| 000 | 01078nam a2200325Ia 4500 | ||
|---|---|---|---|
| 003 | OSt | ||
| 005 | 20220912144108.0 | ||
| 006 | a|||||r|||| 00| 0 | ||
| 007 | ta | ||
| 008 | 220909b |||||||| |||| 00| 0 eng d | ||
| 020 | _a9781119085294 (hbk) | ||
| 024 | _a199522 | ||
| 037 | _b4745, 28/02/2018, Ashutosh Technical Books | ||
| 037 | _cTextual | ||
| 040 | _beng | ||
| 041 | _aeng | ||
| 082 | _aD65,8(B):(894), Q6 | ||
| 100 | _aHubbard Douglas W | ||
| 245 | 0 | _aHow to measure anything in cybersecurity risk | |
| 260 |
_aNew Jersey _bWiley _c2016 |
||
| 300 |
_axv,280p. ill. _ccm |
||
| 500 | _aAppendix 239-268p.; Index 269-280p. | ||
| 650 | _a Cybersecurity risk management for the enterprise | ||
| 650 | _a Evolving the model of cybersecurity risk | ||
| 650 | _a Why cybersecurity needs better measurements for risk | ||
| 650 | _aComputer Science | ||
| 700 | _a Seiersen Richard | ||
| 942 |
_hD65,8(B):(894), Q6 _cTEXL _2CC |
||
| 999 |
_c3104 _d3104 |
||