Búsqueda

Best practices : security information management

<?xml version="1.0" encoding="UTF-8"?><modsCollection xmlns="http://www.loc.gov/mods/v3" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-8.xsd">
<mods version="3.8">
<titleInfo>
<title>Best practices</title>
<subTitle> : security information management</subTitle>
</titleInfo>
<name type="personal" usage="primary" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080651589">
<namePart>Stamp, Paul</namePart>
<nameIdentifier>MAPA20080651589</nameIdentifier>
</name>
<name type="personal" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080648176">
<namePart>Penn, Jonathan</namePart>
<nameIdentifier>MAPA20080648176</nameIdentifier>
</name>
<name type="personal" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080648183">
<namePart>Dill, Alissa</namePart>
<nameIdentifier>MAPA20080648183</nameIdentifier>
</name>
<name type="corporate" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080436582">
<namePart>Forrester</namePart>
<nameIdentifier>MAPA20080436582</nameIdentifier>
</name>
<typeOfResource>text</typeOfResource>
<originInfo>
<place>
<placeTerm type="code" authority="marccountry">usa</placeTerm>
</place>
<issuance>monographic</issuance>
<place>
<placeTerm type="text">Cambridge</placeTerm>
</place>
<publisher>Forrester Research</publisher>
<dateIssued>2007</dateIssued>
</originInfo>
<language>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<form authority="marcform">print</form>
</physicalDescription>
<abstract displayLabel="Summary">Security Information Management (SIM) solutions are no longer the sole domain of the largest organizations. More than one third of enterprises plan to deploy SIM tools by the middle of 2008, and those that have invested the time and effort in the tools already are reaping the benefits, streamlining existing processes, and implementing active monitoring controls where there were none previously. Successful organizations get the best benefit from their SIM implementations when they establish their immediate SIM needs clearly, but have a clear vision for what they want SIM to deliver in the future</abstract>
<note type="statement of responsibility">by Paul Stamp with Jonathan Penn and Alissa Dill</note>
<subject authority="lcshac" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080622251">
<topic>Seguridad de la información</topic>
</subject>
<subject authority="lcshac" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080569815">
<topic>Organizaciones</topic>
</subject>
<subject authority="lcshac" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080617059">
<topic>Gestión de la información</topic>
</subject>
<subject authority="lcshac" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080603731">
<topic>Seguridad informática</topic>
</subject>
<classification authority="">86</classification>
<relatedItem type="series" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="MAPA20080648190">
<titleInfo>
<title>For Security & risk professionals</title>
</titleInfo>
</relatedItem>
<recordInfo>
<recordContentSource authority="marcorg">MAP</recordContentSource>
<recordCreationDate encoding="marc">080918</recordCreationDate>
<recordChangeDate encoding="iso8601">20191202111856.0</recordChangeDate>
<recordIdentifier source="MAP">MAP20080028428</recordIdentifier>
<languageOfCataloging>
<languageTerm type="code" authority="iso639-2b">spa</languageTerm>
</languageOfCataloging>
</recordInfo>
</mods>
</modsCollection>