LEADER 02543oam 2200601 a 450 001 996210068903316 005 20230828224224.0 035 $a(CKB)1000000000750981 035 $a(MH)008150673-2 035 $a(SSID)ssj0000508667 035 $a(PQKBManifestationID)12180358 035 $a(PQKBTitleCode)TC0000508667 035 $a(PQKBWorkID)10555119 035 $a(PQKB)10229333 035 $a(EXLCZ)991000000000750981 100 $a19970707d1997 uy 0 101 0 $aeng 181 $ctxt 182 $cc 183 $acr 200 00$aL?-statistical procedures and related topics /$fYadolah Dodge, editor$b[electronic resource] 210 $aHayward, Calif. $cInstitute of Mathematical Statistics$dc1997 215 $a1 online resource (xxix, 498 p. )$cill. ; 225 0 $aLecture notes monograph series L{esc}b1{esc}s-statistical procedures and related topics 225 0$aLecture notes monograph series ;$vv. 31 300 $a"Papers presented to the Third International Conference on the L?-norm and Related Methods, held in Neuchâtel, Switzerland, from August 11-15, 1997"--Pref. 311 $a0-940600-43-9 320 $aIncludes bibliographical references. 606 $aLeast absolute deviations (Statistics)$vCongresses 606 $aMathematical statistics$vCongresses 606 $aLeast absolute deviations (Statistics)$xCongresses 606 $aMathematical statistics$xCongresses 606 $aMathematics$2HILCC 606 $aPhysical Sciences & Mathematics$2HILCC 606 $aMathematical Statistics$2HILCC 615 0$aLeast absolute deviations (Statistics) 615 0$aMathematical statistics 615 0$aLeast absolute deviations (Statistics)$xCongresses 615 0$aMathematical statistics$xCongresses 615 7$aMathematics 615 7$aPhysical Sciences & Mathematics 615 7$aMathematical Statistics 676 $a519.5/34 701 $aDodge$b Yadolah$f1944-$029867 712 12$aInternational Conference on the L?-norm and Related Methods$d(3rd :$f1997 :$eNeuchâtel, Switzerland) 801 0$bDLC 801 1$bDLC 801 2$bDLC 906 $aBOOK 912 $a996210068903316 996 $aL?-statistical procedures and related topics$92846852 997 $aUNISA 999 $aThis Record contains information from the Harvard Library Bibliographic Dataset, which is provided by the Harvard Library under its Bibliographic Dataset Use Terms and includes data made available by, among others the Library of Congress LEADER 03011nam 22004813 450 001 9911009250903321 005 20240726080302.0 010 $a9781779561985 010 $a1779561989 035 $a(CKB)32713032900041 035 $a(MiAaPQ)EBC31545579 035 $a(Au-PeEL)EBL31545579 035 $a(Exl-AI)31545579 035 $a(OCoLC)1450100208 035 $a(Perlego)4501032 035 $a(EXLCZ)9932713032900041 100 $a20240726d2024 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security and CCP Scheme 205 $a1st ed. 210 1$aBurlington :$cToronto Academic Press,$d2024. 210 4$d©2024. 215 $a1 online resource (251 pages) 311 08$a9781774697856 311 08$a1774697858 327 $aCover -- Title Page -- Copyright -- About The Editor -- Contents -- List of Figures -- List of Tables -- List of Abbreviations -- Preface -- Chapter 1: Introduction To Information Security -- Unit Introduction -- 1.1. History Of Information Security -- 1.2. What Is Security? -- 1.3. Key Information Security Concepts -- 1.4. Critical Characteristics Of Information -- 1.5. Cnss Security Model -- 1.6. Components Of An Information System -- 1.7. Balancing Information Security And Access -- 1.8. Approaches To Information Security Implementation -- 1.9. The Systems Development Life Cycle -- 1.10. The Security Systems Development Life Cycle -- 1.11. Security Professionals And The Organization -- 1.12. Senior Management -- 1.13. Information Security Project Team -- 1.14. Data Responsibilities -- Summary -- Review Questions -- Multiple Choice Questions -- References -- Chapter 2: The Human Resources Of It Project Management$7Generated by AI. 330 $aThis book provides a comprehensive overview of the Common Criteria for Information Technology Security Evaluation (CC), an international standard for assessing the security of IT products and systems. It covers the history, development, and evaluation process of the CC scheme, along with its practical applications across various domains. Aimed at students, researchers, and IT professionals, the book includes case studies and real-world examples to illustrate the scheme's role in information security. Edited by Waqas Ahmed, a cybersecurity expert, it serves as a valuable resource for understanding how to ensure the integrity, confidentiality, and availability of information within organizations.$7Generated by AI. 606 $aComputer security$7Generated by AI 606 $aInformation technology$7Generated by AI 615 0$aComputer security 615 0$aInformation technology 700 $aAhmed$b Waqas$01794215 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911009250903321 996 $aInformation Security and CCP Scheme$94396119 997 $aUNINA