05395nam 2200769Ia 450 991101983360332120200520144314.0978661268665897811182116181118211618978128268665612826866589780470558133047055813X97804705581190470558113(CKB)2550000000005931(EBL)477750(OCoLC)609853641(SSID)ssj0000361627(PQKBManifestationID)11242742(PQKBTitleCode)TC0000361627(PQKBWorkID)10351632(PQKB)10226969(MiAaPQ)EBC477750(Perlego)1006355(EXLCZ)99255000000000593120091222d2010 uy 0engur|n|---|||||txtccrInformation technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams /Jake Kouns, Daniel MinoliHoboken, NJ Wileyc20101 online resource (441 p.)Description based upon print version of record.9780471762546 0471762547 INFORMATION TECHNOLOGY RISK MANAGEMENT IN ENTERPRISE ENVIRONMENTS; CONTENTS; PREFACE; ABOUT THE AUTHORS; PART I INDUSTRY PRACTICES IN RISK MANAGEMENT; 1. INFORMATION SECURITY RISK MANAGEMENT IMPERATIVES AND OPPORTUNITIES; 1.1 Risk Management Purpose and Scope; 1.1.1 Purpose of Risk Management; 1.1.2 Text Scope; References; Appendix 1A: Bibliography of Related Literature; 2. INFORMATION SECURITY RISK MANAGEMENT DEFINED; 2.1 Key Risk Management Definitions; 2.1.1 Survey of Industry Definitions; 2.1.2 Adopted Definitions; 2.2 A Mathematical Formulation of Risk2.2.1 What Is Risk? A Formal Definition2.2.2 Risk in IT Environments; 2.2.3 Risk Management Procedures; 2.3 Typical Threats/Risk Events; 2.4 What is an Enterprise Architecture?; References; Appendix 2A: The CISSPforum/ISO27k Implementers Forum Information Security Risk List for 2008; Appendix 2B: What is Enterprise Risk Management (ERM)?; 3. INFORMATION SECURITY RISK MANAGEMENT STANDARDS; 3.1 ISO/IEC 13335; 3.2 ISO/IEC 17799 (ISO/IEC 27002:2005); 3.3 ISO/IEC 27000 SERIES3.3.1 ISO/IEC 27000, Information Technology-Security Techniques-Information Security Management Systems-Fundamentals and Vocabulary3.3.2 ISO/IEC 27001:2005, Information Technology-Security Techniques-Specification for an Information Security Management System; 3.3.3 ISO/IEC 27002:2005, Information Technology-Security Techniques-Code of Practice for Information Security Management; 3.3.4 ISO/IEC 27003 Information Technology-Security Techniques-Information Security Management System Implementation Guidance3.3.5 ISO/IEC 27004 Information Technology-Security Techniques-Information Security Management-Measurement3.3.6 ISO/IEC 27005:2008 Information Technology-Security Techniques-Information Security Risk Management; 3.4 ISO/IEC 31000; 3.5 NIST STANDARDS; 3.5.1 NIST SP 800-16; 3.5.2 NIST SP 800-30; 3.5.3 NIST SP 800-39; 3.6 AS/NZS 4360; References; Appendix 3A: Organization for Economic CoOperation and Development (OECD) Guidelines for the Security of Information Systems and Networks: Toward a Culture of Security; 4. A SURVEY OF AVAILABLE INFORMATION SECURITY RISK MANAGEMENT METHODS AND TOOLS4.1 Overview4.2 Risk Management/Risk Analysis Methods; 4.2.1 Austrian IT Security Handbook; 4.2.2 CCTA Risk Assessment and Management Methodology (CRAMM); 4.2.3 Dutch A&K Analysis; 4.2.4 EBIOS; 4.2.5 ETSI Threat Vulnerability and Risk Analysis (TVRA) Method; 4.2.6 FAIR (Factor Analysis of Information Risk); 4.2.7 FIRM (Fundamental Information Risk Management); 4.2.8 FMEA (Failure Modes and Effects Analysis); 4.2.9 FRAP (Facilitated Risk Assessment Process); 4.2.10 ISAMM (Information Security Assessment and Monitoring Method); 4.2.11 ISO/IEC Baselines; 4.2.12 ISO 31000 Methodology4.2.13 IT-Grundschutz (IT Baseline Protection Manual)Discusses all types of corporate risks and practical means of defending against them.Security is currently identified as a critical area of Information Technology management by a majority of government, commercial, and industrial organizations.Offers an effective risk management program, which is the most critical function of an information security program.Business enterprisesComputer networksSecurity measuresInformation technologySecurity measuresData protectionComputer securityRisk managementBusiness enterprisesComputer networksSecurity measures.Information technologySecurity measures.Data protection.Computer security.Risk management.658.4/78658.472Minoli Daniel1952-535872Kouns Jake1841160MiAaPQMiAaPQMiAaPQBOOK9911019833603321Information technology risk management in enterprise environments4420796UNINA02380oam 2200349z- 450 991016391240332120170926000801.01-4494-2364-7(CKB)3710000001051830(BIP)040243313(VLeBooks)9781449423643(EXLCZ)99371000000105183020170327cuuuuuuuu -u- -engSudden deathAndrews McMeel Publishing1 online resource (288 p.) The Father Koesler Mysteries1-4494-2494-5 "As more than a million readers have learned to their delight, Kienzle is a font of funny stories. He has created one of the most likable and authentic of all recent sleuths--the shy, sly Father Koesler--whose exploits into crime and insights into parish life have continued in seven gossipy and cozy mysteries." --Chicago Tribune "Kienzle's best book since The Rosary Murders." --Publishers Weekly "It's a cracking good mystery." --Houston ChronicleWhen Father Koesler joined the God Squad, he learned that all the fouls weren't on the field. Was murder someone's idea of a game? Abruptly removed from his spectator status by a chilling turnover, the amateur sleuth takes on the pros. Hank "the Hun" Hunsiger had made a career out of making enemies. The thirty-seven year-old tight end for the Pontiac Cougars was widely hated. When the clock stopped on Hunsinger's life, the only question was, which one of his many enemies did it? The focus of the police investigation turned to the God Squad, a Bible Study group consisting of a curious assortment of his Cougar associates ranging from owner Jay Galloway to rookie Kit Hoffer--plus the peripatetic Father Robert Koesler. Asked to aid in the investigation, Father Koesler leads us play by play to a startling conclusion. In his seventh appearance, Father Koesler enters the world of pro football, an involvement his readers will want to renew. From kickoff to final gun, Father Koesler wins again.CatholicsClergyKoesler, Robert (Fictitious character)Catholics.Clergy.Koesler, Robert (Fictitious character)813.54William Kienzle1745892BOOK9910163912403321Sudden death4179170UNINA03647nam 22007455 450 991048371640332120251204111448.03-030-61555-310.1007/978-3-030-61555-0(CKB)4100000011645302(DE-He213)978-3-030-61555-0(MiAaPQ)EBC6423170(PPN)252515730(MiAaPQ)EBC29090627(EXLCZ)99410000001164530220201209d2021 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierReshaping of Dirac Cones in Topological Insulators and Graphene /by Álvaro Díaz Fernández1st ed. 2021.Cham :Springer International Publishing :Imprint: Springer,2021.1 online resource (XXVI, 183 p. 56 illus., 55 illus. in color.) Springer Theses, Recognizing Outstanding Ph.D. Research,2190-50613-030-61554-5 Introduction -- Reshaping of Dirac Cones by Electric Fields -- Reshaping of Dirac Cones by Magnetic Fields -- Surface States in d-doped Topological Boundaries -- Floquet Engineering of Dirac Cones -- Appendix. .Dirac cones are ubiquitous to non-trivial quantum matter and are expected to boost and reshape the field of modern electronics. Particularly relevant examples where these cones arise are topological insulators and graphene. From a fundamental perspective, this thesis proposes schemes towards modifying basic properties of these cones in the aforementioned materials. The thesis begins with a brief historical introduction which is followed by an extensive chapter that endows the reader with the basic tools of symmetry and topology needed to understand the remaining text. The subsequent four chapters are devoted to the reshaping of Dirac cones by external fields and delta doping. At all times, the ideas discussed in the second chapter are always a guiding principle to understand the phenomena discussed in those four chapters. As a result, the thesis is cohesive and represents a major advance in our understanding of the physics of Dirac materials.Springer Theses, Recognizing Outstanding Ph.D. Research,2190-5061Condensed matterTopological insulatorsSurfaces (Technology)Thin filmsMaterials scienceData processingElectronic structureQuantum chemistryComputer programsQuantum physicsCondensed Matter PhysicsTopological MaterialSurfaces, Interfaces and Thin FilmElectronic Structure CalculationsQuantum PhysicsCondensed matter.Topological insulators.Surfaces (Technology).Thin films.Materials scienceData processing.Electronic structure.Quantum chemistryComputer programs.Quantum physics.Condensed Matter Physics.Topological Material.Surfaces, Interfaces and Thin Film.Electronic Structure Calculations.Quantum Physics.530.41Fernández Díaz Álvaro1885299MiAaPQMiAaPQMiAaPQBOOK9910483716403321Reshaping of Dirac Cones in Topological Insulators and Graphene4520491UNINA