MARC details
000 -LEADER |
fixed length control field |
01671cam a22002775a 4500 |
001 - CONTROL NUMBER |
control field |
16772385 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20201128021352.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
110510t2011 maua frb 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781597496155 (pbk.) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Transcribing agency |
DLC |
Modifying agency |
DLC |
-- |
EG-ScBUE |
Language of cataloging |
eng |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
22 |
Item number |
WHE |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Wheeler, Evan. |
9 (RLIN) |
38601 |
245 10 - TITLE STATEMENT |
Title |
Security risk management : |
Remainder of title |
building an information security risk management program from the ground up / |
Statement of responsibility, etc |
Evan Wheeler ; technical editor Kenneth Swick. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Waltham : |
Name of publisher, distributor, etc |
Elsevier, |
Date of publication, distribution, etc |
c.2011. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xx, 340 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
500 ## - GENERAL NOTE |
General note |
Index : p. 331-340. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references. |
505 8# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Machine generated contents note: Part I - Introduction to Risk Management : The Security Evolution -- Risky Business -- The Risk Management Lifecycle -- Risk Profiling Part II - Risk Assessment and Analysis Techniques -- Formulating a Risk -- Risk Exposure Factors -- Security Controls & Services -- Risk Evaluation & Mitigation Strategies -- Reports & Consulting Chapter 10: Risk Assessment Techniques Part III - Building and Running a Risk Management Program -- hreat & Vulnerability Management -- Security Risk Reviews -- A Blueprint for Security -- Building a Program from Scratch Appendix A: Security Risk Profile Appendix B: Risk Models and Scales Appendix C: Architectural Risk Analysis Reference Tables. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
Source of heading or term |
BUEsh |
9 (RLIN) |
2634 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Risk assessment. |
Source of heading or term |
BUEsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Risk management. |
Source of heading or term |
BUEsh |
9 (RLIN) |
12222 |
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME |
Source of heading or term |
BUEsh |
653 ## - INDEX TERM--UNCONTROLLED |
Resource For college |
Informatics and Computer Science |
Arrived date list |
June2015 |
-- |
October2015 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Swick, Kenneth, |
Relator term |
editor. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
952 ## - LOCATION AND ITEM INFORMATION (KOHA) |
-- |
2015-06-28 |