Strategically managing information security risks (Record no. 79815)

000 -LEADER
fixed length control field 01789ngm a2200349 a 4500
001 - CONTROL NUMBER
control field HST2628_1_2
003 - CONTROL NUMBER IDENTIFIER
control field UkLoHST
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m c
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr|cna|||a||||
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field vz|czazum
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 110411s2011 enk|||||||||||s|||v|eng d
028 50 - PUBLISHER NUMBER
Publisher number 2628
Source Henry Stewart Talks
035 ## - SYSTEM CONTROL NUMBER
System control number (UkLoHST)1968
040 ## - CATALOGING SOURCE
Original cataloging agency UkLoHST
Language of cataloging eng
Transcribing agency UkLoHST
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Ray, Amy W.
Relator code spk
245 10 - TITLE STATEMENT
Title Strategically managing information security risks
Medium [electronic resource] /
Statement of responsibility, etc. Amy W. Ray.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. London :
Name of publisher, distributor, etc. Henry Stewart Talks,
Date of publication, distribution, etc. 2011.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (1 streaming video file (44 min.) :
Other physical details color, sound).
490 1# - SERIES STATEMENT
Series statement Strategic issues in information technology : challenges and innovations,
International Standard Serial Number 2056-4570
500 ## - GENERAL NOTE
General note Animated audio-visual presentation with synchronized narration.
500 ## - GENERAL NOTE
General note Title from title frames.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Contents: Cornerstones of security strategy -- Current business environment -- Business growth vs. Information Security -- Risky business activities -- Teleworking -- Malicious attacks -- Malware -- Spam and phishing -- Denial-of-service attacks -- Implications -- Why we can't get ahead on security -- The changing security landscape -- Security strategy -- Security architecture -- Security technology -- Return on Security Investment.
506 ## - RESTRICTIONS ON ACCESS NOTE
Terms governing access Access restricted to subscribers.
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information technology
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Risk assessment.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Henry Stewart talks.
Name of part/section of a work Business & management collection.
-- Strategic issues in information technology.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://hstalks.com/bm/1968/">https://hstalks.com/bm/1968/</a>
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://hstalks.com/bm/p/536/">https://hstalks.com/bm/p/536/</a>
Materials specified Series

No items available.

Technical University of Mombasa
Tom Mboya Street, Tudor 90420-80100 , Mombasa Kenya
Tel: (254)41-2492222/3 Fax: 2490571