Pesquisa de referências

Best practices : security information management

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000nam a22000004b 4500</leader>
    <controlfield tag="001">MAP20080028428</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20191202111856.0</controlfield>
    <controlfield tag="008">080918s2007    usa||||       ||| ||eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">86</subfield>
    </datafield>
    <datafield tag="100" ind1="1" ind2=" ">
      <subfield code="0">MAPA20080651589</subfield>
      <subfield code="a">Stamp, Paul</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Best practices</subfield>
      <subfield code="b"> : security information management</subfield>
      <subfield code="c">by Paul Stamp with Jonathan Penn and Alissa Dill</subfield>
    </datafield>
    <datafield tag="260" ind1=" " ind2=" ">
      <subfield code="a">Cambridge</subfield>
      <subfield code="b">Forrester Research</subfield>
      <subfield code="c">2007</subfield>
    </datafield>
    <datafield tag="490" ind1="1" ind2=" ">
      <subfield code="a">For Security & risk professionals</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">Security Information Management (SIM) solutions are no longer the sole domain of the largest organizations. More than one third of enterprises plan to deploy SIM tools by the middle of 2008, and those that have invested the time and effort in the tools already are reaping the benefits, streamlining existing processes, and implementing active monitoring controls where there were none previously. Successful organizations get the best benefit from their SIM implementations when they establish their immediate SIM needs clearly, but have a clear vision for what they want SIM to deliver in the future</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080622251</subfield>
      <subfield code="a">Seguridad de la información</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080569815</subfield>
      <subfield code="a">Organizaciones</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080617059</subfield>
      <subfield code="a">Gestión de la información</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="1">
      <subfield code="0">MAPA20080603731</subfield>
      <subfield code="a">Seguridad informática</subfield>
    </datafield>
    <datafield tag="700" ind1="1" ind2=" ">
      <subfield code="0">MAPA20080648176</subfield>
      <subfield code="a">Penn, Jonathan</subfield>
    </datafield>
    <datafield tag="700" ind1="1" ind2=" ">
      <subfield code="0">MAPA20080648183</subfield>
      <subfield code="a">Dill, Alissa</subfield>
    </datafield>
    <datafield tag="710" ind1="2" ind2=" ">
      <subfield code="0">MAPA20080436582</subfield>
      <subfield code="a">Forrester</subfield>
    </datafield>
    <datafield tag="830" ind1=" " ind2="3">
      <subfield code="0">MAPA20080648190</subfield>
      <subfield code="a">For Security & risk professionals</subfield>
    </datafield>
  </record>
</collection>