How to measure anything in cybersecurity risk / (Record no. 7528)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 03583cam a22006138i 4500 |
| 001 - CONTROL NUMBER | |
| control field | on1377214751 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OCoLC |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250613130053.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 221222t20232023njua b 001 0 eng c |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2022061027 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | MdU/DLC |
| Language of cataloging | eng |
| Description conventions | rda |
| Transcribing agency | DLC |
| Modifying agency | IMD |
| -- | YDX |
| -- | UKMGB |
| -- | HCO |
| -- | OCLCF |
| -- | OCLCO |
| -- | OCLCL |
| -- | IG# |
| -- | BUB |
| -- | LD0 |
| -- | OCLCO |
| 015 ## - NATIONAL BIBLIOGRAPHY NUMBER | |
| National bibliography number | GBC375164 |
| Source | bnb |
| 016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER | |
| Record control number | 021025581 |
| Source | Uk |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781119892304 |
| Qualifying information | hardback |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 1119892309 |
| Qualifying information | hardback |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Cancelled/invalid ISBN | 9781119892328 |
| Qualifying information | adobe pdf |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| Cancelled/invalid ISBN | 9781119892311 |
| Qualifying information | epub |
| 029 0# - (OCLC) | |
| OCLC library identifier | UKMGB |
| System control number | 021025581 |
| 029 1# - (OCLC) | |
| OCLC library identifier | AU@ |
| System control number | 000074396085 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (OCoLC)1377214751 |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | pcc |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
| Classification number | HV6773.15.C97 |
| Item number | H835 2023 |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 363.325 |
| Edition number | 23/eng/20230524 |
| 049 ## - LOCAL HOLDINGS (OCLC) | |
| Holding library | TZAA |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Hubbard, Douglas W., |
| Dates associated with a name | 1962- |
| Relator term | author. |
| -- | https://id.oclc.org/worldcat/entity/E39PCjBkFm84JGy6X73hCJ4J8P |
| 245 10 - TITLE STATEMENT | |
| Title | How to measure anything in cybersecurity risk / |
| Statement of responsibility, etc | Douglas W. Hubbard, Richard Seiersen. |
| 250 ## - EDITION STATEMENT | |
| Edition statement | Second edition. |
| 264 #1 - | |
| -- | Hoboken, New Jersey : |
| -- | Wiley, |
| -- | [2023] |
| 264 #4 - | |
| -- | �2023 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xv, 345 pages : |
| Other physical details | illustrations ; |
| Dimensions | 24 cm |
| 336 ## - | |
| -- | text |
| -- | txt |
| -- | rdacontent |
| 336 ## - | |
| -- | still image |
| -- | sti |
| -- | rdacontent |
| 337 ## - | |
| -- | unmediated |
| -- | n |
| -- | rdamedia |
| 338 ## - | |
| -- | volume |
| -- | nc |
| -- | rdacarrier |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc | Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Part I: why cybersecurity needs better measurements for risk. The one patch most needed in cybersecurity ; A measurement primer for cybersecurity ; The rapid risk audit: starting with a simple quantitative risk model ; The single most important measurement in cybersecurity ; Risk matrices, lie factors, misconceptions, and other obstacles to measuring risk -- Part II: evolving the model of cybersecurity risk. Decompose it: unpacking the details ; Calibrated estimates: how much do you know now? ; Reducing uncertainty with Bayesian methods ; Some powerful methods based on Bayes -- Part III: cybersecurity risk management for the enterprise. Toward security metrics maturity ; How well are my security investments working together? ; A call to action: how to roll out cybersecurity risk management. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | "Cybersecurity has become one of the biggest risks facing companies today. There is a need to provide the tools and information for a CISO to become more of a chief information risk officer so they are better able to identify and prioritize risk, allocate resources, and develop effective risk mitigation strategies. This book helps to fill that need"-- |
| -- | Provided by publisher. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Cyberterrorism. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Cyberspace |
| General subdivision | Security measures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Risk management. |
| 650 #2 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Risk Management |
| 650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Cyberterrorisme. |
| 650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Gestion du risque. |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | risk management. |
| Source of heading or term | aat |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Cyberspace |
| General subdivision | Security measures |
| Source of heading or term | fast |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Cyberterrorism |
| Source of heading or term | fast |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Risk management |
| Source of heading or term | fast |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Seiersen, Richard, |
| Dates associated with a name | 1967- |
| Relator term | author. |
| -- | https://id.oclc.org/worldcat/entity/E39PCjDpy4qdHvy79ycRTxD7Dy |
| 710 2# - ADDED ENTRY--CORPORATE NAME | |
| Corporate name or jurisdiction name as entry element | John Wiley & Sons, |
| Relator term | publisher. |
| 758 ## - | |
| -- | has work: |
| -- | How to measure anything in cybersecurity risk (Text) |
| -- | https://id.oclc.org/worldcat/entity/E39PCGJ6B7Hf38yqMJKrdqkPXq |
| -- | https://id.oclc.org/worldcat/ontology/hasWork |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
| Display text | Online version: |
| Main entry heading | Hubbard, Douglas W., 1962- |
| Title | How to measure anything in cybersecurity risk. |
| Edition | Second edition |
| Place, publisher, and date of publication | Hoboken, New Jersey : Wiley, [2023] |
| International Standard Book Number | 9781119892328 |
| Record control number | (DLC) 2022061028 |
| 938 ## - | |
| -- | Ingram Library Services |
| -- | INGR |
| -- | in022161013 |
| 994 ## - | |
| -- | C0 |
| -- | TZACH |
No items available.
