Managing Risk and Information Security (Record no. 1625)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 04926nam a22005175i 4500 |
001 - CONTROL NUMBER | |
control field | 978-1-4842-1455-8 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20210511122748.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 160912s2016 xxu| s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781484214558 |
-- | 978-1-4842-1455-8 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-1-4842-1455-8 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UR |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM053000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UR |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Harkins, Malcolm W. |
Relator term | author. |
Relationship | aut |
-- | http://id.loc.gov/vocabulary/relators/aut |
9 (RLIN) | 7885 |
245 10 - TITLE STATEMENT | |
Title | Managing Risk and Information Security |
Medium | [electronic resource] : |
Remainder of title | Protect to Enable / |
Statement of responsibility, etc. | by Malcolm W. Harkins. |
250 ## - EDITION STATEMENT | |
Edition statement | 2nd ed. 2016. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Berkeley, CA : |
Name of producer, publisher, distributor, manufacturer | Apress : |
-- | Imprint: Apress, |
Date of production, publication, distribution, manufacture, or copyright notice | 2016. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XXVII, 187 p. 20 illus. in color. |
Other physical details | online resource. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS | |
File type | text file |
Encoding format | |
Source | rda |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Chapter 1 Introduction -- Chapter 2 Misperception of Risk -- Chapter 3 Governance and Internal Partnerships -- Chapter 4 External Partnerships -- Chapter 5 People Are the Perimeter -- Chapter 6 Emerging Capabilities and Usage Models -- Chapter 7 A New Security Architecture to Improve Business Agility -- Chapter 8 Looking to the Future -- Chapter 9 Corporate Social Responsibility -- Chapter 10 The 21st Century CISO -- Chapter 11 Performance Coaching -- Appendix A: References. . |
506 0# - RESTRICTIONS ON ACCESS NOTE | |
Terms governing access | Open Access |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author’s experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Managing Risk and Information Security provides thought leadership in the increasingly important area of enterprise information risk and security. It describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology not only for internal operations but increasing as a part of product or service creation, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This edition discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities and offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. What You'll Learn Review how people perceive risk and the effects it has on information security See why different perceptions of risk within an organization matters Understand and reconcile these differing risk views Gain insights into how to safely enable the use of new technologies Who This Book Is For The primary audience is CIOs and other IT leaders, CISOs and other information security leaders, IT auditors, and other leaders of corporate governance and risk functions. The secondary audience is CEOs, board members, privacy professionals, and less senior-level information security and risk professionals. "Harkins’ logical, methodical approach as a CISO to solving the most complex cybersecurity problems is reflected in the lucid style of this book. His enlightened approach to intelligence-based security infrastructure and risk mitigation is our best path forward if we are ever to realize the vast potential of the innovative digital world we are creating while reducing the threats to manageable levels. The author shines a light on that path in a comprehensive yet very readable way." —Art Coviello, Former CEO and Executive Chairman, RSA . |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data protection. |
9 (RLIN) | 210 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer science. |
9 (RLIN) | 1566 |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Security. |
Authority record control number or standard number | https://scigraph.springernature.com/ontologies/product-market-codes/I28000 |
9 (RLIN) | 215 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer Science, general. |
Authority record control number or standard number | https://scigraph.springernature.com/ontologies/product-market-codes/I00001 |
9 (RLIN) | 2132 |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
9 (RLIN) | 141 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9781484214565 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9781484214572 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9781484252406 |
773 ## - HOST ITEM ENTRY | |
Title | Springer Nature Open Access eBook |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/978-1-4842-1455-8">https://doi.org/10.1007/978-1-4842-1455-8</a> |
912 ## - | |
-- | ZDB-2-CWD |
912 ## - | |
-- | ZDB-2-SXPC |
912 ## - | |
-- | ZDB-2-SOB |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | e-Books |
-- | Administrator Library |
No items available.