Contents. xvii. Preface. xxi. Foreword. 1 Introduction 1. Preamble 1. Scope and Structure of the Book 3. Acknowledgments 4 Endnotes 5

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Contents. xvii. Preface. xxi. Foreword. 1 Introduction 1. Preamble 1. Scope and Structure of the Book 3. Acknowledgments 4 Endnotes 5"

Transcription

1 Contents Preface Foreword xvii xxi 1 Introduction 1 Preamble 1 Scope and Structure of the Book 3 Acknowledgments 4 Endnotes 5 2 Engineering Systems 7 Introduction 8 Some Initial Observations 8 Deficient Definitions 11 Rationale 12 What are Systems? 13 Deconstructing Systems Engineering 16 What Is Systems Engineering? 19 vii

2 viii Engineering Safe and Secure Software Systems Systems Engineering and the Systems Engineering Management Process 20 The DoD Text 22 Another Observation 22 More on Systems Engineering 23 The Systems Engineering Process (SEP) 23 Summary and Conclusions 26 Endnotes 26 3 Engineering Software Systems 29 Introduction 29 The Great Debate 31 Some Observations 32 Rationale 33 Understanding Software Systems Engineering 34 Deconstructing Software Systems Engineering 34 What Is Software? 35 What Are Software Systems? 36 Are Control Software Systems Different? 42 What is Software Systems Engineering? 42 The Software Systems Engineering Process 44 Steps in the Software Development Process 44 Omissions or Lack of Attention 48 Nonfunctional Requirements 48 Testing Nonfunctional Attributes 49

3 Contents ix Verification and Validation 49 Creating Requisite Functional and Nonfunctional Data 52 Resiliency and Availability 55 Decommissioning 56 Summary and Conclusions 56 Endnotes 57 4 Engineering Secure and Safe Systems, Part I 59 Introduction 59 The Approach 60 Security Versus Safety 60 Four Approaches to Developing Critical Systems 63 The Dependability Approach 64 The Safety Engineering Approach 65 The Secure Systems Approach 67 The Real-Time Systems Approach 68 Security-Critical and Safety-Critical Systems 68 Summary and Conclusions 70 Endnotes 70 5 Engineering Secure and Safe Systems, Part 2 73 Introduction 73 Approach 75 Reducing the Safety-Security Deficit 76 Game-Changing and Clean-Slate Approaches 77 A Note on Protection 81 Safety-Security Governance Structure and Risk Management 83

4 x Engineering Safe and Secure Software Systems An Illustration 83 The General Development Life Cycle 84 Structure of the Software Systems Development Life Cycle 86 Life Cycle Processes 89 Governance Structure for Systems Engineering Projects 92 Risks of Security-Oriented Versus Safety-Oriented Software Systems 94 Expertise Needed at Various Stages 95 Summary and Conclusions 95 Endnotes 96 6 Software Systems Security and Safety Risk 99 Introduction 99 Understanding Risk 100 Risks of Determining Risk 100 Software-Related Risks 101 Motivations for Risk Mitigation 103 Defining Risk 104 Assessing and Calculating Risk 105 Threats Versus Exploits 107 Threat Risk Modeling 111 Threats from Safety-Critical Systems 114 Creating Exploits and Suffering Events 116 Vulnerabilities 119 Application Risk Management Considerations 120 Subjective vs. Objective vs. Personal Risk 121 Personalization of Risk 122

5 Contents xi The Fallacies of Data Ownership, Risk Appetite, and Risk Tolerance 122 The Dynamics of Risk 124 A Holistic View of Risk 125 Summary and Conclusions 126 Endnotes Software System Security and Safety Metrics 131 Introduction 131 Obtaining Meaningful Data 133 Defining Metrics 133 Differentiating Between Metrics and Measures 135 Software Metrics 138 Measuring and Reporting Metrics 140 Metrics for Meeting Requirements 143 Risk Metrics 146 Consideration of Individual Metrics 146 Security Metrics for Software Systems 150 Safety Metrics for Software Systems 151 Summary and Conclusions 152 Endnotes Software System Development Processes 157 Introduction 157 Processes and Their Optimization 158 Processes in Relation to Projects and Products/Services 159

6 xii Engineering Safe and Secure Software Systems Some Definitions 161 Chronology of Maturity Models 164 Security and Safety in Maturity Models 165 FAA Model 165 The +SAFE V1.2 Extension 167 The +SECURE V1.3 Extension 167 The CMMI Approach 167 General CMMI 167 CMMI for Development 168 Incorporating Safety and Security Processes 169 +SAFE V1.2 Comparisons 169 +SECURE V1.2 Comparisons 172 Summary and Conclusions 173 Endnotes Secure SSDLC Projects in Greater Detail 177 Introduction 177 Different Terms, Same or Different Meanings 178 Creating and Using Software Systems 180 Phases and Steps of the SSDLC 182 Summary and Conclusions 191 Endnotes Safe SSDLC Projects in Greater Detail 195 Introduction 195 Definitions and Terms 196 Hazard Analysis 198 Software Requirements Hazard Analysis 199 Top-Level Design Hazard Analysis 200 Detailed Design Hazard Analysis 201 Code-Level Software Hazard Analysis 201

7 Contents xiii Software Safety Testing 201 Software/User Interface Analysis 202 Software Change Hazard Analysis 203 The Safe Software System Development Lifecycle 204 Combined Safety and Security Requirements 207 Summary and Conclusions 208 Endnotes The Economics of Software Systems Safety and Security 211 Introduction 211 Closing the Gap 212 Technical Debt 214 Application of Technical Debt Concept to Security and Safety 215 System Obsolescence and Replacement 217 The Responsibility for Safety and Security by Individuals and Groups 218 Basic Idea 218 Extending the Model 219 Concept and Requirements Phase 219 Design and Architecture Phase 222 Development 223 Verification 224 Validation 224 Deployment, Operations, Maintenance, and Technical Support 225 Decommissioning and Disposal 226 Overall Impression 226 Methods for Encouraging Optimal Behavior 226 Pricing 227 Chargeback 227 Costs and Risk Mitigation 228 Management Mandate 228

8 xiv Engineering Safe and Secure Software Systems Legislation 229 Regulation 229 Standards and Certifications 229 Going Forward 230 Tampering 231 Tamper Evidence 231 Tamper Resistance 232 Tamperproofing 232 A Brief Note on Patterns 234 Conclusions 236 Endnotes 238 Appendix A: Software Vulnerabilities, Errors, and Attacks 239 Ranking Errors, Vulnerabilities, and Risks 240 The OWASP Top Security Risks 241 The CWE/SANS Most Dangerous Software Errors 244 Top-Ranking Safety Issues 244 Enumeration and Classification 246 WASC Threat Classification 248 Summary and Conclusions 250 Endnotes 250 Appendix B: Comparison of ISO/IEC and CMMI -DEV Process Areas 253 Appendix C: Security-Related Tasks in the Secure SSDLC 257 Task Areas for SSDLC Phases 258 Involvement by Teams and Groups for Secure SSDLC Phases 262

9 Contents xv A Note on Sources 288 Endnotes 288 Appendix D: Safety-Related Tasks in the Safe SSDLC 289 Task Areas for Safe SSDLC Phases 289 Levels of Involvement 309 A Note on Sources 309 Endnotes 313 About the Author 315 Index 317

10

TABLE OF CONTENTS CHAPTER TITLE PAGE

TABLE OF CONTENTS CHAPTER TITLE PAGE viii TABLE OF CONTENTS CHAPTER TITLE PAGE TITLE PAGE DECLARATION DEDICATION ACKNOWLEDGEMENT ABSTRACT ABSTRAK TABLE OF CONTENTS LIST OF TABLES LIST OF FIGURES LIST OF APPENDICES I II III IV VI VII VIII

More information

RESILIENT. SECURE and SOFTWARE. Requirements, Test Cases, and Testing Methods. Mark S. Merkow and Lakshmikanth Raghavan. CRC Press

RESILIENT. SECURE and SOFTWARE. Requirements, Test Cases, and Testing Methods. Mark S. Merkow and Lakshmikanth Raghavan. CRC Press SECURE and RESILIENT SOFTWARE Requirements, Test Cases, and Testing Methods Mark S. Merkow and Lakshmikanth Raghavan CRC Press Taylor & Francis Group Boca Raton London New York CRC Press Is an imprint

More information

Securing the Cloud. Cloud Computer Security Techniques and Tactics. Vic (J.R.) Winkler. Technical Editor Bill Meine ELSEVIER

Securing the Cloud. Cloud Computer Security Techniques and Tactics. Vic (J.R.) Winkler. Technical Editor Bill Meine ELSEVIER Securing the Cloud Cloud Computer Security Techniques and Tactics Vic (J.R.) Winkler Technical Editor Bill Meine ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO

More information

SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE (2013-29) ON THIRD PARTY RELATIONSHIPS

SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE (2013-29) ON THIRD PARTY RELATIONSHIPS SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE (2013-29) ON THIRD PARTY RELATIONSHIPS An overview of how the Shared Assessments Program SIG 2014

More information

Software Maintenance Management

Software Maintenance Management Software Maintenance Management Evaluation and Continuous Improvement Alain April Alain Abran IEEE COMPUTER SOCIETY iwiley- INTERSCIENCE A JOHN WILEY & SONS, INC., PUBLICATION Contents Foreword Thomas

More information

PURCHASING & SUPPLY CHAIN MANAGEMENT

PURCHASING & SUPPLY CHAIN MANAGEMENT FIFTH EDITION PURCHASING & SUPPLY CHAIN MANAGEMENT Analysis, Strategy, Planning and Practice AHJAN J. VAN WEELE Eindhoven University of Technology, The Netherlands ;\ CENGAGE t% Learning" Australia Brazil

More information

Requirements Engineering for Software

Requirements Engineering for Software Requirements Engineering for Software and Systems Second Edition Phillip A. Laplante CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an

More information

Security Metrics. A Beginner's Guide. Caroline Wong. Mc Graw Hill. Singapore Sydney Toronto. Lisbon London Madrid Mexico City Milan New Delhi San Juan

Security Metrics. A Beginner's Guide. Caroline Wong. Mc Graw Hill. Singapore Sydney Toronto. Lisbon London Madrid Mexico City Milan New Delhi San Juan Security Metrics A Beginner's Guide Caroline Wong Mc Graw Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Contents FOREWORD

More information

Implementation Plan: Development of an asset and financial planning management. Australian Capital Territory

Implementation Plan: Development of an asset and financial planning management. Australian Capital Territory Implementation Plan: Development of an asset and financial planning management framework for TAMS Australian Capital Territory NATIONAL PARTNERSHIP AGREEMENT TO SUPPORT LOCAL GOVERNMENT AND REGIONAL DEVELOPMENT

More information

CONTENTS. Preface. Acknowledgements. 1. Introduction and Overview 1 Introduction 1 Whatis the CMMI"? 2 What the CMMI* is Not 3 What are Standards?

CONTENTS. Preface. Acknowledgements. 1. Introduction and Overview 1 Introduction 1 Whatis the CMMI? 2 What the CMMI* is Not 3 What are Standards? Preface Acknowledgements xi xiii 1. Introduction and Overview 1 Introduction 1 Whatis the CMMI"? 2 What the CMMI* is Not 3 What are Standards? 3 2. Summaryof CMMI-SW 5 The CMM*-SW 5 CMMI--SW Continuous

More information

C ONTENTS. Acknowledgments

C ONTENTS. Acknowledgments kincaidtoc.fm Page vii Friday, September 20, 2002 1:25 PM C ONTENTS Preface Acknowledgments xxi xxvii Part 1 CRM: Is It Right for Your Company? 1 Chapter 1 Commerce in the 21st Century 3 1.1 Understanding

More information

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i.

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i. New York, NY, USA: Basic Books, 2013. p i. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=2 New York, NY, USA: Basic Books, 2013. p ii. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=3 New

More information

Chapter URL: http://www.nber.org/chapters/c0775

Chapter URL: http://www.nber.org/chapters/c0775 This PDF is a selection from an out-of-print volume from the National Bureau of Economic Research Volume Title: Urban Mortgage Lending by Life Insurance Companies Volume Author/Editor: Raymond J. Saulnier

More information

Quality Management. Theory and Application PETER D. MAUCH. Ltfi) CRC Press. \ V J Taylor & Francis Group. ^ ^ Boca Raton London New York

Quality Management. Theory and Application PETER D. MAUCH. Ltfi) CRC Press. \ V J Taylor & Francis Group. ^ ^ Boca Raton London New York Quality Management Theory and Application PETER D. MAUCH Ltfi) CRC Press \ V J Taylor & Francis Group ^ ^ Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an Informa business

More information

Four-Phase-Model for the Implementation of Shared Services

Four-Phase-Model for the Implementation of Shared Services Martin H. Wenderoth Four-Phase-Model for the Implementation of Shared Services Verlag Dr. Kovac Hamburg 2014 Table of Content Foreword V Acknowledgement VII Abstract... IX Table of Content XI List of Figures

More information

Hi iv. Declaration Certificate Acknowledgement Preface. List o f Table. List o f Figures. viii xvi xvii. 1.1 Introduction 1

Hi iv. Declaration Certificate Acknowledgement Preface. List o f Table. List o f Figures. viii xvi xvii. 1.1 Introduction 1 Declaration Certificate Acknowledgement Preface. List o f Table. List o f Figures Hi iv V viii xvi xvii Chapter 1 Introduction 1-13 1.1 Introduction 1 1.2 Statement of the Problem 3 1.2.1 Terms used in

More information

Effective Software Security Management

Effective Software Security Management Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta dharmeshmm@mastek.com / dharmeshmm@owasp.org Table of Contents Abstract... 1

More information

Management. Project. Software. Ashfaque Ahmed. A Process-Driven Approach. CRC Press. Taylor Si Francis Group Boca Raton London New York

Management. Project. Software. Ashfaque Ahmed. A Process-Driven Approach. CRC Press. Taylor Si Francis Group Boca Raton London New York Software Project Management A Process-Driven Approach Ashfaque Ahmed CRC Press Taylor Si Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor St Francis Croup, an Informa business

More information

Bas~c Accoun~~nll NZELE DAVID NZOMO. "'lwalnn or NAIWoml\'~ZJI'-""M" fl. 9. Ikx lrhj7. 1i.JQ. University of Nairobi Press. iijjmiiimllii ---~_---1 \

Bas~c Accoun~~nll NZELE DAVID NZOMO. 'lwalnn or NAIWoml\'~ZJI'-M fl. 9. Ikx lrhj7. 1i.JQ. University of Nairobi Press. iijjmiiimllii ---~_---1 \ Bas~c Accoun~~nll Principles and Procedures NZELE DAVID NZOMO. "'lwalnn or NAIWoml\'~ZJI'-""M" fl. 9. Ikx lrhj7 1i.JQ University of Nairobi Press iijjmiiimllii 04965091 ---~_---1 \ Epigraph List of Abbreviations

More information

Supply Chain Risk. An Emerging Discipline. Gregory L. Schlegel. Robert J. Trent

Supply Chain Risk. An Emerging Discipline. Gregory L. Schlegel. Robert J. Trent Supply Chain Risk Management An Emerging Discipline Gregory L. Schlegel Robert J. Trent CRC Press Taylors.Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup,

More information

Expert Oracle Application. Express Security. Scott Spendolini. Apress"

Expert Oracle Application. Express Security. Scott Spendolini. Apress Expert Oracle Application Express Security Scott Spendolini Apress" Contents Foreword About the Author About the Technical Reviewer Acknowledgments Introduction xv xvii xix xxi xxiii BChapter 1: Threat

More information

Agile! Springer. The Good, the Hype and the Ugly. Bertrand Meyer

Agile! Springer. The Good, the Hype and the Ugly. Bertrand Meyer i ii imnin111 imiiii niiini n in mi1111 m i urn u n in i H 111 nil n i ni*tmi n11111 iimn mn n IIIH iwi m«inininnmminniii m HI

More information

SECOND EDITION THE SECURITY RISK ASSESSMENT HANDBOOK. A Complete Guide for Performing Security Risk Assessments DOUGLAS J. LANDOLL

SECOND EDITION THE SECURITY RISK ASSESSMENT HANDBOOK. A Complete Guide for Performing Security Risk Assessments DOUGLAS J. LANDOLL SECOND EDITION THE SECURITY RISK ASSESSMENT HANDBOOK A Complete Guide for Performing Security Risk Assessments DOUGLAS J. LANDOLL CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is

More information

Executive's Guide to Project Management

Executive's Guide to Project Management J Executive's Guide to Project Management Organizational Processes and Practices for Supporting Complex Projects ROBERT K. WYSOCKI WILEY John Wiley & Sons, Inc. Foreword Preface xi, XV INTRODUCTIONN The

More information

Validating Enterprise Systems: A Practical Guide

Validating Enterprise Systems: A Practical Guide Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise

More information

Department of Defense Fiscal Year (FY) 2013 President's Budget Submission

Department of Defense Fiscal Year (FY) 2013 President's Budget Submission Department of Defense Fiscal Year (FY) 2013 President's Budget Submission February 2012 Defense Security Service Justification Book Research, Development, Test & Evaluation, Defense-Wide THIS PAGE INTENTIONALLY

More information

Cyber security standard

Cyber security standard Cyber security standard Brief description This *Standard specifies security standards that protect *ICT systems and data from unintended or unauthorized access, damage or destruction. Related policies

More information

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright

More information

Governance Simplified

Governance Simplified Information Security Governance Simplified From the Boardroom to the Keyboard TODD FITZGERALD, cissp; cisa, cism Foreword by Tom Peltier CRC Press Taylor & Francis Croup Boca Raton London NewYork CRC Press

More information

Contents. Foreword. Acknowledgments

Contents. Foreword. Acknowledgments Foreword Preface Acknowledgments xv xvii xviii CHAPTER 1 Introduction 1 1.1 What Is Mission Critical? 1 1.2 Purpose of the Book 2 1.3 Network Continuity Versus Disaster Recovery 2 1.4 The Case for Mission-Critical

More information

^H 3RD EDITION ITGOVERNANCE A MANAGER'S GUIOE TO OATA SECURITY ANO DS 7799/IS017799 ALAN CALDER STEVE WATKINS. KOGAN PAGE London and Sterling, VA

^H 3RD EDITION ITGOVERNANCE A MANAGER'S GUIOE TO OATA SECURITY ANO DS 7799/IS017799 ALAN CALDER STEVE WATKINS. KOGAN PAGE London and Sterling, VA ^H 3RD EDITION ITGOVERNANCE A MANAGER'S GUIOE TO OATA SECURITY ANO DS 7799/IS017799 ALAN CALDER STEVE WATKINS KOGAN PAGE London and Sterling, VA Contents Foreword by Nigel Turnbull How to use this book

More information

COPYRIGHTED MATERIAL. Contents. Acknowledgments Introduction

COPYRIGHTED MATERIAL. Contents. Acknowledgments Introduction Contents Acknowledgments Introduction 1. Governance Overview How Do We Do It? What Do We 1 Get Out of It? 1.1 What Is It? 1 1.2 Back to Basics 2 1.3 Origins of Governance 3 1.4 Governance Definition 5

More information

Online Recruiting and Selection

Online Recruiting and Selection Online Recruiting and Selection Innovations in Talent Acquisition Douglas H. Reynolds and John A. Weiner ^WILEY-BLACKWELL A John Wiley &. Sons, Ltd., Publication Contents Series Editor's Preface About

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

Business Architecture

Business Architecture Business Architecture A Practical Guide JONATHAN WHELAN and GRAHAM MEADEN GOWER Contents List of Figures List of Tables About the Authors Foreword Preface Acknowledgemen ts Abbreviations IX xi xiii xv

More information

Networking. Cloud and Virtual. Data Storage. Greg Schulz. Your journey. effective information services. to efficient and.

Networking. Cloud and Virtual. Data Storage. Greg Schulz. Your journey. effective information services. to efficient and. Cloud and Virtual Data Storage Networking Your journey to efficient and effective information services Greg Schulz CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of

More information

CONTENTS. List of Tables List of Figures

CONTENTS. List of Tables List of Figures Prelims 13/3/06 9:11 pm Page iii CONTENTS List of Tables List of Figures ix xi 1 Introduction 1 1.1 The Need for Guidance on ERP System Validation 1 1.2 The Need to Validate ERP Systems 3 1.3 The ERP Implementation

More information

1 of 7 31/10/2012 18:34

1 of 7 31/10/2012 18:34 Regulatory Story Go to market news section Company TIDM Headline Released Number Ironveld PLC IRON Holding(s) in Company 18:01 31-Oct-2012 0348Q18 RNS Number : 0348Q Ironveld PLC 31 October 2012 TR-1:

More information

UF Risk IT Assessment Guidelines

UF Risk IT Assessment Guidelines Who Should Read This All risk assessment participants should read this document, most importantly, unit administration and IT workers. A robust risk assessment includes evaluation by all sectors of an

More information

Enterprise Performance Management Done Right. An Operating System for Your Organization. Wiley CIO

Enterprise Performance Management Done Right. An Operating System for Your Organization. Wiley CIO Brochure More information from http://www.researchandmarkets.com/reports/2329628/ Enterprise Performance Management Done Right. An Operating System for Your Organization. Wiley CIO Description: A workable

More information

TABLE OF CONTENTS. Preface About the Author Acknowledgments About APICS Web Added Value

TABLE OF CONTENTS. Preface About the Author Acknowledgments About APICS Web Added Value TABLE OF CONTENTS Preface About the Author Acknowledgments About APICS Web Added Value xi xiii xv xvii xix Chapter 1. What Is ERP? 1 Top-Management Planning 2 Master Production Scheduling and Materials

More information

Open Source Toolkit. Penetration Tester's. Jeremy Faircloth. Third Edition. Fryer, Neil. Technical Editor SYNGRESS. Syngrcss is an imprint of Elsevier

Open Source Toolkit. Penetration Tester's. Jeremy Faircloth. Third Edition. Fryer, Neil. Technical Editor SYNGRESS. Syngrcss is an imprint of Elsevier Penetration Tester's Open Source Toolkit Third Edition Jeremy Faircloth Neil Fryer, Technical Editor AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS. SAN DIEGO SAN FRANCISCO. SINGAPORE SYDNEY

More information

for Research and Guiding Innovation for Positive R&D Outcomes Lory Mitchell Wingate

for Research and Guiding Innovation for Positive R&D Outcomes Lory Mitchell Wingate Project Management for Research and Development Guiding Innovation for Positive R&D Outcomes Lory Mitchell Wingate CRC Press Taylor & Francis Group BocaRaton London New York CRC Press is an imprint of

More information

Annex B - Content Management System (CMS) Qualifying Procedure

Annex B - Content Management System (CMS) Qualifying Procedure Page 1 DEPARTMENT OF Version: 1.5 Effective: December 18, 2014 Annex B - Content Management System (CMS) Qualifying Procedure This document is an annex to the Government Web Hosting Service (GWHS) Memorandum

More information

A Study on the Secure Software Development Life Cycle for Common Criteria (CC) Certification

A Study on the Secure Software Development Life Cycle for Common Criteria (CC) Certification , pp. 131-142 http://dx.doi.org/10.14257/ijseia.2015.9.10.13 A Study on the Secure Software Development Life Cycle for Common Criteria (CC) Certification Min-gyu Lee 1, Hyo-jung Sohn 2, Baek-min Seong

More information

Agenda Item #06-29 Effective Spring 2007 Eastern Illinois University Revised Course Proposal MGT 4500, Employee Staffing and Development

Agenda Item #06-29 Effective Spring 2007 Eastern Illinois University Revised Course Proposal MGT 4500, Employee Staffing and Development Agenda Item #06-29 Effective Spring 2007 Eastern Illinois University Revised Course Proposal MGT 4500, Employee Staffing and Development 1. Catalog Description a. Course Number: MGT 4500 b. Title: Employee

More information

Cyber Attacks. Protecting National Infrastructure Student Edition. Edward G. Amoroso

Cyber Attacks. Protecting National Infrastructure Student Edition. Edward G. Amoroso Cyber Attacks Protecting National Infrastructure Student Edition Edward G. Amoroso ELSEVIER. AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Butterworth-Heinemann

More information

Job Hazard Analysis. A Guide for Voluntary Compliance and Beyond. From Hazard to Risk: Transforming the JHA from a Tool to a Process

Job Hazard Analysis. A Guide for Voluntary Compliance and Beyond. From Hazard to Risk: Transforming the JHA from a Tool to a Process Job Hazard Analysis A Guide for Voluntary Compliance and Beyond From Hazard to Risk: Transforming the JHA from a Tool to a Process James E. Roughton Nathan Crutchfield E L S E V I E R AMSTERDAM. BOSTON.

More information

Compensating the Sales Force

Compensating the Sales Force Compensating the Sales Force A Practical Guide to Designing Winning Sales Reward Programs Second Edition David J. Cichelli Me Graw Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan

More information

PART A: OVERVIEW...1 1. INTRODUCTION...1 2. APPLICABILITY...1 3. OBJECTIVE...1 PART B: LEGAL PROVISIONS...2 4. LEGAL PROVISIONS...

PART A: OVERVIEW...1 1. INTRODUCTION...1 2. APPLICABILITY...1 3. OBJECTIVE...1 PART B: LEGAL PROVISIONS...2 4. LEGAL PROVISIONS... PART A: OVERVIEW...1 1. INTRODUCTION...1 2. APPLICABILITY...1 3. OBJECTIVE...1 PART B: LEGAL PROVISIONS...2 4. LEGAL PROVISIONS...2 PART C: POLICY...2 5. SCOPE OF ACTIVITIES THAT CAN BE OUTSOURCED...2

More information

IMPROVEMENT THE PRACTITIONER'S GUIDE TO DATA QUALITY DAVID LOSHIN

IMPROVEMENT THE PRACTITIONER'S GUIDE TO DATA QUALITY DAVID LOSHIN i I I I THE PRACTITIONER'S GUIDE TO DATA QUALITY IMPROVEMENT DAVID LOSHIN ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann

More information

Electronic Payment Schemes Guidelines

Electronic Payment Schemes Guidelines BANK OF TANZANIA Electronic Payment Schemes Guidelines Bank of Tanzania May 2007 Bank of Tanzania- Electronic Payment Schemes and Products Guidleness page 1 Bank of Tanzania, 10 Mirambo Street, Dar es

More information

Preface. Table of Contents. List of Figures. List of Tables. List of Abbreviations. 1 Introduction 1. 2 Problem 23.

Preface. Table of Contents. List of Figures. List of Tables. List of Abbreviations. 1 Introduction 1. 2 Problem 23. XI Outline Foreword Preface Outline Table of Contents List of Figures List of Tables List of Abbreviations VII IX XI XIII XXI XXIII XXV 1 Introduction 1 2 Problem 23 3 Related Work 35 4 Development of

More information

IT Governance Regulatory. P.K.Patel AGM, MoF

IT Governance Regulatory. P.K.Patel AGM, MoF IT Governance Regulatory Perspective P.K.Patel AGM, MoF Agenda What is IT Governance? Aspects of IT Governance What banks should consider before implementing these aspects? What banks should do for implementation

More information

Agenda item number: 5 FINANCE AND PERFORMANCE MANAGEMENT OVERVIEW AND SCRUTINY COMMITTEE FUTURE WORK PROGRAMME

Agenda item number: 5 FINANCE AND PERFORMANCE MANAGEMENT OVERVIEW AND SCRUTINY COMMITTEE FUTURE WORK PROGRAMME Agenda item number: 5 COMMITTEE FINANCE AND PERFORMANCE MANAGEMENT OVERVIEW AND SCRUTINY COMMITTEE DATE TUESDAY 17 JUNE 2003 TITLE OF REPORT RESPONSIBLE OFFICER FUTURE WORK PROGRAMME Ann Joyce, Head of

More information

ROAD SAFETY GUIDELINES FOR TAH ROAD INFRASTRUCTURE SAFETY MANAGEMENT

ROAD SAFETY GUIDELINES FOR TAH ROAD INFRASTRUCTURE SAFETY MANAGEMENT I. GENERAL ROAD SAFETY GUIDELINES FOR TAH ROAD INFRASTRUCTURE SAFETY MANAGEMENT ANNEX III B i. The setting up and implementing of appropriate management procedures is an essential tool for improving the

More information

INNOVATION MANAGEMENT

INNOVATION MANAGEMENT INNOVATION MANAGEMENT Strategy and Implementation using the Pentathlon Framework SECOND EDITION KEITH GOFFIN & RICK MITCHELL Includes 77 innovation case studies - from the service and manufacturing sectors

More information

Mental Health Declaration for Europe

Mental Health Declaration for Europe WHO European Ministerial Conference on Mental Health Facing the Challenges, Building Solutions Helsinki, Finland, 12 15 January 2005 EUR/04/5047810/6 14 January 2005 52667 ORIGINAL: ENGLISH Mental Health

More information

Workflow Administration of Windchill 10.2

Workflow Administration of Windchill 10.2 Workflow Administration of Windchill 10.2 Overview Course Code Course Length TRN-4339-T 2 Days In this course, you will learn about Windchill workflow features and how to design, configure, and test workflow

More information

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix Honeynet2_bookTOC.fm Page vii Monday, May 3, 2004 12:00 PM Contents Preface Foreword xix xxvii P ART I THE HONEYNET 1 Chapter 1 The Beginning 3 The Honeynet Project 3 The Information Security Environment

More information

Web Application Security

Web Application Security Web Application Security A Beginner's Guide Bryan Sullivan Vincent Liu Mc r New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Contents

More information

Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,

Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group, Secure and Resilient Software Development Mark S. Merkow Lakshmikanth Raghavan CRC Press Taylor& Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor St Francis Group, an Informs

More information

THE CERTIFIED SIX SIGMA BLACK BELT HANDBOOK

THE CERTIFIED SIX SIGMA BLACK BELT HANDBOOK THE CERTIFIED SIX SIGMA BLACK BELT HANDBOOK SECOND EDITION T. M. Kubiak Donald W. Benbow ASQ Quality Press Milwaukee, Wisconsin Table of Contents list of Figures and Tables Preface to the Second Edition

More information

Requirements Engineering

Requirements Engineering Murali Chemuturi Requirements Engineering and Management for Software Development Projects Foreword by Tom Gilb ^ Springer Contents 1 Introduction to Requirements Engineering and Management... 1 1.1 What

More information

Table of Contents. Testimonials from the MDM Alliance Group... Introduction to MDM...

Table of Contents. Testimonials from the MDM Alliance Group... Introduction to MDM... Testimonials from the MDM Alliance Group... Foreword... xiii xxv Preface... xxix Acknowledgements... xxxix Introduction to MDM... xli PART ONE: THE MDM APPROACH... 1 Chapter 1. A Company and its Data...

More information

Declaration to be submitted by directors in the Applicant Company 1

Declaration to be submitted by directors in the Applicant Company 1 Form SNBFI/D1 Name of the Applicant Company: Declaration to be submitted by directors in the Applicant Company 1 1. Personal Details 1.1 Full name: 1.2 National Identity Card number: 1.3 Passport number:

More information

Business Valuation Discounts and Premiums

Business Valuation Discounts and Premiums Business Valuation Discounts and Premiums Second Edition SHANNON P. PRATT WILEY John Wiley & Sons, Inc. Contents List of Exhibits xv About the Author xix About the Contributing Authors xxi Foreword Preface

More information

ANDROID SECURITY ATTACKS AND DEFENSES ABHISHEK DUBEY I ANMOL MISRA. ( r öc) CRC Press VV J Taylor & Francis Group ^ "^ Boca Raton London New York

ANDROID SECURITY ATTACKS AND DEFENSES ABHISHEK DUBEY I ANMOL MISRA. ( r öc) CRC Press VV J Taylor & Francis Group ^ ^ Boca Raton London New York ANDROID SECURITY ATTACKS AND DEFENSES ABHISHEK DUBEY I ANMOL MISRA ( r öc) CRC Press VV J Taylor & Francis Group ^ "^ Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an

More information

NATIONAL UNIVERSITY OF SCIENCE AND TECHNOLOGY FACULTY OF COMMERCE DEPARTMENT OF INSURANCE AND ACTUARIAL SCIENCE

NATIONAL UNIVERSITY OF SCIENCE AND TECHNOLOGY FACULTY OF COMMERCE DEPARTMENT OF INSURANCE AND ACTUARIAL SCIENCE NATIONAL UNIVERSITY OF SCIENCE AND TECHNOLOGY FACULTY OF COMMERCE DEPARTMENT OF INSURANCE AND ACTUARIAL SCIENCE B.COMM (HONS) DEGREE IN RISK MANAGEMENT AND INSURANCE STRATEGIC MARKETING OF INSURANCE [CIN

More information

Leveraging OWASP to Reduce Web App Data Breach Risk

Leveraging OWASP to Reduce Web App Data Breach Risk Leveraging OWASP to Reduce Web App Data Breach Risk P R E S E N T E D B Y J O H N VERRY P R I N C I P A L S E C U R I T Y C O N S U L T A N T P I V O T POINT SECURITY www.pivotpointsecurity.com Specialists

More information

Environmental and Material Flow Cost Accounting

Environmental and Material Flow Cost Accounting Environmental and Material Flow Cost Accounting Principles and Procedures Christine Jasch 4y Springer Contents Foreword by Tarcisio AIvarez-Rivero, UNDESA Acknowledgments List of Abbreviations List of

More information

San$Diego$Imperial$Counties$Region$of$Narcotics$Anonymous$ Western$Service$Learning$Days$$ XXX$Host$Committee!Guidelines$ $$

San$Diego$Imperial$Counties$Region$of$Narcotics$Anonymous$ Western$Service$Learning$Days$$ XXX$Host$Committee!Guidelines$ $$ SanDiegoImperialCountiesRegionofNarcoticsAnonymous WesternServiceLearningDays XXXHostCommitteeGuidelines I. Purpose ThepurposeoftheWesternServiceLearningDays(WSLD)XXXHostCommittee(HostCommittee)isto organize,coordinateandproducethewsldxxxeventwithinthe6weekperiodof3weekspriortotheendof

More information

Contents. BBS Software as a Service (SaaS),7. EH introducing aoudco.pu.ing 1. Distinguishing Cloud Types 4. Exploring

Contents. BBS Software as a Service (SaaS),7. EH introducing aoudco.pu.ing 1. Distinguishing Cloud Types 4. Exploring Contents Preface xvii EH introducing aoudco.pu.ing 1 Web 2.0 and the Cloud 3 Distinguishing Cloud Types 4 Cloud Deployment Models 5 Cloud Service Models 6 Exploring Uses of the Cloud 9 Introducing Scalability

More information

Addressing FISMA Assessment Requirements

Addressing FISMA Assessment Requirements SOLUTION BRIEF Heeding FISMA s Call for Security Metrics and Continuous Network Monitoring Addressing FISMA Assessment Requirements Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965 Freedom

More information

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department

More information

Digital Records Preservation Procedure No.: 6701 PR2

Digital Records Preservation Procedure No.: 6701 PR2 Digital Records Preservation Procedure No.: 6701 PR2 Policy Reference: Category: Department Responsible: Current Approved Date: 6700 Records Management Information Management Records Management and Privacy

More information

GFSU Certified Cyber Crime Investigator GFSU-CCCI. Training Partner. Important dates for all batches

GFSU Certified Cyber Crime Investigator GFSU-CCCI. Training Partner. Important dates for all batches GFSU Certified Cyber Crime Investigator GFSU-CCCI 1. Internet Fundamentals 2. Cyber Crime Essentials 3. Cyber Investigation Essentials 4. Digital Evidence in Computer Devices 5. Cyber Forensics Essentials

More information

Bank Recovery and Resolution. Sven Schelo. 01 Wolters Kluwer Law & Business

Bank Recovery and Resolution. Sven Schelo. 01 Wolters Kluwer Law & Business Bank Recovery and Resolution Sven Schelo 01 Wolters Kluwer Law & Business Foreword Preface List of Abbreviations xiii xv xvii CHARTER 1 Bank Business 1 1.01 Evolution of Size and Shape of Banks 1 1.02

More information

Regulations on Information Systems Security. I. General Provisions

Regulations on Information Systems Security. I. General Provisions Riga, 7 July 2015 Regulations No 112 (Meeting of the Board of the Financial and Capital Market Commission Min. No 25; paragraph 2) Regulations on Information Systems Security Issued in accordance with

More information

Introduction. Acknowledgments Support & Feedback Preparing for the Exam. Chapter 1 Plan and deploy a server infrastructure 1

Introduction. Acknowledgments Support & Feedback Preparing for the Exam. Chapter 1 Plan and deploy a server infrastructure 1 Introduction Acknowledgments Support & Feedback Preparing for the Exam xv xvi xvii xviii Chapter 1 Plan and deploy a server infrastructure 1 Objective 1.1: Design an automated server installation strategy...1

More information

AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Academic Press is an imprint of Elsevier

AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Academic Press is an imprint of Elsevier Emerging Market Bank Lending and Credit Risk Control Evolving Strategies to Mitigate Credit Risk, Optimize Lending Portfolios, and Check Delinquent Loans Leo Onyiriuba ELSEVIER AMSTERDAM BOSTON HEIDELBERG

More information

Application Security Report

Application Security Report Application Security Report Application Security Report is an annual SYNTAX publication summarizing the vulnerabilities discovered on application security engagements and provides an insight on current

More information

TITLE 9. HEALTH SERVICES CHAPTER 1. DEPARTMENT OF HEALTH SERVICES ADMINISTRATION ARTICLE 4. CODES AND STANDARDS REFERENCED

TITLE 9. HEALTH SERVICES CHAPTER 1. DEPARTMENT OF HEALTH SERVICES ADMINISTRATION ARTICLE 4. CODES AND STANDARDS REFERENCED TITLE 9. HEALTH SERVICES CHAPTER 1. DEPARTMENT OF HEALTH SERVICES ADMINISTRATION ARTICLE 4. CODES AND STANDARDS REFERENCED R9-1-412. Physical Plant Health and Safety Codes and Standards A. The following

More information

IT Security Risk Management: A Lifecycle Approach

IT Security Risk Management: A Lifecycle Approach Information Technology Security Guidance IT Security Risk Management: A Lifecycle Approach ITSG-33 November 2012 Foreword The of is an unclassified publication issued under the authority of the Chief,

More information

Business Administration of Windchill PDMLink 10.0

Business Administration of Windchill PDMLink 10.0 Business Administration of Windchill PDMLink 10.0 Overview Course Code Course Length TRN-3160-T 3 Days After completing this course, you will be well prepared to set up and manage a basic Windchill PDMLink

More information

Project Management Guidelines

Project Management Guidelines Project Management Guidelines 1. INTRODUCTION. This Appendix (Project Management Guidelines) sets forth the detailed Project Management Guidelines. 2. PROJECT MANAGEMENT PLAN POLICY AND GUIDELINES OVERVIEW.

More information

HANDBOOK OF SYSTEMS ENGINEERING AND MANAGEMENT

HANDBOOK OF SYSTEMS ENGINEERING AND MANAGEMENT HANDBOOK OF SYSTEMS ENGINEERING AND MANAGEMENT Second Edition Edited by Andrew P. Sage and William B. Rouse Preface Contributors xvii xxi An Introduction to Systems Engineering and Systems Management 1

More information

City of Casper, Wyoming. Request for Proposals. for. Food Service Point of Sale Solution

City of Casper, Wyoming. Request for Proposals. for. Food Service Point of Sale Solution City of Casper, Wyoming Request for Proposals for Food Service Point of Sale Solution The City of Casper, Wyoming (hereinafter referred to as City ) is seeking qualification statements and service proposals

More information

Contents. Intended Audience for This Book How This Book Is Structured. Acknowledgements

Contents. Intended Audience for This Book How This Book Is Structured. Acknowledgements Preface Intended Audience for This Book How This Book Is Structured xvii xviii xix Acknowledgements xxi 1 Open Source Software: Definitions and History 1 1.1 Definition of Terms 1 1.1.1 What Is Free Software?

More information

Measuring Data Quality for Ongoing Improvement

Measuring Data Quality for Ongoing Improvement Measuring Data Quality for Ongoing Improvement A Data Quality Assessment Framework Laura Sebastian-Coleman ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE

More information

Negoltaling Gosnpeiit' ^ Wvaniage

Negoltaling Gosnpeiit' ^ Wvaniage . G k Mastering the Business «Global Trade Negoltaling Gosnpeiit' ^ Wvaniage C;:iit

More information

Acknowledgements PART ONE: CONCEPTUAL FRAMEWORK. 1. ERP Systems: An Introduction 3

Acknowledgements PART ONE: CONCEPTUAL FRAMEWORK. 1. ERP Systems: An Introduction 3 Contents Preface Acknowledgements vii ix PART ONE: CONCEPTUAL FRAMEWORK 1. ERP Systems: An Introduction 3 Introduction 3 Need for Enterprise Resource Planning Systems 3 Evolution of ERP 6 What is ERP System?

More information

Department of Defense Fiscal Year (FY) 2014 President's Budget Submission

Department of Defense Fiscal Year (FY) 2014 President's Budget Submission Department of Defense Fiscal Year (FY) 2014 President's Budget Submission April 2013 Defense Contract Management Agency Justification Book Research, Development, Test & Evaluation, Defense-Wide THIS PAGE

More information

Student Loan Counselor Certification Program. I. Introduction & History of Federal Student Loans a. Objective b. Useful Terms

Student Loan Counselor Certification Program. I. Introduction & History of Federal Student Loans a. Objective b. Useful Terms Student Loan Counselor Certification Program I. Introduction & History of Federal Student Loans a. Objective b. Useful Terms II. III. History of Federal Student Loans Federal Student Loan Basics a. Interest

More information

INTERNAL REGULATIONS OF THE AUDIT AND COMPLIANCE COMMITEE OF BBVA COLOMBIA

INTERNAL REGULATIONS OF THE AUDIT AND COMPLIANCE COMMITEE OF BBVA COLOMBIA ANNEX 3 INTERNAL REGULATIONS OF THE AUDIT AND COMPLIANCE COMMITEE OF BBVA COLOMBIA (Hereafter referred to as the Committee) 1 INDEX CHAPTER I RULES OF PROCEDURE OF THE BOARD OF DIRECTORS 1 NATURE 3 2.

More information

WebGoat for testing your Application Security tools

WebGoat for testing your Application Security tools WebGoat for testing your Application Security tools NAISG-DFW February 28 th, 2012 Michael A Ortega, CISSP CEH CISM GCFA Sr Application Security Professional IBM Security Systems 312.523.1538 maortega@us.ibm.com

More information

Regulatory Story. RNS Number : 8343I. DCD Media PLC. 08 July 2013. TR-1: NOTIFICATION OF MAJOR INTEREST IN SHARES i

Regulatory Story. RNS Number : 8343I. DCD Media PLC. 08 July 2013. TR-1: NOTIFICATION OF MAJOR INTEREST IN SHARES i 1 of 7 25/11/2013 11:51 Regulatory Story Go to market news section Company TIDM Headline Released DCD Media PLC DCD Holding(s) in Company 15:19 08-Jul-2013 8343I15 RNS : 8343I DCD Media PLC 08 July 2013

More information

SERVICE MANAGEMENT AN INTEGRATED APPROACH TO SUPPLY CHAIN MANAGEMENT AND OPERATIONS. Cengiz Haksever Barry Render

SERVICE MANAGEMENT AN INTEGRATED APPROACH TO SUPPLY CHAIN MANAGEMENT AND OPERATIONS. Cengiz Haksever Barry Render SERVICE MANAGEMENT AN INTEGRATED APPROACH TO SUPPLY CHAIN MANAGEMENT AND OPERATIONS Cengiz Haksever Barry Render Preface CONTENTS xxi Part I: Understanding Services 1 THE IMPORTANT ROLE SERVICES PLAY IN

More information

Delivery. Enterprise Software. Bringing Agility and Efficiency. Global Software Supply Chain. AAddison-Wesley. Alan W. Brown.

Delivery. Enterprise Software. Bringing Agility and Efficiency. Global Software Supply Chain. AAddison-Wesley. Alan W. Brown. Enterprise Software Delivery Bringing Agility and Efficiency Global Software Supply Chain to the Alan W. Brown AAddison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto

More information

CHAPTER 42A. Case management of certain personal injuries actions. 42A.1. (1) Subject to paragraph (3), this Chapter applies to actions

CHAPTER 42A. Case management of certain personal injuries actions. 42A.1. (1) Subject to paragraph (3), this Chapter applies to actions CHAPTER 42A Case management of certain personal injuries actions Application and interpretation of this Chapter 42A.1. (1) Subject to paragraph (3), this Chapter applies to actions proceeding as ordinary

More information