It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_columbia

Record ID marc_columbia/Columbia-extract-20221130-031.mrc:31329035:5126
Source marc_columbia
Download Link /show-records/marc_columbia/Columbia-extract-20221130-031.mrc:31329035:5126?format=raw

LEADER: 05126cam a22007574a 4500
001 15067859
005 20220521230723.0
006 m o d
007 cr cnu---unuuu
008 060406s2006 fluab ob 001 0 eng d
035 $a(OCoLC)ocm65538300
035 $a(NNC)15067859
040 $aN$T$beng$epn$cN$T$dOCLCQ$dYDXCP$dOCLCQ$dUV0$dE7B$dOCLCQ$dDXU$dOCLCO$dOCLCQ$dOCLCF$dCRCPR$dOCLCQ$dOCLCO$dOCLCQ$dUAB$dOCLCA$dCAUOI$dOCLCQ$dCEF$dUPM$dNLE$dUKMGB$dWYU$dYDX$dTYFRS$dLEAUB$dUKAHL$dOCLCO
015 $aGBB7C6595$2bnb
016 7 $a018428013$2Uk
019 $a228140915$a228140916$a647593353$a1029503788$a1065705311$a1086936391
020 $a1420031236$q(electronic bk.)
020 $a9781420031232$q(electronic bk.)
020 $z0849329981
020 $a9780849329982
020 $a0849329981
035 $a(OCoLC)65538300$z(OCoLC)228140915$z(OCoLC)228140916$z(OCoLC)647593353$z(OCoLC)1029503788$z(OCoLC)1065705311$z(OCoLC)1086936391
037 $aTANDF_183241$bIngram Content Group
050 4 $aHF5548.37$b.L358 2006eb
072 7 $aBUS$x097000$2bisacsh
072 7 $aBUS$x104000$2bisacsh
072 7 $aBUS$x071000$2bisacsh
072 7 $aBUS$x103000$2bisacsh
082 04 $a658.4/7$222
049 $aZCUA
100 1 $aLandoll, Douglas J.
245 14 $aThe security risk assessment handbook :$ba complete guide for performing security risk assessments /$cDouglas J. Landoll.
260 $aBoca Raton, FL :$bAuerbach Publications,$c2006.
300 $a1 online resource (xxi, 473 pages) :$billustrations, maps
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
504 $aIncludes bibliographical references and index.
588 0 $aPrint version record.
505 0 $aIntroduction; The Need for an Information Security Program; Elements of an Information Security Program; Common Core Information Security Practices; Security Risk Assessment; Related Activities; The Need for This Book; Who Is This Book For?; ; Information Security Risk Assessment Basics; Phase 1: Project Definition; Phase 2: Project Preparation; Phase 3: Data-gathering; Phase 4: Risk Analysis; Phase 5: Risk Mitigation; Phase 6: Risk Reporting and Resolution; ; Project Definition; Ensuring Project Success; Project Description; ; Security Risk Assessment Preparation; Introduce the Team; Review Business Mission; Identify Critical Systems; Identify Assets; Identifying Threats; Determine Expected Controls; ; Data Gathering; Sampling; The RIIOT Method of Data Gathering; ; Administrative Data Gathering; Threats and Safeguards; The RIIOT Method: Administrative Data Gathering; ; Technical Data
505 0 $aGathering; Technical Threats and Safeguards; The RIIOT Method: Technical Data Gathering; ; Physical Data Gathering; Physical Threats and Safeguards; The RIIOT Method: Physical Data Gathering; ; Security Risk Analysis; Determining Risk; Creating Risk Statements; Team Review of Security Risk Statements; ; Security Risk Mitigation; Selecting Safeguards; Safeguard Solution Sets; Establishing Risk Parameters; ; Security Risk Assessment Reporting; Cautions in Reporting; Pointers in Reporting; Report Structure; Document Review Methodology: Create the Report Using; a Top-Down Approach; Assessment Brief; Action Plan; ; Security Risk Assessment Project Management; Project Planning; Project Tracking; Taking Corrective Measures; Project Status Reporting; Project Conclusion and Wrap-up; ; Security Risk Assessment Approaches; Quantitative vs.
505 0 $aQualitative Analysis; Tools; Security Risk Assessment Methods; ; Appendix Relevant Standards and Regulations; GAISP; COBIT; ISO 17799; NIST Handbook; HIPAA: Security; Gramm-Leach-Bliley Act (GLB Act)
650 0 $aBusiness$xData processing$xSecurity measures.
650 0 $aComputer security.
650 0 $aData protection.
650 0 $aRisk assessment.
650 2 $aComputer Security
650 2 $aRisk Assessment
650 6 $aGestion$xInformatique$xSécurité$xMesures.
650 6 $aSécurité informatique.
650 6 $aProtection de l'information (Informatique)
650 6 $aÉvaluation du risque.
650 7 $arisk assessment.$2aat
650 7 $aBUSINESS & ECONOMICS$xWorkplace Culture.$2bisacsh
650 7 $aBUSINESS & ECONOMICS$xCorporate Governance.$2bisacsh
650 7 $aBUSINESS & ECONOMICS$xLeadership.$2bisacsh
650 7 $aBUSINESS & ECONOMICS$xOrganizational Development.$2bisacsh
650 7 $aBusiness$xData processing$xSecurity measures.$2fast$0(OCoLC)fst00842307
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
650 7 $aData protection.$2fast$0(OCoLC)fst00887958
650 7 $aRisk assessment.$2fast$0(OCoLC)fst01098146
655 0 $aElectronic books.
655 4 $aElectronic books.
776 08 $iPrint version:$aLandoll, Douglas J.$tSecurity risk assessment handbook.$dBoca Raton, FL : Auerbach Publications, 2006$z0849329981$w(DLC) 2005050717$w(OCoLC)60644880
856 40 $uhttp://www.columbia.edu/cgi-bin/cul/resolve?clio15067859$zTaylor & Francis eBooks
852 8 $blweb$hEBOOKS