|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn654822818 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
100811s2010 nyu ob 001 0 eng d |
010 |
|
|
|a 2010020201
|
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d YDXCP
|d UMI
|d CEF
|d OCLCQ
|d B24X7
|d DEBSZ
|d OCLCQ
|d OCLCO
|d E7B
|d CDX
|d OCLCQ
|d OCLCO
|d MYSZA
|d OCLCQ
|d PIFAG
|d OCLCQ
|d OCLCA
|d WY@
|d OCLCA
|d LUE
|d OCLCF
|d D6H
|d LIV
|d TOH
|d VT2
|d UHL
|d OCLCQ
|d EBLCP
|d UKAHL
|d HS0
|d DST
|d OCLCO
|d OCLCQ
|d PSYSI
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB077785
|2 bnb
|
016 |
7 |
|
|a 015588545
|2 Uk
|
019 |
|
|
|a 679602784
|a 680617264
|a 712992490
|a 1103255695
|a 1113618358
|a 1153000798
|a 1192331353
|a 1227641214
|a 1240520960
|a 1300649933
|a 1303298697
|
020 |
|
|
|a 9780071713412
|q (electronic bk.)
|
020 |
|
|
|a 0071713417
|q (electronic bk.)
|
020 |
|
|
|z 9780071713405
|q (alk. paper)
|
020 |
|
|
|z 0071713409
|q (alk. paper)
|
020 |
|
|
|a 1282702599
|
020 |
|
|
|a 9781282702592
|
020 |
|
|
|a 9786612702594
|
020 |
|
|
|a 6612702591
|
029 |
1 |
|
|a AU@
|b 000046688218
|
029 |
1 |
|
|a AU@
|b 000053265807
|
029 |
1 |
|
|a AU@
|b 000062340110
|
029 |
1 |
|
|a AU@
|b 000066231891
|
029 |
1 |
|
|a DEBSZ
|b 355394243
|
029 |
1 |
|
|a HEBIS
|b 29146758X
|
029 |
1 |
|
|a NZ1
|b 13490559
|
029 |
1 |
|
|a NZ1
|b 13933864
|
035 |
|
|
|a (OCoLC)654822818
|z (OCoLC)679602784
|z (OCoLC)680617264
|z (OCoLC)712992490
|z (OCoLC)1103255695
|z (OCoLC)1113618358
|z (OCoLC)1153000798
|z (OCoLC)1192331353
|z (OCoLC)1227641214
|z (OCoLC)1240520960
|z (OCoLC)1300649933
|z (OCoLC)1303298697
|
037 |
|
|
|a CL0500000077
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b H392 2010eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Hayden, Lance.
|
245 |
1 |
0 |
|a IT security metrics :
|b a practical framework for measuring security & protecting data /
|c Lance Hayden.
|
260 |
|
|
|a New York :
|b McGraw Hill,
|c ©2010.
|
300 |
|
|
|a 1 online resource (xxvii, 368 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a 1. What is a security metric? -- 2. Designing effective security metrics -- 3. Understanding data -- 4. The security process management framework -- 5. Analyzing security metrics data -- 6. Designing the security measurement project -- 7. Measuring security operations -- 8. Measuring compliance and conformance -- 9. Measuring security cost and value -- 10. Measuring people, organizations, and culture -- 11. The security improvement program -- 12. Learning security : different context for security process management.
|
520 |
|
|
|a Providing a comprehensive approach to measuring risks; threats; operational activities; and the effectiveness of data protection in your organization; this book explains how to choose and design effective measurement strategies and addresses the data requirements of those strategies. --
|c Edited summary from book.
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Information technology
|x Security measures
|x Evaluation.
|
650 |
|
0 |
|a Data protection
|x Evaluation.
|
650 |
|
0 |
|a Computer security
|x Evaluation.
|
650 |
|
0 |
|a Computer crimes
|x Prevention
|x Measurement.
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures
|x Évaluation.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|x Évaluation.
|
650 |
|
6 |
|a Sécurité informatique
|x Évaluation.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Information technology
|x Security measures
|x Evaluation.
|2 blmlsh
|
650 |
|
7 |
|a Data protection
|x Evaluation.
|2 blmlsh
|
650 |
|
7 |
|a Computer security
|x Evaluation.
|2 blmlsh
|
650 |
|
7 |
|a Computer crimes
|x Prevention
|x Measurement.
|2 blmlsh
|
650 |
|
7 |
|a Computer security
|x Evaluation
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Hayden, Lance.
|t IT security metrics.
|d New York : McGraw Hill, ©2010
|z 9780071713405
|w (DLC) 2010020201
|w (OCoLC)606789513
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780071713405/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26368022
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6255741
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00040089
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 14500874
|c 49.99 USD
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10404904
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 329976
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3401762
|
994 |
|
|
|a 92
|b IZTAP
|