LEADER 01077nam 2200373 450 001 9910407743603321 005 20221020101401.0 010 $a1-83968-354-6 010 $a1-78984-781-8 035 $a(CKB)4100000011325371 035 $a(NjHacI)994100000011325371 035 $a(EXLCZ)994100000011325371 100 $a20221020d2020 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aDrought $eDetection and Solutions /$fedited by Gabrijel Ondrasek 210 1$aLondon, United Kingdom :$cIntechOpen,$d2020. 215 $a1 online resource (220 pages) $cillustrations and some color 311 $a1-78984-780-X 320 $aIncludes bibliographical references. 517 $aDrought 606 $aDrought forecasting 615 0$aDrought forecasting. 676 $a551.5773 702 $aOndrasek$b Gabrijel 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910407743603321 996 $aDrought$92606702 997 $aUNINA LEADER 02836nam 22006371 450 001 9910779552903321 005 20200520144314.0 010 $a1-84928-454-7 010 $a1-299-46854-3 010 $a1-84928-453-9 035 $a(CKB)2550000001019510 035 $a(EBL)1186301 035 $a(OCoLC)843642481 035 $a(SSID)ssj0000907218 035 $a(PQKBManifestationID)11448484 035 $a(PQKBTitleCode)TC0000907218 035 $a(PQKBWorkID)10855480 035 $a(PQKB)11568917 035 $a(Au-PeEL)EBL1186301 035 $a(CaPaEBR)ebr10772215 035 $a(CaONFJC)MIL478104 035 $a(CaSebORM)9781849284547 035 $a(MiAaPQ)EBC1186301 035 $a(EXLCZ)992550000001019510 100 $a20130516d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aGovernance and internal controls for cutting edge IT /$fKaren F. Worstell 205 $a1st edition 210 1$aEly, Cambridgeshire :$cIT Governance Publishing,$d2013. 215 $a1 online resource (133 p.) 300 $aDescription based upon print version of record. 311 $a1-84928-376-1 320 $aIncludes bibliographical references. 327 $aCutting edge IT -- Governance -- Legislative and regulatory compliance concerns -- Getting the business case right -- Service level management -- Security and control approach -- Data management -- Business continuity and recovery -- Secure IT-enabled organizations. 330 $aIn Governance and Internal Controls for Cutting Edge IT, Karen Worstell explains strategies and techniques to guide IT managers as they implement cutting edge solutions for their business needs. Based on practical experience and real-life models, she covers key principles and processes for the introduction of new technologies and examines how to establish an appropriate standard of security and control, particularly in the context of the COBIT 5 framework and affiliated standards. 606 $aBusiness enterprises$xInformation technology$xManagement 606 $aBusiness enterprises$xInformation technology$xSecurity measures 606 $aInformation technology$xManagement 606 $aInformation technology$xSecurity measures 615 0$aBusiness enterprises$xInformation technology$xManagement. 615 0$aBusiness enterprises$xInformation technology$xSecurity measures. 615 0$aInformation technology$xManagement. 615 0$aInformation technology$xSecurity measures. 676 $a650.11 700 $aWorstell$b Karen F$01550587 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910779552903321 996 $aGovernance and internal controls for cutting edge IT$93809501 997 $aUNINA