LEADER 03123nam 2200469 450 001 9910698221403321 005 20230308050944.0 035 $a(CKB)2430000000035959 035 $a(NjHacI)992430000000035959 035 $a(OCoLC)84734928 035 $a(EXLCZ)992430000000035959 100 $a20230308d2009 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation security guide for government executives /$fPauline Bowen, Elizabeth Chew Bennett, Joan Hash 210 1$aGaithersburg, Md. :$cNational Institute of Standards and Technology,$d2009. 215 $a1 online resource (14 pages) 225 0 $aNISTIR 300 $aTitle from title screen (viewed on Feb. 20, 2007). 300 $a"January 2007." 330 $aInformation Security Guide for Government Executives provides a broad overview of information security program concepts to assist senior leaders in understanding how to oversee and support the development and implementation of information security programs. Management is responsible for: (1) Establishing the organization's information security program; (2) Setting program goals and priorities that support the mission of the organization; and (3) Making sure resources are available to support the security program and make it successful. Senior leadership commitment to security is more important now than ever before. Studies have shown that senior management's commitment to information security initiatives is the number one critical element that impacts an information security program's success. Meeting this need necessitates senior leadership to focus on effective information security governance and support which requires integration of security into the strategic and daily operations of an organization. When considering this challenge, five key security questions emerge for the executive: (1) What are the information security laws, regulations, standards, and guidance that I need to understand to build an effective security program? (2) What are the key activities to build an effective security program? (3) Why do I need to invest in security? (4) Where do I need to focus my attention in accomplishing critical security goals? (5) Where can I learn more to assist me in evaluating the effectiveness of my security program? This guide provides the answers to those questions. 606 $aGovernment executives 606 $aInformation technology 606 $aComputer security$zUnited States 608 $aHandbooks and manuals.$2lcgft 615 0$aGovernment executives. 615 0$aInformation technology. 615 0$aComputer security 676 $a351.0074 700 $aBowen$b Pauline$01351624 702 $aBennett$b Elizabeth Chew$f1922- 702 $aHash$b Joan 712 02$aNational Institute of Standards and Technology (U.S.) 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910698221403321 996 $aInformation security guide for government executives$93152835 997 $aUNINA LEADER 02927nam 2200553 450 001 9910798075003321 005 20230807221448.0 010 $a1-4529-4409-1 035 $a(CKB)3710000000459617 035 $a(EBL)2145981 035 $a(MiAaPQ)EBC2145981 035 $a(OCoLC)917889111 035 $a(MdBmJHUP)muse48952 035 $a(Au-PeEL)EBL2145981 035 $a(CaPaEBR)ebr11088028 035 $a(CaONFJC)MIL821596 035 $a(EXLCZ)993710000000459617 100 $a20150817h20152015 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 14$aThe poetics of information overload $efrom Gertrude Stein to conceptual writing /$fPaul Stephens 210 1$aMinneapolis, Minnesota ;$aLondon, England :$cUniversity of Minnesota Press,$d2015. 210 4$dİ2015 215 $a1 online resource (258 p.) 300 $aDescription based upon print version of record. 311 $a0-8166-9441-9 320 $aIncludes bibliographical references and index. 327 $a"Reading at it": Gertrude Stein, information overload, and the makings of Americanitis -- Bob Brown, "inforg": the "readies" at the limits of modernist cosmopolitanism -- Human university: Charles Olson and the embodiment of information -- "When information rubs/against information": poetry and informatics in the expanded field in the 1960's -- Paradise and informatics: Lyn Hejinian, Bruce Andrews, and the posthuman adamic -- Vanguard total index: conceptual writing, information asymmetry, and the data glut. 330 $aInformation overload is a subject of vital, ubiquitous concern in our time. The Poetics of Information Overload reveals a fascinating genealogy of information saturation through the literary lens of American modernism. Although technology has typically been viewed as hostile or foreign to poetry, Paul Stephens outlines a countertradition within twentieth- and twenty-first-century literature in which avant-garde poets are centrally involved with technologies of communication, data storage, and bureaucratic control. Beginning with Gertrude Stein and Bob Brown, Stephens explores how writers have... 606 $aAmerican poetry$y20th century$xHistory and criticism 606 $aAmerican poetry$y21st century$xHistory and criticism 606 $aPoetry, Modern$xHistory and criticism 606 $aLiterature and technology 615 0$aAmerican poetry$xHistory and criticism. 615 0$aAmerican poetry$xHistory and criticism. 615 0$aPoetry, Modern$xHistory and criticism. 615 0$aLiterature and technology. 676 $a811/.509112 700 $aStephens$b Paul$f1974-$01534148 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910798075003321 996 $aThe poetics of information overload$93781449 997 $aUNINA