Security risk management : building an information security risk management program from the ground up /
The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix s...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Waltham, MA :
Syngress,
©2011.
|
Colección: | ITPro.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000Ia 4500 | ||
---|---|---|---|
001 | EBSCO_ocn722800242 | ||
003 | OCoLC | ||
005 | 20231017213018.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 110512s2011 mau ob 001 0 eng d | ||
040 | |a OPELS |b eng |e pn |c OPELS |d OCLCQ |d N$T |d E7B |d YDXCP |d UKMGB |d OCLCQ |d DKDLA |d TEF |d DEBSZ |d ALAUL |d CDX |d OCLCQ |d B24X7 |d OCLCQ |d TEFOD |d MNU |d U9X |d OCLCF |d TEFOD |d OCLCQ |d COO |d OCLCQ |d LOA |d UMI |d C6I |d ICA |d AGLDB |d CNNOR |d K6U |d PIFAG |d FVL |d LIV |d OCLCQ |d U3W |d D6H |d OCL |d STF |d WRM |d VNS |d VTS |d INT |d VT2 |d CEF |d OCLCQ |d WYU |d G3B |d TKN |d OCLCQ |d UAB |d LEAUB |d AU@ |d M8D |d UKAHL |d OCLCO |d OCLCQ | ||
016 | 7 | |a 015758345 |2 Uk | |
019 | |a 726845922 |a 768975518 |a 801811803 |a 828498352 |a 980911393 | ||
020 | |a 9781597496155 |q (electronic bk.) | ||
020 | |a 1597496154 |q (electronic bk.) | ||
020 | |a 9781597496162 |q (electronic bk.) | ||
020 | |a 1597496162 |q (electronic bk.) | ||
029 | 1 | |a AU@ |b 000047867626 | |
029 | 1 | |a AU@ |b 000050013229 | |
029 | 1 | |a AU@ |b 000053283958 | |
029 | 1 | |a CHNEW |b 001010108 | |
029 | 1 | |a DEBBG |b BV039829371 | |
029 | 1 | |a DEBBG |b BV040902080 | |
029 | 1 | |a DEBBG |b BV042314271 | |
029 | 1 | |a DEBSZ |b 360078648 | |
029 | 1 | |a DEBSZ |b 372821529 | |
029 | 1 | |a DEBSZ |b 378295349 | |
029 | 1 | |a DEBSZ |b 381381455 | |
029 | 1 | |a DEBSZ |b 48126681X | |
029 | 1 | |a GBVCP |b 785363580 | |
029 | 1 | |a NZ1 |b 15189610 | |
029 | 1 | |a AU@ |b 000066232588 | |
029 | 1 | |a AU@ |b 000067092826 | |
035 | |a (OCoLC)722800242 |z (OCoLC)726845922 |z (OCoLC)768975518 |z (OCoLC)801811803 |z (OCoLC)828498352 |z (OCoLC)980911393 | ||
037 | |a D3A1E47E-9022-4427-8494-1390CBB56C22 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a HD61 |b .W44 2011eb | |
072 | 7 | |a BUS |x 033070 |2 bisacsh | |
082 | 0 | 4 | |a 658.15/5 |2 22 |
049 | |a UAMI | ||
100 | 1 | |a Wheeler, Evan. | |
245 | 1 | 0 | |a Security risk management : |b building an information security risk management program from the ground up / |c Evan Wheeler. |
260 | |a Waltham, MA : |b Syngress, |c ©2011. | ||
300 | |a 1 online resource (xxi, 340 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file |2 rda | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Introduction to Risk Management -- Risk Assessment and Analysis Techniques -- Building and Running a Risk Management Program. | |
520 | |a The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain why. This book will help you to break free from the so-called "best practices" argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive guide for managing security risks. Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. Explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. Presents a roadmap for designing and implementing a security risk management program. | ||
588 | 0 | |a Print version record. | |
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Risk management. | |
650 | 0 | |a Risk management |x Security measures. | |
650 | 6 | |a Gestion du risque. | |
650 | 6 | |a Gestion du risque |x Sécurité |x Mesures. | |
650 | 7 | |a risk management. |2 aat | |
650 | 7 | |a BUSINESS & ECONOMICS |x Insurance |x Risk Assessment & Management. |2 bisacsh | |
650 | 7 | |a Risk management. |2 fast |0 (OCoLC)fst01098164 | |
776 | 0 | 8 | |i Print version: |t Security Risk Management. |d Syngress Media Inc 2011 |z 9781597496155 |w (OCoLC)692291806 |
830 | 0 | |a ITPro. | |
856 | 4 | 0 | |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=365553 |z Texto completo |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781597496155/?ar |z Texto completo |
938 | |a Askews and Holts Library Services |b ASKH |n AH23095093 | ||
938 | |a Books 24x7 |b B247 |n bks00041881 | ||
938 | |a Coutts Information Services |b COUT |n 23141918 | ||
938 | |a ebrary |b EBRY |n ebr10465832 | ||
938 | |a EBSCOhost |b EBSC |n 365553 | ||
938 | |a YBP Library Services |b YANK |n 5048756 | ||
994 | |a 92 |b IZTAP |