MARC details
000 -LEADER |
fixed length control field |
01663cam a2200325 a 4500 |
FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
150702s2016 flua b 001 0 eng |
LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2015025606 |
INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781482244199 |
CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Modifying agency |
DLC |
AUTHENTICATION CODE |
Authentication code |
pcc |
LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HV8290 |
Item number |
.N67 2016 |
DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
658.4/7 |
Edition information |
23 |
SYSTEM CONTROL NUMBER |
System control number |
(IMchF)fol15770010 |
DATE AND TIME OF LATEST TRANSACTION |
control field |
20170126101138.0 |
CONTROL NUMBER |
control field |
64356 |
CONTROL NUMBER IDENTIFIER |
control field |
UOWD |
MAIN ENTRY--PERSONAL NAME |
Personal name |
Norman, Thomas L. |
TITLE STATEMENT |
Title |
Risk analysis and security countermeasure selection |
Statement of responsibility, etc. |
Thomas L. Norman |
EDITION STATEMENT |
Edition statement |
2nd ed. |
PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Boca Raton, FL : |
Name of publisher, distributor, etc. |
CRC Press, |
Date of publication, distribution, etc. |
c2016. |
PHYSICAL DESCRIPTION |
Extent |
xxxiii, 449 p. : |
Other physical details |
ill. ; |
Dimensions |
26 cm. |
BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
SUMMARY, ETC. |
Summary, etc. |
For companies and other entities concerned about security, Norman offers advice on risk analysis, policy development before countermeasures, and countermeasure selection and budgeting. Among his topics are risk analysis basics and risk analysis methods approved by the US Department of Homeland Security, critical thinking and the risk analysis process, characterizing and identifying assets, criticality and consequence analysis, estimating probability, prioritizing risk, security policy and countermeasure goals, developing effective security policies, countermeasure selection and budgeting tools, cost-effectiveness metrics, and writing effective reports. Annotation ©2015 Ringgold, Inc., Portland, OR (protoview.com) |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Security systems |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Business enterprises |
General subdivision |
Security measures |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Office buildings |
General subdivision |
Security measures |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Risk assessment |
ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
REGULAR |