000 01745cam a22003014a 4500
001 16772385
003 AUA.1
005 20171204130039.0
008 110510s2011 ne b 000 0 eng
010 _a 2011013125
020 _a9781597496155 (pbk.)
040 _aDLC
_cDLC
_dDLC
042 _apcc
050 0 0 _aTK5105.59
_b.W48 2011
082 0 0 _a005.8
_223
100 1 _aWheeler, Evan.
245 1 0 _aSecurity risk management :
_bbuilding an information security risk management program from the ground up /
_cEvan Wheeler.
260 _aWaltham, MA :
_bSyngress,
_cc2011.
300 _axx, 340 p. ;
_c24 cm.
504 _aIncludes bibliographical references.
505 8 _aMachine generated contents note: Part I - Introduction to Risk Management : The Security Evolution -- Risky Business -- The Risk Management Lifecycle -- Risk Profiling Part II - Risk Assessment and Analysis Techniques -- Formulating a Risk -- Risk Exposure Factors -- Security Controls & Services -- Risk Evaluation & Mitigation Strategies -- Reports & Consulting Chapter 10: Risk Assessment Techniques Part III - Building and Running a Risk Management Program -- hreat & Vulnerability Management -- Security Risk Reviews -- A Blueprint for Security -- Building a Program from Scratch Appendix A: Security Risk Profile Appendix B: Risk Models and Scales Appendix C: Architectural Risk Analysis Reference Tables.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aRisk assessment.
_915673
650 0 _aRisk management.
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2lcc
_cBOOK
_hTK 5105.59
_i.W48 2011
999 _c18907
_d18907