Cyber-risk management:
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2015]
|
Schriftenreihe: | SpringerBriefs in computer science
|
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FKE01 FLA01 FRO01 UBG01 UBM01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online Ressource (XI, 145 Seiten, 32 illus) |
ISBN: | 9783319235707 |
ISSN: | 2191-5768 |
DOI: | 10.1007/978-3-319-23570-7 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043209133 | ||
003 | DE-604 | ||
005 | 20160714 | ||
007 | cr|uuu---uuuuu | ||
008 | 151215s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319235707 |c Online |9 978-3-319-23570-7 | ||
024 | 7 | |a 10.1007/978-3-319-23570-7 |2 doi | |
035 | |a (OCoLC)929991676 | ||
035 | |a (DE-599)BVBBV043209133 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-739 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Refsdal, Atle |e Verfasser |0 (DE-588)1096513579 |4 aut | |
245 | 1 | 0 | |a Cyber-risk management |c Atle Refsdal, Bjørnar Solhaug, Ketil Stølen |
264 | 1 | |a Cham |b Springer |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a 1 Online Ressource (XI, 145 Seiten, 32 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a SpringerBriefs in computer science |x 2191-5768 | |
650 | 4 | |a Computer science | |
650 | 4 | |a Management | |
650 | 4 | |a Industrial management | |
650 | 4 | |a Computer security | |
650 | 4 | |a Mathematical statistics | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Quality control | |
650 | 4 | |a Reliability | |
650 | 4 | |a Industrial safety | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Quality Control, Reliability, Safety and Risk | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Probability and Statistics in Computer Science | |
650 | 4 | |a Innovation/Technology Management | |
650 | 4 | |a Informatik | |
700 | 1 | |a Solhaug, Bjørnar |e Verfasser |4 aut | |
700 | 1 | |a Stølen, Ketil |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-23569-1 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-23570-7 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632294&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632294&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028632294 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-23570-7 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23570-7 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23570-7 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23570-7 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23570-7 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23570-7 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23570-7 |l FLA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23570-7 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23570-7 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23570-7 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23570-7 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23570-7 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23570-7 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23570-7 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-23570-7 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175707600846848 |
---|---|
adam_text | CYBER-RISK MANAGEMENT
/ REFSDAL, ATLE
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
1 INTRODUCTION
PART I CONCEPTUAL INTRODUCTION
2 RISK MANAGEMENT
3 CYBER-SYSTEMS
4 CYBERSECURITY
5 CYBER-RISK MANAGEMENT
PART II CYBER-RISK ASSESSMENT EXEMPLIFIED
6 CONTEXT ESTABLISHMENT
7 RISK IDENTIFICATION
8 RISK ANALYSIS
9 RISK EVALUATION
10 RISK TREATMENT
PART III KNOWN CHALLENGES AND HOW TO ADDRESS THEM IN PRACTICE
11 WHICH MEASURE OF RISK LEVEL TO USE?- 12 WHAT SCALES ARE BEST SUITED
UNDER WHAT CONDITIONS?- 13 HOW TO DEAL WITH UNCERTAINTY?- 14
HIGH-CONSEQUENCE RISK WITH LOW LIKELIHOOD
15 CONCLUSION
GLOSSARY
REFERENCES
INDEX
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
CYBER-RISK MANAGEMENT
/ REFSDAL, ATLE
: 2015
ABSTRACT / INHALTSTEXT
THIS BOOK PROVIDES A BRIEF AND GENERAL INTRODUCTION TO CYBERSECURITY AND
CYBER-RISK ASSESSMENT. NOT LIMITED TO A SPECIFIC APPROACH OR TECHNIQUE,
ITS FOCUS IS HIGHLY PRAGMATIC AND IS BASED ON ESTABLISHED INTERNATIONAL
STANDARDS (INCLUDING ISO 31000) AS WELL AS INDUSTRIAL BEST PRACTICES. IT
EXPLAINS HOW CYBER-RISK ASSESSMENT SHOULD BE CONDUCTED, WHICH TECHNIQUES
SHOULD BE USED WHEN, WHAT THE TYPICAL CHALLENGES AND PROBLEMS ARE, AND
HOW THEY SHOULD BE ADDRESSED. THE CONTENT IS DIVIDED INTO THREE PARTS.
FIRST, PART I PROVIDES A CONCEPTUAL INTRODUCTION TO THE TOPIC OF RISK
MANAGEMENT IN GENERAL AND TO CYBERSECURITY AND CYBER-RISK MANAGEMENT IN
PARTICULAR. NEXT, PART II PRESENTS THE MAIN STAGES OF CYBER-RISK
ASSESSMENT FROM CONTEXT ESTABLISHMENT TO RISK TREATMENT AND ACCEPTANCE,
EACH ILLUSTRATED BY A RUNNING EXAMPLE. FINALLY, PART III DETAILS FOUR
IMPORTANT CHALLENGES AND HOW TO REASONABLY DEAL WITH THEM IN PRACTICE:
RISK MEASUREMENT, RISK SCALES, UNCERTAINTY, AND LOW-FREQUENCY RISKS WITH
HIGH CONSEQUENCE. THE TARGET AUDIENCE IS MAINLY PRACTITIONERS AND
STUDENTS WHO ARE INTERESTED IN THE FUNDAMENTALS AND BASIC PRINCIPLES AND
TECHNIQUES OF SECURITY RISK ASSESSMENT, AS WELL AS LECTURERS SEEKING
TEACHING MATERIAL. THE BOOK PROVIDES AN OVERVIEW OF THE CYBER-RISK
ASSESSMENT PROCESS, THE TASKS INVOLVED, AND HOW TO COMPLETE THEM IN
PRACTICE
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Refsdal, Atle Solhaug, Bjørnar Stølen, Ketil |
author_GND | (DE-588)1096513579 |
author_facet | Refsdal, Atle Solhaug, Bjørnar Stølen, Ketil |
author_role | aut aut aut |
author_sort | Refsdal, Atle |
author_variant | a r ar b s bs k s ks |
building | Verbundindex |
bvnumber | BV043209133 |
classification_rvk | ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)929991676 (DE-599)BVBBV043209133 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-23570-7 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03957nmm a2200781zc 4500</leader><controlfield tag="001">BV043209133</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160714 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151215s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319235707</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-23570-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-23570-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)929991676</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043209133</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Refsdal, Atle</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1096513579</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber-risk management</subfield><subfield code="c">Atle Refsdal, Bjørnar Solhaug, Ketil Stølen</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online Ressource (XI, 145 Seiten, 32 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SpringerBriefs in computer science</subfield><subfield code="x">2191-5768</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industrial management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematical statistics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Quality control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Reliability</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Industrial safety</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Quality Control, Reliability, Safety and Risk</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Probability and Statistics in Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Innovation/Technology Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Solhaug, Bjørnar</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Stølen, Ketil</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-23569-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-23570-7</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632294&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632294&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028632294</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23570-7</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23570-7</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23570-7</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23570-7</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23570-7</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23570-7</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23570-7</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23570-7</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23570-7</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23570-7</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23570-7</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23570-7</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23570-7</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23570-7</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-23570-7</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043209133 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:20:34Z |
institution | BVB |
isbn | 9783319235707 |
issn | 2191-5768 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028632294 |
oclc_num | 929991676 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
physical | 1 Online Ressource (XI, 145 Seiten, 32 illus) |
psigel | ZDB-2-SCS ZDB-2-SCS_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer |
record_format | marc |
series2 | SpringerBriefs in computer science |
spelling | Refsdal, Atle Verfasser (DE-588)1096513579 aut Cyber-risk management Atle Refsdal, Bjørnar Solhaug, Ketil Stølen Cham Springer [2015] © 2015 1 Online Ressource (XI, 145 Seiten, 32 illus) txt rdacontent c rdamedia cr rdacarrier SpringerBriefs in computer science 2191-5768 Computer science Management Industrial management Computer security Mathematical statistics Management information systems Quality control Reliability Industrial safety Computer Science Systems and Data Security Quality Control, Reliability, Safety and Risk Management of Computing and Information Systems Probability and Statistics in Computer Science Innovation/Technology Management Informatik Solhaug, Bjørnar Verfasser aut Stølen, Ketil Verfasser aut Erscheint auch als Druckausgabe 978-3-319-23569-1 https://doi.org/10.1007/978-3-319-23570-7 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632294&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632294&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Refsdal, Atle Solhaug, Bjørnar Stølen, Ketil Cyber-risk management Computer science Management Industrial management Computer security Mathematical statistics Management information systems Quality control Reliability Industrial safety Computer Science Systems and Data Security Quality Control, Reliability, Safety and Risk Management of Computing and Information Systems Probability and Statistics in Computer Science Innovation/Technology Management Informatik |
title | Cyber-risk management |
title_auth | Cyber-risk management |
title_exact_search | Cyber-risk management |
title_full | Cyber-risk management Atle Refsdal, Bjørnar Solhaug, Ketil Stølen |
title_fullStr | Cyber-risk management Atle Refsdal, Bjørnar Solhaug, Ketil Stølen |
title_full_unstemmed | Cyber-risk management Atle Refsdal, Bjørnar Solhaug, Ketil Stølen |
title_short | Cyber-risk management |
title_sort | cyber risk management |
topic | Computer science Management Industrial management Computer security Mathematical statistics Management information systems Quality control Reliability Industrial safety Computer Science Systems and Data Security Quality Control, Reliability, Safety and Risk Management of Computing and Information Systems Probability and Statistics in Computer Science Innovation/Technology Management Informatik |
topic_facet | Computer science Management Industrial management Computer security Mathematical statistics Management information systems Quality control Reliability Industrial safety Computer Science Systems and Data Security Quality Control, Reliability, Safety and Risk Management of Computing and Information Systems Probability and Statistics in Computer Science Innovation/Technology Management Informatik |
url | https://doi.org/10.1007/978-3-319-23570-7 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632294&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028632294&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT refsdalatle cyberriskmanagement AT solhaugbjørnar cyberriskmanagement AT stølenketil cyberriskmanagement |