Adobe Security Training
|
|
|
- Ophelia Butler
- 10 years ago
- Views:
Transcription
1 Adobe Securty Tranng Whte Paper Adobe Securty Tranng Table of Contents 1 Adobe Securty 1 The Adobe Securty Organzaton 2 Adobe Secure Product Development 3 ASSET Software Securty Certfcaton Program 5 Securty Awareness Tranng 6 Concluson Adobe Securty At Adobe, we take the securty of your dgtal experence serously. From our rgorous ntegraton of securty nto our nternal software development process and tools to our cross-functonal ncdent response teams, we strve to be proactve and nmble. What s more, our collaboratve work wth partners, researchers, and other ndustry organzatons helps us understand the latest securty best practces as well as contnually buld securty nto the products and servces we offer. Ths whte paper descrbes the Adobe securty tranng and awareness actvtes that help ncrease the securty IQ of Adobe employees and ultmately help mprove the securty of Adobe products and servces. The Adobe Securty Organzaton As part of our commtment to the securty of our products and servces, Adobe coordnates all securty efforts, ncludng securty tranng, under the Chef Securty Offcer (CSO). The offce of the CSO coordnates all product and servce securty ntatves as well as the mplementaton of the Adobe Secure Product Lfecycle (SPLC) process. The CSO also manages the Adobe Secure Software Engneerng Team (ASSET), a dedcated, central team of securty specalsts who serve as consultants to key Adobe development and operatons teams. ASSET researchers work wth ndvdual Adobe product and operatons teams to strve to acheve the rght level of securty for products and servces and advse these teams on securty practces for clear and repeatable processes for development, deployment, operatons, and ncdent response. Chef Securty Offcer Chef Prvacy Offcer Eng. Infr. Securty Prd & Svcs Securty arketng IT Securty Rsk, Audt & Advsory Corporate Securty Cloud Svcs Securty Dg kt InfoSec Creatve Cloud Securty Secure Software Eng PR IT Securty Cloud Ops TechOps Securty Dg eda Secure Eng Securty Coord Center Identty gt Dg kt Secure Eng Adobe Securty Organzaton
2 Adobe Secure Product Development Adobe s ASSET team employs the Adobe SPLC process for product and servces development. A rgorous set of several hundred specfc securty actvtes spannng software development practces, processes, and tools, the Adobe SPLC s ntegrated nto multple stages of the product lfecycle, from desgn and development to qualty assurance, testng, and deployment. ASSET securty researchers provde specfc SPLC gudance for each key product or servce based on an assessment of potental securty ssues. Complemented by contnuous communty engagement, the Adobe SPLC evolves to stay current as changes occur n technology, securty practces, and the threat landscape. Adobe Secure Product Lfecycle Adobe SPLC controls nclude, dependng on the specfc Adobe product or servce, some or all of the followng recommended best practces, processes, and tools: Securty tranng and certfcaton for development teams Product health, rsk, and threat landscape analyss Secure codng gudelnes, rules, and analyss Servce roadmaps, securty tools, and testng methods that gude the Adobe Dgtal Publshng Sute securty team to help address the Open Web Applcaton Securty Project (OWASP) Top 10 most crtcal web applcaton securty flaws and CWE/SANS Top 25 most dangerous software errors Securty archtecture revews and penetraton testng Source code revews to help elmnate known flaws that could lead to vulnerabltes User-generated content valdaton Statc and dynamc code analyss Applcaton and network scannng Full readness revews, response plans, and release of developer educaton materals Tranng & Certfcaton Abuse, Fraud & Incdent Responses COUNITY ENGAGEENT > COUNITY ENGAGEENT > Requrements & Plannng Operatons & ontorng Desgn Deployment Stagng & Stablzaton Development & Testng Adobe Secure Product Lfecycle (SPLC) Adobe Securty Tranng Whte Paper 2
3 ASSET Software Securty Certfcaton Program A key part of the Adobe SPLC, the ASSET Software Securty Certfcaton Program ncludes ongong securty tranng wthn development teams to enhance securty knowledge throughout the company and mprove the overall securty of our products and servces. The program provdes a foundaton for partcpants to understand securty fundamentals as well as a path for those ndvduals who want to become securty leaders. Snce ts ncepton n 2009, thousands of Adobe employees partcpate annually n the ASSET Software Securty Certfcaton Program, attanng one or more of the certfcaton levels descrbed n detal below. ore recently, the program formed the bass for the newly released ndustry software securty tranng program from SAFECode (the Software Assurance Forum for Excellence n Code), a global, non-proft organzaton focused on dentfyng and promotng best practces for developng and delverng more safe and relable software, hardware, and servces. ASSET Certfcaton Levels Whte Introduces basc securty concepts (e.g., securty n web-focused languages, such as Ruby on Rals and PhP) Green Bulds on basc securty topcs covered n the whte belt level Brown easures, recognzes, and rewards the development of securty components n Adobe product code (e.g., sandboxng) Black Recognzes the hghest level of hands-on securty expertse wthn Adobe development teams across the company ASSET Certfcaton Levels Dependng on ther specfc job functon and role, Adobe employees may choose from one of four (4) levels of certfcaton, also called belts. Each level or belt requres a specfc number of hours of tranng to acheve, agan based on job functon or role wth Adobe. Whle the lower levels of certfcaton only requre onlne tranng sessons n basc securty concepts, the hgher certfcaton levels nclude hands-on, experental projects that may drectly relate to or mpact the employee s job responsbltes. Currently, Whte Belt certfcatons are requred to be updated after eghteen months, unless an employee also earns a Green belt. ASSET Course Content The current ASSET Software Securty Certfcaton Program currculum ncludes more than 50 course offerngs, and Adobe contnually adds new materal to the currculum n a rollng-release format. Updates are made based on emergng securty concepts, new products or technologes, and employee feedback and recommendatons, thereby keepng program content fresh and current. Adobe notfes employees of new course content through onlne announcements, ensurng equal access and avalablty to mportant securty concepts and achevement of tranng levels. Adobe employees can choose dfferent tracks wthn each level of the program based on ther specfc job functon and requrements, wth tracks desgned for developers, qualty engneers, and managers. Each track also ncludes sub-tracks that enable employees to focus on the partcular products and technologes wth whch they work n ther role at Adobe. At the end of each tranng module, program partcpants fll out a survey, askng them to rate the content and propose suggestons for mprovement. ASSET Certfcaton Requrements Through the four-tered ASSET Software Securty Certfcaton Program, employees earn a colored belt for each level they attan: Whte Between two (2) and eght (8) hours of onlne tranng, dependng on employee role Green Between two (2) and eleven (11) hours of onlne tranng, dependng on employee role Brown Hundreds of hours of experental, hands-on tranng wth specfc securty projects Black Hundreds of hours of experental, hands-on tranng wth specfc securty projects Whte belt 2-8 hours of onlne tranng, dependng on employee role Green belt 2-11 hours of onlne tranng, dependng on employee role Brown belt Hundreds of hours of experental, hands-on tranng wth specfc securty projects Black belt Hundreds of hours of experental, hands-on tranng wth specfc securty projectss Adobe Software Securty Certfcaton Program Adobe Securty Tranng Whte Paper 3
4 Whte and Green Belts Adobe desgned the Whte Belt and Green Belt levels to provde basc securty tranng for employees who need to understand securty concepts for ther job. Employees attan one or both of these levels through computer-based tranngs (CBTs), whch nclude PowerPont presentaton decks wth voce-overs and anmated demos. Whle the CBTs vary n length, most of them are approxmately 30 mnutes long and nclude a quz at the end of the tranng module to ensure that the partcpant has dgested the content n the CBT. In general, achevng a Whte Belt takes between two and eght hours of screen tme, whle tranng for a Green Belt can be completed n approxmately two to 11 hours. Whte Belt Currculum The Whte Belt currculum s desgned to ensure that the employee has a core competency n securty concepts as well as possesses securty knowledge that apples drectly to hs or her job responsblty at Adobe. To meet ths goal, the Whte Belt currculum ncludes a core syllabus of basc securty concepts that affect every employee at Adobe, from polcy tranng (e.g., SPLC: Adobe Secure Product Lfecycle) to more techncal, yet platform- and language-agnostc securty tranng (e.g., Authentcaton 101: A Passwords Backgrounder for Everyone). From there, the partcpant can engage n specalzed tranng n technologes drectly related to hs or her job responsbltes. For example, f a developer codes n C/C++ on a Wndows platform, he or she can take Whte Belt-defned courses for developers for C/C++ on Wndows. Smlar courses exst for employees usng Java, PHP, and Ruby on Rals n ther day-to-day job responsbltes. Green Belt Currculum Pckng up where the Whte Belt currculum ends, the Green Belt currculum explores securty concepts n greater depth and ntroduces more complex securty topcs and case studes. Examples of some Green Belt courses nclude: Anatomy of an Attack, XSS 201, Injectons 201, and Web Archtecture, Same Orgn, and User-Generated Content. Brown and Black Belts The two hgher certfcaton levels, Brown Belt and Black Belt, requre completon of hundreds of hours of hands-on experence wth securty projects over a perod of several months or even a year. Some projects that employees can undertake n order to gan Brown Belt or Black Belt certfcaton nclude: Researchng and presentng a topc at a securty conference Implementng new testng strateges Researchng and developng new content for the ASSET Software Securty Certfcaton Programs Archtectng or re-archtectng products or components to enhance securty, (e.g. sandboxes) Creatng new vulnerablty detecton and response strateges Often, employees combne or undertake several projects to fulfll the Brown Belt and Black Belt certfcaton requrements. For each project he or she completes, the partcpant earns ponts toward the 1,000-pont requrement for Brown Belt status or the 3,000-pont requrement for Black Belt status. Ponts are determned by multplyng the number of hours a canddate worked on a project aganst the securty expertse modfer, a number that reflects 1) the dffculty of the task and 2) the mpact of the project on securty at Adobe. Ths number ranges from.03 to 3.0. Upon completon of a securty project, the canddate submts a report to the securty tranng commttee, whch then determnes the approprate ponts for the project. When an employee accumulates enough ponts to reach Brown Belt or Black Belt status, the securty tranng team sends a congratulatory emal not only to the canddate, but also to the Adobe securty communty as well as the canddate s manager. Employees attanng Brown and Black Belts become canddates for the embedded securty champon wthn ther development teams and are a crtcal part of the mplementaton of the Adobe SPLC process throughout the company. Securty champons assst the centralzed ASSET team n scalng securty efforts across the company, dssemnatng crtcal securty nformaton to and ensurng the completon of securty tasks wthn ther product or servce teams. These securty champons also partcpate n perodc securty boot camps and ndustry events and conferences to further enhance ther securty knowledge. Adobe Securty Tranng Whte Paper 4
5 Trackng Certfcaton Progress Partcpants and ther managers are encouraged to set goals for reachng a specfc certfcaton by a specfc date. otvated partcpants make achevement of the next level of certfcaton a part of ther annual performance objectves and can gan ncreased vsblty and recognton when they acheve those levels. Usng an nternal web tool that nterfaces wth Adobe Connect, employees can check ther own progress through a partcular certfcaton level and managers can follow up wth team members about ther certfcaton status. Per-product certfcaton status rolls up to an overall securty health dashboard, whch s revewed monthly at Adobe Senor Operatons Staff meetngs. Stacey Smth Chef Securty Offcer [email protected] BELT BLACK COUNTRY US STATE CALIFORNIA Whte Belts Green Belts Brown Belts Black Belts Whte Belts (6) Green Belts (16) Brown Belts (7) Black Belts (4) al Tranng Remnder Rchard Page Gunter Haas Aaron Katz Rachel Tsao Davd Capella chel Powers Kate Cole Donna Tesam Joydeep Bava Baley Stewart Amr Rao Santosh Kumar Tom Russell Juan Daz Rchard Gordon Atul Gaval Emerson Graham Ebony Wllams Carole ller Dana Powers Cheryl Sten Allan Foster olly Rvers Pat Waters ara Lus Chrs Hansen Adobe Securty Certfcaton Program Status Tool The screen shot above shows current certfcaton progress for an organzaton s securty team. The yellow buttons allow the manager to automatcally send a remnder emal to anyone wthn the organzaton that has not completed hs or her certfcaton by the pre-defned date. Clckng on the yellow button opens the managers emal clent and populates a message wth the approprate content for the person he has selected to remnd. Securty Awareness Tranng In addton to the ASSET Software Securty Certfcaton Program, all full-tme, regular Adobe employees are requred to complete annual securty awareness tranng, whch ncludes nformaton about safe handlng of confdental nformaton, safeguardng devces, usng password protectons effectvely, and recognzng and avodng socal engneerng. Securty Awareness tranng s refreshed annually. Employees also regularly partcpate n nternal securty awareness semnars and other actvtes to ncrease awareness of how securty affects ther specfc roles wthn the organzaton and the company as a whole. Adobe regularly holds semnars featurng speakers who share the latest research n the feld. Employees gan exposure to top securty professonals, researchers, and academcs through these semnars and perodcal securty summts, mprovng ther overall securty knowledge. In addton, the company s nternal b-annual event held n San Jose, Calforna, called Tech Summt, ncludes a specfc track for securty, enablng Adobe developers and qualty control engneers to share nformaton wth each other. Adobe Securty Tranng Whte Paper 5
6 Adobe employees are also encouraged to take full advantage of the wealth of securty resources avalable outsde the company. Adobe employees attend local, regonal and nternatonal securty meet-ups and conferences and take courses n cyber-securty at nearby unverstes. any development teams also send team members to ndustry conferences, such as Black Hat, Hack n the Box, and OWASP (Open Web Applcaton Securty Project) AppSec. In addton, Adobe holds global, hands-on cyber-awareness events for employees such as HackFests, whch help partcpants gan a better understandng of how hackers explot vulnerabltes as well as how these explots are not as dffcult as they may seem. Durng Hackfests, employees gan access to a dummy server that s open to a specfc class of vulnerablty, such as SQL Injecton or XSS. Employees attempt to hack the server and leave ther name n a fle on the server as proof of the hack. Each employee who successfully hacks the server s elgble for a prze drawng. Typcally, between 400 and 500 employees successfully hack the dummy server durng a HackFest. After partcpatng n a HackFest, many partcpants comment that they have a greater apprecaton for securty n general and for the mportance of securty best practces n partcular. Concluson The proactve approach to securty tranng descrbed n ths paper helps ncrease the securty IQ of Adobe employees, whch ultmately helps mprove the securty of your Adobe products and servces, as well as your data. We recognze that the securty landscape s not statc, whch s why we contnually update and enhance our securty tranng to meet the growng number of securty challenges, helpng to keep your Adobe dgtal experence safe and secure. For more nformaton, please vst: Adobe Securty Tranng Whte Paper 6
7 Adobe Securty Tranng Whte Paper 7
8 Informaton n ths document s subject to change wthout notce. For more nformaton on Adobe solutons and controls, please contact your Adobe sales representatve. Further detals on the Adobe soluton, ncludng SLAs, change approval processes, access control procedures, and dsaster recovery processes are avalable. Adobe Systems Incorporated 345 Park Avenue San Jose, CA USA Adobe Systems Incorporated 345 Park Avenue San Jose, CA USA Adobe and, the Adobe logo, are ether regstered trademarks or trademarks of Adobe Systems Incorporated n the Unted States and/or other countres. All other trademarks are the property of ther respectve owners Adobe Systems Incorporated. All rghts reserved. Prnted n the USA. 9/2014
IT09 - Identity Management Policy
IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these
LAW ENFORCEMENT TRAINING TOOLS. Training tools for law enforcement officials and the judiciary
chapter 5 Law enforcement and prosecuton 261 LAW ENFORCEMENT TRAINING TOOLS Tool 5.20 Tranng tools for law enforcement offcals and the judcary Overvew Ths tool recommends resources for tranng law enforcement
One Click.. Ȯne Location.. Ȯne Portal...
New Addton to your NJ-HITEC Membershp! Member Portal Detals & Features Insde! One Clck.. Ȯne Locaton.. Ȯne Portal... Connect...Share...Smplfy Health IT Member Portal Benefts Trusted Advsor - NJ-HITEC s
Overview of monitoring and evaluation
540 Toolkt to Combat Traffckng n Persons Tool 10.1 Overvew of montorng and evaluaton Overvew Ths tool brefly descrbes both montorng and evaluaton, and the dstncton between the two. What s montorng? Montorng
Capacity-building and training
92 Toolkt to Combat Traffckng n Persons Tool 2.14 Capacty-buldng and tranng Overvew Ths tool provdes references to tranng programmes and materals. For more tranng materals, refer also to Tool 9.18. Capacty-buldng
1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.
HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher
Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )
February 17, 2011 Andrew J. Hatnay [email protected] Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs
IMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.
Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:
Multiple-Period Attribution: Residuals and Compounding
Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens
LIFETIME INCOME OPTIONS
LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com
iavenue iavenue i i i iavenue iavenue iavenue
Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both
BEST-IN-CLASS VENDOR COMPLIANCE BURLINGTON COAT FACTORY
BEST-IN-CLASS VENDOR COMPLIANCE BURLINGTON COAT FACTORY A best n class Vendor Complance program enabled Burlngton Coat Factory to gan control of ther supply chans by provdng accountablty for vendors and
Transforming the Field Force: How Accenture Can Help Companies Improve Service Quality While Reducing Operating Costs
Transformng the Feld Force: How Accenture Can Help Companes Improve Servce Qualty Whle Reducng Operatng Costs Introducton Companes today face many challenges n ther pursut of growth. For some organzatons,
Electronic Document Management
tem no 14- THE CTY OF EDNBURGH COUNCL Electronc Document Management Executve of the Councl 7th October 2003 y. 1 1. 2 2.1 2.2 2.3 2.4 2.5 Purpose of report To approve a preferred suppler and proposed way
General Teaching Council for Northern Ireland. Promoting Teacher Professionalism. Annual Business Plan 2014/2015. Promoting Teacher Professionalism
General Teachng Councl for Northern Ireland Promotng Teacher Professonalsm Annual Busness Plan 2014/2015 Promotng Teacher Professonalsm 2 Annual Busness Plan 2014/2015 General Teachng Councl for Northern
Calculation of Sampling Weights
Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample
Getting It Together Project & Implementation Management
Gettng It Together Project & Implementaton Management CFE NETWORKING November 30, 2011 Fnancng NFA Fshng Best Practces Tranng & Mentorng Marketng & Brandng Governance Markets Fsh Legal Regulaton ? HR
Study on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
Mission Oriented Business Integration Services (MOBIS) FSC Group: 874 Class: R499
General Servces Admnstraton Federal Supply Servce Authorzed Federal Supply Schedule Prce Lst Msson Orented Busness Integraton Servces (MOBIS) FSC Group: 874 Class: R499 On-lne access to contract orderng
A powerful tool designed to enhance innovation and business performance
A powerful tool desgned to enhance nnovaton and busness performance The LEGO Foundaton has taken over the responsblty for the LEGO SERIOUS PLAY method. Ths change wll help create the platform for the contnued
Marketing Society Awards for Excellence 2013. Employee Engagement Summary. Objective
Marketng Socety Awards for Excellence 2013 Employee Engagement Summary Objectve Our objectve was to transform employee engagement and along wth t, the success and proftablty of the frm. We wanted to move
SPONSOR BROCHURE. WINning combinations for precision cancer medicine. Symposium
2014 Symposum WINnng combnatons for precson cancer medcne Breakthrough bomarker nvestgatons and combned therapeutc approaches SPONSOR BROCHURE Pars, France, June 23-24, 2014 1. GENERAL SYMPOSIUM INFORMATION
Tuition Fee Loan application notes
Tuton Fee Loan applcaton notes for new part-tme EU students 2012/13 About these notes These notes should be read along wth your Tuton Fee Loan applcaton form. The notes are splt nto three parts: Part 1
ADVERTISEMENT FOR THE POST OF DIRECTOR, lim TIRUCHIRAPPALLI
ADVERTSEMENT FOR THE POST OF DRECTOR, lm TRUCHRAPPALL The ndan nsttute of Management Truchrappall (MT), establshed n 2011 n the regon of Taml Nadu s a leadng management school n nda. ts vson s "Preparng
Design and Development of a Security Evaluation Platform Based on International Standards
Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School
The Safety Board recommends that the Penn Central Transportation. Company and the American Railway Engineering Association revise
V. RECOWNDATONS 4.! The Safety Board recommends that the Penn Central Transportaton Company and the Amercan Ralway Engneerng Assocaton revse ther track nspecton and mantenance standards or recommended
Assessment of the legal framework
46 Toolkt to Combat Traffckng n Persons Tool 2.4 Assessment of the legal framework Overvew Ths tool offers gudelnes and resources for assessng a natonal legal framework. See also Tool 3.2 on crmnalzaton
Enterprise Content Management
Enterprse Content Management for the Laboratory Jm Mller Drector of Informatcs and Software Aglent Technologes Branden Humphrey Global Data Archve Program Manager Pfzer Global Research The content exploson
Vehicle Detection and Tracking in Video from Moving Airborne Platform
Journal of Computatonal Informaton Systems 10: 12 (2014) 4965 4972 Avalable at http://www.jofcs.com Vehcle Detecton and Trackng n Vdeo from Movng Arborne Platform Lye ZHANG 1,2,, Hua WANG 3, L LI 2 1 School
www.gov.uk/studentfinance 2016/17
www.gov.uk/studentfnance SECTION 1 WHAT SUPPORT CAN YOU GET? FEES, LOANS, GRANTS & MORE *Fgures shown n ths secton are based on the 2015/16 student fnance polcy and may change SECTION 1 TUITION FEES AND
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.
www.olr.ccli.com Introducing Online Reporting Your step-by-step guide to the new online copy report Online Reporting
Onlne Reportng Introducng Onlne Reportng www.olr.ccl.com Your step-by-step gude to the new onlne copy report Important nformaton for all lcence holders No more software to download Reportng as you go...
DEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
E-learning Vendor Management Checklist
E-learning Vendor Management Checklist June 2008 Permission is granted to print freely, unmodified, this document from www.doingelearning.com or to copy it in electronic form. If linked to from the net
Revised and re-published by the Ministerial Advisory Committee: Students with Disabilities Level 4, 111 Gawler Place, Adelaide SA 5000 February 2006
Ths resource s avalable on the Mnsteral Advsory Commttee: Students wth Dsabltes webste at . Informaton was accurate at the tme of publcaton, and wll be updated as requred.
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
Small pots lump sum payment instruction
For customers Small pots lump sum payment nstructon Please read these notes before completng ths nstructon About ths nstructon Use ths nstructon f you re an ndvdual wth Aegon Retrement Choces Self Invested
GMA/FPA SmartBrief. ASTA SmartBrief. The premier source of daily news delivered to the desktops of travel agents and executives.
GMA/FPA SmartBref ASTA SmartBref The premer source of daly news delvered to the desktops of travel agents and executves. GMA/FPA SmartBref 2011 Meda Kt Subscrber Profle Reach Travel Agency Professonals
http://ceo.lacounty.gov
WLLAM T FUJOKA Chef Executve Offcer December 3, 2010 To: From: County of Los Angeles CHEF EXECUTVE OFFCE Kenneth Hahn Hall of Admnstraton 500 West Temple Street, Room 713, Los Angeles, Calforna 90012 (213)
CLOUD COMPUTING AUDIT
U.P.B. Sc. Bull., Seres C, Vol. 77, Iss. 3, 2015 ISSN 2286-3540 CLOUD COMPUTING AUDIT Georgana MATEESCU 1, Valentn SGÂRCIU 2 Ths paper presents a personal approach of conductng the audt process n cloud
Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno
Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December
Selecting Best Employee of the Year Using Analytical Hierarchy Process
J. Basc. Appl. Sc. Res., 5(11)72-76, 2015 2015, TextRoad Publcaton ISSN 2090-4304 Journal of Basc and Appled Scentfc Research www.textroad.com Selectng Best Employee of the Year Usng Analytcal Herarchy
Keywords: Tourism, Mobile Learning, Quality Management, Security
M-TOURIM EDUCATION FOR FUTURE QUALITY MANAGEMENT ABTRACT Ion Ivan 1 Aln Zamfrou 2 Toursm s the man ncome source of revenue n GDP n many countres. For 2012 the relatve contrbuton of toursm n GDP n Croata
A message from LMA Chairman of the Board Gordon Borrell
M E D I A T R A N S F O R M A T I O N C E N T E R d I G I T A L t R A I N I N G & m O R E F O R p R O G R E S S I V E L O C a l M e d a E x e c u t v e s D g t al &Sal estr a n ng D g t al Cer t f cat
MULTIVAC Customer Portal Your access to the MULTIVAC World
MULTIVAC Customer Portal Your access to the MULTIVAC World 2 Contents MULTIVAC Customer Portal Introducton 24/7 Accessblty Your ndvdual nformaton Smple and ntutve Helpful and up to date Your benefts at
VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
Reporting Forms ARF 113.0A, ARF 113.0B, ARF 113.0C and ARF 113.0D FIRB Corporate (including SME Corporate), Sovereign and Bank Instruction Guide
Reportng Forms ARF 113.0A, ARF 113.0B, ARF 113.0C and ARF 113.0D FIRB Corporate (ncludng SME Corporate), Soveregn and Bank Instructon Gude Ths nstructon gude s desgned to assst n the completon of the FIRB
An Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
Protection, assistance and human rights. Recommended Principles and Guidelines on Human Rights and Human Trafficking (E/2002/68/Add.
chapter 8 Vctm assstance 385 Tool 8.3 Protecton, assstance and human rghts Overvew Ths tool dscusses the human rghts consderatons whch must be borne n mnd n protectng and assstng vctms of traffckng. Recommended
VOLUME 5 SECTION 1 STANDARDS FOR EDUCATIONAL INSTITUTIONS
Standards for Educatonal Insttutons.qxp 01/05/2007 12:28 PM Page 1 VOLUME 5 SECTION 1 STANDARDS FOR EDUCATIONAL INSTITUTIONS The Responsblty of The Mnstry of Educaton and Youth 2 Natonal Heroes Crcle Kngston
ACKNOWLEDGEMENTS. Core Operational Guidelines for Telehealth Services Involving Provider-Patient Interactions
Cor eoper at onal Gu del nes f ort el eheal t hser v c esi nv ol v ng Pr ov der Pat enti nt er ac t ons May201 4 ACKNOWLEDGEMENTS The Amercan Telemedcne Assocaton (ATA) wshes to express sncere apprecaton
WhitePaper: Security "Point" Solutions are Not a 4 Letter Word:
Securty "Pont" Solutons are Not a 4 Letter Word: Why Purpose-Bult Solutons for Patch and Confguraton Management Contnue to be a Good Thng Securty "Pont" Solutons are Not a 4 Letter Word: In recent years
Global innovative solutions You can rely on. www.calyon.com
Global nnovatve solutons You can rely on www.calyon.com CALYON has developed OPTIM SWIFTNet for ts clents. By provdng an extensve range of value-added servces, OPTIM SWIFTNet offers you worldwde connectons
benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching)
Face Recognton Problem Face Verfcaton Problem Face Verfcaton (1:1 matchng) Querymage face query Face Recognton (1:N matchng) database Applcaton: Access Control www.vsage.com www.vsoncs.com Bometrc Authentcaton
Introduction CONTENT. - Whitepaper -
OneCl oud ForAl l YourCr t c al Bus nes sappl c at ons Bl uew r esol ut ons www. bl uew r e. c o. uk Introducton Bluewre Cloud s a fully customsable IaaS cloud platform desgned for organsatons who want
Vembu StoreGrid Windows Client Installation Guide
Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on
Quality Management System at Construction Project: A Questionnaire Survey
ISSN : 2248-9622, Vol., Issue 3, ( Part -3) March 21, pp.126-13 RESEARCH ARTICLE OPEN ACCESS Qualty Management System at Constructon Project: A Questonnare Surey P.P.Mane*, J.R.Patl* *(Department of Cl
: da:j :!: b ;hich all its officers, regardless of
TERRTORY OF GUAM OFFCE OF THE GOVERNOR AGANA, GUAM 96910 U.S.A. h EfECUTVE ORDER NO. 96-16 RELAT VE TO CREATON OF A PEACE OFF CER STANDARDS land TRANNG COMMSSON (POST), AND G A POST REVO LVNG FUND. ESTABLSDN
STRATEGIC PLAN TORINO METROPOLI 2025
Tor nopl an Sc ent f ccomm t t ee FI RSTMEETI NG Tur n, 910J anuar y2014 STRATEGIC PLAN TORINO METROPOLI 2025 In July 2012, Mayor Fassno launched Torno s thrd Strategc Plannng effort. After a perod of
Dear AGWA Member, Sincerely, John G. Porter, Ph.D., CGW Executive Director
PO Box 8481, Semnole FL 33775 Shppng Address: 12551 Indan Rocks Rd Sute 12, Largo FL 33774 Phone: 727-366-9334 Fax: 727-596-5192 Emal: [email protected] Webste: www.agwa.us Dear AGWA Member, We are
Traffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal [email protected] Peter Möhl, PTV AG,
Canon NTSC Help Desk Documentation
Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE
AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent
Hosted Voice Self Service Installation Guide
Hosted Voce Self Servce Installaton Gude Contact us at 1-877-355-1501 [email protected] www.earthlnk.com 2015 EarthLnk. Trademarks are property of ther respectve owners. All rghts reserved. 1071-07629
M-applications Development using High Performance Project Management Techniques
M-applcatons Development usng Hgh Performance Project Management Technques PAUL POCATILU, MARIUS VETRICI Economc Informatcs Department Academy of Economc Studes 6 Pata Romana, Sector, Bucharest ROMANIA
On the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
A system for real-time calculation and monitoring of energy performance and carbon emissions of RET systems and buildings
A system for real-tme calculaton and montorng of energy performance and carbon emssons of RET systems and buldngs Dr PAAIOTIS PHILIMIS Dr ALESSADRO GIUSTI Dr STEPHE GARVI CE Technology Center Democratas
CONTENTS Introduction... 3
Cuty ourm c r os of t Ex c hangeser v er s t or agec os t sbyupt o85% Howema lar c h v ngs ol ut onsex pand y ournat v eema lappl c at on' sc apab l t es CONTENTS Introducton... 3 Emal Storage Management...
Guidance for Operational Risk Management in Government Debt Management 1 Tomas Magnusson, Abha Prasad and Ian Storkey
Gu dancef oroper at onalr skmanagement n Gover nmentdebtmanagement TomasMagnusson,AbhaPr asad and Ian St or key Mar ch 2010 Thef nd ngs, nt er pr et at ons,andconcl us onsexpr essedher e nar et hoseoft
Computer-assisted Auditing for High- Volume Medical Coding
Computer-asssted Audtng for Hgh-Volume Medcal Codng Computer-asssted Audtng for Hgh- Volume Medcal Codng by Danel T. Henze, PhD; Peter Feller, MS; Jerry McCorkle, BA; and Mark Morsch, MS Abstract The volume
PEER REVIEWER RECOMMENDATION IN ONLINE SOCIAL LEARNING CONTEXT: INTEGRATING INFORMATION OF LEARNERS AND SUBMISSIONS
PEER REVIEWER RECOMMENDATION IN ONLINE SOCIAL LEARNING CONTEXT: INTEGRATING INFORMATION OF LEARNERS AND SUBMISSIONS Yunhong Xu, Faculty of Management and Economcs, Kunmng Unversty of Scence and Technology,
Help is a tou ch of a button away. Telecare - keeping you safe and independent in your own home. i Personal emergency equipment
Help s a tou ch of a button away Telecare - keepng you safe and ndependent n your own home Personal emergency equpment 24/7 moble response - ncludng a dgnty savng lftng servce Professonal support Welcome
Commissioning responsibilities
Publc Health n Local Government Commssonng responsbltes Local authortes wll be responsble for: tobacco control and smokng cessaton servces alcohol and drug msuse servces publc health servces for chldren
Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) [email protected] Abstract
Using an Ordered Probit Regression Model to Assess the Performance of Real Estate Brokers
Usng an Ordered Probt Regresson Model to Assess the Performance of Real Estate Brokers Chun-Chang Lee, Department of Real Estate Management, Natonal Pngtung Insttute of Commerce, Tawan Shu-Man You, Department
For example, you might want to capture security group membership changes. A quick web search may lead you to the 632 event.
Audtng Wndows & Actve Drectory Changes va Wndows Event Logs Ths document takes a lghtweght look at the steps and consderatons nvolved n settng up Wndows and/or Actve Drectory event log audtng. Settng up
Assurant Employee Benefits City of Frisco Dental DHMO & Dental PPO
Assurant Employee Benefts Cty of Frsco Dental DHMO & Dental PPO Dental Health Goes Beyond Your Teeth Bad dental health mpacts overall health and ncreases the rsk for dabetes, heart dsease, and poor brth
How Much is E-Commerce Worth to Rural Businesses?
How Much s E-Commerce Worth to Rural Busnesses? Susan Watson, Assstant Professor O. John Nwoha, Program Assocate Gary Kennedy, Department Head and Assocate Professor Kenneth Rea, Vce Presdent for Academc
CEP Businesses & Unions Cluster
CEP Busnesses & Unons Cluster The Communty Engagement Programme (CEP) seeks to strengthen the understandng and tes between people of dfferent races and relgons, and encourage dfferent sectors of the socety
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,
GENESYS BUSINESS MANAGER
GENESYS BUSINESS MANAGER e-manager Onlne Conference User Account Admnstraton User Gude Ths User Gude contans the followng sectons: Mnmum Requrements...3 Gettng Started...4 Sgnng On to Genesys Busness Manager...7
