000 | 01361cam a22002054a 4500 | ||
---|---|---|---|
005 | 20150915131204.0 | ||
008 | 110510s2011 ne b 000 0 eng | ||
020 | _a9781597496155 (pbk.) | ||
041 | _aeng | ||
082 | 0 | 0 |
_a005.8 _bWHE |
100 | 1 |
_aWheeler, Evan _91832 |
|
245 | 1 | 0 |
_aSecurity Risk management : _bbuilding an information security risk management program from the ground up _cWheeler, Evan |
260 |
_aAmsterdam _aWaltham, MA : _bElsevier _c2011 |
||
300 | _axx, 340p. | ||
505 | 8 | _aMachine generated contents note: Part I - Introduction to Risk Management : The Security Evolution -- Risky Business -- The Risk Management Lifecycle -- Risk Profiling Part II - Risk Assessment and Analysis Techniques -- Formulating a Risk -- Risk Exposure Factors -- Security Controls & Services -- Risk Evaluation & Mitigation Strategies -- Reports & Consulting Chapter 10: Risk Assessment Techniques Part III - Building and Running a Risk Management Program -- hreat & Vulnerability Management -- Security Risk Reviews -- A Blueprint for Security -- Building a Program from Scratch Appendix A: Security Risk Profile Appendix B: Risk Models and Scales Appendix C: Architectural Risk Analysis Reference Tables. | |
650 | 0 |
_aComputer networks _xSecurity measures. _91825 |
|
650 | 0 |
_aRisk assessment. _95618 |
|
650 | 0 |
_aRisk management. _91833 |
|
942 | _cBK | ||
999 |
_c26257 _d26257 |