CIO's Guide to Security Incident Management / (Record no. 48893)

MARC details
000 -LEADER
fixed length control field 01857cmm a2200277 a 4500
001 - CONTROL NUMBER
control field 46883
003 - CONTROL NUMBER IDENTIFIER
control field IN-BdCUP
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230426175603.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230426s2023 u eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781315117515
040 ## - CATALOGING SOURCE
Language of cataloging eng
Transcribing agency IN-BdCUP
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.800
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Pemble, Matthew W.A.
245 #0 - TITLE STATEMENT
Title CIO's Guide to Security Incident Management /
Statement of responsibility, etc. Matthew W.A. Pemble, Wendy F. Goucher
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (273 pages)
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Cover; Frontispiece; Half Title; Title Page; Copyright Page; Dedication; Contents; Introduction; Authors; Chapter 1: Oh, No. It's All Gone Horribly Wrong!; Introduction; Is It an "Information Security Incident"?; The Meeting; Basic Meeting Management; First Steps; Impacts; Aims; Authority; Capabilities; Constraints; Second Steps -- Activities; Third Steps -- Reporting; Chapter 2: And, Breathe ... ; Introduction; Thinking More Deeply about Goals; What Do I Have to Tell People?; How Critical to the Business Is Restoration of Service?; What, When, Why and How?; Immediate Concerns
520 ## - SUMMARY, ETC.
Summary, etc. This book will help IT and business operations managers who have been tasked with addressing security issues. It provides a solid understanding of security incident response and detailed guidance in the setting up and running of specialist incident management teams. Having an incident response plan is required for compliance with government regulations, industry standards such as PCI DSS, and certifications such as ISO 27001. This book will help organizations meet those compliance requirements
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
Topical term or geographic name entry element Computers
Topical term or geographic name entry element Business & Economics
Topical term or geographic name entry element Data Protection
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Goucher, Wendy F.
856 ## - ELECTRONIC LOCATION AND ACCESS
Materials specified Electronic Book Resource
Uniform Resource Identifier <a href="https://www.taylorfrancis.com/books/9781315117515">https://www.taylorfrancis.com/books/9781315117515</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type E-Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Total checkouts Full call number Barcode Date last seen Uniform resource identifier Bill Date Koha item type
    Dewey Decimal Classification     Ranganathan Library Ranganathan Library 07/04/2022 Taylor & Francis   005.800 E01487 26/04/2023 https://www.taylorfrancis.com/books/9781315117515 07/04/2022 E-Book
This system is made operational by the in-house staff of the CUP Library.