Optimal spending on cybersecurity measures : (Record no. 5030)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03700cam a2200553 i 4500 |
001 - CONTROL NUMBER | |
control field | 9781003200895 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | FlBoTFG |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240213122826.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr ||||||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 210423t20222022enka ob 001 0 eng |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | OCoLC-P |
Language of cataloging | eng |
Description conventions | rda |
Transcribing agency | OCoLC-P |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781003200895 |
Qualifying information | electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1003200893 |
Qualifying information | electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781000440768 |
Qualifying information | electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1000440761 |
Qualifying information | electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781000440706 |
Qualifying information | electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1000440702 |
Qualifying information | electronic book |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781032061405 |
Qualifying information | hardcover |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1248601757 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC-P)1248601757 |
050 04 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | HF5548.37 |
Item number | .K57 2022 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | BUS |
Subject category code subdivision | 083000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | BUS |
Subject category code subdivision | 033070 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | BUS |
Subject category code subdivision | 041000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | KJC |
Source | bicssc |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 658.4/78 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Kissoon, Tara, |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Optimal spending on cybersecurity measures : |
Remainder of title | risk management / |
Statement of responsibility, etc. | Tara Kissoon. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Abingdon, Oxon ; |
-- | New York, NY : |
Name of producer, publisher, distributor, manufacturer | Routledge, |
Date of production, publication, distribution, manufacture, or copyright notice | 2022. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Date of production, publication, distribution, manufacture, or copyright notice | ©2022 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (vii, 156 pages) : |
Other physical details | illustrations. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
490 1# - SERIES STATEMENT | |
Series statement | Routledge focus on business and management |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Introduction -- Enterprise Risk Management Framework -- Alignment with the Enterprise Risk Management Framework -- Risk Management Practice -- Vulnerability Management -- Risk Management Practice -- System Development Lifecycle -- Risk Management Practice -- Business Continuity Management -- Cybersecurity Risk Management Framework -- Case Studies. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | "This book explores the strategic decisions made by organizations when implementing cybersecurity controls, leveraging economic models and theories from the economics of information security and risk management frameworks. Based on unique and distinct research completed within the field of risk management and information security, this book provides insight into organizational risk management processes utilized in determining cybersecurity investments. It looks at how theoretical models and frameworks rely on either specific scenarios or controlled conditions, and how decisions on cybersecurity spending within organizations, specifically the funding available in comparison to the recommended security measures necessary for compliance, vary depending on stakeholders. As the trade-off between the costs of implementing a security measure and the benefit derived from the implementation of the security control is not easily measured, a business leader's decision to fund security measures may be biased. The author presents an innovative approach to assess cyber security initiatives with a risk management perspective and leverages a data-centric focus on the evolution of cyber-attacks. This book is ideal for business school students and technology professionals with an interest in risk management"-- |
Assigning source | Provided by publisher. |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | OCLC-licensed vendor bibliographic record. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Risk management. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | BUSINESS & ECONOMICS / Information Management |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | BUSINESS & ECONOMICS / Insurance / Risk Assessment & Management |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | BUSINESS & ECONOMICS / Management |
Source of heading or term | bisacsh |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | Taylor & Francis |
Uniform Resource Identifier | <a href="https://www.taylorfrancis.com/books/9781003200895">https://www.taylorfrancis.com/books/9781003200895</a> |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | OCLC metadata license agreement |
Uniform Resource Identifier | <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a> |
No items available.