HKSYU Course Resources
MARC Display
LEADER 02055cam a22004458i 4500
001
991002337629707546
005
20220621232502.0
008
220305s2017 flua b 001 0 eng
010
a| 2016040209
020
a| 9781498785143
q| (Hardback)
028
5
0
a| K30184
035
a| (HKSYU)b21542193-852hksyu_inst
040
a| DLC
b| eng
e| rda
c| DLC
d| OCLCF
d| OCLCQ
d| YDX
d| TOL
d| UtOrBLW
d| HK-SYU
042
a| pcc
050
0
0
a| QA76.9.A25
b| K63463 2017
092
0
a| 005.8
b| KOH 2017
100
1
a| Kohnke, Anne,
e| author
245
1
0
a| Implementing cybersecurity :
b| a guide to the National Institute of Standards and Technology Risk Management Framework /
c| Anne Kohnke, Ken Sigler and Dan Shoemaker
246
3
0
a| Guide to the National Institute of Standards and Technology Risk Management Framework
264
1
a| Boca Raton, FL :
b| CRC Press,
c| 2017
264
4
c| ©2017
300
a| xxiii, 313 pages :
b| illustrations ;
c| 25 cm
336
a| text
b| txt
2| rdacontent
337
a| unmediated
b| n
2| rdamedia
338
a| volume
b| nc
2| rdacarrier
490
1
a| Internal audit and IT audit
504
a| Includes bibliographical references and index
505
0
a| Introduction to organizational security risk management -- Survey of existing risk management models -- Categorize information and information systems -- Select security controls -- Implement security controls -- Assess security controls -- Authorize information systems -- Monitor security state -- Practical application of the NIST risk management framework
650
0
a| Computer networks
x| Security measures
650
0
a| Computer security
650
0
a| Information technology
x| Security measures
650
0
a| Risk management
700
1
a| Sigler, Kenneth,
e| author
700
1
a| Shoemaker, Dan,
e| author
830
0
a| Internal audit and IT audit
907
a| b21542193
b| 30-04-22
c| 05-03-22
910
a| nlw
b| mkl
935
a| (HK-SYU)501047522
9| ExL
998
a| book
b| 30-04-22
c| m
d| a
e| -
f| eng
g| flu
h| 0
i| 0
945
h| Supplement
l| location
i| barcode
y| id
f| bookplate
a| callnoa
b| callnob
n| FINT301