000 01361cam a22002054a 4500
005 20150915131204.0
008 110510s2011 ne b 000 0 eng
020 _a9781597496155 (pbk.)
041 _aeng
082 0 0 _a005.8
_bWHE
100 1 _aWheeler, Evan
_91832
245 1 0 _aSecurity Risk management :
_bbuilding an information security risk management program from the ground up
_cWheeler, Evan
260 _aAmsterdam
_aWaltham, MA :
_bElsevier
_c2011
300 _axx, 340p.
505 8 _aMachine generated contents note: Part I - Introduction to Risk Management : The Security Evolution -- Risky Business -- The Risk Management Lifecycle -- Risk Profiling Part II - Risk Assessment and Analysis Techniques -- Formulating a Risk -- Risk Exposure Factors -- Security Controls & Services -- Risk Evaluation & Mitigation Strategies -- Reports & Consulting Chapter 10: Risk Assessment Techniques Part III - Building and Running a Risk Management Program -- hreat & Vulnerability Management -- Security Risk Reviews -- A Blueprint for Security -- Building a Program from Scratch Appendix A: Security Risk Profile Appendix B: Risk Models and Scales Appendix C: Architectural Risk Analysis Reference Tables.
650 0 _aComputer networks
_xSecurity measures.
_91825
650 0 _aRisk assessment.
_95618
650 0 _aRisk management.
_91833
942 _cBK
999 _c26257
_d26257