LEADER 05395nam 2200769Ia 450 001 9911019833603321 005 20200520144314.0 010 $a9786612686658 010 $a9781118211618 010 $a1118211618 010 $a9781282686656 010 $a1282686658 010 $a9780470558133 010 $a047055813X 010 $a9780470558119 010 $a0470558113 035 $a(CKB)2550000000005931 035 $a(EBL)477750 035 $a(OCoLC)609853641 035 $a(SSID)ssj0000361627 035 $a(PQKBManifestationID)11242742 035 $a(PQKBTitleCode)TC0000361627 035 $a(PQKBWorkID)10351632 035 $a(PQKB)10226969 035 $a(MiAaPQ)EBC477750 035 $a(Perlego)1006355 035 $a(EXLCZ)992550000000005931 100 $a20091222d2010 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aInformation technology risk management in enterprise environments $ea review of industry practices and a practical guide to risk management teams /$fJake Kouns, Daniel Minoli 210 $aHoboken, NJ $cWiley$dc2010 215 $a1 online resource (441 p.) 300 $aDescription based upon print version of record. 311 08$a9780471762546 311 08$a0471762547 327 $aINFORMATION TECHNOLOGY RISK MANAGEMENT IN ENTERPRISE ENVIRONMENTS; CONTENTS; PREFACE; ABOUT THE AUTHORS; PART I INDUSTRY PRACTICES IN RISK MANAGEMENT; 1. INFORMATION SECURITY RISK MANAGEMENT IMPERATIVES AND OPPORTUNITIES; 1.1 Risk Management Purpose and Scope; 1.1.1 Purpose of Risk Management; 1.1.2 Text Scope; References; Appendix 1A: Bibliography of Related Literature; 2. INFORMATION SECURITY RISK MANAGEMENT DEFINED; 2.1 Key Risk Management Definitions; 2.1.1 Survey of Industry Definitions; 2.1.2 Adopted Definitions; 2.2 A Mathematical Formulation of Risk 327 $a2.2.1 What Is Risk? A Formal Definition2.2.2 Risk in IT Environments; 2.2.3 Risk Management Procedures; 2.3 Typical Threats/Risk Events; 2.4 What is an Enterprise Architecture?; References; Appendix 2A: The CISSPforum/ISO27k Implementers Forum Information Security Risk List for 2008; Appendix 2B: What is Enterprise Risk Management (ERM)?; 3. INFORMATION SECURITY RISK MANAGEMENT STANDARDS; 3.1 ISO/IEC 13335; 3.2 ISO/IEC 17799 (ISO/IEC 27002:2005); 3.3 ISO/IEC 27000 SERIES 327 $a3.3.1 ISO/IEC 27000, Information Technology-Security Techniques-Information Security Management Systems-Fundamentals and Vocabulary3.3.2 ISO/IEC 27001:2005, Information Technology-Security Techniques-Specification for an Information Security Management System; 3.3.3 ISO/IEC 27002:2005, Information Technology-Security Techniques-Code of Practice for Information Security Management; 3.3.4 ISO/IEC 27003 Information Technology-Security Techniques-Information Security Management System Implementation Guidance 327 $a3.3.5 ISO/IEC 27004 Information Technology-Security Techniques-Information Security Management-Measurement3.3.6 ISO/IEC 27005:2008 Information Technology-Security Techniques-Information Security Risk Management; 3.4 ISO/IEC 31000; 3.5 NIST STANDARDS; 3.5.1 NIST SP 800-16; 3.5.2 NIST SP 800-30; 3.5.3 NIST SP 800-39; 3.6 AS/NZS 4360; References; Appendix 3A: Organization for Economic CoOperation and Development (OECD) Guidelines for the Security of Information Systems and Networks: Toward a Culture of Security; 4. A SURVEY OF AVAILABLE INFORMATION SECURITY RISK MANAGEMENT METHODS AND TOOLS 327 $a4.1 Overview4.2 Risk Management/Risk Analysis Methods; 4.2.1 Austrian IT Security Handbook; 4.2.2 CCTA Risk Assessment and Management Methodology (CRAMM); 4.2.3 Dutch A&K Analysis; 4.2.4 EBIOS; 4.2.5 ETSI Threat Vulnerability and Risk Analysis (TVRA) Method; 4.2.6 FAIR (Factor Analysis of Information Risk); 4.2.7 FIRM (Fundamental Information Risk Management); 4.2.8 FMEA (Failure Modes and Effects Analysis); 4.2.9 FRAP (Facilitated Risk Assessment Process); 4.2.10 ISAMM (Information Security Assessment and Monitoring Method); 4.2.11 ISO/IEC Baselines; 4.2.12 ISO 31000 Methodology 327 $a4.2.13 IT-Grundschutz (IT Baseline Protection Manual) 330 $aDiscusses all types of corporate risks and practical means of defending against them.Security is currently identified as a critical area of Information Technology management by a majority of government, commercial, and industrial organizations.Offers an effective risk management program, which is the most critical function of an information security program. 606 $aBusiness enterprises$xComputer networks$xSecurity measures 606 $aInformation technology$xSecurity measures 606 $aData protection 606 $aComputer security 606 $aRisk management 615 0$aBusiness enterprises$xComputer networks$xSecurity measures. 615 0$aInformation technology$xSecurity measures. 615 0$aData protection. 615 0$aComputer security. 615 0$aRisk management. 676 $a658.4/78 676 $a658.472 700 $aMinoli$b Daniel$f1952-$0535872 701 $aKouns$b Jake$01841160 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911019833603321 996 $aInformation technology risk management in enterprise environments$94420796 997 $aUNINA LEADER 04100nam 2200661Ia 450 001 9910973009203321 005 20250826214059.0 010 $a1-283-90590-6 010 $a0-85700-537-5 035 $a(CKB)2670000000232434 035 $a(EBL)989599 035 $a(OCoLC)809768138 035 $a(SSID)ssj0000695967 035 $a(PQKBManifestationID)12289601 035 $a(PQKBTitleCode)TC0000695967 035 $a(PQKBWorkID)10681253 035 $a(PQKB)10034530 035 $a(MiAaPQ)EBC989599 035 $a(EXLCZ)992670000000232434 100 $a20120628d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aLesbian, gay, bisexual and transgender ageing $ebiographical approaches for inclusive care and support /$fedited by Richard Ward, Ian Rivers and Mike Sutherland 210 $aLondon ;$aPhiladelphia $cJessica Kingsley Publishers$dc2012 215 $a1 online resource (226 p.) 300 $aDescription based upon print version of record. 311 08$a1-84905-257-3 320 $aIncludes bibliographical references and index. 327 $aLesbian, Gay, Bisexual and TransgenderAgeing: Biographical Approachesfor Inclusive Care and Support; Introduction: Lesbian, Gay, Bisexual and TransgenderAgeing: Providing Effective Support Through BiographicalPractice; Part I Growing Older: Diverse Pathways Into Later Life; 1. Imagining the Unimaginable: Bisexual Roadmaps for Ageing; 2. Care Anticipated: Older Lesbians and Gay Men Consider their Future Needs; 3. Trans Ageing: Thoughts on a Life Course Approach in Order to Better Understand Trans Lives; 4. 'Women Like That': Older Lesbians in the UK 327 $aPart II Implications for Health and Social Care Practice5. 'I'm Older than I Ever Thought I Would be': The LivedExperience of Ageing in HIV-positive Gay Men; 6. Categories and Their Consequences: Understanding andSupporting the Caring Relationships of Older Lesbian, Gayand Bisexual People; 7. Care Near the End of Life: The Concerns, Needs, andExperiences of LGBT Elders; Part III Community Engagement and Support; 8. Polari's Life Story: Learning from Work with Older LGBTPeople; 9. Opening Doors and Opening Minds: Sharing One Project'sExperience of Successful Community Engagement 327 $a10. Ageing in Gay Brighton11. Meeting the Needs of LGBT People Affected by Dementia: The Story of the LGBT Dementia Support Group; 12. Conclusion: Making Space for LGBT Lives in Health and Social Care; Glossary; Selected Resources for Working with Older LGBT Groups and Individuals; Notes on Contributors; Subject Index; Author Index; Blank Page 330 $aThis book explores the lives and perspectives of older lesbian, gay, bisexual and transgender (LGBT) people. As their distinct needs are often overlooked due to lack of understanding, this book demonstrates how life course approaches can offer insights into their support needs as they grow older, from housing and health care to community support. 606 $aOlder sexual minorities$xServices for$zGreat Britain 606 $aSocial work with older sexual minorities$zGreat Britain 606 $aOlder people$xCare$zGreat Britain 606 $aAutobiography$xTherapeutic use 606 $aLGBTQ+ older people$2homoit$3https://homosaurus.org/v4/homoit0000393 606 $aHealth care for LGBTQ+ people$2homoit$3https://homosaurus.org/v4/homoit0000614 615 0$aOlder sexual minorities$xServices for 615 0$aSocial work with older sexual minorities 615 0$aOlder people$xCare 615 0$aAutobiography$xTherapeutic use. 615 7$aLGBTQ+ older people. 615 7$aHealth care for LGBTQ+ people. 676 $a362.6/9664050941 701 $aWard$b Richard$f1966-$01843339 701 $aRivers$b Ian$0746084 701 $aSutherland$b Mike$f1961-$01843340 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910973009203321 996 $aLesbian, gay, bisexual and transgender ageing$94424461 997 $aUNINA LEADER 05363nam 2200661Ia 450 001 9910821845803321 005 20260209141317.0 010 $a1-282-25370-0 010 $a9786613814357 010 $a1-118-16600-0 010 $a1-118-16599-3 035 $a(CKB)2550000000054318 035 $a(EBL)818939 035 $a(OCoLC)757487547 035 $a(SSID)ssj0000534062 035 $a(PQKBManifestationID)11359972 035 $a(PQKBTitleCode)TC0000534062 035 $a(PQKBWorkID)10508886 035 $a(PQKB)11717093 035 $a(MiAaPQ)EBC818939 035 $a(OCoLC)421948268 035 $a(FINmELB)ELB179173 035 $a(EXLCZ)992550000000054318 100 $a20090630d2010 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aApplied integer programming $emodeling and solution /$fDer-San Chen, Robert G. Batson, Yu Dang 205 $a1st ed. 210 $aHoboken, NJ $cJohn Wiley & Sons$dc2010 215 $a1 online resource (490 p.) 300 $aDescription based upon print version of record. 311 08$a0-470-37306-7 320 $aIncludes bibliographical references (p. 411-121) and index. 327 $aApplied Integer Programming: Modeling and Solution; CONTENTS; PREFACE; PART I MODELING; 1 Introduction; 1.1 Integer Programming; 1.2 Standard Versus Nonstandard Forms; 1.3 Combinatorial Optimization Problems; 1.4 Successful Integer Programming Applications; 1.5 Text Organization and Chapter Preview; 1.6 Notes; 1.7 Exercises; 2 Modeling and Models; 2.1 Assumptions on Mixed Integer Programs; 2.2 Modeling Process; 2.3 Project Selection Problems; 2.3.1 Knapsack Problem; 2.3.2 Capital Budgeting Problem; 2.4 Production Planning Problems; 2.4.1 Uncapacitated Lot Sizing; 2.4.2 Capacitated Lot Sizing 327 $a2.4.3 Just-in-Time Production Planning 2.5 Workforce/Staff Scheduling Problems; 2.5.1 Scheduling Full-Time Workers; 2.5.2 Scheduling Full-Time and Part-Time Workers; 2.6 Fixed-Charge Transportation and Distribution Problems; 2.6.1 Fixed-Charge Transportation; 2.6.2 Uncapacitated Facility Location; 2.6.3 Capacitated Facility Location; 2.7 Multicommodity Network Flow Problem; 2.8 Network Optimization Problems with Side Constraints; 2.9 Supply Chain Planning Problems; 2.10 Notes; 2.11 Exercises; 3 Transformation Using 0-1 Variables; 3.1 Transform Logical (Boolean) Expressions 327 $a3.1.1 Truth Table of Boolean Operations 3.1.2 Basic Logical (Boolean) Operations on Variables; 3.1.3 Multiple Boolean Operations on Variables; 3.2 Transform Nonbinary to 0-1 Variable; 3.2.1 Transform Integer Variable; 3.2.2 Transform Discrete Variable; 3.3 Transform Piecewise Linear Functions; 3.3.1 Arbitrary Piecewise Linear Functions; 3.3.2 Concave Piecewise Linear Cost Functions: Economy of Scale; 3.4 Transform 0-1 Polynomial Functions; 3.5 Transform Functions with Products of Binary and Continuous Variables: Bundle Pricing Problem; 3.6 Transform Nonsimultaneous Constraints 327 $a3.6.1 Either/Or Constraints 3.6.2 p Out of m Constraints Must Hold; 3.6.3 Disjunctive Constraint Sets; 3.6.4 Negation of a Constraint; 3.6.5 If/Then Constraints; 3.7 Notes; 3.8 Exercises; 4 Better Formulation by Preprocessing; 4.1 Better Formulation; 4.2 Automatic Problem Preprocessing; 4.3 Tightening Bounds on Variables; 4.3.1 Bounds on Continuous Variables; 4.3.2 Bounds on General Integer Variables; 4.3.3 Bounds on 0-1 Variables; 4.3.4 Variable Fixing Redundant Constraints, and Infeasibility; 4.4 Preprocessing Pure 0-1 Integer Programs; 4.4.1 Fixing 0-1 Variables 327 $a4.4.2 Detecting Redundant Constraints And Infeasibility 4.4.3 Tightening Constraints (or Coefficients Reduction); 4.4.4 Generating Cutting Planes from Minimum Cover; 4.4.5 Rounding by Division with GCD; 4.5 Decomposing a Problem into Independent Subproblems; 4.6 Scaling the Coefficient Matrix; 4.7 Notes; 4.8 Exercises; 5 Modeling Combinatorial Optimization Problems I; 5.1 Introduction; 5.2 Set Covering and Set Partitioning; 5.2.1 Set Covering Problem; 5.2.2 Set Partitioning and Set Packing; 5.2.3 Set Covering in Networks; 5.2.4 Applications of Set Covering Problem; 5.3 Matching Problem 327 $a5.3.1 Matching Problems in Network 330 $aAn accessible treatment of the modeling and solution of integer programming problems, featuring modern applications and software In order to fully comprehend the algorithms associated with integer programming, it is important to understand not only how algorithms work, but also why they work. Applied Integer Programming features a unique emphasis on this point, focusing on problem modeling and solution using commercial software. Taking an application-oriented approach, this book addresses the art and science of mathematical modeling related to the mixed integer 606 $aInteger programming 606 $aMathematical optimization 615 0$aInteger programming. 615 0$aMathematical optimization. 676 $a519.7/7 700 $aChen$b Der-San$f1940-$0786035 701 $aBatson$b Robert G.$f1950-$01601810 701 $aDang$b Yu.$f1977-$01601811 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910821845803321 996 $aApplied Integer Programming$93925577 997 $aUNINA