Security metrics : (Record no. 7256)
[ view plain ]
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
|---|---|
| fixed length control field | 120710s2012 nyua 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2011043857 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9780071744003 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 0071744002 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (Sirsi) u8353 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | EG-CaNU |
| Transcribing agency | EG-CaNU |
| Modifying agency | EG-CaNU |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Edition number | 23 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Wong, Caroline. |
| 9 (RLIN) | 15400 |
| 245 10 - TITLE STATEMENT | |
| Title | Security metrics : |
| Remainder of title | a beginner’s guide / |
| Statement of responsibility, etc. | Caroline Wong. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | New York : |
| Name of publisher, distributor, etc. | McGraw-Hill, |
| Date of publication, distribution, etc. | c2012. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xxxii, 397 p. : |
| Other physical details | ill. ; |
| Dimensions | 24 cm. |
| 500 ## - GENERAL NOTE | |
| General note | Includes index. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc. note | Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Part I: Why Security Metrics -- Chapter 1 Why Measure Security' -- Chapter 2 Why Now Security Metrics Are Needed Now -- Part II: Essential Components of an Effective Security Metrics Practitioner -- Chapter 3 Analytics -- Chapter 4 Commitment to Project Management -- Part III: Decide What to Measure -- Chapter 5 Identify Core Competencies, Information Security Work, and Resourcing Options -- Chapter 6 Identify Targets -- Part IV: Get Started -- Chapter 7 Defining Project Objectives -- Chapter 8 Define Your Priorities -- Chapter 9 Identify Key Messages and Key Audiences -- Chapter 10 Obtain Buy-In from Stakeholders -- Part V: Toolkit -- Chapter 11 Automation -- Chapter 12 Analysis Technology and a Case Study -- Part VI: Creating the Best Environment for Healthy Metrics -- Chapter 13 Define a Communications Strategy -- Chapter 14 Create and Drive an Action Plan: The Importance of Project Management -- Part VII: Secret Sauce: Lessons Learned from an Enterprise Practitioner -- Chapter 15 Improving Data Quality and Presentation -- Chapter 16 Resourcing Security Metrics Projects -- Part VIII: Looking Forward -- Chapter 17 Security Metrics for Cloud Computing. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | This practical resource covers project management, communication, analytics tools, identifying targets, defining objectives, obtaining stakeholder buy-in, metrics automation, data quality, and resourcing. You'll also get details on cloud-based security metrics and process improvement. Templates, checklists, and examples give you the hands-on help you need to get started right away. |
| 596 ## - | |
| -- | 1 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Data protection |
| General subdivision | Standards. |
| 9 (RLIN) | 15401 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Microcomputers |
| General subdivision | Access control. |
| 9 (RLIN) | 454 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer security |
| General subdivision | Evaluation. |
| 9 (RLIN) | 15402 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer crimes |
| General subdivision | Prevention. |
| 9 (RLIN) | 15403 |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | PURCHASE | 005.8 / WO.S 2012 | 011872 | 11/24/2019 | 1 | 11/24/2019 | Books |