000 01671cam a22002775a 4500
001 16772385
005 20201128021352.0
008 110510t2011 maua frb 001 0 eng d
020 _a9781597496155 (pbk.)
040 _aDLC
_cDLC
_dDLC
_dEG-ScBUE
_beng
082 0 4 _a005.8
_222
_bWHE
100 1 _aWheeler, Evan.
_938601
245 1 0 _aSecurity risk management :
_bbuilding an information security risk management program from the ground up /
_cEvan Wheeler ; technical editor Kenneth Swick.
260 _aWaltham :
_bElsevier,
_cc.2011.
300 _axx, 340 p. :
_bill. ;
_c24 cm.
500 _aIndex : p. 331-340.
504 _aIncludes bibliographical references.
505 8 _aMachine generated contents note: Part I - Introduction to Risk Management : The Security Evolution -- Risky Business -- The Risk Management Lifecycle -- Risk Profiling Part II - Risk Assessment and Analysis Techniques -- Formulating a Risk -- Risk Exposure Factors -- Security Controls & Services -- Risk Evaluation & Mitigation Strategies -- Reports & Consulting Chapter 10: Risk Assessment Techniques Part III - Building and Running a Risk Management Program -- hreat & Vulnerability Management -- Security Risk Reviews -- A Blueprint for Security -- Building a Program from Scratch Appendix A: Security Risk Profile Appendix B: Risk Models and Scales Appendix C: Architectural Risk Analysis Reference Tables.
650 7 _aComputer networks
_xSecurity measures.
_2BUEsh
_92634
650 0 _aRisk assessment.
_2BUEsh
650 7 _aRisk management.
_2BUEsh
_912222
651 _2BUEsh
653 _bCOMSCI
_cJune2015
_cOctober2015
700 1 _aSwick, Kenneth,
_eeditor.
942 _2ddc
999 _c19992
_d19964