Cargando…

Security risk management : building an information security risk management program from the ground up /

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix s...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Wheeler, Evan
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress, ©2011.
Colección:ITPro.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000Ia 4500
001 EBSCO_ocn722800242
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 110512s2011 mau ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OCLCQ  |d N$T  |d E7B  |d YDXCP  |d UKMGB  |d OCLCQ  |d DKDLA  |d TEF  |d DEBSZ  |d ALAUL  |d CDX  |d OCLCQ  |d B24X7  |d OCLCQ  |d TEFOD  |d MNU  |d U9X  |d OCLCF  |d TEFOD  |d OCLCQ  |d COO  |d OCLCQ  |d LOA  |d UMI  |d C6I  |d ICA  |d AGLDB  |d CNNOR  |d K6U  |d PIFAG  |d FVL  |d LIV  |d OCLCQ  |d U3W  |d D6H  |d OCL  |d STF  |d WRM  |d VNS  |d VTS  |d INT  |d VT2  |d CEF  |d OCLCQ  |d WYU  |d G3B  |d TKN  |d OCLCQ  |d UAB  |d LEAUB  |d AU@  |d M8D  |d UKAHL  |d OCLCO  |d OCLCQ 
016 7 |a 015758345  |2 Uk 
019 |a 726845922  |a 768975518  |a 801811803  |a 828498352  |a 980911393 
020 |a 9781597496155  |q (electronic bk.) 
020 |a 1597496154  |q (electronic bk.) 
020 |a 9781597496162  |q (electronic bk.) 
020 |a 1597496162  |q (electronic bk.) 
029 1 |a AU@  |b 000047867626 
029 1 |a AU@  |b 000050013229 
029 1 |a AU@  |b 000053283958 
029 1 |a CHNEW  |b 001010108 
029 1 |a DEBBG  |b BV039829371 
029 1 |a DEBBG  |b BV040902080 
029 1 |a DEBBG  |b BV042314271 
029 1 |a DEBSZ  |b 360078648 
029 1 |a DEBSZ  |b 372821529 
029 1 |a DEBSZ  |b 378295349 
029 1 |a DEBSZ  |b 381381455 
029 1 |a DEBSZ  |b 48126681X 
029 1 |a GBVCP  |b 785363580 
029 1 |a NZ1  |b 15189610 
029 1 |a AU@  |b 000066232588 
029 1 |a AU@  |b 000067092826 
035 |a (OCoLC)722800242  |z (OCoLC)726845922  |z (OCoLC)768975518  |z (OCoLC)801811803  |z (OCoLC)828498352  |z (OCoLC)980911393 
037 |a D3A1E47E-9022-4427-8494-1390CBB56C22  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a HD61  |b .W44 2011eb 
072 7 |a BUS  |x 033070  |2 bisacsh 
082 0 4 |a 658.15/5  |2 22 
049 |a UAMI 
100 1 |a Wheeler, Evan. 
245 1 0 |a Security risk management :  |b building an information security risk management program from the ground up /  |c Evan Wheeler. 
260 |a Waltham, MA :  |b Syngress,  |c ©2011. 
300 |a 1 online resource (xxi, 340 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
504 |a Includes bibliographical references and index. 
505 0 |a Introduction to Risk Management -- Risk Assessment and Analysis Techniques -- Building and Running a Risk Management Program. 
520 |a The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain why. This book will help you to break free from the so-called "best practices" argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive guide for managing security risks. Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. Explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. Presents a roadmap for designing and implementing a security risk management program. 
588 0 |a Print version record. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Risk management. 
650 0 |a Risk management  |x Security measures. 
650 6 |a Gestion du risque. 
650 6 |a Gestion du risque  |x Sécurité  |x Mesures. 
650 7 |a risk management.  |2 aat 
650 7 |a BUSINESS & ECONOMICS  |x Insurance  |x Risk Assessment & Management.  |2 bisacsh 
650 7 |a Risk management.  |2 fast  |0 (OCoLC)fst01098164 
776 0 8 |i Print version:  |t Security Risk Management.  |d Syngress Media Inc 2011  |z 9781597496155  |w (OCoLC)692291806 
830 0 |a ITPro. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=365553  |z Texto completo 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597496155/?ar  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH23095093 
938 |a Books 24x7  |b B247  |n bks00041881 
938 |a Coutts Information Services  |b COUT  |n 23141918 
938 |a ebrary  |b EBRY  |n ebr10465832 
938 |a EBSCOhost  |b EBSC  |n 365553 
938 |a YBP Library Services  |b YANK  |n 5048756 
994 |a 92  |b IZTAP