It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_columbia

Record ID marc_columbia/Columbia-extract-20221130-034.mrc:6597105:5923
Source marc_columbia
Download Link /show-records/marc_columbia/Columbia-extract-20221130-034.mrc:6597105:5923?format=raw

LEADER: 05923cam a2200757 a 4500
001 16614098
005 20220627125733.0
006 m o d
007 cr cnu---unuuu
008 110705s2011 fluab obf 001 0 eng d
035 $a(OCoLC)ocn738433256
035 $a(NNC)16614098
040 $aN$T$beng$epn$cN$T$dYDXCP$dUKMGB$dCUS$dOCLCQ$dOTZ$dB24X7$dOCLCQ$dOCLCF$dOCLCO$dCRCPR$dOCLCQ$dE7B$dDEBSZ$dUMI$dDEBBG$dAU@$dCOO$dOCLCO$dOCLCQ$dOCLCO$dOCLCQ$dCPO$dSTF$dOCLCA$dCEF$dNLE$dYDX$dLEAUB$dOCLCQ$dNLW$dBRF$dEYM$dOCLCQ$dOCLCO
016 7 $a015522898$2Uk
019 $a742513205$a761956346$a879683557$a972120240$a972234532$a984681519$a1000356046$a1015212901$a1060197718$a1080587402$a1179693172$a1194786880
020 $a9781439821497$q(electronic bk.)
020 $a1439821496$q(electronic bk.)
020 $z9781439821480
020 $z1439821488
035 $a(OCoLC)738433256$z(OCoLC)742513205$z(OCoLC)761956346$z(OCoLC)879683557$z(OCoLC)972120240$z(OCoLC)972234532$z(OCoLC)984681519$z(OCoLC)1000356046$z(OCoLC)1015212901$z(OCoLC)1060197718$z(OCoLC)1080587402$z(OCoLC)1179693172$z(OCoLC)1194786880
037 $aCL0500000426$bSafari Books Online
050 4 $aHF5548.37$b.L358 2011eb
072 7 $aBUS$x097000$2bisacsh
072 7 $aBUS$x104000$2bisacsh
072 7 $aBUS$x071000$2bisacsh
072 7 $aBUS$x103000$2bisacsh
082 04 $a658.4/7$222
084 $aCOM053000$aBUS073000$2bisacsh
049 $aZCUA
100 1 $aLandoll, Douglas J.
245 14 $aThe security risk assessment handbook :$ba complete guide for performing security risk assessments /$cDouglas Landoll.
250 $a2nd ed.
260 $aBoca Raton, FL :$bCRC Press,$c©2011.
300 $a1 online resource (xix, 475 pages) :$billustrations, maps
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
504 $aIncludes bibliographical references and index.
520 $a"The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional development. It also enables security consumers to better negotiate the scope and rigor of a security assessment, effectively interface with a security assessment team, deliver insightful comments on a draft report, and have a greater understanding of final report recommendations. This book can save time and money by eliminating guesswork as to what assessment steps to perform, and how to perform them. In addition, the book offers charts, checklists, examples, and templates that speed up data gathering, analysis, and document development. By improving the efficiency of the assessment process, security consultants can deliver a higher-quality service with a larger profit margin. The text allows consumers to intelligently solicit and review proposals, positioning them to request affordable security risk assessments from quality vendors that meet the needs of their organizations"--$cProvided by publisher
520 $a"The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment from a practical point of view. Designed for security professionals who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional development and experience. It also enables security consumers to better negotiate the scope and rigor of a security assessment, effectively interface with a security assessment team, deliver insightful comments on a draft report, and have a greater understanding of final report recommendations"--$cProvided by publisher
588 0 $aPrint version record.
505 0 $a1. Introduction -- 2. Information security risk assessment basics -- 3. Project definition -- 4. Security risk assessment preparation -- 5. Data gathering -- 6. Administrative data gathering -- 7. Technical data gathering -- 8. Physical data gathering -- 9. Security risk analysis -- 10. Security risk mitigation -- 11. Security risk assessment reporting -- 12. Security risk assessment project management -- 13. Security risk assessment approaches.
650 0 $aBusiness$xData processing$xSecurity measures.
650 0 $aComputer security.
650 0 $aData protection.
650 0 $aRisk assessment.
650 6 $aGestion$xInformatique$xSécurité$xMesures.
650 6 $aSécurité informatique.
650 6 $aProtection de l'information (Informatique)
650 6 $aÉvaluation du risque.
650 7 $arisk assessment.$2aat
650 7 $aComputers$xSecurity$xGeneral.$2bisacsh
650 7 $aBusiness and ecomonics$xCommerce.$2bisacsh
650 7 $aBUSINESS & ECONOMICS$xWorkplace Culture.$2bisacsh
650 7 $aBUSINESS & ECONOMICS$xCorporate Governance.$2bisacsh
650 7 $aBUSINESS & ECONOMICS$xLeadership.$2bisacsh
650 7 $aBUSINESS & ECONOMICS$xOrganizational Development.$2bisacsh
650 7 $aBusiness$xData processing$xSecurity measures.$2fast$0(OCoLC)fst00842307
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
650 7 $aData protection.$2fast$0(OCoLC)fst00887958
650 7 $aRisk assessment.$2fast$0(OCoLC)fst01098146
655 0 $aElectronic books.
655 4 $aElectronic books.
776 08 $iPrint version:$aLandoll, Douglas J.$tSecurity risk assessment handbook.$b2nd ed.$dBoca Raton, FL : CRC Press, ©2011$z9781439821480$w(DLC) 2010043672$w(OCoLC)619180196
856 40 $uhttp://www.columbia.edu/cgi-bin/cul/resolve?clio16614098$zTaylor & Francis eBooks
852 8 $blweb$hEBOOKS