1.

Record Nr.

UNINA9910695572903321

Autore

Anderson Darwin

Titolo

BOREAS TE-1 soils data over the SSA tower sites in raster format [[electronic resource] /] / Darwin Anderson, David E. Knapp

Pubbl/distr/stampa

Greenbelt, Md. : , : NASA Goddard Space Flight Center, , [2000]

Descrizione fisica

1 volume : digital, PDF file

Collana

Technical report series on the Boreal Ecosystem-Atmosphere Study (BOREAS) ; ; 125

NASA/TM ; ; 2000-209891, v. 125

Altri autori (Persone)

KnappDavid E

Soggetti

Data acquisition

Earth resources

Ecology

Remote sensing

Plants (botany)

Soils

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Title from title screen (viewed on Jan. 30, 2007).

"October 2000."

Nota di bibliografia

Includes bibliographical references.



2.

Record Nr.

UNINA9910790021503321

Titolo

Information security management handbook / / edited by Harold F. Tipton, Micki Krause Nozaki

Pubbl/distr/stampa

Boca Raton : , : Auerbach Publications, , 2007-

ISBN

0-429-11284-X

1-283-59665-2

9786613909107

1-4398-9315-2

Edizione

[6th ed.]

Descrizione fisica

1 online resource (495 p.)

Collana

Information security management handbook ; ; v. 6

Altri autori (Persone)

TiptonHarold F

NozakiMicki Krause

Disciplina

658

658/.0558

Soggetti

Computer security - Management

Data protection

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

"An Auerbach book."

Nota di bibliografia

Includes bibliographical references.

Nota di contenuto

Front Cover; Contents; Introduction; Editors; Contributors; Chapter 1: What Business Associates Need to Know about Protected Health Information under HIPAA and HITECH; Chapter 2: E-Mail Security; Chapter 3: Appreciating Organizational Behavior and Institutions to Solidify Your Information Security Program; Chapter 4: The Information Security Auditors Have Arrived, Now What?; Chapter 5: Continuous Monitoring: Extremely Valuable to Deploy within Reason; Chapter 6: Social Networking; Chapter 7: Insider Threat Defense; Chapter 8: Risk Management in Public Key Certificate Applications

Chapter 9: Server Virtualization: Information Security ConsiderationsChapter 10: Security Requirements Analysis; Chapter 11: CERT Resilience Management Model: An Overview; Chapter 12: Managing Bluetooth Security; Chapter 13: Slash and Burn: In Times of Recession, Do Not Let Emotions Drive Business Decisions; Chapter 15: Application Whitelisting; Chapter 16: Design of Information Security for Large System Development Projects; Chapter 17: Building Application Security Testing into the Software Development Life Cycle; Chapter 19:



Format Preserving Encryption

Chapter 20: Elliptic Curve CryptosystemsChapter 21: Pirating the Ultimate Killer App: Hacking Military Unmanned Aerial Vehicles; Chapter 22: Service-Oriented Architecture; Chapter 23: Cloud Security; Chapter 24: Enterprise Zones of Trust; Chapter 25: Complex Event Processing for Automated Security Event Analysis; Chapter 26: Records Management; Chapter 27: Data Backup Strategies: Traditional versus Cloud; Chapter 28: Managing Advanced Persistent Threats; Chapter 29: Virtualization Forensics; Information Security Management Handbook: Comprehensive Table of Contents; Back Cover

Sommario/riassunto

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2® CISSP Common Body of Knowledge (CBK®</SU