1.

Record Nr.

UNISA990000788690203316

Autore

MAZZARESE, Tecla

Titolo

Logica deontica e linguaggio giuridico / Tecla Mazzarese

Pubbl/distr/stampa

Padova : CEDAM, 1989

ISBN

88-13-16765-2

Descrizione fisica

X, 193 p ; 24 cm

Collana

Pubblicazioni / [della] Università di Pavia , Studi nelle scienze giuridiche e sociali N.S. ; 58

Disciplina

160.

Soggetti

Logica deontica

Diritto - Linguaggio

Collocazione

XXX.A. Coll. 117/ 49 (X 26 XVIII 58)

Lingua di pubblicazione

Italiano

Formato

Materiale a stampa

Livello bibliografico

Monografia



2.

Record Nr.

UNINA9910459692903321

Autore

Wheeler Evan

Titolo

Security risk management [[electronic resource] ] : building an information security risk management program from the ground up / / Evan Wheeler

Pubbl/distr/stampa

Waltham, MA, : Syngress, 2011

ISBN

1-283-52639-5

9786613838841

1-59749-616-2

Edizione

[1st edition]

Descrizione fisica

1 online resource (361 pages)

Disciplina

005.8

658.4/7

658.47

Soggetti

Computer networks - Security measures

Computer security

Electronic books.

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Front Cover; Security Risk Management: Building an InformationSecurity Risk Management Program from the Ground Up; Copyright; Table of Contents; Preface; Intended Audience; Organization of This Book; Acknowledgments; About the Author; About the Technical Editor; Part I: Introduction to Risk Management; Chapter 1. The Security Evolution; Introduction; How We Got Here; A Risk-Focused Future; Information Security Fundamentals; The Death of Information Security; Summary; References; Chapter 2. Risky Business; Introduction; Applying Risk Management to Information Security

Business-Driven Security ProgramSecurity as an Investment; Qualitative versus Quantitative; Summary; References; Chapter 3. The Risk Management Lifecycle; Introduction; Stages of the Risk Management Lifecycle; Business Impact Assessment; A Vulnerability Assessment Is Not a Risk Assessment; Making Risk Decisions; Mitigation Planning and Long-Term Strategy; Process Ownership; Summary; Part II: Risk Assessment and AnalysisTechniques; Chapter 4. Risk Profiling;



Introduction; How Risk Sensitivity Is Measured; Asking the Right Questions; Assessing Risk Appetite; Summary; Reference

Chapter 5. Formulating a RiskIntroduction; Breaking Down a Risk; Who or What Is the Threat?; Summary; References; Chapter 6. Risk Exposure Factors; Introduction; Qualitative Risk Measures; Risk Assessment; Summary; Reference; Chapter 7. Security Controls and Services; Introduction; Fundamental Security Services; Recommended Controls; Summary; Reference; Chapter 8. Risk Evaluation and Mitigation Strategies; Introduction; Risk Evaluation; Risk Mitigation Planning; Policy Exceptions and Risk Acceptance; Summary; Chapter 9. Reports and Consulting; Introduction; Risk Management Artifacts

A Consultant's PerspectiveWriting Audit Responses; Summary; References; Chapter 10. Risk Assessment Techniques; Introduction; Operational Assessments; Project-Based Assessments; Third-Party Assessments; Summary; References; Part III: Building and Running a Risk Management Program; Chapter 11. Threat and Vulnerability Management; Introduction; Building Blocks; Threat Identification; Advisories and Testing; An Efficient Workflow; The FAIR Approach; Summary; References; Chapter 12. Security Risk Reviews; Introduction; Assessing the State of Compliance; Implementing a Process

Process Optimization: A Review of Key PointsThe NIST Approach; Summary; References; Chapter 13. A Blueprint for Security; Introduction; Risk in the Development Lifecycle; Security Architecture; Patterns and Baselines; Architectural Risk Analysis; Summary; Reference; Chapter 14. Building a Program from Scratch; Introduction; Designing a Risk Program; Prerequisites for a Risk Management Program; Risk at the Enterprise Level; Linking the Program Components; Program Roadmap; Summary; Reference; Appendix A: Sample Security Risk Profile; A. General Information; B. Information Sensitivity

C Regulatory Requirements

Sommario/riassunto

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain why. This book will help you to break free from the so-called ""best practices"" argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily ri



3.

Record Nr.

UNINA9910457581003321

Autore

Gillespie Robert M

Titolo

Black ops, Vietnam [[electronic resource] ] : the operational history of MACVSOG / / Robert M. Gillespie

Pubbl/distr/stampa

Annapolis, Md., : Naval Institute Press, c2011

ISBN

1-283-30487-2

9786613304872

1-61251-064-7

Descrizione fisica

1 online resource (322 p.)

Disciplina

959.70434

959.70438

Soggetti

Vietnam War, 1961-1975 - Military intelligence - United States

Vietnam War, 1961-1975 - Regimental histories - United States

Electronic books.

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Contents; Abbreviations; Antecedents; Chapter 1; Chapter 2; Chapter 3

Sommario/riassunto

During the Vietnam War, the Military Assistance Command, Vietnam Studies and Observations Group (MACVSOG) was a highly-classified, U.S. joint-service organization that consisted of personnel from Army Special Forces, the Air Force, Navy SEALs, Marine Corps Force Reconnaissance units, and the CIA. This secret organization was committed to action in Southeast Asia even before the major build-up of U.S. forces in 1965 and also fielded a division-sized element of South Vietnamese military personnel, indigenous Montagnards, ethnic Chinese Nungs, and Taiwanese pilots in its varied reconnaissanc



4.

Record Nr.

UNIORUON00025991

Autore

BARKER, David

Titolo

An English-Chinese glossary of printmaking terms / David Barker

Pubbl/distr/stampa

[Belfast], : The University Press, 1995 VII, 344 ; 15 cm

ISBN

18-592-3013-x

Classificazione

CIN IX

Soggetti

ARTE CINESE - DIZIONARI

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia