Managing Risk and Information Security (Record no. 1625)

000 -LEADER
fixed length control field 04926nam a22005175i 4500
001 - CONTROL NUMBER
control field 978-1-4842-1455-8
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210511122748.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160912s2016 xxu| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781484214558
-- 978-1-4842-1455-8
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-1-4842-1455-8
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Harkins, Malcolm W.
Relator term author.
Relationship aut
-- http://id.loc.gov/vocabulary/relators/aut
9 (RLIN) 7885
245 10 - TITLE STATEMENT
Title Managing Risk and Information Security
Medium [electronic resource] :
Remainder of title Protect to Enable /
Statement of responsibility, etc. by Malcolm W. Harkins.
250 ## - EDITION STATEMENT
Edition statement 2nd ed. 2016.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Berkeley, CA :
Name of producer, publisher, distributor, manufacturer Apress :
-- Imprint: Apress,
Date of production, publication, distribution, manufacture, or copyright notice 2016.
300 ## - PHYSICAL DESCRIPTION
Extent XXVII, 187 p. 20 illus. in color.
Other physical details online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Encoding format PDF
Source rda
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1 Introduction -- Chapter 2 Misperception of Risk -- Chapter 3 Governance and Internal Partnerships -- Chapter 4 External Partnerships -- Chapter 5 People Are the Perimeter -- Chapter 6 Emerging Capabilities and Usage Models -- Chapter 7 A New Security Architecture to Improve Business Agility -- Chapter 8 Looking to the Future -- Chapter 9 Corporate Social Responsibility -- Chapter 10 The 21st Century CISO -- Chapter 11 Performance Coaching -- Appendix A: References. .
506 0# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Open Access
520 ## - SUMMARY, ETC.
Summary, etc. Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author’s experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Managing Risk and Information Security provides thought leadership in the increasingly important area of enterprise information risk and security. It describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology not only for internal operations but increasing as a part of product or service creation, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This edition discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities and offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. What You'll Learn Review how people perceive risk and the effects it has on information security See why different perceptions of risk within an organization matters Understand and reconcile these differing risk views Gain insights into how to safely enable the use of new technologies Who This Book Is For The primary audience is CIOs and other IT leaders, CISOs and other information security leaders, IT auditors, and other leaders of corporate governance and risk functions. The secondary audience is CEOs, board members, privacy professionals, and less senior-level information security and risk professionals. "Harkins’ logical, methodical approach as a CISO to solving the most complex cybersecurity problems is reflected in the lucid style of this book. His enlightened approach to intelligence-based security infrastructure and risk mitigation is our best path forward if we are ever to realize the vast potential of the innovative digital world we are creating while reducing the threats to manageable levels. The author shines a light on that path in a comprehensive yet very readable way." —Art Coviello, Former CEO and Executive Chairman, RSA .
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
9 (RLIN) 210
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer science.
9 (RLIN) 1566
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Security.
Authority record control number or standard number https://scigraph.springernature.com/ontologies/product-market-codes/I28000
9 (RLIN) 215
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer Science, general.
Authority record control number or standard number https://scigraph.springernature.com/ontologies/product-market-codes/I00001
9 (RLIN) 2132
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
9 (RLIN) 141
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9781484214565
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9781484214572
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9781484252406
773 ## - HOST ITEM ENTRY
Title Springer Nature Open Access eBook
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-1-4842-1455-8">https://doi.org/10.1007/978-1-4842-1455-8</a>
912 ## -
-- ZDB-2-CWD
912 ## -
-- ZDB-2-SXPC
912 ## -
-- ZDB-2-SOB
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type e-Books
-- Administrator Library

No items available.

Supported by Central Library, NIT Hamirpur
Powered by KOHA