LEADER 03552nam 2200685 a 450 001 9910141163003321 005 20230912160735.0 010 $a1-283-40115-0 010 $a9786613401151 010 $a1-118-15976-4 010 $a1-118-15974-8 010 $a1-118-15977-2 035 $a(CKB)2670000000138106 035 $a(EBL)818498 035 $a(SSID)ssj0000575865 035 $a(PQKBManifestationID)11359349 035 $a(PQKBTitleCode)TC0000575865 035 $a(PQKBWorkID)10553319 035 $a(PQKB)10476618 035 $a(Au-PeEL)EBL818498 035 $a(CaPaEBR)ebr10630585 035 $a(CaONFJC)MIL340115 035 $a(CaSebORM)9780470631577 035 $a(MiAaPQ)EBC818498 035 $a(OCoLC)773301897 035 $a(MiAaPQ)EBC4032354 035 $a(EXLCZ)992670000000138106 100 $a20111017d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aFibonacci and Catalan numbers$b[electronic resource] $ean introduction /$fRalph P. Grimaldi 205 $a1st edition 210 $aHoboken, N.J. $cJohn Wiley & Sons$dc2012 215 $a1 online resource (382 p.) 300 $aDescription based upon print version of record. 311 $a0-470-63157-0 320 $aIncludes bibliographical references and index. 327 $apt. 1. The Fibonacci numbers -- pt. 2. The Catalan numbers. 330 $a"In this one-of-a-kind book, Ralph Grimaldi uses his extensive experience from the classroom and as a leader of mini-courses to present an accessible, single resource on the topics of Fibonacci Numbers and Catalan Numbers. The book first embarks on a complete treatment of Fibonacci numbers. Starting with a historical background on the topic, the author goes on to present the properties of Fibonacci numbers, a slew of introductory-level examples, and in-depth discussion of related topics including compositions and palindromes; tiling and Fibonacci numbers; solving linear recurrence relations; graph theory; Lucas numbers; and alternate Fibonacci numbers. The second half of the book explores Catalan numbers, and the author builds a complete foundation to the topic using a historical background and introductory examples, along with coverage of partial orders, total orders, topological sorting, graph theory, rooted ordered binary trees, pattern avoidance, and the Narayana numbers. Coverage of both topics are accompanied by interesting, real-world examples from areas such as sports, botany, and computer science. Each section concludes with detailed exercise sets that can also serve as extended examples of the presented material along with selected solutions. An Instructor's Manual featuring complete solutions is available upon written request, and extensive reference sections outline resources for further study of the discussed topics."--$cProvided by publisher. 606 $aFibonacci numbers 606 $aRecurrent sequences (Mathematics) 606 $aCatalan numbers (Mathematics) 606 $aCombinatorial analysis 615 0$aFibonacci numbers. 615 0$aRecurrent sequences (Mathematics) 615 0$aCatalan numbers (Mathematics) 615 0$aCombinatorial analysis. 676 $a512.7/2 686 $aMAT036000$2bisacsh 700 $aGrimaldi$b Ralph P$065937 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910141163003321 996 $aFibonacci and Catalan numbers$92167202 997 $aUNINA LEADER 05626nam 2200769Ia 450 001 9911020238703321 005 20200520144314.0 010 $a9786612137563 010 $a9781118585511 010 $a1118585518 010 $a9781282137561 010 $a1282137565 010 $a9780470476017 010 $a047047601X 010 $a9780470476000 010 $a0470476001 035 $a(CKB)1000000000747747 035 $a(EBL)433807 035 $a(OCoLC)428170752 035 $a(SSID)ssj0000179101 035 $a(PQKBManifestationID)11171417 035 $a(PQKBTitleCode)TC0000179101 035 $a(PQKBWorkID)10230728 035 $a(PQKB)11441223 035 $a(MiAaPQ)EBC433807 035 $a(Perlego)1009222 035 $a(EXLCZ)991000000000747747 100 $a20090225d2009 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aInformation security governance $ea practical development and implementation approach /$fKrag Brotby 210 $aHoboken, N.J. $cJohn Wiley & Sons$dc2009 215 $a1 online resource (207 p.) 225 1 $aWiley series in systems engineering and management 300 $aDescription based upon print version of record. 311 08$a9780470131183 311 08$a0470131187 320 $aIncludes bibliographical references and index. 327 $aINFORMATION SECURITY GOVERNANCE; Contents; Acknowledgments; Introduction; 1. Governance Overview-How Do We Do It? What Do We Get Out of It?; 1.1 What Is It?; 1.2 Back to Basics; 1.3 Origins of Governance; 1.4 Governance Definition; 1.5 Information Security Governance; 1.6 Six Outcomes of Effective Security Governance; 1.7 Defining Information, Data, Knowledge; 1.8 Value of Information; 2. Why Governance?; 2.1 Benefits of Good Governance; 2.1.1 Aligning Security with Business Objectives; 2.1.2 Providing the Structure and Framework to Optimize Allocations of Limited Resources 327 $a2.1.3 Providing Assurance that Critical Decisions are Not Based on Faulty Information2.1.4 Ensuring Accountability for Safeguarding Critical Assets; 2.1.5 Increasing Trust of Customers and Stakeholders; 2.1.6 Increasing the Company's Worth; 2.1.7 Reducing Liability for Information Inaccuracy or Lack of Due Care in Protection; 2.1.8 Increasing Predictability and Reducing Uncertainty of Business Operations; 2.2 A Management Problem; 3. Legal and Regulatory Requirements; 3.1 Security Governance and Regulation; 4. Roles and Responsibilities; 4.1 The Board of Directors; 4.2 Executive Management 327 $a4.3 Security Steering Committee4.4 The CISO; 5. Strategic Metrics; 5.1 Governance Objectives; 5.1.1 Strategic Direction; 5.1.2 Ensuring Objectives are Achieved; 5.1.3 Risks Managed Appropriately; 5.1.4 Verifying that Resources are Used Responsibly; 6. Information Security Outcomes; 6.1 Defining Outcomes; 6.1.1 Strategic Alignment-Aligning Security Activities in Support of Organizational Objectives; 6.1.2 Risk Management-Executing Appropriate Measures to Manage Risks and Potential Impacts to an Acceptable Level 327 $a6.1.3 Business Process Assurance/Convergence-Integrating All Relevant Assurance Processes to Improve Overall Security and Efficiency6.1.4 Value Delivery-Optimizing Investments in Support of Organizational Objectives; 6.1.5 Resource Management-Using Organizational Resources Efficiently and Effectively; 6.1.6 Performance Measurement-Monitoring and Reporting on Security Processes to Ensure that Objectives are Achieved; 7. Security Governance Objectives; 7.1 Security Architecture; 7.1.1 Managing Complexity; 7.1.2 Providing a Framework and Road Map 327 $a7.1.3 Simplicity and Clarity through Layering and Modularization7.1.4 Business Focus Beyond the Technical Domain; 7.1.5 Objectives of Information Security Architectures; 7.1.6 SABSA Framework for Security Service Management; 7.1.7 SABSA Development Process; 7.1.8 SABSA Life Cycle; 7.1.9 SABSA Attributes; 7.2 CobiT; 7.3 Capability Maturity Model; 7.4 ISO/IEC 27001/27002; 7.4.1 ISO 27001; 7.4.2 ISO 27002; 7.5 Other Approaches; 7.5.1 National Cybersecurity Task Force, Information Security Governance: A Call to Action; 8. Risk Management Objectives; 8.1 Risk Management Responsibilities 327 $a8.2 Managing Risk Appropriately 330 $aThe Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the necessity for information security to be tightly integrated into the fabric of every organization. The protection of an organization's most valuable asset information can no longer be relegated to low-level technical personnel, but must be considered an essential element of corporate governance that i 410 0$aWiley series in systems engineering and management. 606 $aData protection 606 $aComputer security$xManagement 606 $aInformation technology$xSecurity measures 615 0$aData protection. 615 0$aComputer security$xManagement. 615 0$aInformation technology$xSecurity measures. 676 $a658.4 676 $a658.4/78 676 $a658.472 676 $a658.478 700 $aBrotby$b W. Krag$0862239 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911020238703321 996 $aInformation security governance$94422445 997 $aUNINA