; AN EVOLVING FUNCTION; A FALSE SENSE OF SECURITY; HIGH STAKES; SUPPORT FOR THIS ENDEAVOR; Preface; Acknowledgments; About the Author; Chapter 1: Why Ethics and Compliance Will Always Matter; ETHICS IS JOB ONE; THE NYPD AND AN ETHICAL CULTURE; WHAT IS COMPLIANCE?; BUILDING THE BUSINESS CASE FOR ETHICS; COMPLIANCE OBSTACLES; KEN LAY ON ETHICAL CONDUCT; THE WARNING SIGNS OF COMPLIANCE FAILURES; NOTES; Chapter 2: Tone at the Top and Throughout; INTEGRITY AT THE TOP; IT'S BETTER TO BE LUCKY THAN GOOD; COMMUNICATING VALUESHOW THE CEO CAN MAKE THE DIFFERENCENOTES; Chapter 3: The Growth and Evolution of Compliance; A BRIEF HISTORY OF COMPLIANCE; CRACKING DOWN ON FRAUD; THE MCNULTY MEMORANDUM; EVALUATING THE SEABOARD CRITERIA IN MITIGATING ENFORCEMENT ACTIONS; NOTES; Chapter 4: Caremarkand Sarbanes-Oxley: Enhancing Compliance; THE CAREMARK CASE; CAREMARK: A CRITICAL LOOK BACK; SOX RECONSIDERED; ADDITIONAL COMPLIANCE LAWS AND STANDARDS; NOTES; Chapter 5: CA's Compliance Rebirth: Don't Lie, Don't Cheat, Don't Steal; THE "35-DAY MONTH" ACCOUNTING FRAUD; THE DEFFERED PROSECUTION AGREEMENTCA'S FIRST CHIEF COMPLIANCE OFFICERUNFETTERED ACCESS; BUILDING THE COMPLIANCE PROGRAM; CA'S REVISED CODE OF CONDUCT; JOINING THE DEFENSE INDUSTRY INITIATIVE; CA'S TONE AT THE TOP; RESPONSE TO VIOLATIONS OF BUSINESS PRACTICES; ENSURING FUTURE COMPLIANCE; BUSINESS PRACTICE OFFICERS; COMPLIANCE AND ETHICS LEADERSHIP COUNCIL PROGRAM ASSESSMENT; PAT GNAZZO'S FIVE BEST PRACTICES FOR A WORLD-CLASS COMPLIANCE PROGRAM; A NEW ERA OF OPPORTUNITY; NOTES; Chapter 6: The International Landscape of Compliance; THE FOREIGN CORRUPT PRACTICES ACT; SCHNITZER STEEL AND THE FCPAMETCALF AND EDDY CIVIL FCPA SETTLEMENTTHE CHALLENGE OF IMPLEMENTING CORPORATE COMPLIANCE IN FOREIGN ISSUERS; NOTES; Chapter 7: Compliance Programs and Anti-Money Laundering Efforts; WHAT IS MONEY LAUNDERING?; BANK SECRECY ACT; USA PATRIOT ACT; NON-FINANCIAL INSTITUTIONS; COMPLIANCE PROGRAMS; THE RISE OF FOREIGN STATUTES; NOTES; About the Chapter Authors; Chapter 8: Interview with an Ethics and Compliance Thought Leader; NOTES; Chapter 9: Building a World-Class Compliance Program: The Seven Steps in Practice (Part I); THE SEVEN STEPS TO AN EFFECTIVE COMPLIANCE PROGRAM; SEVEN STEPS OVERVIEWSTEP 1: COMPLIANCE STANDARDS AND PROCEDURESSTEP 2: ORGANIZATIONAL LEADERSHIP AND A CULTURE OF COMPLIANCE; STEP 3: REASONABLE EFFORTS TO EXCLUDE PROHIBITED PERSONS; NOTES; Chapter 10: Building a World-Class Compliance Program: The Seven Steps in Practice (Part II); STEP 4: TRAINING AND COMMUNICATION OF STANDARDS AND PROCEDURES; STEP 5: MONITORING, AUDITING, AND EVALUATING PROGRAM EFFECTIVENESS; STEP 6: PERFORMANCE INCENTIVES AND DISCIPLINARY ACTION; STEP 7: RESPONSE TO CRIMINAL CONDUCT AND REMEDIAL ACTION; AVOIDING ACCIDENTS ON THE ROAD TO COMPLIANCE; NOTESChapter 11: Recognizing Compliance Excellence: Premier, Inc. and Winning the Baldrige Award*Written by a long-standing practitioner in the field, this timely and critical work is your best source for understanding all the complex issues and requirements associated with corporate compliance. It provides clear guidance for those charged with protecting their companies from financial and reputational risk, litigation, and government intervention, who want a robust guide to establish an effective compliance program.Compliance auditingAuditing, InternalCorporationsCorrupt practicesPreventionBusiness ethicsCompliance auditing.Auditing, Internal.CorporationsCorrupt practicesPrevention.Business ethics.657657.45657/.45658.473Biegelman Martin T1611966Biegelman Daniel R1611967MiAaPQMiAaPQMiAaPQBOOK9910830817103321Building a world-class compliance program3940483UNINA03835nam 22005775 450 991029897950332120220218184613.03-658-07005-610.1007/978-3-658-07005-2(CKB)3710000000227030(EBL)1802609(SSID)ssj0001338458(PQKBManifestationID)11735561(PQKBTitleCode)TC0001338458(PQKBWorkID)11337923(PQKB)11610679(MiAaPQ)EBC1802609(DE-He213)978-3-658-07005-2(PPN)180623605(EXLCZ)99371000000022703020140825d2014 u| 0engur|n|---|||||txtccrTrustworthy Reconfigurable Systems Enhancing the Security Capabilities of Reconfigurable Hardware Architectures /by Thomas Feller1st ed. 2014.Wiesbaden :Springer Fachmedien Wiesbaden :Imprint: Springer Vieweg,2014.1 online resource (228 p.)Description based upon print version of record.1-322-17256-0 3-658-07004-8 Includes bibliographical references.Introduction -- Trustworthy Computing.- Requirements for Trustworthiness -- Design Security and Cyber-Physical Threats -- Towards Trustworthy Cyber-Physical Systems -- Application Scenarios -- Summary.Thomas Feller sheds some light on trust anchor architectures for trustworthy reconfigurable systems. He is presenting novel concepts enhancing the security capabilities of reconfigurable hardware. Almost invisible to the user, many computer systems are embedded into everyday artifacts, such as cars, ATMs, and pacemakers. The significant growth of this market segment within the recent years enforced a rethinking with respect to the security properties and the trustworthiness of these systems. The trustworthiness of a system in general equates to the integrity of its system components. Hardware-based trust anchors provide measures to compare the system configuration to reference measurements. Reconfigurable architectures represent a special case in this regard, as in addition to the software implementation, the underlying hardware architecture may be exchanged, even during runtime. Contents Trustworthy Systems, Reconfigurable Architectures FPGA Design Security, Authenticated Encryption Physical Attack Resistance, System Security Target Groups Researchers and students in the field of reconfigurable hardware architectures with an emphasis on secure and trustworthy systems Practitioners using reconfigurable architectures and need to provide a high level of protection against overproduction and counterfeiting. The Author Thomas Feller finished his doctoral thesis at the Center of Advanced Security Research (CASED) and the department of Integrated Circuits and Systems Lab, Technische Universität Darmstadt, under the supervision of Prof. Dr.-Ing. Sorin A. Huss.Computer input-output equipmentData structures (Computer science)Computer Hardwarehttps://scigraph.springernature.com/ontologies/product-market-codes/I1200XData Structures and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15009Computer input-output equipment.Data structures (Computer science)Computer Hardware.Data Structures and Information Theory.004005.82Feller Thomasauthttp://id.loc.gov/vocabulary/relators/aut995758BOOK9910298979503321Trustworthy Reconfigurable Systems2281689UNINA