CIO's Guide to Security Incident Management / (Record no. 48893)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01857cmm a2200277 a 4500 |
001 - CONTROL NUMBER | |
control field | 46883 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | IN-BdCUP |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20230426175603.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 230426s2023 u eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781315117515 |
040 ## - CATALOGING SOURCE | |
Language of cataloging | eng |
Transcribing agency | IN-BdCUP |
041 ## - LANGUAGE CODE | |
Language code of text/sound track or separate title | eng |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.800 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Pemble, Matthew W.A. |
245 #0 - TITLE STATEMENT | |
Title | CIO's Guide to Security Incident Management / |
Statement of responsibility, etc. | Matthew W.A. Pemble, Wendy F. Goucher |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (273 pages) |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Cover; Frontispiece; Half Title; Title Page; Copyright Page; Dedication; Contents; Introduction; Authors; Chapter 1: Oh, No. It's All Gone Horribly Wrong!; Introduction; Is It an "Information Security Incident"?; The Meeting; Basic Meeting Management; First Steps; Impacts; Aims; Authority; Capabilities; Constraints; Second Steps -- Activities; Third Steps -- Reporting; Chapter 2: And, Breathe ... ; Introduction; Thinking More Deeply about Goals; What Do I Have to Tell People?; How Critical to the Business Is Restoration of Service?; What, When, Why and How?; Immediate Concerns |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This book will help IT and business operations managers who have been tasked with addressing security issues. It provides a solid understanding of security incident response and detailed guidance in the setting up and running of specialist incident management teams. Having an incident response plan is required for compliance with government regulations, industry standards such as PCI DSS, and certifications such as ISO 27001. This book will help organizations meet those compliance requirements |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security |
Topical term or geographic name entry element | Computers |
Topical term or geographic name entry element | Business & Economics |
Topical term or geographic name entry element | Data Protection |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Goucher, Wendy F. |
856 ## - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | Electronic Book Resource |
Uniform Resource Identifier | <a href="https://www.taylorfrancis.com/books/9781315117515">https://www.taylorfrancis.com/books/9781315117515</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | E-Book |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Total checkouts | Full call number | Barcode | Date last seen | Uniform resource identifier | Bill Date | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Ranganathan Library | Ranganathan Library | 07/04/2022 | Taylor & Francis | 005.800 | E01487 | 26/04/2023 | https://www.taylorfrancis.com/books/9781315117515 | 07/04/2022 | E-Book |