Cargando…

The security risk assessment handbook : a complete guide for performing security risk assessments /

"The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of th...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Landoll, Douglas J.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton, FL : CRC Press, ©2011.
Edición:2nd ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn738433256
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 110705s2011 fluab obf 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d UKMGB  |d CUS  |d OCLCQ  |d OTZ  |d B24X7  |d OCLCQ  |d OCLCF  |d OCLCO  |d CRCPR  |d OCLCQ  |d E7B  |d DEBSZ  |d UMI  |d DEBBG  |d AU@  |d COO  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d CPO  |d STF  |d OCLCA  |d CEF  |d NLE  |d YDX  |d LEAUB  |d OCLCQ  |d NLW  |d BRF  |d EYM  |d OCLCQ  |d OCLCO  |d OCLCQ  |d SFB  |d OCLCQ  |d OCLCO 
016 7 |a 015522898  |2 Uk 
019 |a 742513205  |a 761956346  |a 879683557  |a 972120240  |a 972234532  |a 984681519  |a 1000356046  |a 1015212901  |a 1060197718  |a 1080587402  |a 1179693172  |a 1194786880 
020 |a 9781439821497  |q (electronic bk.) 
020 |a 1439821496  |q (electronic bk.) 
020 |z 9781439821480 
020 |z 1439821488 
029 1 |a AU@  |b 000048044663 
029 1 |a AU@  |b 000053282745 
029 1 |a CHNEW  |b 000606949 
029 1 |a DEBBG  |b BV042032410 
029 1 |a DEBSZ  |b 372699235 
029 1 |a DEBSZ  |b 414178777 
029 1 |a NZ1  |b 14105497 
035 |a (OCoLC)738433256  |z (OCoLC)742513205  |z (OCoLC)761956346  |z (OCoLC)879683557  |z (OCoLC)972120240  |z (OCoLC)972234532  |z (OCoLC)984681519  |z (OCoLC)1000356046  |z (OCoLC)1015212901  |z (OCoLC)1060197718  |z (OCoLC)1080587402  |z (OCoLC)1179693172  |z (OCoLC)1194786880 
037 |a CL0500000426  |b Safari Books Online 
050 4 |a HF5548.37  |b .L358 2011eb 
072 7 |a BUS  |x 097000  |2 bisacsh 
072 7 |a BUS  |x 104000  |2 bisacsh 
072 7 |a BUS  |x 071000  |2 bisacsh 
072 7 |a BUS  |x 103000  |2 bisacsh 
082 0 4 |a 658.4/7  |2 22 
084 |a COM053000  |a BUS073000  |2 bisacsh 
049 |a UAMI 
100 1 |a Landoll, Douglas J. 
245 1 4 |a The security risk assessment handbook :  |b a complete guide for performing security risk assessments /  |c Douglas Landoll. 
250 |a 2nd ed. 
260 |a Boca Raton, FL :  |b CRC Press,  |c ©2011. 
300 |a 1 online resource (xix, 475 pages) :  |b illustrations, maps 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
520 |a "The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional development. It also enables security consumers to better negotiate the scope and rigor of a security assessment, effectively interface with a security assessment team, deliver insightful comments on a draft report, and have a greater understanding of final report recommendations. This book can save time and money by eliminating guesswork as to what assessment steps to perform, and how to perform them. In addition, the book offers charts, checklists, examples, and templates that speed up data gathering, analysis, and document development. By improving the efficiency of the assessment process, security consultants can deliver a higher-quality service with a larger profit margin. The text allows consumers to intelligently solicit and review proposals, positioning them to request affordable security risk assessments from quality vendors that meet the needs of their organizations"--  |c Provided by publisher 
520 |a "The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment from a practical point of view. Designed for security professionals who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional development and experience. It also enables security consumers to better negotiate the scope and rigor of a security assessment, effectively interface with a security assessment team, deliver insightful comments on a draft report, and have a greater understanding of final report recommendations"--  |c Provided by publisher 
588 0 |a Print version record. 
505 0 |a 1. Introduction -- 2. Information security risk assessment basics -- 3. Project definition -- 4. Security risk assessment preparation -- 5. Data gathering -- 6. Administrative data gathering -- 7. Technical data gathering -- 8. Physical data gathering -- 9. Security risk analysis -- 10. Security risk mitigation -- 11. Security risk assessment reporting -- 12. Security risk assessment project management -- 13. Security risk assessment approaches. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Business  |x Data processing  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Data protection. 
650 0 |a Risk assessment. 
650 6 |a Gestion  |x Informatique  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Protection de l'information (Informatique) 
650 6 |a Évaluation du risque. 
650 7 |a risk assessment.  |2 aat 
650 7 |a Computers  |x Security  |x General.  |2 bisacsh 
650 7 |a Business and ecomonics  |x Commerce.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Workplace Culture.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Corporate Governance.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Leadership.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Organizational Development.  |2 bisacsh 
650 7 |a Business  |x Data processing  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Risk assessment  |2 fast 
776 0 8 |i Print version:  |a Landoll, Douglas J.  |t Security risk assessment handbook.  |b 2nd ed.  |d Boca Raton, FL : CRC Press, ©2011  |z 9781439821480  |w (DLC) 2010043672  |w (OCoLC)619180196 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781439821497/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00037005 
938 |a CRC Press  |b CRCP  |n CRC0KE11010PDF 
938 |a ebrary  |b EBRY  |n ebr10473056 
938 |a EBSCOhost  |b EBSC  |n 369042 
938 |a YBP Library Services  |b YANK  |n 6921734 
938 |a YBP Library Services  |b YANK  |n 15917928 
994 |a 92  |b IZTAP