|
Showing 1 - 25 of
48 matches in All Departments
The book introduces a preliminary, integrative conceptual framework
on the intersections between management and social justice with a
view that the quest for social justice is not an endpoint rather an
ongoing journey. With contributions from management scholars and
practitioners, it highlights, examines, and explores the
continuities and discontinuities, gains and losses, and struggles
and successes in this quest for reimagining organizations as sites
and vehicles for advancing social justice in the world. To nurture
and facilitate flourishing individuals and collectives, we need
bolder, more innovative, and more creative models of engagement.
Further, we need models for speaking and learning from different
perspectives and building common ground through shared values of
equity, connectivity, and compassion and moral expansiveness while
recognizing the complexities of the world we inhabit via our
organizations and the need to develop nuanced understandings of the
same. Contributing authors address questions such as: Are social
justice and management mutually exclusive concepts? How can we draw
on effective management for advancing social justice aims? How do
we bend the arc of organizational life towards more justice? What
are the rights and obligations of organizations and their members
to the world at large, and to their local communities and
societies? Through its re-imagining of organizations and management
as vehicles for social justice instead of just as tools of
oppression, injustice, or regressive organizing in an extractive
economy, this book brings together critical and positive
organizational approaches challenging fundamental assumptions about
how our society, people's collectives, and workplaces are organized
with capacity building, incremental change, sustained change,
institutionalized change, dynamic ongoing problem-solving/
assessment/ redesign, and more. Management scholars will learn the
nuanced and complex intersections between management theories and
practice and different types of justice/injustice in a global
context both as antecedents to modern organizations and workplaces
and the ways in which these intersectional actors advance and
change the organizations and workplaces of the future.
This book comprises an edited version of the Proceedings of the 2nd
Interna tional Conference on Applications of Supercomputers in
Engineering which took place at the Massachusetts Institute of
Technology, Cambridge, USA during August 1991. The Conference was
organized by the Wessex Insti tute of Technology, Southampton, UK
with the support of the International Society for Boundary
Elements. The first International Conference on Ap plications of
Supercomputers in Engineering held in Southampton, UK in September
1989 was a very successful meeting and the resulting Conference
Proceedings are now widely distributed throughout the world. The
revolutionary aspects of the next generation of computers are now
fully recognised by many engineers and scientists. Vector and
parallel computers form the basis of the computing power needed to
address the complex prob lems with which engineers are faced. The
new machines not only increase the size of the problems which can
be solved, but also require a different computational approach to
obtain the most efficient results.
Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs) - all CISSPs - this test prep book allows CISSP candidates to test their current knowledge in each of the ten security domains that make up the Common Body of Knowledge (CBK) from which the CISSP examination is based on. The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques provides an outline of the subjects, topics, and sub-topics contained within each domain in the CBK, and with it you can readily identify terms and concepts that you will need to know for the exam.
The book starts with a review of each of the ten domains and provides 25 sample questions with answers and references for each. It discusses successful approaches for preparing for the exam based on experiences of those who have recently passed the exam. It then provides a complete 250-question practice exam with answers. Explanations are provided to clarify why the correct answers are correct, and why the incorrect answers are incorrect. With a total of 500 sample questions, The Total CISSP Exam Prep Book gives you a full flavor of what it will take to pass the exam.
Historical Instructional Design Cases presents a collection of
design cases which are historical precedents for the field with
utility for practicing designers and implications for contemporary
design and delivery. Featuring concrete and detailed views of
instructional design materials, programs, and environments, this
book's unique curatorial approach situates these cases in the
field's broader timeline while facilitating readings from a variety
of perspectives and stages of design work. Students, faculty, and
researchers will be prepared to build their lexicon of observed
designs, understand the real-world outcomes of theory application,
and develop cases that are fully accessible to future generations
and contexts.
While many agencies struggle to comply with Federal Information
Security Management Act (FISMA) regulations, those that have
embraced its requirements have found that their comprehensive and
flexible nature provides a sound security risk management framework
for the implementation of essential system security controls.
Detailing a proven approach for establishing and implementing a
comprehensive information security program, FISMA Principles and
Best Practices: Beyond Compliance integrates compliance review,
technical monitoring, and remediation efforts to explain how to
achieve and maintain compliance with FISMA requirements. Based on
the author's experience developing, implementing, and maintaining
enterprise FISMA-based information technology security programs at
three major federal agencies, including the U.S. Department of
Housing and Urban Development, the book gives you workable
solutions for establishing and operating an effective security
compliance program. It delineates the processes, practices, and
principles involved in managing the complexities of FISMA
compliance. Describing how FISMA can be used to form the basis for
an enterprise security risk management program, the book: Provides
a comprehensive analysis of FISMA requirements Highlights the
primary considerations for establishing an effective security
compliance program Illustrates successful implementation of FISMA
requirements with numerous case studies Clarifying exactly what it
takes to gain and maintain FISMA compliance, Pat Howard, CISO of
the Nuclear Regulatory Commission, provides detailed guidelines so
you can design and staff a compliance capability, build
organizational relationships, gain management support, and
integrate compliance into the system development life cycle. While
there is no such thing as absolute protection, this up-to-date
resource reflects th
Significant developments since the publication of its
bestselling predecessor, "Building and Implementing a Security
Certification and Accreditation Program, "warrant an updated text
as well as an updated title. Reflecting recent updates to the
Certified Authorization Professional (CAP(r)) Common Body of
Knowledge (CBK(r)) and NIST SP 800-37, the Official (ISC)2(r) Guide
to the CAP(r) CBK(r), Second Edition provides readers with the
tools to effectively secure their IT systems via standard,
repeatable processes.
Derived from the author s decades of experience, including time as
the CISO for the Nuclear Regulatory Commission, the Department of
Housing and Urban Development, and the National Science Foundation
s Antarctic Support Contract, the book describes what it takes to
build a system security authorization program at the organizational
level in both public and private organizations. It analyzes the
full range of system security authorization (formerly C&A)
processes and explains how they interrelate. Outlining a
user-friendly approach for top-down implementation of IT security,
the book:
- Details an approach that simplifies the authorization process,
yet still satisfies current federal government criteria
- Explains how to combine disparate processes into a unified risk
management methodology
- Covers all the topics included in the Certified Authorization
Professional (CAP(r)) Common Body of Knowledge (CBK(r))
- Examines U.S. federal polices, including DITSCAP, NIACAP, CNSS,
NIAP, DoD 8500.1 and 8500.2, and NIST FIPS
- Reviews the tasks involved in certifying and accrediting U.S.
government information systems
Chapters 1 through 7 describe each of the domains of the
(ISC)2(r) CAP(r) CBK(r). This is followed by a case study on the
establishment of a successful system authorization program in a
major U.S. government department. The final chapter considers the
future of system authorization. The book s appendices include a
collection of helpful samples and additional information to provide
you with the tools to effectively secure your I
Historical Instructional Design Cases presents a collection of
design cases which are historical precedents for the field with
utility for practicing designers and implications for contemporary
design and delivery. Featuring concrete and detailed views of
instructional design materials, programs, and environments, this
book's unique curatorial approach situates these cases in the
field's broader timeline while facilitating readings from a variety
of perspectives and stages of design work. Students, faculty, and
researchers will be prepared to build their lexicon of observed
designs, understand the real-world outcomes of theory application,
and develop cases that are fully accessible to future generations
and contexts.
Over the past five to ten years the growing demand nationally for a
"new breed" of educational leaders has resulted in new and
restructured Educational Leadership programs. The students in many
of these programs are part-time with substantial full-time job
responsibilities in a leadership position. The traditional doctoral
program design and student experience has not-indeed cannot-meet
the needs of this population. Frequently the result is a frustrated
student who leaves without completing the degree. This frustration
is often born of an inability on the part of the institution and
academic program to create a flexible set of learning experiences
that meet both the student's professional goals and the
institution's goals for academic excellence. The purpose of
Full-Time Leaders/Part-Time Learners is to present a design for
doctoral programs that recognizes the unique needs of the full-time
leader/part-time learner with multiple priorities of a demanding
leadership position and the equally demanding expectations of a
doctoral program. Will be of interest to higher education faculty
who serve doctoral students in leadership preparation programs.
Until now, those preparing to take the Certified Information
Systems Security Professional (CISSP) examination were not afforded
the luxury of studying a single, easy-to-use manual. Written by ten
subject matter experts (SMEs) - all CISSPs - this test prep book
allows CISSP candidates to test their current knowledge in each of
the ten security domains that make up the Common Body of Knowledge
(CBK) from which the CISSP examination is based on. The Total CISSP
Exam Prep Book: Practice Questions, Answers, and Test Taking Tips
and Techniques provides an outline of the subjects, topics, and
sub-topics contained within each domain in the CBK, and with it you
can readily identify terms and concepts that you will need to know
for the exam. The book starts with a review of each of the ten
domains and provides 25 sample questions with answers and
references for each. It discusses successful approaches for
preparing for the exam based on experiences of those who have
recently passed the exam. It then provides a complete 250-question
practice exam with answers. Explanations are provided to clarify
why the correct answers are correct, and why the incorrect answers
are incorrect. With a total of 500 sample questions, The Total
CISSP Exam Prep Book gives you a full flavor of what it will take
to pass the exam.
While many agencies struggle to comply with Federal Information
Security Management Act (FISMA) regulations, those that have
embraced its requirements have found that their comprehensive and
flexible nature provides a sound security risk management framework
for the implementation of essential system security controls.
Detailing a proven approach for establishing and implementing a
comprehensive information security program, FISMA Principles and
Best Practices: Beyond Compliance integrates compliance review,
technical monitoring, and remediation efforts to explain how to
achieve and maintain compliance with FISMA requirements. Based on
the author's experience developing, implementing, and maintaining
enterprise FISMA-based information technology security programs at
three major federal agencies, including the U.S. Department of
Housing and Urban Development, the book gives you workable
solutions for establishing and operating an effective security
compliance program. It delineates the processes, practices, and
principles involved in managing the complexities of FISMA
compliance. Describing how FISMA can be used to form the basis for
an enterprise security risk management program, the book: *
Provides a comprehensive analysis of FISMA requirements *
Highlights the primary considerations for establishing an effective
security compliance program * Illustrates successful implementation
of FISMA requirements with numerous case studies Clarifying exactly
what it takes to gain and maintain FISMA compliance, Pat Howard,
CISO of the Nuclear Regulatory Commission, provides detailed
guidelines so you can design and staff a compliance capability,
build organizational relationships, gain management support, and
integrate compliance into the system development life cycle. While
there is no such thing as absolute protection, this up-to-date
resource reflects the important security concepts and ideas for
addressing information security requirements
|
You may like...
Higher
Michael Buble
CD
(1)
R459
Discovery Miles 4 590
Loot
Nadine Gordimer
Paperback
(2)
R205
R164
Discovery Miles 1 640
|