How to measure anything in cybersecurity risk / (Record no. 12953)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 07275cam a22008297i 4500 |
001 - CONTROL NUMBER | |
control field | on1375438384 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240523125544.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu---unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 230412s2023 nju o 000 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | YDX |
Language of cataloging | eng |
Description conventions | rda |
Transcribing agency | YDX |
Modifying agency | N$T |
-- | YDX |
-- | EBLCP |
-- | GZM |
-- | UKMGB |
-- | TEF |
-- | ORMDA |
-- | OCLCO |
-- | OCLCL |
015 ## - NATIONAL BIBLIOGRAPHY NUMBER | |
National bibliography number | GBC376704 |
Source | bnb |
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER | |
Record control number | 021027124 |
Source | Uk |
019 ## - | |
-- | 1375298579 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119892311 |
Qualifying information | (electronic book) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119892317 |
Qualifying information | (electronic book) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119892328 |
Qualifying information | (electronic book) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119892325 |
Qualifying information | (electronic book) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119892335 |
Qualifying information | (electronic book) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119892333 |
Qualifying information | (electronic book) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 1119892309 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781119892304 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1002/9781119892335 |
Source of number or code | doi |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | UKMGB |
System control number | 021027124 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000074347080 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1375438384 |
Canceled/invalid control number | (OCoLC)1375298579 |
037 ## - SOURCE OF ACQUISITION | |
Stock number | 9781119892311 |
Source of stock number/acquisition | Wiley, US |
037 ## - SOURCE OF ACQUISITION | |
Stock number | 9781119892304 |
Source of stock number/acquisition | O'Reilly Media |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | HV6773.15.C97 |
Item number | H835 2023eb |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 658.4/78 |
Edition number | 23 |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | MAIN |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Hubbard, Douglas W., |
Dates associated with a name | 1962- |
Relator term | author. |
Real World Object URI | https://id.oclc.org/worldcat/entity/E39PCjBkFm84JGy6X73hCJ4J8P |
245 10 - TITLE STATEMENT | |
Title | How to measure anything in cybersecurity risk / |
Statement of responsibility, etc. | Douglas W. Hubbard, Richard Seiersen. |
250 ## - EDITION STATEMENT | |
Edition statement | Second edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Hoboken, New Jersey : |
Name of producer, publisher, distributor, manufacturer | Wiley, |
Date of production, publication, distribution, manufacture, or copyright notice | [2023] |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Description based on online resource; title from digital title page (viewed on April 25, 2023). |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Cover -- Title Page -- Copyright Page -- Contents -- Foreword for the Second Edition -- Acknowledgments -- Preface -- How to Measure Anything in Cybersecurity Risk -- Introduction -- Why We Chose This Topic -- What Is This Book About? -- We Need More Than Technology -- Part I Why Cybersecurity Needs Better Measurements for Risk -- Chapter 1 The One Patch Most Needed in Cybersecurity -- Insurance: A Canary in the Coal Mine -- The Global Attack Surface -- The Cyber Threat Response -- A Proposal for Cybersecurity Risk Management -- Notes -- Chapter 2 A Measurement Primer for Cybersecurity |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | The Concept of Measurement -- A Taxonomy of Measurement Scales -- The Object of Measurement -- The Methods of Measurement -- Notes -- Chapter 3 The Rapid Risk Audit: Starting With a Simple Quantitative Risk Model -- The Setup and Terminology -- The Rapid Audit Steps -- Some Initial Sources of Data -- The Expert as the Instrument -- Supporting the Decision: Return on Controls -- Doing "Uncertainty Math" -- Visualizing Risk With a Loss Exceedance Curve -- Where to Go from Here -- Notes -- Chapter 4 The Single Most Important Measurement in Cybersecurity |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | The Analysis Placebo: Why We Can't Trust Opinion Alone -- How You Have More Data than You Think -- When Algorithms Beat Experts -- Tools for Improving the Human Component -- Summary and Next Steps -- Notes -- Chapter 5 Risk Matrices, Lie Factors, Misconceptions, and Other Obstacles to Measuring Risk -- Scanning the Landscape: A Survey of Cybersecurity Professionals -- What Color Is Your Risk? The Ubiquitous-and Risky-Risk Matrix -- Exsupero Ursus and Other Fallacies -- Communication and Consensus Objections -- Conclusion -- Notes -- Part II Evolving the Model of Cybersecurity Risk |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Chapter 6 Decompose It: Unpacking the Details -- Decomposing the Simple One-for-One Substitution Model -- More Decomposition Guidelines: Clear, Observable, Useful -- A Hard Decomposition: Reputation Damage -- Conclusion -- Notes -- Chapter 7 Calibrated Estimates: How Much Do You Know Now? -- Introduction to Subjective Probability -- Calibration Exercise -- More Hints for Controlling Overconfidence -- Conceptual Obstacles to Calibration -- The Effects of Calibration -- Beyond Initial Calibration Training: More Methods for Improving Subjective Judgment -- Notes |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Answers to Trivia Questions for Calibration Exercise -- Chapter 8 Reducing Uncertainty with Bayesian Methods -- A Brief Introduction to Bayes and Probability Theory -- An Example from Little Data: Does Multifactor Authentication Work? -- Other Ways Bayes Applies -- Notes -- Chapter 9 Some Powerful Methods Based on Bayes -- Computing Frequencies with (Very) Few Data Points: The Beta Distribution -- Decomposing Probabilities with Many Conditions -- Reducing Uncertainty Further and When to Do It -- More Advanced Modeling Considerations -- Wrapping Up Bayes -- Notes |
520 ## - SUMMARY, ETC. | |
Summary, etc. | A start-to-finish guide for realistically measuring cybersecurity risk In the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods delivers yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework. Advanced methods and detailed advice for a variety of use cases round out the book, which also includes: A new "Rapid Risk Audit" for a first quick quantitative risk assessment. New research on the real impact of reputation damage New Bayesian examples for assessing risk with little data New material on simple measurement and estimation, pseudo-random number generators, and advice on combining expert opinion Dispelling long-held beliefs and myths about information security, How to Measure Anything in Cybersecurity Risk is an essential roadmap for IT security managers, CFOs, risk and compliance professionals, and even statisticians looking for novel new ways to apply quantitative techniques to cybersecurity. |
590 ## - LOCAL NOTE (RLIN) | |
Local note | John Wiley and Sons |
Provenance (VM) [OBSOLETE] | Wiley Online Library: Complete oBooks |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cyberterrorism. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cyberspace |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Risk management. |
650 #2 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Risk Management |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cyberterrorisme. |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Gestion du risque. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | risk management. |
Source of heading or term | aat |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | BUSINESS & ECONOMICS |
General subdivision | Statistics. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS |
General subdivision | Security |
-- | General. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cyberspace |
General subdivision | Security measures |
Source of heading or term | fast |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cyberterrorism |
Source of heading or term | fast |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Risk management |
Source of heading or term | fast |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cyberterrorism. |
Source of heading or term | nli |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cyberspace |
General subdivision | Security measures. |
Source of heading or term | nli |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Risk management. |
Source of heading or term | nli |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Seiersen, Richard, |
Dates associated with a name | 1967- |
Relator term | author. |
Real World Object URI | https://id.oclc.org/worldcat/entity/E39PCjDpy4qdHvy79ycRTxD7Dy |
758 ## - RESOURCE IDENTIFIER | |
Relationship information | has work: |
Label | How to measure anything in cybersecurity risk (Text) |
Real World Object URI | https://id.oclc.org/worldcat/entity/E39PCGJ6B7Hf38yqMJKrdqkPXq |
Relationship | https://id.oclc.org/worldcat/ontology/hasWork |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
International Standard Book Number | 1119892309 |
-- | 9781119892304 |
Record control number | (OCoLC)1302738859 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119892335">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119892335</a> |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 304816556 |
938 ## - | |
-- | EBSCOhost |
-- | EBSC |
-- | 3590054 |
938 ## - | |
-- | ProQuest Ebook Central |
-- | EBLB |
-- | EBL7234983 |
994 ## - | |
-- | 92 |
-- | INLUM |
No items available.