Sulfur is devoted to the methods of production and applications as they intertwined during different stages of industrial and technological developments. Commercial sulfuric acid production from the early 16th century until today is reviewed, spanning the Ancient and Renaissance periods, the Industrial Age (to which sulfur was vitally important), and the Sulfur War of 1840. The book introduces "the Sulfur Age" and the processes of this period -- such as the Nordhausen, Bell and Leblanc methods --, then goes on to review native sulfur production in Sicily, once a major supplier to the world.…mehr
Sulfur is devoted to the methods of production and applications as they intertwined during different stages of industrial and technological developments. Commercial sulfuric acid production from the early 16th century until today is reviewed, spanning the Ancient and Renaissance periods, the Industrial Age (to which sulfur was vitally important), and the Sulfur War of 1840. The book introduces "the Sulfur Age" and the processes of this period -- such as the Nordhausen, Bell and Leblanc methods --, then goes on to review native sulfur production in Sicily, once a major supplier to the world. The 'Frasch method' is also covered in detail. Moving to present day, the book presents "recovered" sulfur -- derived from sour gas and oil -- which constitutes 90% of today's elemental sulfur supply, and looks to Canada, a powerhouse supplier of Recovered Sulfur. An entire chapter is devoted to the modern-day sulfur entrepreneur, with a profile of various investors (from the reluctant to the private and institutional), and evaluates the benefits of adopting new and revolutionary technologies. Finally, the book forecasts the sulfur industry's future and potential supply sources, such as worldwide oil sands.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Stephen Gantz (CISSP-ISSAP, CEH, CGEIT, CRISC, CIPP/G, C CISO) is an information security and IT consultant with over 20 years of experience in security and privacy management, enterprise architecture, systems development and integration, and strategic planning. He currently holds an executive position with a health information technology services firm primarily serving federal and state government customers. He is also an Associate Professor of Information Assurance in the Graduate School at University of Maryland University College. He maintains a security-focused website and blog at http://www.securityarchitecture.com. Steve's security and privacy expertise spans program management, security architecture, policy development and enforcement, risk assessment, and regulatory compliance with major legislation such as FISMA, HIPAA, and the Privacy Act. His industry experience includes health, financial services, higher education, consumer products, and manufacturing, but since 2000 his work has focused on security and other information resources management functions in federal government agencies. His prior work history includes completing projects for government clients including the Departments of Defense, Labor, and Health and Human Services, Office of Management and Budget, Federal Deposit Insurance Corporation, U.S. Postal Service, and U.S. Senate. Steve holds a master's degree in public policy from the Kennedy School of Government at Harvard University, and also earned his bachelor's degree from Harvard. He is nearing completion of the Doctor of Management program at UMUC, where his dissertation focuses on trust and distrust in networks and inter-organizational relationships. Steve currently resides in Arlington, Virginia with his wife Reneé and children Henry, Claire, and Gillian.
Inhaltsangabe
1. Fundamentals/Key Concepts 2. Auditing in Context 3. Internal Auditing 4. External Auditing 5. Types of Audits 6. IT Audit Components 7. Audit Drivers 8. IT Audit Processes 9. Methodologies & Frameworks 10. Organizations, standards & Certifications 11. Appendices