High-Priority Asset


Book Description

To safeguard California’s Witness Protection Program, recovering leaked information is the top priority. The safety of every person in California’s Witness Protection Program rests in US marshal Dutch Haas’s capable hands. So inserting himself into Isabel Vargas’s life to get the drop on her criminal uncle is a no-brainer. Except his target is fiery and intelligent—and she quickly becomes his partner instead of his mark. With threats stacking up, will Isabel and Dutch be able to stop Isabel’s past from catching up with her before it is too late?







Managing the NIH Bethesda Campus Capital Assets for Success in a Highly Competitive Global Biomedical Research Environment


Book Description

The National Institutes of Health (NIH) is the primary agency of the United States government responsible for biomedical and public health research. Founded in the late 1870s, NIH has produced extraordinary advances in the treatment of common and rare diseases and leads the world in biomedical research. It is a critical national resource that plays an important role in supporting national security. The 310-acre Bethesda campus supports some 20,000 employees and contractors, and it contains more than 12 million square feet of facilities divided amongst nearly 100 buildings, including the largest dedicated research hospital in the world. The Bethesda campus supports some of the most sophisticated and groundbreaking biomedical research in the world. However, while some new state-of-the-art buildings have been constructed in recent years, essential maintenance for many facilities and the campus overall has been consistently deferred for many years. The deteriorating condition of NIH's built environment is now putting its ability to fulfill its mission at substantial risk. Managing the NIH Bethesda Campus's Capital Assets for Success in a Highly Competitive Global Biomedical Research Environment identifies the facilities in greatest need of repair on the Bethesda campus and evaluates cost estimates to determine what investment is needed for the NIH to successfully accomplish its mission going forward.




A Comprehensive Guide to the NIST Cybersecurity Framework 2.0


Book Description

Learn to enhance your organization’s cybersecurit y through the NIST Cybersecurit y Framework in this invaluable and accessible guide The National Institute of Standards and Technology (NIST) Cybersecurity Framework, produced in response to a 2014 US Presidential directive, has proven essential in standardizing approaches to cybersecurity risk and producing an efficient, adaptable toolkit for meeting cyber threats. As these threats have multiplied and escalated in recent years, this framework has evolved to meet new needs and reflect new best practices, and now has an international footprint. There has never been a greater need for cybersecurity professionals to understand this framework, its applications, and its potential. A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 offers a vital introduction to this NIST framework and its implementation. Highlighting significant updates from the first version of the NIST framework, it works through each of the framework’s functions in turn, in language both beginners and experienced professionals can grasp. Replete with compliance and implementation strategies, it proves indispensable for the next generation of cybersecurity professionals. A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 readers will also find: Clear, jargon-free language for both beginning and advanced readers Detailed discussion of all NIST framework components, including Govern, Identify, Protect, Detect, Respond, and Recover Hundreds of actionable recommendations for immediate implementation by cybersecurity professionals at all levels A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 is ideal for cybersecurity professionals, business leaders and executives, IT consultants and advisors, and students and academics focused on the study of cybersecurity, information technology, or related fields.




Uptime


Book Description

Uptime describes the combination of activities that deliver fewer breakdowns, improved productive capacity, lower costs, and better environmental performance. The bestselling second edition of Uptime has been used as a textbook on maintenance management in several postsecondary institutions and by many companies as the model framework for their mai













Model-Driven Risk Analysis


Book Description

The term “risk” is known from many fields, and we are used to references to contractual risk, economic risk, operational risk, legal risk, security risk, and so forth. We conduct risk analysis, using either offensive or defensive approaches to identify and assess risk. Offensive approaches are concerned with balancing potential gain against risk of investment loss, while defensive approaches are concerned with protecting assets that already exist. In this book, Lund, Solhaug and Stølen focus on defensive risk analysis, and more explicitly on a particular approach called CORAS. CORAS is a model-driven method for defensive risk analysis featuring a tool-supported modelling language specially designed to model risks. Their book serves as an introduction to risk analysis in general, including the central concepts and notions in risk analysis and their relations. The authors’ aim is to support risk analysts in conducting structured and stepwise risk analysis. To this end, the book is divided into three main parts. Part I of the book introduces and demonstrates the central concepts and notation used in CORAS, and is largely example-driven. Part II gives a thorough description of the CORAS method and modelling language. After having completed this part of the book, the reader should know enough to use the method in practice. Finally, Part III addresses issues that require special attention and treatment, but still are often encountered in real-life risk analysis and for which CORAS offers helpful advice and assistance. This part also includes a short presentation of the CORAS tool support. The main target groups of the book are IT practitioners and students at graduate or undergraduate level. They will appreciate a concise introduction into the emerging field of risk analysis, supported by a sound methodology, and completed with numerous examples and detailed guidelines.