LEADER 01069cam a2200277 i 4500 001 991000333629707536 008 090715s19890000xxu eng 020 $a0262022834 035 $ab1384247x-39ule_inst 040 $aSet. Economia - SEMS$bita 082 $a339 100 1 $aBlanchard, Olivier Jean$0133011 245 10$aLectures on macroeconomics /$cOliver Jean Blanchard e Stanley Fischer 260 $aCambridge, Mass. :$bThe MIT,$c1989 300 $axiii, 650 p. ;$c24 cm 500 $aBibliografia a fine capitolo 650 04$aMacroeconomia$xModelli matematici 650 04$aMacroeconomia 650 04$aMacroeconomia$xTeorie 700 1 $aFischer, Stanley$eauthor$4http://id.loc.gov/vocabulary/relators/aut$07953 907 $a.b1384247x$b13-11-18$c15-07-09 912 $a991000333629707536 945 $aLE025 ECO 339 BLA01.04$g1$i2025000251267$lle025$nCatalogato 2018$o-$pE0.00$q-$rl$s- $t0$u8$v2$w8$x0$y.i14991743$z15-07-09 996 $aLectures on macroeconomics$914723 997 $aUNISALENTO 998 $ale025$b15-07-09$cm$da $e-$feng$gxxu$h0$i0 LEADER 04445nam 22006975 450 001 9910485586703321 005 20251202170304.0 010 $a3-030-71381-4 024 7 $a10.1007/978-3-030-71381-2 035 $a(CKB)5590000000487487 035 $a(MiAaPQ)EBC6648089 035 $a(Au-PeEL)EBL6648089 035 $a(PPN)258065486 035 $a(BIP)80656022 035 $a(BIP)79127329 035 $a(DE-He213)978-3-030-71381-2 035 $a(EXLCZ)995590000000487487 100 $a20210615d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cybersecurity Management /$fedited by Kevin Daimi, Cathryn Peoples 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (494 pages) 311 08$a3-030-71380-6 320 $aIncludes bibliographical references and index. 327 $aIntroduction -- Management Techniques in Cybersecurity -- Information Technology Risk Management -- Impact of Technologies and Techniques on Cybersecurity Management -- Regulatory Techniques and Issues -- International Issues Related to Security Management -- IT Compliance Management -- Security Policy Management -- IT Vendor Risk Management -- Cyber Security Incident Response -- Compliance Requirements for Cyber Security -- Information Continuity Management -- Assets Classification and Control -- Conclusion. 330 $aThis book concentrates on a wide range of advances related to IT cybersecurity management. The topics covered in this book include, among others, management techniques in security, IT risk management, the impact of technologies and techniques on security management, regulatory techniques and issues, surveillance technologies, security policies, security for protocol management, location management, GOS management, resource management, channel management, and mobility management. The authors also discuss digital contents copyright protection, system security management, network security management, security management in network equipment, storage area networks (SAN) management, information security management, government security policy, web penetration testing, security operations, and vulnerabilities management. The authors introduce the concepts, techniques, methods, approaches and trends needed by cybersecurity management specialists and educators for keeping current their cybersecurity management knowledge. Further, they provide a glimpse of future directions where cybersecurity management techniques, policies, applications, and theories are headed. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse cybersecurity management experts in the listed fields and edited by prominent cybersecurity management researchers and specialists. Provides a professional development resource for educators and practitioners on the state-of-the-art cybersecurity management materials; Contributes towards the enhancement of the community outreach and engagement component of cybersecurity management; Introduces various techniques, methods, and approaches adopted by cybersecurity management experts. 606 $aData protection 606 $aCooperating objects (Computer systems) 606 $aTechnical education 606 $aTelecommunication 606 $aQuantitative research 606 $aData and Information Security 606 $aCyber-Physical Systems 606 $aEngineering and Technology Education 606 $aCommunications Engineering, Networks 606 $aData Analysis and Big Data 615 0$aData protection. 615 0$aCooperating objects (Computer systems). 615 0$aTechnical education. 615 0$aTelecommunication. 615 0$aQuantitative research. 615 14$aData and Information Security. 615 24$aCyber-Physical Systems. 615 24$aEngineering and Technology Education. 615 24$aCommunications Engineering, Networks. 615 24$aData Analysis and Big Data. 676 $a005.8 702 $aPeoples$b Cathryn 702 $aDaimi$b Kevin 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910485586703321 996 $aAdvances in cybersecurity management$92860753 997 $aUNINA