LEADER 03304oam 2200793I 450 001 9910451205103321 005 20200520144314.0 010 $a0-429-23167-9 010 $a0-585-46474-X 010 $a1-280-20230-0 010 $a1-134-79531-9 010 $a0-203-43422-6 024 7 $a10.4324/9780203434222 035 $a(CKB)1000000000252374 035 $a(EBL)168434 035 $a(OCoLC)171117311 035 $a(SSID)ssj0000305075 035 $a(PQKBManifestationID)11947644 035 $a(PQKBTitleCode)TC0000305075 035 $a(PQKBWorkID)10286038 035 $a(PQKB)11555850 035 $a(SSID)ssj0001147754 035 $a(PQKBManifestationID)12465184 035 $a(PQKBTitleCode)TC0001147754 035 $a(PQKBWorkID)11142137 035 $a(PQKB)20474394 035 $a(MiAaPQ)EBC168434 035 $a(Au-PeEL)EBL168434 035 $a(CaPaEBR)ebr10057703 035 $a(CaONFJC)MIL20230 035 $a(OCoLC)647375306 035 $a(OCoLC)1000426668 035 $a(EXLCZ)991000000000252374 100 $a20180331d1996 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aOn the origins of classical economics $edistribution and value from William Petty to Adam Smith /$fTony Aspromourgos 210 1$aLondon ;$aNew York :$cRoutledge,$d1996. 215 $a1 online resource (237 p.) 225 1 $aRoutledge studies in the history of economics,$x1349-7906 ;$v4 300 $aDescription based upon print version of record. 311 $a0-415-51350-2 311 $a0-415-12878-1 320 $aIncludes bibliographical references (p. 210-218) and index. 327 $aBook Cover; Title; Contents; Preface; Acknowledgements; Note on citation practice; INTRODUCTION; THE LIFE OF PETTY IN RELATION TO HIS ECONOMICS; ECONOMIC SURPLUS AND THE SOCIAL DIVISION OF LABOUR: THE ECONOMICS OF PETTY; METHODOLOGICAL AND POLITICAL BASES OF PETTY'S ECONOMICS; THE THEORY OF PRODUCTION AND DISTRIBUTION IN CANTILLON'S ESSAI; THE SIGNIFICANCE OF VALUE PARITY IN PETTY AND CANTILLON; PETTY-CANTILLON-QUESNAY: THE FORMATION OF THE SURPLUS APPROACH; WAGES, PRICES AND ECONOMIC SURPLUS IN STEUART'S PRINCIPLES; DEVELOPMENTS IN THE THEORY OF DISTRIBUTION AND VALUE, 1662 1767 327 $aADAM SMITH AND AFTERPetty's writings; Contents of the 'Supplement' to Cantillon's Essai; Notes; References; Index; 330 $aExamines the origin and early development of the classical theory of distribution up to 1767, stressing the concept of economic `surplus' as a key determinant of economic phenomena. 410 0$aRoutledge studies in the history of economics ;$v4. 606 $aClassical school of economics 606 $aEconomics$xHistory 606 $aDistribution (Economic theory) 606 $aValue 608 $aElectronic books. 615 0$aClassical school of economics. 615 0$aEconomics$xHistory. 615 0$aDistribution (Economic theory) 615 0$aValue. 676 $a330.15/3 700 $aAspromourgos$b Tony$f1957,$0958566 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910451205103321 996 $aOn the origins of classical economics$92171965 997 $aUNINA LEADER 05253nam 2200697Ia 450 001 9910830594603321 005 20230725044904.0 010 $a1-118-21161-8 010 $a1-282-68665-8 010 $a9786612686658 010 $a0-470-55813-X 010 $a0-470-55811-3 035 $a(CKB)2550000000005931 035 $a(EBL)477750 035 $a(OCoLC)609853641 035 $a(SSID)ssj0000361627 035 $a(PQKBManifestationID)11242742 035 $a(PQKBTitleCode)TC0000361627 035 $a(PQKBWorkID)10351632 035 $a(PQKB)10226969 035 $a(MiAaPQ)EBC477750 035 $a(EXLCZ)992550000000005931 100 $a20091222d2010 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aInformation technology risk management in enterprise environments$b[electronic resource] $ea review of industry practices and a practical guide to risk management teams /$fJake Kouns, Daniel Minoli 210 $aHoboken, NJ $cWiley$dc2010 215 $a1 online resource (441 p.) 300 $aDescription based upon print version of record. 311 $a0-471-76254-7 327 $aINFORMATION TECHNOLOGY RISK MANAGEMENT IN ENTERPRISE ENVIRONMENTS; CONTENTS; PREFACE; ABOUT THE AUTHORS; PART I INDUSTRY PRACTICES IN RISK MANAGEMENT; 1. INFORMATION SECURITY RISK MANAGEMENT IMPERATIVES AND OPPORTUNITIES; 1.1 Risk Management Purpose and Scope; 1.1.1 Purpose of Risk Management; 1.1.2 Text Scope; References; Appendix 1A: Bibliography of Related Literature; 2. INFORMATION SECURITY RISK MANAGEMENT DEFINED; 2.1 Key Risk Management Definitions; 2.1.1 Survey of Industry Definitions; 2.1.2 Adopted Definitions; 2.2 A Mathematical Formulation of Risk 327 $a2.2.1 What Is Risk? A Formal Definition2.2.2 Risk in IT Environments; 2.2.3 Risk Management Procedures; 2.3 Typical Threats/Risk Events; 2.4 What is an Enterprise Architecture?; References; Appendix 2A: The CISSPforum/ISO27k Implementers Forum Information Security Risk List for 2008; Appendix 2B: What is Enterprise Risk Management (ERM)?; 3. INFORMATION SECURITY RISK MANAGEMENT STANDARDS; 3.1 ISO/IEC 13335; 3.2 ISO/IEC 17799 (ISO/IEC 27002:2005); 3.3 ISO/IEC 27000 SERIES 327 $a3.3.1 ISO/IEC 27000, Information Technology-Security Techniques-Information Security Management Systems-Fundamentals and Vocabulary3.3.2 ISO/IEC 27001:2005, Information Technology-Security Techniques-Specification for an Information Security Management System; 3.3.3 ISO/IEC 27002:2005, Information Technology-Security Techniques-Code of Practice for Information Security Management; 3.3.4 ISO/IEC 27003 Information Technology-Security Techniques-Information Security Management System Implementation Guidance 327 $a3.3.5 ISO/IEC 27004 Information Technology-Security Techniques-Information Security Management-Measurement3.3.6 ISO/IEC 27005:2008 Information Technology-Security Techniques-Information Security Risk Management; 3.4 ISO/IEC 31000; 3.5 NIST STANDARDS; 3.5.1 NIST SP 800-16; 3.5.2 NIST SP 800-30; 3.5.3 NIST SP 800-39; 3.6 AS/NZS 4360; References; Appendix 3A: Organization for Economic CoOperation and Development (OECD) Guidelines for the Security of Information Systems and Networks: Toward a Culture of Security; 4. A SURVEY OF AVAILABLE INFORMATION SECURITY RISK MANAGEMENT METHODS AND TOOLS 327 $a4.1 Overview4.2 Risk Management/Risk Analysis Methods; 4.2.1 Austrian IT Security Handbook; 4.2.2 CCTA Risk Assessment and Management Methodology (CRAMM); 4.2.3 Dutch A&K Analysis; 4.2.4 EBIOS; 4.2.5 ETSI Threat Vulnerability and Risk Analysis (TVRA) Method; 4.2.6 FAIR (Factor Analysis of Information Risk); 4.2.7 FIRM (Fundamental Information Risk Management); 4.2.8 FMEA (Failure Modes and Effects Analysis); 4.2.9 FRAP (Facilitated Risk Assessment Process); 4.2.10 ISAMM (Information Security Assessment and Monitoring Method); 4.2.11 ISO/IEC Baselines; 4.2.12 ISO 31000 Methodology 327 $a4.2.13 IT-Grundschutz (IT Baseline Protection Manual) 330 $aDiscusses all types of corporate risks and practical means of defending against them.Security is currently identified as a critical area of Information Technology management by a majority of government, commercial, and industrial organizations.Offers an effective risk management program, which is the most critical function of an information security program. 606 $aBusiness enterprises$xComputer networks$xSecurity measures 606 $aInformation technology$xSecurity measures 606 $aData protection 606 $aComputer security 606 $aRisk management 615 0$aBusiness enterprises$xComputer networks$xSecurity measures. 615 0$aInformation technology$xSecurity measures. 615 0$aData protection. 615 0$aComputer security. 615 0$aRisk management. 676 $a658.4/78 676 $a658.472 700 $aMinoli$b Daniel$f1952-$0535872 701 $aKouns$b Jake$01667947 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910830594603321 996 $aInformation technology risk management in enterprise environments$94028174 997 $aUNINA