Building an Effective Security Program / / Chris Williams, Scott Donaldson, Stanley Siegel.

Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security aw...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter DG Ebook Package English 2020
VerfasserIn:
Place / Publishing House:Berlin ;, Boston : : De Gruyter, , [2020]
©2020
Year of Publication:2020
Language:English
Online Access:
Physical Description:1 online resource (XIX, 425 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9781501506529
lccn 2020939274
ctrlnum (DE-B1597)479832
(OCoLC)1198930891
collection bib_alma
record_format marc
spelling Williams, Chris, author. aut http://id.loc.gov/vocabulary/relators/aut
Building an Effective Security Program / Chris Williams, Scott Donaldson, Stanley Siegel.
Berlin ; Boston : De Gruyter, [2020]
©2020
1 online resource (XIX, 425 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Frontmatter -- Acknowledgments -- About the Authors -- Contents -- Introduction -- Chapter 1. The Digital Organization -- Chapter 2. Ever-Present Cyber Threats -- Chapter 3. Cyber Risk Management -- Chapter 4. Cyberdefense Concepts -- Chapter 5. Cybersecurity Drivers -- Chapter 6. Cyber Program Management -- Chapter 7. Cybersecurity Capabilities -- Chapter 8. Cybersecurity Operations -- Chapter 9. Cyber Awareness -- Chapter 10. Organization Cyber Awareness -- Chapter 11. Cyber Training -- Chapter 12. Measuring Cyber Performance -- Chapter 13. When Things Go Wrong -- Chapter 14. Looking to the Future -- Appendix A: Common Malware Threats -- Appendix B: Cyber Awareness and Cyber Training Topics -- Appendix C: Example Cyber Policy -- Appendix D: Online Cybersecurity Resources -- Glossary -- Index
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training. This program will establish and maintain effective security protections for the confidentiality, availability, and integrity of organization information. In this book, the authors take a pragmatic approach to building organization cyberdefenses that are effective while also remaining affordable. This book is intended for business leaders, IT professionals, cybersecurity personnel, educators, and students interested in deploying real-world cyberdefenses against today’s persistent and sometimes devastating cyberattacks. It includes detailed explanation of the following IT security topics: IT Security Mindset—Think like an IT security professional, and consider how your IT environment can be defended against potential cyberattacks. Risk Management—Identify the assets, vulnerabilities and threats that drive IT risk, along with the controls that can be used to mitigate such risk. Effective Cyberdefense—Consider the components of an effective organization cyberdefense to successfully protect computers, devices, networks, accounts, applications and data. Cyber Operations—Operate cyberdefense capabilities and controls so that assets are protected, and intruders can be detected and repelled before significant damage can be done. IT Security Awareness and Training—Promote effective cybersecurity practices at work, on travel, and at home, among your organization’s business leaders, IT professionals, and staff. Resilient IT Security—Implement, operate, monitor, assess, and improve your cybersecurity program on an ongoing basis to defend against the cyber threats of today and the future.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021)
COMPUTERS / Security / General. bisacsh
Cyber Threat.
Cybercrime.
Cybersecurity.
Hacking.
Phishing.
Security.
Virus.
Donaldson, Scott, author. aut http://id.loc.gov/vocabulary/relators/aut
Siegel, Stanley, author. aut http://id.loc.gov/vocabulary/relators/aut
Title is part of eBook package: De Gruyter DG Ebook Package English 2020 9783110696288
Title is part of eBook package: De Gruyter DG Plus DeG Package 2020 Part 1 9783110696271
Title is part of eBook package: De Gruyter De Gruyter English eBooks 2020 - UC 9783110659061
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2020 English 9783110704716
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2020 9783110704518 ZDB-23-DGG
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2020 English 9783110704815
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2020 9783110704617 ZDB-23-DEI
EPUB 9781501506420
print 9781501515248
https://doi.org/10.1515/9781501506529
https://www.degruyter.com/isbn/9781501506529
Cover https://www.degruyter.com/cover/covers/9781501506529.jpg
language English
format eBook
author Williams, Chris,
Williams, Chris,
Donaldson, Scott,
Siegel, Stanley,
spellingShingle Williams, Chris,
Williams, Chris,
Donaldson, Scott,
Siegel, Stanley,
Building an Effective Security Program /
Frontmatter --
Acknowledgments --
About the Authors --
Contents --
Introduction --
Chapter 1. The Digital Organization --
Chapter 2. Ever-Present Cyber Threats --
Chapter 3. Cyber Risk Management --
Chapter 4. Cyberdefense Concepts --
Chapter 5. Cybersecurity Drivers --
Chapter 6. Cyber Program Management --
Chapter 7. Cybersecurity Capabilities --
Chapter 8. Cybersecurity Operations --
Chapter 9. Cyber Awareness --
Chapter 10. Organization Cyber Awareness --
Chapter 11. Cyber Training --
Chapter 12. Measuring Cyber Performance --
Chapter 13. When Things Go Wrong --
Chapter 14. Looking to the Future --
Appendix A: Common Malware Threats --
Appendix B: Cyber Awareness and Cyber Training Topics --
Appendix C: Example Cyber Policy --
Appendix D: Online Cybersecurity Resources --
Glossary --
Index
author_facet Williams, Chris,
Williams, Chris,
Donaldson, Scott,
Siegel, Stanley,
Donaldson, Scott,
Donaldson, Scott,
Siegel, Stanley,
Siegel, Stanley,
author_variant c w cw
c w cw
s d sd
s s ss
author_role VerfasserIn
VerfasserIn
VerfasserIn
VerfasserIn
author2 Donaldson, Scott,
Donaldson, Scott,
Siegel, Stanley,
Siegel, Stanley,
author2_variant s d sd
s s ss
author2_role VerfasserIn
VerfasserIn
VerfasserIn
VerfasserIn
author_sort Williams, Chris,
title Building an Effective Security Program /
title_full Building an Effective Security Program / Chris Williams, Scott Donaldson, Stanley Siegel.
title_fullStr Building an Effective Security Program / Chris Williams, Scott Donaldson, Stanley Siegel.
title_full_unstemmed Building an Effective Security Program / Chris Williams, Scott Donaldson, Stanley Siegel.
title_auth Building an Effective Security Program /
title_alt Frontmatter --
Acknowledgments --
About the Authors --
Contents --
Introduction --
Chapter 1. The Digital Organization --
Chapter 2. Ever-Present Cyber Threats --
Chapter 3. Cyber Risk Management --
Chapter 4. Cyberdefense Concepts --
Chapter 5. Cybersecurity Drivers --
Chapter 6. Cyber Program Management --
Chapter 7. Cybersecurity Capabilities --
Chapter 8. Cybersecurity Operations --
Chapter 9. Cyber Awareness --
Chapter 10. Organization Cyber Awareness --
Chapter 11. Cyber Training --
Chapter 12. Measuring Cyber Performance --
Chapter 13. When Things Go Wrong --
Chapter 14. Looking to the Future --
Appendix A: Common Malware Threats --
Appendix B: Cyber Awareness and Cyber Training Topics --
Appendix C: Example Cyber Policy --
Appendix D: Online Cybersecurity Resources --
Glossary --
Index
title_new Building an Effective Security Program /
title_sort building an effective security program /
publisher De Gruyter,
publishDate 2020
physical 1 online resource (XIX, 425 p.)
contents Frontmatter --
Acknowledgments --
About the Authors --
Contents --
Introduction --
Chapter 1. The Digital Organization --
Chapter 2. Ever-Present Cyber Threats --
Chapter 3. Cyber Risk Management --
Chapter 4. Cyberdefense Concepts --
Chapter 5. Cybersecurity Drivers --
Chapter 6. Cyber Program Management --
Chapter 7. Cybersecurity Capabilities --
Chapter 8. Cybersecurity Operations --
Chapter 9. Cyber Awareness --
Chapter 10. Organization Cyber Awareness --
Chapter 11. Cyber Training --
Chapter 12. Measuring Cyber Performance --
Chapter 13. When Things Go Wrong --
Chapter 14. Looking to the Future --
Appendix A: Common Malware Threats --
Appendix B: Cyber Awareness and Cyber Training Topics --
Appendix C: Example Cyber Policy --
Appendix D: Online Cybersecurity Resources --
Glossary --
Index
isbn 9781501506529
9783110696288
9783110696271
9783110659061
9783110704716
9783110704518
9783110704815
9783110704617
9781501506420
9781501515248
url https://doi.org/10.1515/9781501506529
https://www.degruyter.com/isbn/9781501506529
https://www.degruyter.com/cover/covers/9781501506529.jpg
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
doi_str_mv 10.1515/9781501506529
oclc_num 1198930891
work_keys_str_mv AT williamschris buildinganeffectivesecurityprogram
AT donaldsonscott buildinganeffectivesecurityprogram
AT siegelstanley buildinganeffectivesecurityprogram
status_str n
ids_txt_mv (DE-B1597)479832
(OCoLC)1198930891
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter DG Ebook Package English 2020
Title is part of eBook package: De Gruyter DG Plus DeG Package 2020 Part 1
Title is part of eBook package: De Gruyter De Gruyter English eBooks 2020 - UC
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2020 English
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2020
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2020 English
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2020
is_hierarchy_title Building an Effective Security Program /
container_title Title is part of eBook package: De Gruyter DG Ebook Package English 2020
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
_version_ 1806143889811177472
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06510nam a22008895i 4500</leader><controlfield tag="001">9781501506529</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20210830012106.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">210830t20202020gw fo d z eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2020939274</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781501506529</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781501506529</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)479832</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1198930891</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="8">5p</subfield><subfield code="a">005.8</subfield><subfield code="q">DE-101</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Williams, Chris, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Building an Effective Security Program /</subfield><subfield code="c">Chris Williams, Scott Donaldson, Stanley Siegel.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ;</subfield><subfield code="a">Boston : </subfield><subfield code="b">De Gruyter, </subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (XIX, 425 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">About the Authors -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Introduction -- </subfield><subfield code="t">Chapter 1. The Digital Organization -- </subfield><subfield code="t">Chapter 2. Ever-Present Cyber Threats -- </subfield><subfield code="t">Chapter 3. Cyber Risk Management -- </subfield><subfield code="t">Chapter 4. Cyberdefense Concepts -- </subfield><subfield code="t">Chapter 5. Cybersecurity Drivers -- </subfield><subfield code="t">Chapter 6. Cyber Program Management -- </subfield><subfield code="t">Chapter 7. Cybersecurity Capabilities -- </subfield><subfield code="t">Chapter 8. Cybersecurity Operations -- </subfield><subfield code="t">Chapter 9. Cyber Awareness -- </subfield><subfield code="t">Chapter 10. Organization Cyber Awareness -- </subfield><subfield code="t">Chapter 11. Cyber Training -- </subfield><subfield code="t">Chapter 12. Measuring Cyber Performance -- </subfield><subfield code="t">Chapter 13. When Things Go Wrong -- </subfield><subfield code="t">Chapter 14. Looking to the Future -- </subfield><subfield code="t">Appendix A: Common Malware Threats -- </subfield><subfield code="t">Appendix B: Cyber Awareness and Cyber Training Topics -- </subfield><subfield code="t">Appendix C: Example Cyber Policy -- </subfield><subfield code="t">Appendix D: Online Cybersecurity Resources -- </subfield><subfield code="t">Glossary -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training. This program will establish and maintain effective security protections for the confidentiality, availability, and integrity of organization information. In this book, the authors take a pragmatic approach to building organization cyberdefenses that are effective while also remaining affordable. This book is intended for business leaders, IT professionals, cybersecurity personnel, educators, and students interested in deploying real-world cyberdefenses against today’s persistent and sometimes devastating cyberattacks. It includes detailed explanation of the following IT security topics: IT Security Mindset—Think like an IT security professional, and consider how your IT environment can be defended against potential cyberattacks. Risk Management—Identify the assets, vulnerabilities and threats that drive IT risk, along with the controls that can be used to mitigate such risk. Effective Cyberdefense—Consider the components of an effective organization cyberdefense to successfully protect computers, devices, networks, accounts, applications and data. Cyber Operations—Operate cyberdefense capabilities and controls so that assets are protected, and intruders can be detected and repelled before significant damage can be done. IT Security Awareness and Training—Promote effective cybersecurity practices at work, on travel, and at home, among your organization’s business leaders, IT professionals, and staff. Resilient IT Security—Implement, operate, monitor, assess, and improve your cybersecurity program on an ongoing basis to defend against the cyber threats of today and the future.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cyber Threat.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybercrime.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cybersecurity.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hacking.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Phishing.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Virus.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Donaldson, Scott, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Siegel, Stanley, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">DG Ebook Package English 2020</subfield><subfield code="z">9783110696288</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">DG Plus DeG Package 2020 Part 1</subfield><subfield code="z">9783110696271</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">De Gruyter English eBooks 2020 - UC</subfield><subfield code="z">9783110659061</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2020 English</subfield><subfield code="z">9783110704716</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2020</subfield><subfield code="z">9783110704518</subfield><subfield code="o">ZDB-23-DGG</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Engineering, Computer Sciences 2020 English</subfield><subfield code="z">9783110704815</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Engineering, Computer Sciences 2020</subfield><subfield code="z">9783110704617</subfield><subfield code="o">ZDB-23-DEI</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">EPUB</subfield><subfield code="z">9781501506420</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9781501515248</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781501506529</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781501506529</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/cover/covers/9781501506529.jpg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-065906-1 De Gruyter English eBooks 2020 - UC</subfield><subfield code="b">2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-069627-1 DG Plus DeG Package 2020 Part 1</subfield><subfield code="b">2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-069628-8 DG Ebook Package English 2020</subfield><subfield code="b">2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-070471-6 EBOOK PACKAGE COMPLETE 2020 English</subfield><subfield code="b">2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-070481-5 EBOOK PACKAGE Engineering, Computer Sciences 2020 English</subfield><subfield code="b">2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA18STMEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DEI</subfield><subfield code="b">2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="b">2020</subfield></datafield></record></collection>