<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>00809nam a2200265Ia 4500</leader>
  <controlfield tag="008">160621s9999    xx            000 0 und d</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">978-1-4221-0666-2</subfield>
  </datafield>
  <datafield tag="050" ind1=" " ind2=" ">
    <subfield code="a">ComSc HD 30.2</subfield>
  </datafield>
  <datafield tag="050" ind1=" " ind2=" ">
    <subfield code="b">.W43 2007</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="a">Westerman, George.</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">IT risk :</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="b">turning business threats into competitive advantage /</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="c">George Westerman, Richard Hunter.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Boston, MA :</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="b">Harvard Business School Press,</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2007</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">221 pages :</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="b">illustrations ;</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="c">24 cm.</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
    <subfield code="a">Include bibliographical references.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2=" ">
    <subfield code="a">Information technology -- Management.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2=" ">
    <subfield code="a">Risk management.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2=" ">
    <subfield code="x">Information technology -- Security measures.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2=" ">
    <subfield code="x">Management information systems.</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">296162</subfield>
    <subfield code="d">296162</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="4">0</subfield>
    <subfield code="a">SMC</subfield>
    <subfield code="b">SMC</subfield>
    <subfield code="c">ComSc</subfield>
    <subfield code="d">2008-01-11</subfield>
    <subfield code="g">2.00</subfield>
    <subfield code="l">0</subfield>
    <subfield code="o">ComSc HD 30.2 .W43 2007</subfield>
    <subfield code="p">SMC04795</subfield>
    <subfield code="r">2016-06-21 00:00:00</subfield>
    <subfield code="w">2016-06-21</subfield>
    <subfield code="y">BK </subfield>
  </datafield>
</record>
