<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>01671cam a22002775a 4500</leader>
  <controlfield tag="001">16772385</controlfield>
  <controlfield tag="005">20201128021352.0</controlfield>
  <controlfield tag="008">110510t2011    maua   frb    001 0 eng d</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">9781597496155 (pbk.)</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="a">DLC</subfield>
    <subfield code="c">DLC</subfield>
    <subfield code="d">DLC</subfield>
    <subfield code="d">EG-ScBUE</subfield>
    <subfield code="b">eng</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2="4">
    <subfield code="a">005.8</subfield>
    <subfield code="2">22</subfield>
    <subfield code="b">WHE</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
    <subfield code="a">Wheeler, Evan.</subfield>
    <subfield code="9">38601</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
    <subfield code="a">Security risk management :</subfield>
    <subfield code="b">building an information security risk management program from the ground up /</subfield>
    <subfield code="c">Evan Wheeler ; technical editor Kenneth Swick.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Waltham :</subfield>
    <subfield code="b">Elsevier,</subfield>
    <subfield code="c">c.2011.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">xx, 340 p. :</subfield>
    <subfield code="b">ill. ;</subfield>
    <subfield code="c">24 cm.</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
    <subfield code="a">Index : p. 331-340.</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
    <subfield code="a">Includes bibliographical references.</subfield>
  </datafield>
  <datafield tag="505" ind1="8" ind2=" ">
    <subfield code="a">Machine generated contents note: Part I - Introduction to Risk Management : The Security Evolution -- Risky Business -- The Risk Management Lifecycle -- Risk Profiling Part II - Risk Assessment and Analysis Techniques --  Formulating a Risk -- Risk Exposure Factors -- Security Controls &amp; Services -- Risk Evaluation &amp; Mitigation Strategies -- Reports &amp; Consulting Chapter 10: Risk Assessment Techniques Part III - Building and Running a Risk Management Program -- hreat &amp; Vulnerability Management -- Security Risk Reviews -- A Blueprint for Security -- Building a Program from Scratch Appendix A: Security Risk Profile Appendix B: Risk Models and Scales Appendix C: Architectural Risk Analysis Reference Tables.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="7">
    <subfield code="a">Computer networks</subfield>
    <subfield code="x">Security measures.</subfield>
    <subfield code="2">BUEsh</subfield>
    <subfield code="9">2634</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Risk assessment.</subfield>
    <subfield code="2">BUEsh</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="7">
    <subfield code="a">Risk management.</subfield>
    <subfield code="2">BUEsh</subfield>
    <subfield code="9">12222</subfield>
  </datafield>
  <datafield tag="651" ind1=" " ind2=" ">
    <subfield code="2">BUEsh</subfield>
  </datafield>
  <datafield tag="653" ind1=" " ind2=" ">
    <subfield code="b">COMSCI</subfield>
    <subfield code="c">June2015</subfield>
    <subfield code="c">October2015</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
    <subfield code="a">Swick, Kenneth,</subfield>
    <subfield code="e">editor.</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="2">ddc</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">19992</subfield>
    <subfield code="d">19964</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="2">ddc</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="8">Alahram</subfield>
    <subfield code="a">MAIN</subfield>
    <subfield code="b">MAIN</subfield>
    <subfield code="c">LOW</subfield>
    <subfield code="d">2015-06-28</subfield>
    <subfield code="e">purchase</subfield>
    <subfield code="g">345.00</subfield>
    <subfield code="h">330</subfield>
    <subfield code="l">0</subfield>
    <subfield code="o">005.8 WHE</subfield>
    <subfield code="p">000039201</subfield>
    <subfield code="r">2025-07-15 00:00:00</subfield>
    <subfield code="v">431.25</subfield>
    <subfield code="y">BB</subfield>
  </datafield>
</record>
