000 | 01745cam a22003014a 4500 | ||
---|---|---|---|
001 | 16772385 | ||
003 | AUA.1 | ||
005 | 20171204130039.0 | ||
008 | 110510s2011 ne b 000 0 eng | ||
010 | _a 2011013125 | ||
020 | _a9781597496155 (pbk.) | ||
040 |
_aDLC _cDLC _dDLC |
||
042 | _apcc | ||
050 | 0 | 0 |
_aTK5105.59 _b.W48 2011 |
082 | 0 | 0 |
_a005.8 _223 |
100 | 1 | _aWheeler, Evan. | |
245 | 1 | 0 |
_aSecurity risk management : _bbuilding an information security risk management program from the ground up / _cEvan Wheeler. |
260 |
_aWaltham, MA : _bSyngress, _cc2011. |
||
300 |
_axx, 340 p. ; _c24 cm. |
||
504 | _aIncludes bibliographical references. | ||
505 | 8 | _aMachine generated contents note: Part I - Introduction to Risk Management : The Security Evolution -- Risky Business -- The Risk Management Lifecycle -- Risk Profiling Part II - Risk Assessment and Analysis Techniques -- Formulating a Risk -- Risk Exposure Factors -- Security Controls & Services -- Risk Evaluation & Mitigation Strategies -- Reports & Consulting Chapter 10: Risk Assessment Techniques Part III - Building and Running a Risk Management Program -- hreat & Vulnerability Management -- Security Risk Reviews -- A Blueprint for Security -- Building a Program from Scratch Appendix A: Security Risk Profile Appendix B: Risk Models and Scales Appendix C: Architectural Risk Analysis Reference Tables. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 |
_aRisk assessment. _915673 |
|
650 | 0 | _aRisk management. | |
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
942 |
_2lcc _cBOOK _hTK 5105.59 _i.W48 2011 |
||
999 |
_c18907 _d18907 |