How to measure anything in cybersecurity risk:
"This book will critique some of cybersecurity's premier, seemingly quantitative, risk management approaches"...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ
Wiley
[2016]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "This book will critique some of cybersecurity's premier, seemingly quantitative, risk management approaches"... |
Beschreibung: | Includes index |
Beschreibung: | xv, 280 Seiten Diagramme 24 cm |
ISBN: | 9781119085294 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044652941 | ||
003 | DE-604 | ||
005 | 20211119 | ||
007 | t | ||
008 | 171127s2016 xxu|||| |||| 00||| eng d | ||
010 | |a 016025853 | ||
020 | |a 9781119085294 |c Hb. |9 978-1-119-08529-4 | ||
035 | |a (OCoLC)1015873471 | ||
035 | |a (DE-599)BVBBV044652941 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-M487 |a DE-706 | ||
050 | 0 | |a HV6773.15.C97 | |
082 | 0 | |a 658.4/78 |2 23 | |
100 | 1 | |a Hubbard, Douglas W. |d 1962- |0 (DE-588)173955398 |4 aut | |
245 | 1 | 0 | |a How to measure anything in cybersecurity risk |c Douglas W. Hubbard, Richard Seiersen |
264 | 1 | |a Hoboken, NJ |b Wiley |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a xv, 280 Seiten |b Diagramme |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a "This book will critique some of cybersecurity's premier, seemingly quantitative, risk management approaches"... | ||
650 | 4 | |a BUSINESS & ECONOMICS / Statistics / bisacsh | |
650 | 4 | |a COMPUTERS / Security / General / bisacsh | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Cyberspace |x Security measures | |
650 | 4 | |a Risk management | |
650 | 4 | |a BUSINESS & ECONOMICS / Statistics | |
650 | 4 | |a COMPUTERS / Security / General | |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Risikomanagement |0 (DE-588)4121590-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Quantitative Methode |0 (DE-588)4232139-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberspace |0 (DE-588)4266146-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Cyberspace |0 (DE-588)4266146-8 |D s |
689 | 0 | 1 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | 2 | |a Risikomanagement |0 (DE-588)4121590-4 |D s |
689 | 0 | 3 | |a Quantitative Methode |0 (DE-588)4232139-6 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Seiersen, Richard |d 1967- |0 (DE-588)1246094789 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, PDF |z 9781119224600 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, EPUB |z 9781119224617 |
856 | 4 | 2 | |m LoC Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030050619&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-030050619 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804178082999828480 |
---|---|
adam_text | HOW TO MEASURE ANYTHING IN CYBERSECURITY RISK
/ HUBBARD, DOUGLAS W.YYD1962-YYEAUTHOR
: 2016
TABLE OF CONTENTS / INHALTSVERZEICHNIS
FOREWORD DANIEL E. GEER, JR. IX FOREWORD STUART MCCLURE XI
ACKNOWLEDGMENTS XIII ABOUT THE AUTHORS XV INTRODUCTION 1 PART I WHY
CYBERSECURITY NEEDS BETTER MEASUREMENTS FOR RISK 5 CHAPTER 1 THE ONE
PATCH MOST NEEDED IN CYBERSECURITY 7 CHAPTER 2 A MEASUREMENT PRIMER FOR
CYBERSECURITY 19 CHAPTER 3 MODEL NOW!: AN INTRODUCTION TO PRACTICAL
QUANTITATIVE METHODS FOR CYBERSECURITY 35 CHAPTER 4 THE SINGLE MOST
IMPORTANT MEASUREMENT IN CYBERSECURITY 55 CHAPTER 5 RISK MATRICES, LIE
FACTORS, MISCONCEPTIONS, AND OTHER OBSTACLES TO MEASURING RISK 81 PART
II EVOLVING THE MODEL OF CYBERSECURITY RISK 111 CHAPTER 6 DECOMPOSE IT:
UNPACKING THE DETAILS 113 CHAPTER 7 CALIBRATED ESTIMATES: HOW MUCH DO
YOU KNOW NOW ? 133 CHAPTER 8 REDUCING UNCERTAINTY WITH BAYESIAN METHODS
157 CHAPTER 9 SOME POWERFUL METHODS BASED ON BAYES 169 PART III
CYBERSECURITY RISK MANAGEMENT FOR THE ENTERPRISE 197 CHAPTER 10 TOWARD
SECURITY METRICS MATURITY 199 CHAPTER 11 HOW WELL ARE MY SECURITY
INVESTMENTS WORKING TOGETHER? 213 CHAPTER 12 A CALL TO ACTION: HOW TO
ROLL OUT CYBERSECURITY RISK MANAGEMENT 229 APPENDIX A SELECT
DISTRIBUTIONS 239 APPENDIX B GUEST CONTRIBUTORS 247 INDEX 269
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Hubbard, Douglas W. 1962- Seiersen, Richard 1967- |
author_GND | (DE-588)173955398 (DE-588)1246094789 |
author_facet | Hubbard, Douglas W. 1962- Seiersen, Richard 1967- |
author_role | aut aut |
author_sort | Hubbard, Douglas W. 1962- |
author_variant | d w h dw dwh r s rs |
building | Verbundindex |
bvnumber | BV044652941 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773.15.C97 |
callnumber-search | HV6773.15.C97 |
callnumber-sort | HV 46773.15 C97 |
callnumber-subject | HV - Social Pathology, Criminology |
ctrlnum | (OCoLC)1015873471 (DE-599)BVBBV044652941 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02442nam a2200589 c 4500</leader><controlfield tag="001">BV044652941</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211119 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">171127s2016 xxu|||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">016025853</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119085294</subfield><subfield code="c">Hb.</subfield><subfield code="9">978-1-119-08529-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1015873471</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044652941</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M487</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773.15.C97</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hubbard, Douglas W.</subfield><subfield code="d">1962-</subfield><subfield code="0">(DE-588)173955398</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">How to measure anything in cybersecurity risk</subfield><subfield code="c">Douglas W. Hubbard, Richard Seiersen</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">Wiley</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xv, 280 Seiten</subfield><subfield code="b">Diagramme</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book will critique some of cybersecurity's premier, seemingly quantitative, risk management approaches"...</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS & ECONOMICS / Statistics / bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / General / bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS & ECONOMICS / Statistics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / General</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Quantitative Methode</subfield><subfield code="0">(DE-588)4232139-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="0">(DE-588)4266146-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Quantitative Methode</subfield><subfield code="0">(DE-588)4232139-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Seiersen, Richard</subfield><subfield code="d">1967-</subfield><subfield code="0">(DE-588)1246094789</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, PDF</subfield><subfield code="z">9781119224600</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, EPUB</subfield><subfield code="z">9781119224617</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">LoC Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030050619&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030050619</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV044652941 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:58:19Z |
institution | BVB |
isbn | 9781119085294 |
language | English |
lccn | 016025853 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030050619 |
oclc_num | 1015873471 |
open_access_boolean | |
owner | DE-M487 DE-706 |
owner_facet | DE-M487 DE-706 |
physical | xv, 280 Seiten Diagramme 24 cm |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Wiley |
record_format | marc |
spelling | Hubbard, Douglas W. 1962- (DE-588)173955398 aut How to measure anything in cybersecurity risk Douglas W. Hubbard, Richard Seiersen Hoboken, NJ Wiley [2016] © 2016 xv, 280 Seiten Diagramme 24 cm txt rdacontent n rdamedia nc rdacarrier Includes index "This book will critique some of cybersecurity's premier, seemingly quantitative, risk management approaches"... BUSINESS & ECONOMICS / Statistics / bisacsh COMPUTERS / Security / General / bisacsh Cyberterrorism Cyberspace Security measures Risk management BUSINESS & ECONOMICS / Statistics COMPUTERS / Security / General Sicherheit (DE-588)4054790-5 gnd rswk-swf Risikomanagement (DE-588)4121590-4 gnd rswk-swf Quantitative Methode (DE-588)4232139-6 gnd rswk-swf Cyberspace (DE-588)4266146-8 gnd rswk-swf Cyberspace (DE-588)4266146-8 s Sicherheit (DE-588)4054790-5 s Risikomanagement (DE-588)4121590-4 s Quantitative Methode (DE-588)4232139-6 s 1\p DE-604 Seiersen, Richard 1967- (DE-588)1246094789 aut Erscheint auch als Online-Ausgabe, PDF 9781119224600 Erscheint auch als Online-Ausgabe, EPUB 9781119224617 LoC Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030050619&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Hubbard, Douglas W. 1962- Seiersen, Richard 1967- How to measure anything in cybersecurity risk BUSINESS & ECONOMICS / Statistics / bisacsh COMPUTERS / Security / General / bisacsh Cyberterrorism Cyberspace Security measures Risk management BUSINESS & ECONOMICS / Statistics COMPUTERS / Security / General Sicherheit (DE-588)4054790-5 gnd Risikomanagement (DE-588)4121590-4 gnd Quantitative Methode (DE-588)4232139-6 gnd Cyberspace (DE-588)4266146-8 gnd |
subject_GND | (DE-588)4054790-5 (DE-588)4121590-4 (DE-588)4232139-6 (DE-588)4266146-8 |
title | How to measure anything in cybersecurity risk |
title_auth | How to measure anything in cybersecurity risk |
title_exact_search | How to measure anything in cybersecurity risk |
title_full | How to measure anything in cybersecurity risk Douglas W. Hubbard, Richard Seiersen |
title_fullStr | How to measure anything in cybersecurity risk Douglas W. Hubbard, Richard Seiersen |
title_full_unstemmed | How to measure anything in cybersecurity risk Douglas W. Hubbard, Richard Seiersen |
title_short | How to measure anything in cybersecurity risk |
title_sort | how to measure anything in cybersecurity risk |
topic | BUSINESS & ECONOMICS / Statistics / bisacsh COMPUTERS / Security / General / bisacsh Cyberterrorism Cyberspace Security measures Risk management BUSINESS & ECONOMICS / Statistics COMPUTERS / Security / General Sicherheit (DE-588)4054790-5 gnd Risikomanagement (DE-588)4121590-4 gnd Quantitative Methode (DE-588)4232139-6 gnd Cyberspace (DE-588)4266146-8 gnd |
topic_facet | BUSINESS & ECONOMICS / Statistics / bisacsh COMPUTERS / Security / General / bisacsh Cyberterrorism Cyberspace Security measures Risk management BUSINESS & ECONOMICS / Statistics COMPUTERS / Security / General Sicherheit Risikomanagement Quantitative Methode Cyberspace |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030050619&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT hubbarddouglasw howtomeasureanythingincybersecurityrisk AT seiersenrichard howtomeasureanythingincybersecurityrisk |