000 | 01671cam a22002775a 4500 | ||
---|---|---|---|
001 | 16772385 | ||
005 | 20201128021352.0 | ||
008 | 110510t2011 maua frb 001 0 eng d | ||
020 | _a9781597496155 (pbk.) | ||
040 |
_aDLC _cDLC _dDLC _dEG-ScBUE _beng |
||
082 | 0 | 4 |
_a005.8 _222 _bWHE |
100 | 1 |
_aWheeler, Evan. _938601 |
|
245 | 1 | 0 |
_aSecurity risk management : _bbuilding an information security risk management program from the ground up / _cEvan Wheeler ; technical editor Kenneth Swick. |
260 |
_aWaltham : _bElsevier, _cc.2011. |
||
300 |
_axx, 340 p. : _bill. ; _c24 cm. |
||
500 | _aIndex : p. 331-340. | ||
504 | _aIncludes bibliographical references. | ||
505 | 8 | _aMachine generated contents note: Part I - Introduction to Risk Management : The Security Evolution -- Risky Business -- The Risk Management Lifecycle -- Risk Profiling Part II - Risk Assessment and Analysis Techniques -- Formulating a Risk -- Risk Exposure Factors -- Security Controls & Services -- Risk Evaluation & Mitigation Strategies -- Reports & Consulting Chapter 10: Risk Assessment Techniques Part III - Building and Running a Risk Management Program -- hreat & Vulnerability Management -- Security Risk Reviews -- A Blueprint for Security -- Building a Program from Scratch Appendix A: Security Risk Profile Appendix B: Risk Models and Scales Appendix C: Architectural Risk Analysis Reference Tables. | |
650 | 7 |
_aComputer networks _xSecurity measures. _2BUEsh _92634 |
|
650 | 0 |
_aRisk assessment. _2BUEsh |
|
650 | 7 |
_aRisk management. _2BUEsh _912222 |
|
651 | _2BUEsh | ||
653 |
_bCOMSCI _cJune2015 _cOctober2015 |
||
700 | 1 |
_aSwick, Kenneth, _eeditor. |
|
942 | _2ddc | ||
999 |
_c19992 _d19964 |