Security metrics: a beginner's guide ; [learn how to develop and deploy an effective security metrics program ; implement proven techniques for reducing vulnerabilities and mitigating security risks ; achieve immediate results using downloadable templates, checklists, and examples]
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
New York [u.a.]
McGraw-Hill
2012
|
Schlagwörter: | |
Umfang: | XXXII, 397 S. |
ISBN: | 9780071744003 0071744002 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV039845042 | ||
003 | DE-604 | ||
005 | 20120217 | ||
007 | t| | ||
008 | 120126s2012 xx |||| 00||| eng d | ||
020 | |a 9780071744003 |c (pbk.) £30.99 |9 978-0-07-174400-3 | ||
020 | |a 0071744002 |c (pbk.) £30.99 |9 0-07-174400-2 | ||
035 | |a (OCoLC)775130499 | ||
035 | |a (DE-599)HBZHT016852199 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Wong, Caroline |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security metrics |b a beginner's guide ; [learn how to develop and deploy an effective security metrics program ; implement proven techniques for reducing vulnerabilities and mitigating security risks ; achieve immediate results using downloadable templates, checklists, and examples] |c Caroline Wong |
264 | 1 | |a New York [u.a.] |b McGraw-Hill |c 2012 | |
300 | |a XXXII, 397 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Softwaremetrie |0 (DE-588)4227925-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
653 | |a Computer networks--Security measures. | ||
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Softwaremetrie |0 (DE-588)4227925-2 |D s |
689 | 0 | |C b |5 DE-604 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-024704879 |
Datensatz im Suchindex
_version_ | 1818975923068731392 |
---|---|
any_adam_object | |
author | Wong, Caroline |
author_facet | Wong, Caroline |
author_role | aut |
author_sort | Wong, Caroline |
author_variant | c w cw |
building | Verbundindex |
bvnumber | BV039845042 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)775130499 (DE-599)HBZHT016852199 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01387nam a2200349 c 4500</leader><controlfield tag="001">BV039845042</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120217 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">120126s2012 xx |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780071744003</subfield><subfield code="c">(pbk.) £30.99</subfield><subfield code="9">978-0-07-174400-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0071744002</subfield><subfield code="c">(pbk.) £30.99</subfield><subfield code="9">0-07-174400-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)775130499</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)HBZHT016852199</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wong, Caroline</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security metrics</subfield><subfield code="b">a beginner's guide ; [learn how to develop and deploy an effective security metrics program ; implement proven techniques for reducing vulnerabilities and mitigating security risks ; achieve immediate results using downloadable templates, checklists, and examples]</subfield><subfield code="c">Caroline Wong</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York [u.a.]</subfield><subfield code="b">McGraw-Hill</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXXII, 397 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwaremetrie</subfield><subfield code="0">(DE-588)4227925-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer networks--Security measures.</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Softwaremetrie</subfield><subfield code="0">(DE-588)4227925-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="C">b</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024704879</subfield></datafield></record></collection> |
id | DE-604.BV039845042 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T16:03:39Z |
institution | BVB |
isbn | 9780071744003 0071744002 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024704879 |
oclc_num | 775130499 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | XXXII, 397 S. |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | McGraw-Hill |
record_format | marc |
spelling | Wong, Caroline Verfasser aut Security metrics a beginner's guide ; [learn how to develop and deploy an effective security metrics program ; implement proven techniques for reducing vulnerabilities and mitigating security risks ; achieve immediate results using downloadable templates, checklists, and examples] Caroline Wong New York [u.a.] McGraw-Hill 2012 XXXII, 397 S. txt rdacontent n rdamedia nc rdacarrier Softwaremetrie (DE-588)4227925-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computer networks--Security measures. Computersicherheit (DE-588)4274324-2 s Softwaremetrie (DE-588)4227925-2 s b DE-604 |
spellingShingle | Wong, Caroline Security metrics a beginner's guide ; [learn how to develop and deploy an effective security metrics program ; implement proven techniques for reducing vulnerabilities and mitigating security risks ; achieve immediate results using downloadable templates, checklists, and examples] Softwaremetrie (DE-588)4227925-2 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4227925-2 (DE-588)4274324-2 |
title | Security metrics a beginner's guide ; [learn how to develop and deploy an effective security metrics program ; implement proven techniques for reducing vulnerabilities and mitigating security risks ; achieve immediate results using downloadable templates, checklists, and examples] |
title_auth | Security metrics a beginner's guide ; [learn how to develop and deploy an effective security metrics program ; implement proven techniques for reducing vulnerabilities and mitigating security risks ; achieve immediate results using downloadable templates, checklists, and examples] |
title_exact_search | Security metrics a beginner's guide ; [learn how to develop and deploy an effective security metrics program ; implement proven techniques for reducing vulnerabilities and mitigating security risks ; achieve immediate results using downloadable templates, checklists, and examples] |
title_full | Security metrics a beginner's guide ; [learn how to develop and deploy an effective security metrics program ; implement proven techniques for reducing vulnerabilities and mitigating security risks ; achieve immediate results using downloadable templates, checklists, and examples] Caroline Wong |
title_fullStr | Security metrics a beginner's guide ; [learn how to develop and deploy an effective security metrics program ; implement proven techniques for reducing vulnerabilities and mitigating security risks ; achieve immediate results using downloadable templates, checklists, and examples] Caroline Wong |
title_full_unstemmed | Security metrics a beginner's guide ; [learn how to develop and deploy an effective security metrics program ; implement proven techniques for reducing vulnerabilities and mitigating security risks ; achieve immediate results using downloadable templates, checklists, and examples] Caroline Wong |
title_short | Security metrics |
title_sort | security metrics a beginner s guide learn how to develop and deploy an effective security metrics program implement proven techniques for reducing vulnerabilities and mitigating security risks achieve immediate results using downloadable templates checklists and examples |
title_sub | a beginner's guide ; [learn how to develop and deploy an effective security metrics program ; implement proven techniques for reducing vulnerabilities and mitigating security risks ; achieve immediate results using downloadable templates, checklists, and examples] |
topic | Softwaremetrie (DE-588)4227925-2 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Softwaremetrie Computersicherheit |
work_keys_str_mv | AT wongcaroline securitymetricsabeginnersguidelearnhowtodevelopanddeployaneffectivesecuritymetricsprogramimplementproventechniquesforreducingvulnerabilitiesandmitigatingsecurityrisksachieveimmediateresultsusingdownloadabletemplateschecklistsandexamples |