Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Security risk management : (Record no. 6946)

MARC details
000 -LEADER
fixed length control field 02146nam a2200361 i 4500
001 - CONTROL NUMBER
control field 801811803
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230604140549.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120726s2011 ne a b 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781597496162
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1597496162
040 ## - CATALOGING SOURCE
Original cataloging agency UMI
Transcribing agency UMI
Description conventions rda
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 21
Classification number 005.8
Item number W.E.S
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Wheeler, Evan.
Relator term author
245 10 - TITLE STATEMENT
Title Security risk management :
Remainder of title building an information security risk management program from the ground up /
Statement of responsibility, etc Evan Wheeler ; Technical editor, Kenneth Swick.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Amsterdam ;
-- Waltham, MA :
Name of publisher, distributor, etc Syngress,
Date of publication, distribution, etc [2011]
300 ## - PHYSICAL DESCRIPTION
Extent 1 volume :
Other physical details illustrations ;
Dimensions 24 cm
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Part I: Introduction to risk management -- The security evolution -- Risky business -- The risk management lifecycle -- Part II: Risk assessment and analysis techniques -- Risk profiling -- Formulating a risk -- Risk exposure factors -- Security controls and services -- Risk evaluation and mitigation strategies -- Reports and consulting -- Risk assessment techniques -- Part III: Building and running a risk management program -- Threat and vulnerability management -- Security risk reviews -- A blueprint for security -- Building a program from scratch-- Appendix A: Security risk profile -- Appendix B: Qualitative risk scale reference tables -- Appendix C: Architectural risk analysis reference tables.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
General subdivision Management.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Risk management
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Risk management.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Swick, Kenneth.
Relator term author
740 0# - ADDED ENTRY--UNCONTROLLED RELATED/ANALYTICAL TITLE
Uncontrolled related/analytical title Safari books online.
856 4# - ELECTRONIC LOCATION AND ACCESS
Public note Connect to this resource online
Uniform Resource Identifier <a href="http://proquest.safaribooksonline.com/?uiCode=ohlink&xmlId=9781597496155">http://proquest.safaribooksonline.com/?uiCode=ohlink&xmlId=9781597496155</a>
856 4# - ELECTRONIC LOCATION AND ACCESS
Public note Connect to this resource online (off-campus acces)
Uniform Resource Identifier <a href="http://proxy.ohiolink.edu:9099/login?url=http://proquest.safaribooksonline.com/?uiCode=ohlink&xmlId=9781597496155">http://proxy.ohiolink.edu:9099/login?url=http://proquest.safaribooksonline.com/?uiCode=ohlink&xmlId=9781597496155</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
  Dewey Decimal Classification     Computers & Information Technology ( Computer Science ) Main library Main library A2 13/12/2012 Sphinx publishing 345.00 PU   005.8 W.E.S 00009281 19/02/2025 1 13/12/2012 Books
  Dewey Decimal Classification     Computers & Information Technology ( Computer Science ) Main library Main library A2 18/12/2012 Academic bookshop 375.00 PU   005.8 W.E.S 00009364 19/02/2025 2 18/12/2012 Books