000 -LEADER |
fixed length control field |
02006cam a2200361 a 4500 |
001 - CONTROL NUMBER |
control field |
u6025 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
SA-PMU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20210418124108.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
070215s2007 maua b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2007006516 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Modifying agency |
YDX |
-- |
BAKER |
-- |
BTCTA |
-- |
YDXCP |
-- |
BWX |
-- |
IXA |
-- |
RUQBL |
-- |
OCLCQ |
-- |
BDX |
-- |
UMR |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781422106662 (hardcover : alk. paper) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
1422106667 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)85018560 |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HD30.2 |
Item number |
.W464 2007 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
658.4/038 |
Edition number |
22 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Westerman, George, |
Dates associated with a name |
1963- |
245 10 - TITLE STATEMENT |
Title |
IT risk : |
Remainder of title |
turning business threats into competitive advantage / |
Statement of responsibility, etc. |
George Westerman, Richard Hunter. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Boston, Mass. : |
Name of publisher, distributor, etc. |
Harvard Business School Press, |
Date of publication, distribution, etc. |
c2007. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xiv, 221 p. : |
Other physical details |
ill. ; |
Dimensions |
25 cm. |
490 0# - SERIES STATEMENT |
Series statement |
Gartner, Inc./Harvard Business School Press series |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
520 1# - SUMMARY, ETC. |
Summary, etc. |
"In this book, the authors define four types of IT risk: availability, access, accuracy, and agility. Citing numerous company examples, they then introduce three disciplines that enterprises must master to manage IT risk effectively: a solid foundation of IT assets, people, and supporting processes and controls that enable executives to manage the right risks in the right order; a well-designed risk governance process - including oversight by high-level executives - that allows companies to identify, prioritize, and track risks; and a risk-aware culture, nurtured from the top, that attunes people to the causes and solutions for IT risks and creates increased vigilance across the organization."--BOOK JACKET. |
596 ## - |
-- |
1 2 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Information technology |
General subdivision |
Management. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Management information systems. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Risk management. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Information technology |
General subdivision |
Security measures. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Hunter, Richard, |
Dates associated with a name |
1952- |
856 41 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Table of contents only |
Uniform Resource Identifier |
<a href="http://catdir.loc.gov/catdir/toc/ecip0711/2007006516.html">http://catdir.loc.gov/catdir/toc/ecip0711/2007006516.html</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Books |
994 ## - |
-- |
Z0 |
-- |
SUPMU |