Security risk management : (Record no. 19992)

MARC details
000 -LEADER
fixed length control field 01671cam a22002775a 4500
001 - CONTROL NUMBER
control field 16772385
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20201128021352.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 110510t2011 maua frb 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781597496155 (pbk.)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency DLC
-- EG-ScBUE
Language of cataloging eng
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
Item number WHE
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Wheeler, Evan.
9 (RLIN) 38601
245 10 - TITLE STATEMENT
Title Security risk management :
Remainder of title building an information security risk management program from the ground up /
Statement of responsibility, etc Evan Wheeler ; technical editor Kenneth Swick.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Waltham :
Name of publisher, distributor, etc Elsevier,
Date of publication, distribution, etc c.2011.
300 ## - PHYSICAL DESCRIPTION
Extent xx, 340 p. :
Other physical details ill. ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note Index : p. 331-340.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Machine generated contents note: Part I - Introduction to Risk Management : The Security Evolution -- Risky Business -- The Risk Management Lifecycle -- Risk Profiling Part II - Risk Assessment and Analysis Techniques -- Formulating a Risk -- Risk Exposure Factors -- Security Controls & Services -- Risk Evaluation & Mitigation Strategies -- Reports & Consulting Chapter 10: Risk Assessment Techniques Part III - Building and Running a Risk Management Program -- hreat & Vulnerability Management -- Security Risk Reviews -- A Blueprint for Security -- Building a Program from Scratch Appendix A: Security Risk Profile Appendix B: Risk Models and Scales Appendix C: Architectural Risk Analysis Reference Tables.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
Source of heading or term BUEsh
9 (RLIN) 2634
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Risk assessment.
Source of heading or term BUEsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Risk management.
Source of heading or term BUEsh
9 (RLIN) 12222
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME
Source of heading or term BUEsh
653 ## - INDEX TERM--UNCONTROLLED
Resource For college Informatics and Computer Science
Arrived date list June2015
-- October2015
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Swick, Kenneth,
Relator term editor.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
952 ## - LOCATION AND ITEM INFORMATION (KOHA)
-- 2015-06-28
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Koha collection Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Serial Enumeration / chronology Total Checkouts Full call number Barcode Date last seen Cost, replacement price Koha item type
    Dewey Decimal Classification     Alahram Central Library Central Library Lower Floor 28/06/2015 Purchase 345.00 330   005.8 WHE 000039201 11/06/2024 431.25 Book - Borrowing