Cyber risk management : (Record no. 7944)

MARC details
000 -LEADER
fixed length control field 02791cam a2200445 i 4500
001 - CONTROL NUMBER
control field 23367848
003 - CONTROL NUMBER IDENTIFIER
control field n
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250929134042.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 231030s2024 enka b 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2023949509
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781398613515
Qualifying information (hardcover)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781398613492
Qualifying information (paperback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781398613508
Qualifying information (ebook)
035 ## - SYSTEM CONTROL NUMBER
System control number 23367848
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1368339453
040 ## - CATALOGING SOURCE
Original cataloging agency YDX
Language of cataloging eng
Description conventions rda
Transcribing agency YDX
Modifying agency BDX
-- OCLCO
-- OCLCQ
-- VMC
-- DLC
042 ## - AUTHENTICATION CODE
Authentication code lccopycat
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HD31.2
Item number .H63 2024
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 H63 2024
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Hodson, Christopher J.,
Relator term author.
245 10 - TITLE STATEMENT
Title Cyber risk management :
Remainder of title prioritize threats, identify vulnerabilities and apply controls /
Statement of responsibility, etc. Christopher J Hodson.
250 ## - EDITION STATEMENT
Edition statement Second edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture London, United Kingdom ;
-- New York, NY, USA :
Name of producer, publisher, distributor, manufacturer Kogan Page,
Date of production, publication, distribution, manufacture, or copyright notice 2024.
300 ## - PHYSICAL DESCRIPTION
Extent xii, 431 pages :
Other physical details illustrations ;
Dimensions 24 cm
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Part One. Contextualizing cybersecurity risk -- Why now? : the only constant is change -- Technologies and security challenges -- Data breaches -- Part Two. Cybersecurity programme management -- What are cybersecurity and cybercrime? -- Establishing a cybersecurity programme -- Part Three. Actors, events and vulnerabilities -- Threat actors -- Threat events -- Vulnerabilities -- Controls -- Part Four. Conclusion: the cybersecurity risk equation explained -- Cyber risk management: a conclusion -- References -- Index.
520 ## - SUMMARY, ETC.
Summary, etc. "How can you manage the complex threats that can cause financial, operational and reputational damage to the business? This practical guide shows how to implement a successful cybersecurity programme. The second edition of Cyber Risk Management covers the latest developments in cybersecurity for those responsible for managing threat events, vulnerabilities and controls. These include the impact of Web3 and the metaverse on cybersecurity, supply-chain security in the gig economy and exploration of the global, macroeconomic conditions that affect strategies. It explains how Covid-19 and remote working changed the cybersecurity landscape." -- Back cover.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Industrial management.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberspace
General subdivision Security measures
-- Management.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberterrorism
General subdivision Prevention.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberterrorism
General subdivision Prevention.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst01905567
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Industrial management.
Source of heading or term fast
Authority record control number or standard number (OCoLC)fst00971246
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c copycat
d 2
e ncip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type English Book
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type Copy number
    Dewey Decimal Classification     CENTRAL CENTRAL 10/01/2025   005.8 H63 2024 1000000020303 10/01/2025 10/01/2025 English Book  
    Dewey Decimal Classification     CENTRAL WOMEN 11/25/2025   005.8 H63 2024 1000000016251 11/25/2025 11/25/2025 English Book C2