Managing cybersecurity resources: a cost-benefit analysis
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
New York u.a.
McGraw-Hill
2005
|
Schlagwörter: | |
Beschreibung: | Includes bibliographical references and index |
Umfang: | IX, 223 S. graph. Darst. |
ISBN: | 0071452850 9780071452854 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035045758 | ||
003 | DE-604 | ||
005 | 20081119 | ||
007 | t| | ||
008 | 080910s2005 xx d||| |||| 00||| eng d | ||
010 | |a 2005014300 | ||
020 | |a 0071452850 |c hardcover |9 0-07-145285-0 | ||
020 | |a 9780071452854 |9 978-0-07-145285-4 | ||
035 | |a (OCoLC)636134373 | ||
035 | |a (DE-599)BSZ263440346 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-384 | ||
084 | |a QH 500 |0 (DE-625)141607: |2 rvk | ||
100 | 1 | |a Gordon, Lawrence A. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Managing cybersecurity resources |b a cost-benefit analysis |c Lawrence A. Gordon and Martin P. Loeb |
264 | 1 | |a New York u.a. |b McGraw-Hill |c 2005 | |
300 | |a IX, 223 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Datenverarbeitung | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Business / Data processing / Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Information technology / Security measures | |
650 | 4 | |a Data protection | |
650 | 0 | 7 | |a Unternehmen |0 (DE-588)4061963-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kosten-Nutzen-Analyse |0 (DE-588)4032589-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Risikomanagement |0 (DE-588)4121590-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Risikomanagement |0 (DE-588)4121590-4 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 1 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 2 | |a Kosten-Nutzen-Analyse |0 (DE-588)4032589-1 |D s |
689 | 1 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
700 | 1 | |a Loeb, Martin P. |e Verfasser |4 aut | |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-016714515 |
Datensatz im Suchindex
_version_ | 1818965551473491968 |
---|---|
any_adam_object | |
author | Gordon, Lawrence A. Loeb, Martin P. |
author_facet | Gordon, Lawrence A. Loeb, Martin P. |
author_role | aut aut |
author_sort | Gordon, Lawrence A. |
author_variant | l a g la lag m p l mp mpl |
building | Verbundindex |
bvnumber | BV035045758 |
classification_rvk | QH 500 |
ctrlnum | (OCoLC)636134373 (DE-599)BSZ263440346 |
discipline | Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02040nam a2200553 c 4500</leader><controlfield tag="001">BV035045758</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20081119 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">080910s2005 xx d||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2005014300</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0071452850</subfield><subfield code="c">hardcover</subfield><subfield code="9">0-07-145285-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780071452854</subfield><subfield code="9">978-0-07-145285-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)636134373</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BSZ263440346</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-384</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QH 500</subfield><subfield code="0">(DE-625)141607:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gordon, Lawrence A.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Managing cybersecurity resources</subfield><subfield code="b">a cost-benefit analysis</subfield><subfield code="c">Lawrence A. Gordon and Martin P. Loeb</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York u.a.</subfield><subfield code="b">McGraw-Hill</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">IX, 223 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datenverarbeitung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business / Data processing / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kosten-Nutzen-Analyse</subfield><subfield code="0">(DE-588)4032589-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Kosten-Nutzen-Analyse</subfield><subfield code="0">(DE-588)4032589-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Loeb, Martin P.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016714515</subfield></datafield></record></collection> |
id | DE-604.BV035045758 |
illustrated | Illustrated |
indexdate | 2024-12-20T13:18:48Z |
institution | BVB |
isbn | 0071452850 9780071452854 |
language | English |
lccn | 2005014300 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016714515 |
oclc_num | 636134373 |
open_access_boolean | |
owner | DE-384 |
owner_facet | DE-384 |
physical | IX, 223 S. graph. Darst. |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | McGraw-Hill |
record_format | marc |
spelling | Gordon, Lawrence A. Verfasser aut Managing cybersecurity resources a cost-benefit analysis Lawrence A. Gordon and Martin P. Loeb New York u.a. McGraw-Hill 2005 IX, 223 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Datenverarbeitung Wirtschaft Business / Data processing / Security measures Computer security Information technology / Security measures Data protection Unternehmen (DE-588)4061963-1 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Kosten-Nutzen-Analyse (DE-588)4032589-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Risikomanagement (DE-588)4121590-4 gnd rswk-swf Risikomanagement (DE-588)4121590-4 s Datensicherung (DE-588)4011144-1 s DE-604 Unternehmen (DE-588)4061963-1 s Computersicherheit (DE-588)4274324-2 s Kosten-Nutzen-Analyse (DE-588)4032589-1 s 1\p DE-604 Loeb, Martin P. Verfasser aut 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Gordon, Lawrence A. Loeb, Martin P. Managing cybersecurity resources a cost-benefit analysis Datenverarbeitung Wirtschaft Business / Data processing / Security measures Computer security Information technology / Security measures Data protection Unternehmen (DE-588)4061963-1 gnd Datensicherung (DE-588)4011144-1 gnd Kosten-Nutzen-Analyse (DE-588)4032589-1 gnd Computersicherheit (DE-588)4274324-2 gnd Risikomanagement (DE-588)4121590-4 gnd |
subject_GND | (DE-588)4061963-1 (DE-588)4011144-1 (DE-588)4032589-1 (DE-588)4274324-2 (DE-588)4121590-4 |
title | Managing cybersecurity resources a cost-benefit analysis |
title_auth | Managing cybersecurity resources a cost-benefit analysis |
title_exact_search | Managing cybersecurity resources a cost-benefit analysis |
title_full | Managing cybersecurity resources a cost-benefit analysis Lawrence A. Gordon and Martin P. Loeb |
title_fullStr | Managing cybersecurity resources a cost-benefit analysis Lawrence A. Gordon and Martin P. Loeb |
title_full_unstemmed | Managing cybersecurity resources a cost-benefit analysis Lawrence A. Gordon and Martin P. Loeb |
title_short | Managing cybersecurity resources |
title_sort | managing cybersecurity resources a cost benefit analysis |
title_sub | a cost-benefit analysis |
topic | Datenverarbeitung Wirtschaft Business / Data processing / Security measures Computer security Information technology / Security measures Data protection Unternehmen (DE-588)4061963-1 gnd Datensicherung (DE-588)4011144-1 gnd Kosten-Nutzen-Analyse (DE-588)4032589-1 gnd Computersicherheit (DE-588)4274324-2 gnd Risikomanagement (DE-588)4121590-4 gnd |
topic_facet | Datenverarbeitung Wirtschaft Business / Data processing / Security measures Computer security Information technology / Security measures Data protection Unternehmen Datensicherung Kosten-Nutzen-Analyse Computersicherheit Risikomanagement |
work_keys_str_mv | AT gordonlawrencea managingcybersecurityresourcesacostbenefitanalysis AT loebmartinp managingcybersecurityresourcesacostbenefitanalysis |