NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

How to measure anything in cybersecurity risk / (Record no. 12953)

MARC details
000 -LEADER
fixed length control field 07275cam a22008297i 4500
001 - CONTROL NUMBER
control field on1375438384
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240523125544.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230412s2023 nju o 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency YDX
Language of cataloging eng
Description conventions rda
Transcribing agency YDX
Modifying agency N$T
-- YDX
-- EBLCP
-- GZM
-- UKMGB
-- TEF
-- ORMDA
-- OCLCO
-- OCLCL
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBC376704
Source bnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 021027124
Source Uk
019 ## -
-- 1375298579
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119892311
Qualifying information (electronic book)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119892317
Qualifying information (electronic book)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119892328
Qualifying information (electronic book)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119892325
Qualifying information (electronic book)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119892335
Qualifying information (electronic book)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119892333
Qualifying information (electronic book)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1119892309
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781119892304
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1002/9781119892335
Source of number or code doi
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier UKMGB
System control number 021027124
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000074347080
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1375438384
Canceled/invalid control number (OCoLC)1375298579
037 ## - SOURCE OF ACQUISITION
Stock number 9781119892311
Source of stock number/acquisition Wiley, US
037 ## - SOURCE OF ACQUISITION
Stock number 9781119892304
Source of stock number/acquisition O'Reilly Media
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6773.15.C97
Item number H835 2023eb
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.4/78
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Hubbard, Douglas W.,
Dates associated with a name 1962-
Relator term author.
Real World Object URI https://id.oclc.org/worldcat/entity/E39PCjBkFm84JGy6X73hCJ4J8P
245 10 - TITLE STATEMENT
Title How to measure anything in cybersecurity risk /
Statement of responsibility, etc. Douglas W. Hubbard, Richard Seiersen.
250 ## - EDITION STATEMENT
Edition statement Second edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, New Jersey :
Name of producer, publisher, distributor, manufacturer Wiley,
Date of production, publication, distribution, manufacture, or copyright notice [2023]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on online resource; title from digital title page (viewed on April 25, 2023).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Title Page -- Copyright Page -- Contents -- Foreword for the Second Edition -- Acknowledgments -- Preface -- How to Measure Anything in Cybersecurity Risk -- Introduction -- Why We Chose This Topic -- What Is This Book About? -- We Need More Than Technology -- Part I Why Cybersecurity Needs Better Measurements for Risk -- Chapter 1 The One Patch Most Needed in Cybersecurity -- Insurance: A Canary in the Coal Mine -- The Global Attack Surface -- The Cyber Threat Response -- A Proposal for Cybersecurity Risk Management -- Notes -- Chapter 2 A Measurement Primer for Cybersecurity
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note The Concept of Measurement -- A Taxonomy of Measurement Scales -- The Object of Measurement -- The Methods of Measurement -- Notes -- Chapter 3 The Rapid Risk Audit: Starting With a Simple Quantitative Risk Model -- The Setup and Terminology -- The Rapid Audit Steps -- Some Initial Sources of Data -- The Expert as the Instrument -- Supporting the Decision: Return on Controls -- Doing "Uncertainty Math" -- Visualizing Risk With a Loss Exceedance Curve -- Where to Go from Here -- Notes -- Chapter 4 The Single Most Important Measurement in Cybersecurity
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note The Analysis Placebo: Why We Can't Trust Opinion Alone -- How You Have More Data than You Think -- When Algorithms Beat Experts -- Tools for Improving the Human Component -- Summary and Next Steps -- Notes -- Chapter 5 Risk Matrices, Lie Factors, Misconceptions, and Other Obstacles to Measuring Risk -- Scanning the Landscape: A Survey of Cybersecurity Professionals -- What Color Is Your Risk? The Ubiquitous-and Risky-Risk Matrix -- Exsupero Ursus and Other Fallacies -- Communication and Consensus Objections -- Conclusion -- Notes -- Part II Evolving the Model of Cybersecurity Risk
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 6 Decompose It: Unpacking the Details -- Decomposing the Simple One-for-One Substitution Model -- More Decomposition Guidelines: Clear, Observable, Useful -- A Hard Decomposition: Reputation Damage -- Conclusion -- Notes -- Chapter 7 Calibrated Estimates: How Much Do You Know Now? -- Introduction to Subjective Probability -- Calibration Exercise -- More Hints for Controlling Overconfidence -- Conceptual Obstacles to Calibration -- The Effects of Calibration -- Beyond Initial Calibration Training: More Methods for Improving Subjective Judgment -- Notes
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Answers to Trivia Questions for Calibration Exercise -- Chapter 8 Reducing Uncertainty with Bayesian Methods -- A Brief Introduction to Bayes and Probability Theory -- An Example from Little Data: Does Multifactor Authentication Work? -- Other Ways Bayes Applies -- Notes -- Chapter 9 Some Powerful Methods Based on Bayes -- Computing Frequencies with (Very) Few Data Points: The Beta Distribution -- Decomposing Probabilities with Many Conditions -- Reducing Uncertainty Further and When to Do It -- More Advanced Modeling Considerations -- Wrapping Up Bayes -- Notes
520 ## - SUMMARY, ETC.
Summary, etc. A start-to-finish guide for realistically measuring cybersecurity risk In the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods delivers yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework. Advanced methods and detailed advice for a variety of use cases round out the book, which also includes: A new "Rapid Risk Audit" for a first quick quantitative risk assessment. New research on the real impact of reputation damage New Bayesian examples for assessing risk with little data New material on simple measurement and estimation, pseudo-random number generators, and advice on combining expert opinion Dispelling long-held beliefs and myths about information security, How to Measure Anything in Cybersecurity Risk is an essential roadmap for IT security managers, CFOs, risk and compliance professionals, and even statisticians looking for novel new ways to apply quantitative techniques to cybersecurity.
590 ## - LOCAL NOTE (RLIN)
Local note John Wiley and Sons
Provenance (VM) [OBSOLETE] Wiley Online Library: Complete oBooks
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberterrorism.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberspace
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Risk management.
650 #2 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Risk Management
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberterrorisme.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Gestion du risque.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element risk management.
Source of heading or term aat
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element BUSINESS & ECONOMICS
General subdivision Statistics.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS
General subdivision Security
-- General.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberspace
General subdivision Security measures
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberterrorism
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Risk management
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberterrorism.
Source of heading or term nli
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberspace
General subdivision Security measures.
Source of heading or term nli
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Risk management.
Source of heading or term nli
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Seiersen, Richard,
Dates associated with a name 1967-
Relator term author.
Real World Object URI https://id.oclc.org/worldcat/entity/E39PCjDpy4qdHvy79ycRTxD7Dy
758 ## - RESOURCE IDENTIFIER
Relationship information has work:
Label How to measure anything in cybersecurity risk (Text)
Real World Object URI https://id.oclc.org/worldcat/entity/E39PCGJ6B7Hf38yqMJKrdqkPXq
Relationship https://id.oclc.org/worldcat/ontology/hasWork
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 1119892309
-- 9781119892304
Record control number (OCoLC)1302738859
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119892335">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119892335</a>
938 ## -
-- YBP Library Services
-- YANK
-- 304816556
938 ## -
-- EBSCOhost
-- EBSC
-- 3590054
938 ## -
-- ProQuest Ebook Central
-- EBLB
-- EBL7234983
994 ## -
-- 92
-- INLUM

No items available.

© 2022- NLU Meghalaya. All Rights Reserved. || Implemented and Customized by
OPAC Visitors

Powered by Koha