00660nam0-2200229 --450 991026294710332120180329112702.020180329d1977----km y0itay50 baengUS 001yyTransient ground water hydraulicsby Robert E. GloverFort Collins, Co.Water Resources Publications1977194 p.28 cmGlover,Robert E.749784ITUNINAREICATUNIMARCBK991026294710332115 ID A/5-37s.i.DINIDDINIDTransient ground water hydraulics1509163UNINA01546nam 2200433Ia 450 991071126500332120180711120956.0GOVPUB-C13-f95679060d52cc13d69f4bf9c15639d3(CKB)5470000002481370(OCoLC)959982501(OCoLC)995470000002481370(EXLCZ)99547000000248137020161006d1971 ua 0engtxtrdacontentcrdamediacrrdacarrierA simulation model for estimating airport terminal area throughputs and delays /Judith Gilsinn, E.H. Short, W.A. Steele, D. KlavanGaithersburg, MD :U.S. Dept. of Commerce, National Institute of Standards and Technology,1971.1 online resourceNBS report ;105921971.Contributed record: Metadata reviewed, not verified. Some fields updated by batch processes.Title from PDF title page.Includes bibliographical references.Gilsinn Judith1392184Gilsinn Judith1392184Klavan D1392185Short E. H1392186Steele W. A1389002United States.National Bureau of Standards.NBSNBSOCLCOOCLCQBOOK9910711265003321A simulation model for estimating airport terminal area throughputs and delays3446585UNINA03789nam 22006135 450 991033764020332120200703105323.03-030-02360-510.1007/978-3-030-02360-7(CKB)4100000007598566(DE-He213)978-3-030-02360-7(MiAaPQ)EBC5927526(PPN)23380188X(EXLCZ)99410000000759856620190124d2019 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierThe NICE Cyber Security Framework Cyber Security Intelligence and Analytics /by Izzat Alsmadi1st ed. 2019.Cham :Springer International Publishing :Imprint: Springer,2019.1 online resource (XX, 354 p. 192 illus., 153 illus. in color.) 3-030-02359-1 Includes bibliographical references and index.Introduction -- Acquisition Management -- Continuity Planning and Disaster Recovery -- Cyber Defense Analysis and Support -- Cyber Intelligence -- Cyber Intelligence Analysis -- Cyber Operational Planning -- Cyber Policy and Strategy Management -- Cyber Threat Analysis -- Cybersecurity Management -- Forensics Analysis -- Identity Management -- Incident Response.This textbook is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) KSAs work roles and framework, that adopt the Competency-Based Education (CBE) method. The book follows the CBT (KSA) general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for Skills and Abilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into seven parts: Securely Provision; Operate and Maintain; Oversee and Govern; Protect and Defend; Analysis; Operate and Collect; Investigate. All classroom materials (in the book an ancillary) adhere to the NICE framework. Mirrors classes set up by the National Initiative for Cybersecurity Education (NICE) Adopts the Competency-Based Education (CBE) method of teaching, used by universities, corporations, and in government training Includes content and ancillaries that provide skill-based instruction on compliance laws, information security standards, risk response and recovery, and more.Electrical engineeringComputer securitySystem safetyComputersCommunications Engineering, Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/T24035Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Security Science and Technologyhttps://scigraph.springernature.com/ontologies/product-market-codes/P31080Information Systems and Communication Servicehttps://scigraph.springernature.com/ontologies/product-market-codes/I18008Electrical engineering.Computer security.System safety.Computers.Communications Engineering, Networks.Systems and Data Security.Security Science and Technology.Information Systems and Communication Service.005.8005.8Alsmadi Izzatauthttp://id.loc.gov/vocabulary/relators/aut875246MiAaPQMiAaPQMiAaPQBOOK9910337640203321The NICE Cyber Security Framework1954033UNINA