Methods for Phase Diagram Determination


Book Description

Phase diagrams are "maps" materials scientists often use to design new materials. They define what compounds and solutions are formed and their respective compositions and amounts when several elements are mixed together under a certain temperature and pressure. This monograph is the most comprehensive reference book on experimental methods for phase diagram determination. It covers a wide range of methods that have been used to determine phase diagrams of metals, ceramics, slags, and hydrides.* Extensive discussion on methodologies of experimental measurements and data assessments * Written by experts around the world, covering both traditional and combinatorial methodologies* A must-read for experimental measurements of phase diagrams




Guide to Protecting the Confidentiality of Personally Identifiable Information


Book Description

The escalation of security breaches involving personally identifiable information (PII) has contributed to the loss of millions of records over the past few years. Breaches involving PII are hazardous to both individuals and org. Individual harms may include identity theft, embarrassment, or blackmail. Organ. harms may include a loss of public trust, legal liability, or remediation costs. To protect the confidentiality of PII, org. should use a risk-based approach. This report provides guidelines for a risk-based approach to protecting the confidentiality of PII. The recommend. here are intended primarily for U.S. Fed. gov¿t. agencies and those who conduct business on behalf of the agencies, but other org. may find portions of the publication useful.







Effective Cybersecurity


Book Description

The Practical, Comprehensive Guide to Applying Cybersecurity Best Practices and Standards in Real Environments In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management practices needed for successful cybersecurity. Stallings makes extensive use of standards and best practices documents that are often used to guide or mandate cybersecurity implementation. Going beyond these, he offers in-depth tutorials on the “how” of implementation, integrated into a unified framework and realistic plan of action. Each chapter contains a clear technical overview, as well as a detailed discussion of action items and appropriate policies. Stallings offers many pedagogical features designed to help readers master the material: clear learning objectives, keyword lists, review questions, and QR codes linking to relevant standards documents and web resources. Effective Cybersecurity aligns with the comprehensive Information Security Forum document “The Standard of Good Practice for Information Security,” extending ISF’s work with extensive insights from ISO, NIST, COBIT, other official standards and guidelines, and modern professional, academic, and industry literature. • Understand the cybersecurity discipline and the role of standards and best practices • Define security governance, assess risks, and manage strategy and tactics • Safeguard information and privacy, and ensure GDPR compliance • Harden systems across the system development life cycle (SDLC) • Protect servers, virtualized systems, and storage • Secure networks and electronic communications, from email to VoIP • Apply the most appropriate methods for user authentication • Mitigate security risks in supply chains and cloud environments This knowledge is indispensable to every cybersecurity professional. Stallings presents it systematically and coherently, making it practical and actionable.




Guidelines for Evaluating and Expressing the Uncertainty of NIST Measurement Results (rev. Ed. )


Book Description

Results of measurements and conclusions derived from them constitute much of the technical information produced by the National Institute of Standards and Technology (NIST). In July 1992 the Director of NIST appointed an Ad Hoc Committee on Uncertainty Statements and charged it with recommending a policy on this important topic. The Committee concluded that the CIPM approach could be used to provide quantitative expression of measurement that would satisfy NIST¿s customers¿ requirements. NIST initially published a Technical Note on this issue in Jan. 1993. This 1994 edition addresses the most important questions raised by recipients concerning some of the points it addressed and some it did not. Illustrations.




Guide to Computer Security Log Management


Book Description

A log is a record of the events occurring within an org¿s. systems & networks. Many logs within an org. contain records related to computer security (CS). These CS logs are generated by many sources, incl. CS software, such as antivirus software, firewalls, & intrusion detection & prevention systems; operating systems on servers, workstations, & networking equip.; & applications. The no., vol., & variety of CS logs have increased greatly, which has created the need for CS log mgmt. -- the process for generating, transmitting, storing, analyzing, & disposing of CS data. This report assists org¿s. in understanding the need for sound CS log mgmt. It provides practical, real-world guidance on developing, implementing, & maintaining effective log mgmt. practices. Illus.




The Gauge Block Handbook


Book Description

This handbook is a both a description of the current practice at the National Institute of Standards and Technology, and a compilation of the theory and lore of gauge block calibration. Most of the chapters are nearly self-contained so that the interested reader can, for example, get information on the cleaning and handling of gauge blocks without having to read the chapters on measurement schemes or process control, etc. This partitioning of the material has led to some unavoidable repetition of material between chapters. The basic structure of the handbook is from the theoretical to the practical. Chapter 1: basic concepts and definitions of length and units; Chapter 2: history of gauge blocks, appropriate definitions and a discussion of pertinent national and international standards; Chapter 3: physical characteristics of gauge blocks, including thermal, mechanical and optical properties; Chapter 4: a description of statistical process control (SPC) and measurement assurance (MA) concepts; and Chapters 5 and 6: details of the mechanical comparisons and interferometric techniques used for gauge block calibrations. Full discussions of the related uncertainties and corrections are included. Finally, the appendices cover in more detail some important topics in metrology and gauge block calibration.







Baldrige 20/20


Book Description