This standard specifies recommended processes for conducting penetration testing with financial service organizations. This standard describes a framework for specifying, describing and conducting penetration testing, and then relating the results of the penetration testing. This standard allows an...
This specification is for the development and implementation of secure audit data and logs for electronically stored health information. It specifies how to design the audit log to record all activities impacting a medical record, for example, creating a new record, entering data into a record,...
This European Standard is a service standard that specifies requirements for quality in organization, processes, staff and management of a security services provider and/or its independent branches and establishments under commercial law and trade as a provider with regard to port and...
The book takes readers though a series of security and risk discussions based on real-life experiences. While the experience story may not be technical, it will relate specifically to a value or skill critical to being a successful CISO. The core content is organized into ten major chapters,...
This European Standard is a service standard that specifies requirements for quality in organization, processes, staff and management of a security services provider and/or its independent branches and establishments under commercial law and trade as a provider with regard to port and...
"Design, build and test RESTful web services with the Django framework and Python About This Book • Create efficient real-world RESTful web services with the latest Django framework • Authenticate, secure, and integrate third-party packages efficiently in your Web Services • Leverage the power of...
Use Spring Boot to build lightning-fast apps About This Book • Get up to date with the defining characteristics of Spring Boot 2.0 in Spring Framework 5 • Learn to perform Reactive programming with SpringBoot • Learn about developer tools, AMQP messaging, WebSockets, security, MongoDB data...
This part of IEC 62351, which is a technical report, addresses the handling of access control of users and automated agents to data objects in power systems by means of role-based access control (RBAC) as defined in IEC TS 62351-8. IEC TS 62351-8 defines three different profiles to distribute role...
This DIN SPEC (PAS) describes the "integrated humble lamppost" (imHLa) as an integral part of a municipality's digital infrastructure. It is described as an integrated system made up of individual functional components. Particular emphasis is placed on the efficient use and reuse of these...
Create fast and efficient server-side applications using the latest features of Odoo v11 About This Book • Get the most up-to-date guide on Odoo 11 to create custom and reusable modules • Interconnect your application with other systems by implementing web APIs • Understand the mechanisms powering...
This part of IEC 61970 specifies the format and rules for exchanging modelling information based upon the CIM. It uses the CIM RDF Schema presented in IEC 61970-501 as the metamodel framework for constructing XML documents of power system modelling information. The style of these documents...
This standard presents a specification for Digital Certificates. The standard defines the Digital Certificate format and associated processing rules in sufficient detail to enable vendors to develop and implement interoperable security solutions. The Digital Certificate standard is...
This standard specifies a cryptographic syntax scheme that can be used to protect financial transactions, files and other messages from unauthorized disclosure and modification. The cryptographic syntax scheme is based on an abstract Cryptographic Message Syntax (CMS) schema whose concrete values...
Use Roslyn as a service to write powerful extensions and tools and use them in Visual Studio to improve code quality and maintain your source code more effectively. About This Book • Use Roslyn extensions and tools in Visual Studio to enforce ""house rules"" on code and fix security...
This part of IEC 61970 specifies the format and rules for exchanging modelling information based upon the CIM. It uses the CIM RDF Schema presented in IEC 61970-501 as the meta-model framework for constructing XML documents of power system modelling information. The style of these documents...
Develop and extend efficient cloud-native applications with ServiceNow About This Book • Build and customize your apps and workflows to suit your organization's requirements • Perform in-depth application development from designing forms to writing business rules, client-scripts, and...
This part of IEC 60839 defines the Web services interface for electronic access control systems. This includes listing electronic access control system components, their logical composition, monitoring their states and controlling them. It also includes a mapping of mandatory and optional...
This International Standard specifies the characteristics of repositories used for the long-term storage of archive and library materials. It covers the siting and construction and renovation of the building and the installation and equipment to be used both within and around the building. It...
This part of IEC 60839 defines procedures for communication between network clients and devices. This series of interoperability standards makes it possible to build an alarm and electronic security system with clients and devices from different manufacturers using common and well defined...