How to measure anything in cybersecurity risk:
A start-to-finish guide for realistically measuring cybersecurity risk In the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods delivers yet another eye-opening text applying the q...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hoboken, New Jersey
Wiley
[2023]
|
Ausgabe: | Second edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781119892304/?ar |
Zusammenfassung: | A start-to-finish guide for realistically measuring cybersecurity risk In the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods delivers yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework. Advanced methods and detailed advice for a variety of use cases round out the book, which also includes: A new "Rapid Risk Audit" for a first quick quantitative risk assessment. New research on the real impact of reputation damage New Bayesian examples for assessing risk with little data New material on simple measurement and estimation, pseudo-random number generators, and advice on combining expert opinion Dispelling long-held beliefs and myths about information security, How to Measure Anything in Cybersecurity Risk is an essential roadmap for IT security managers, CFOs, risk and compliance professionals, and even statisticians looking for novel new ways to apply quantitative techniques to cybersecurity. |
Beschreibung: | Description based on online resource; title from digital title page (viewed on April 25, 2023) |
Umfang: | 1 Online-Ressource |
ISBN: | 9781119892311 1119892317 9781119892328 1119892325 9781119892335 1119892333 9781119892304 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-096166746 | ||
003 | DE-627-1 | ||
005 | 20240228121946.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230907s2023 xx |||||o 00| ||eng c | ||
020 | |a 9781119892311 |c electronic book |9 978-1-119-89231-1 | ||
020 | |a 1119892317 |c electronic book |9 1-119-89231-7 | ||
020 | |a 9781119892328 |c electronic book |9 978-1-119-89232-8 | ||
020 | |a 1119892325 |c electronic book |9 1-119-89232-5 | ||
020 | |a 9781119892335 |c electronic book |9 978-1-119-89233-5 | ||
020 | |a 1119892333 |c electronic book |9 1-119-89233-3 | ||
020 | |a 9781119892304 |9 978-1-119-89230-4 | ||
035 | |a (DE-627-1)096166746 | ||
035 | |a (DE-599)KEP096166746 | ||
035 | |a (ORHE)9781119892304 | ||
035 | |a (DE-627-1)096166746 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 658.4/78 |2 23 | |
100 | 1 | |a Hubbard, Douglas W. |d 1962- |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a How to measure anything in cybersecurity risk |c Douglas W. Hubbard, Richard Seiersen |
250 | |a Second edition. | ||
264 | 1 | |a Hoboken, New Jersey |b Wiley |c [2023] | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Description based on online resource; title from digital title page (viewed on April 25, 2023) | ||
520 | |a A start-to-finish guide for realistically measuring cybersecurity risk In the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods delivers yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework. Advanced methods and detailed advice for a variety of use cases round out the book, which also includes: A new "Rapid Risk Audit" for a first quick quantitative risk assessment. New research on the real impact of reputation damage New Bayesian examples for assessing risk with little data New material on simple measurement and estimation, pseudo-random number generators, and advice on combining expert opinion Dispelling long-held beliefs and myths about information security, How to Measure Anything in Cybersecurity Risk is an essential roadmap for IT security managers, CFOs, risk and compliance professionals, and even statisticians looking for novel new ways to apply quantitative techniques to cybersecurity. | ||
650 | 0 | |a Cyberterrorism | |
650 | 0 | |a Cyberspace |x Security measures | |
650 | 0 | |a Risk management | |
650 | 2 | |a Risk Management | |
650 | 4 | |a Cyberterrorisme | |
650 | 4 | |a Gestion du risque | |
650 | 4 | |a risk management | |
650 | 4 | |a BUSINESS & ECONOMICS ; Statistics | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Cyberspace ; Security measures | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Risk management | |
650 | 4 | |a Cyberterrorism | |
650 | 4 | |a Cyberspace ; Security measures | |
650 | 4 | |a Risk management | |
700 | 1 | |a Seiersen, Richard |d 1967- |e VerfasserIn |4 aut | |
776 | 1 | |z 1119892309 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1119892309 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119892304/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-096166746 |
---|---|
_version_ | 1821494938875985920 |
adam_text | |
any_adam_object | |
author | Hubbard, Douglas W. 1962- Seiersen, Richard 1967- |
author_facet | Hubbard, Douglas W. 1962- Seiersen, Richard 1967- |
author_role | aut aut |
author_sort | Hubbard, Douglas W. 1962- |
author_variant | d w h dw dwh r s rs |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)096166746 (DE-599)KEP096166746 (ORHE)9781119892304 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
edition | Second edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03535cam a22006252 4500</leader><controlfield tag="001">ZDB-30-ORH-096166746</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121946.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230907s2023 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119892311</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-119-89231-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119892317</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-119-89231-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119892328</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-119-89232-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119892325</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-119-89232-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119892335</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-119-89233-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119892333</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-119-89233-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119892304</subfield><subfield code="9">978-1-119-89230-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)096166746</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP096166746</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119892304</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)096166746</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hubbard, Douglas W.</subfield><subfield code="d">1962-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">How to measure anything in cybersecurity risk</subfield><subfield code="c">Douglas W. Hubbard, Richard Seiersen</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">Wiley</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from digital title page (viewed on April 25, 2023)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">A start-to-finish guide for realistically measuring cybersecurity risk In the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods delivers yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework. Advanced methods and detailed advice for a variety of use cases round out the book, which also includes: A new "Rapid Risk Audit" for a first quick quantitative risk assessment. New research on the real impact of reputation damage New Bayesian examples for assessing risk with little data New material on simple measurement and estimation, pseudo-random number generators, and advice on combining expert opinion Dispelling long-held beliefs and myths about information security, How to Measure Anything in Cybersecurity Risk is an essential roadmap for IT security managers, CFOs, risk and compliance professionals, and even statisticians looking for novel new ways to apply quantitative techniques to cybersecurity.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Risk Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorisme</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gestion du risque</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS & ECONOMICS ; Statistics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Seiersen, Richard</subfield><subfield code="d">1967-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1119892309</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1119892309</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119892304/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-096166746 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:20Z |
institution | BVB |
isbn | 9781119892311 1119892317 9781119892328 1119892325 9781119892335 1119892333 9781119892304 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Wiley |
record_format | marc |
spelling | Hubbard, Douglas W. 1962- VerfasserIn aut How to measure anything in cybersecurity risk Douglas W. Hubbard, Richard Seiersen Second edition. Hoboken, New Jersey Wiley [2023] 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Description based on online resource; title from digital title page (viewed on April 25, 2023) A start-to-finish guide for realistically measuring cybersecurity risk In the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods delivers yet another eye-opening text applying the quantitative language of risk analysis to cybersecurity. In the book, the authors demonstrate how to quantify uncertainty and shed light on how to measure seemingly intangible goals. It's a practical guide to improving risk assessment with a straightforward and simple framework. Advanced methods and detailed advice for a variety of use cases round out the book, which also includes: A new "Rapid Risk Audit" for a first quick quantitative risk assessment. New research on the real impact of reputation damage New Bayesian examples for assessing risk with little data New material on simple measurement and estimation, pseudo-random number generators, and advice on combining expert opinion Dispelling long-held beliefs and myths about information security, How to Measure Anything in Cybersecurity Risk is an essential roadmap for IT security managers, CFOs, risk and compliance professionals, and even statisticians looking for novel new ways to apply quantitative techniques to cybersecurity. Cyberterrorism Cyberspace Security measures Risk management Risk Management Cyberterrorisme Gestion du risque risk management BUSINESS & ECONOMICS ; Statistics COMPUTERS ; Security ; General Cyberspace ; Security measures Seiersen, Richard 1967- VerfasserIn aut 1119892309 Erscheint auch als Druck-Ausgabe 1119892309 |
spellingShingle | Hubbard, Douglas W. 1962- Seiersen, Richard 1967- How to measure anything in cybersecurity risk Cyberterrorism Cyberspace Security measures Risk management Risk Management Cyberterrorisme Gestion du risque risk management BUSINESS & ECONOMICS ; Statistics COMPUTERS ; Security ; General Cyberspace ; Security measures |
title | How to measure anything in cybersecurity risk |
title_auth | How to measure anything in cybersecurity risk |
title_exact_search | How to measure anything in cybersecurity risk |
title_full | How to measure anything in cybersecurity risk Douglas W. Hubbard, Richard Seiersen |
title_fullStr | How to measure anything in cybersecurity risk Douglas W. Hubbard, Richard Seiersen |
title_full_unstemmed | How to measure anything in cybersecurity risk Douglas W. Hubbard, Richard Seiersen |
title_short | How to measure anything in cybersecurity risk |
title_sort | how to measure anything in cybersecurity risk |
topic | Cyberterrorism Cyberspace Security measures Risk management Risk Management Cyberterrorisme Gestion du risque risk management BUSINESS & ECONOMICS ; Statistics COMPUTERS ; Security ; General Cyberspace ; Security measures |
topic_facet | Cyberterrorism Cyberspace Security measures Risk management Risk Management Cyberterrorisme Gestion du risque risk management BUSINESS & ECONOMICS ; Statistics COMPUTERS ; Security ; General Cyberspace ; Security measures |
work_keys_str_mv | AT hubbarddouglasw howtomeasureanythingincybersecurityrisk AT seiersenrichard howtomeasureanythingincybersecurityrisk |