| 000 | 04653cam a2200649Ii 4500 | ||
|---|---|---|---|
| 005 | 20250919132326.0 | ||
| 006 | m o d | ||
| 007 | cr cnu---unuuu | ||
| 008 | 190918s2016 nju o 001 0 eng d | ||
| 020 |
_a9781119224600 _q(electronic bk.) |
||
| 020 |
_a1119224608 _q(electronic bk.) |
||
| 020 |
_a9781119224617 _q(electronic bk.) |
||
| 020 |
_a1119224616 _q(electronic bk.) |
||
| 020 |
_a9781119162315 _q(electronic bk.) |
||
| 020 |
_a1119162319 _q(electronic bk.) |
||
| 020 | _z9781119085294 | ||
| 020 | _z1119085292 | ||
| 029 | 1 |
_aDEBBG _bBV043894833 |
|
| 035 |
_a(OCoLC)953458699 _z(OCoLC)957617228 _z(OCoLC)957736940 _z(OCoLC)959330081 _z(OCoLC)959590759 |
||
| 035 | _a(OCoLC)ocn953458699 | ||
| 037 |
_aB5CB30D5-FEBC-477E-9C2E-0C5EBA890E05 _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
| 039 | 9 |
_a201911051508 _bmurni _y09-18-2019 _zhafiz _wUKM UBCM Wiley MARC (363 titles).mrc _x121 |
|
| 040 |
_aNST _beng _erda _epn _cNST _dYDXCP _dEBLCP _dTEFOD _dNST _dDG1 _dYDX _dRECBK _dDG1 _dIDEBK |
||
| 049 | _aMAIN | ||
| 050 | 4 |
_aHV6773.15.C97 _bH835 2016 |
|
| 072 | 7 |
_aBUS _x061000 _2bisacsh |
|
| 072 | 7 |
_aCOM _x053000 _2bisacsh |
|
| 082 | 0 | 4 |
_a658.4/78 _223 |
| 100 | 1 |
_aHubbard, Douglas W., _d1962- _eauthor. |
|
| 245 | 1 | 0 |
_aHow to measure anything in cybersecurity risk / _cDouglas W. Hubbard, Richard Seiersen. |
| 264 | 1 |
_aHoboken, New Jersey : _bWiley, _c[2016] |
|
| 300 | _a1 online resource (304 pages) | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 500 | _aIncludes index. | ||
| 520 |
_aA ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current'risk management' practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security.€ Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely. Discover the shortcomings of cybersecurity's'best practices' Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques'-- _cProvided by publisher. |
||
| 520 |
_a'This book will critique some of cybersecurity's premier, seemingly quantitative, risk management approaches'-- _cProvided by publisher. |
||
| 588 | 0 | _aPrint version record. | |
| 650 | 7 |
_aBUSINESS & ECONOMICS / Statistics. _2bisacsh |
|
| 650 | 7 |
_aCOMPUTERS / Security / General. _2bisacsh |
|
| 650 | 0 | _aCyberterrorism. | |
| 650 | 0 |
_aCyberspace _xSecurity measures. |
|
| 650 | 0 | _aRisk management. | |
| 655 | 4 | _aElectronic books. | |
| 655 | 7 |
_aElectronic books. _2local |
|
| 700 | 1 |
_aSeiersen, Richard, _d1967- _eauthor. |
|
| 773 | 0 | _tWiley e-books | |
| 776 | 0 | 8 |
_iPrint version: _aHubbard, Douglas W., 1962- _tHow to measure anything in cybersecurity risk. _dHoboken : Wiley, 2016 _z9781119085294 _w(DLC) 2016025853 _w(OCoLC)920454627 |
| 856 | 4 | 0 |
_uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=https://doi.org/10.1002/9781119162315 _zWiley Online Library |
| 907 |
_a.b16756162 _b2022-10-05 _c2019-11-12 |
||
| 942 | _n0 | ||
| 914 | _avtls003651273 | ||
| 998 |
_ae _b2019-05-09 _cm _dz _feng _gnju _y0 _z.b16756162 |
||
| 999 |
_c643503 _d643503 |
||