Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
Books | Central Library General Section | 005.8 WHE (Browse shelf(Opens below)) | Available | 026385 |
005.8 SAM Securing cyberspace : | 005.8 SHA Virtualization security protecting virtualized environments | 005.8 VAC Managing information security | 005.8 WHE Security Risk management : | 006.3 ALE How to build a mind : | 006.3 COL Artificial Experts | 006.3 WAR Artificial intelligence : |
Machine generated contents note: Part I - Introduction to Risk Management : The Security Evolution -- Risky Business -- The Risk Management Lifecycle -- Risk Profiling Part II - Risk Assessment and Analysis Techniques -- Formulating a Risk -- Risk Exposure Factors -- Security Controls & Services -- Risk Evaluation & Mitigation Strategies -- Reports & Consulting Chapter 10: Risk Assessment Techniques Part III - Building and Running a Risk Management Program -- hreat & Vulnerability Management -- Security Risk Reviews -- A Blueprint for Security -- Building a Program from Scratch Appendix A: Security Risk Profile Appendix B: Risk Models and Scales Appendix C: Architectural Risk Analysis Reference Tables.
There are no comments on this title.