<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd" xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>00000nam a22000008i 4500</leader>
  <controlfield tag="001">UP-1685675941122102338</controlfield>
  <controlfield tag="003">Buklod</controlfield>
  <controlfield tag="005">20231020162135.0</controlfield>
  <controlfield tag="006">m     o  d        </controlfield>
  <controlfield tag="007">cr |nu|||uuu|a</controlfield>
  <controlfield tag="008">231020t20232023nju     r    |001 0|eng c</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9781119892304 (hardback)</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">22908896</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">DLC</subfield>
   <subfield code="d">DMLR</subfield>
   <subfield code="e">rda</subfield>
  </datafield>
  <datafield tag="041" ind1=" " ind2=" ">
   <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="042" ind1=" " ind2=" ">
   <subfield code="a">DMLUC</subfield>
  </datafield>
  <datafield tag="090" ind1=" " ind2=" ">
   <subfield code="a">HV 6773.15 C97 </subfield>
   <subfield code="b">H83 2023</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
   <subfield code="a">Hubbard, Douglas W.</subfield>
   <subfield code="d">1962-</subfield>
   <subfield code="e">author.</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">How to measure anything in cybersecurity risk</subfield>
   <subfield code="c">Douglas W Hubbard, Richard Seiersen.</subfield>
  </datafield>
  <datafield tag="250" ind1=" " ind2=" ">
   <subfield code="a">Second edition.</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="1">
   <subfield code="a">Hoboken, New Jersey</subfield>
   <subfield code="b">Wiley</subfield>
   <subfield code="c">[2023]</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="4">
   <subfield code="c">©2023</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">xv, 345 pages </subfield>
   <subfield code="c">23 cm</subfield>
  </datafield>
  <datafield tag="336" ind1=" " ind2=" ">
   <subfield code="a">text</subfield>
   <subfield code="2">rdacontent</subfield>
  </datafield>
  <datafield tag="337" ind1=" " ind2=" ">
   <subfield code="a">unmediated</subfield>
   <subfield code="2">rdamedia</subfield>
  </datafield>
  <datafield tag="338" ind1=" " ind2=" ">
   <subfield code="a">volume</subfield>
   <subfield code="2">rdacarrier</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
   <subfield code="a">Includes index.</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2="0">
   <subfield code="a">Part I: Why Cybersecurity Needs Better Measurements for Risk. Chapter 1: The One Patch Most Needed in Cybersecurity. Chapter 2: A Measurement Primer for Cybersecurity. Chapter 3: The Rapid Risk Audit: Starting With A Simple Quantitative Risk Model. Chapter 4: The Single Most Important Measurement in Cybersecurity. Chapter 5: Risk Matrices, Lie Factors, Misconceptions, and Other Obstacles to Measuring Risk -- Part II: Evolving the Model of Cybersecurity Risk. Chapter 6: Decompose It: Unpacking the Details. Chapter 7: Calibrated Estimates: How Much Do You Know Now? Chapter 8: Reducing Uncertainty with Bayesian Methods. Chapter 9: Some Powerful Methods Based on Bayes -- Part III: Cybersecurity Risk Management for the Enterprise. Chapter 10: Toward Security Metrics Maturity. Chapter 11: How Well Are My Security Investments Working Together? Chapter 12: A Call to Action: How to Roll Out Cybersecurity Risk Management.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">&quot;Cybersecurity has become one of the biggest risks facing companies today. There is a need to provide the tools and information for a CISO to become more of a chief information risk officer so they are better able to identify and prioritize risk, allocate resources, and develop effective risk mitigation strategies. This book helps to fill that need&quot;--</subfield>
   <subfield code="c">Provided by publisher.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Cyberterrorism.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Risk management.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Cyberspace</subfield>
   <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Seiersen, Richard</subfield>
   <subfield code="d">1967-</subfield>
   <subfield code="e">author.</subfield>
  </datafield>
  <datafield tag="710" ind1="2" ind2=" ">
   <subfield code="a">John Wiley &amp; Sons</subfield>
   <subfield code="e">publisher.</subfield>
  </datafield>
  <datafield tag="905" ind1=" " ind2=" ">
   <subfield code="a">FO</subfield>
  </datafield>
  <datafield tag="852" ind1="0" ind2=" ">
   <subfield code="a">UPD</subfield>
   <subfield code="b">DMLR</subfield>
   <subfield code="h">HV 6773.15 C97</subfield>
   <subfield code="i">H83 2023</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
   <subfield code="a">Book</subfield>
  </datafield>
 </record>
</collection>
