Contingency Planning Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology


Book Description

NIST Special Publication 800-34, Contingency Planning Guide for Information Technology (IT) Systems provides instructions, recommendations, and considerations for government IT contingency planning. Contingency planning refers to interim measures to recover IT services following an emergency of System disruption. Interim measures may include the relocation of IT systems sod operators to an alternate site, the recovery of IT functions using alternate equipment, or the performance of IT functions using manual methods.




Food Packaging Technology


Book Description

The protection and preservation of a product, the launch of new products or re-launch of existing products, perception of added-value to products or services, and cost reduction in the supply chain are all objectives of food packaging. Taking into consideration the requirements specific to different products, how can one package successfully meet all of these goals? Food Packaging Technology provides a contemporary overview of food processing and packaging technologies. Covering the wide range of issues you face when developing innovative food packaging, the book includes: Food packaging strategy, design, and development Food biodeterioation and methods of preservation Packaged product quality and shelf life Logistical packaging for food marketing systems Packaging materials and processes The battle rages over which type of container should be used for which application. It is therefore necessary to consider which materials, or combination of materials and processes will best serve the market and enhance brand value. Food Packaging Technology gives you the tools to determine which form of packaging will meet your business goals without compromising the safety of your product.




Sub-Saharan Africa


Book Description

3. Investing in people.




Enhancing the Resilience of the Nation's Electricity System


Book Description

Americans' safety, productivity, comfort, and convenience depend on the reliable supply of electric power. The electric power system is a complex "cyber-physical" system composed of a network of millions of components spread out across the continent. These components are owned, operated, and regulated by thousands of different entities. Power system operators work hard to assure safe and reliable service, but large outages occasionally happen. Given the nature of the system, there is simply no way that outages can be completely avoided, no matter how much time and money is devoted to such an effort. The system's reliability and resilience can be improved but never made perfect. Thus, system owners, operators, and regulators must prioritize their investments based on potential benefits. Enhancing the Resilience of the Nation's Electricity System focuses on identifying, developing, and implementing strategies to increase the power system's resilience in the face of events that can cause large-area, long-duration outages: blackouts that extend over multiple service areas and last several days or longer. Resilience is not just about lessening the likelihood that these outages will occur. It is also about limiting the scope and impact of outages when they do occur, restoring power rapidly afterwards, and learning from these experiences to better deal with events in the future.




Power System Economics


Book Description

The first systematic presentation of electricity market design-from the basics to the cutting edge. Unique in its breadth and depth. Using examples and focusing on fundamentals, it clarifies long misunderstood issues-such as why today's markets are inherently unstable. The book reveals for the first time how uncoordinated regulatory and engineering policies cause boom-bust investment swings and provides guidance and tools for fixing broken markets. It also takes a provocative look at the operation of pools and power exchanges. * Part 1 introduces key economic, engineering and market design concepts. * Part 2 links short-run reliability policies with long-run investment problems. * Part 3 examines classic designs for day-ahead and real-time markets. * Part 4 covers market power, and * Part 5 covers locational pricing, transmission right and pricing losses. The non-technical introductions to all chapters allow easy access to the most difficult topics. Steering an independent course between ideological extremes, it provides background material for engineers, economists, regulators and lawyers alike. With nearly 250 figures, tables, side bars, and concisely-stated results and fallacies, the 44 chapters cover such essential topics as auctions, fixed-cost recovery from marginal cost, pricing fallacies, real and reactive power flows, Cournot competition, installed capacity markets, HHIs, the Lerner index and price caps. About the Author Steven Stoft has a Ph.D. in economics (U.C. Berkeley) as well as a background in physics, math, engineering, and astronomy. He spent a year inside FERC and now consults for PJM, California and private generators. Learn more at www.stoft.com.




Methods for Evaluating Tobacco Control Policies


Book Description

The "Handbook" covers how the effects of a tobacco control policy are determined, the core constructs for understanding how and why a given policy works, the potential moderator variables to consider when evaluating a given policy and the data sources that might be useful for evaluation. The "Handbook" includes logic models outlining relevant constructs for evaluating the effectiveness of policies on tobacco taxation, smoke-free environments, tobacco product regulations, limits on tobacco marketing communications, product labeling, anti-tobacco public communication campaigns and tobacco use cessation interventions.




Finding the Uncommon Deal


Book Description

Take advantage of today's real estate market to find great properties at incredible prices Our recent economic meltdown transformed real estate from a popular investment to financial kryptonite. Too many people purchased homes with mortgages they simply could never afford. The good news: Great deals are out there for the taking. Finding the Uncommon Deal gives you the secrets to discovering and successfully negotiating the lowest prices for the most prized properties available. Discover how to go beyond Internet listings to get on-the-ground intelligence on the best deals Get proven negotiating skills to close the deal at a rock-bottom price The author has assisted thousands in purchasing homes as a lawyer, broker, and investor; has been ranked by internationally esteemed publication Chambers and Partners as one of the leading real estate lawyers; and regularly appears as a real estate authority in the New York Times and the Wall Street Journal If you're successful enough to afford a home, then you probably have the skills needed to get a great deal in today's market. Finding the Uncommon Deal gives you the keys to leverage your skills for success and savings, opening the door to today's best properties and lowest prices.




Cloud Security and Privacy


Book Description

You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn detailed information on cloud computing security that-until now-has been sorely lacking. Review the current state of data security and storage in the cloud, including confidentiality, integrity, and availability Learn about the identity and access management (IAM) practice for authentication, authorization, and auditing of the users accessing cloud services Discover which security management frameworks and standards are relevant for the cloud Understand the privacy aspects you need to consider in the cloud, including how they compare with traditional computing models Learn the importance of audit and compliance functions within the cloud, and the various standards and frameworks to consider Examine security delivered as a service-a different facet of cloud security