|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn738433256 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
110705s2011 fluab obf 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d YDXCP
|d UKMGB
|d CUS
|d OCLCQ
|d OTZ
|d B24X7
|d OCLCQ
|d OCLCF
|d OCLCO
|d CRCPR
|d OCLCQ
|d E7B
|d DEBSZ
|d UMI
|d DEBBG
|d AU@
|d COO
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d CPO
|d STF
|d OCLCA
|d CEF
|d NLE
|d YDX
|d LEAUB
|d OCLCQ
|d NLW
|d BRF
|d EYM
|d OCLCQ
|d OCLCO
|d OCLCQ
|d SFB
|d OCLCQ
|d OCLCO
|
016 |
7 |
|
|a 015522898
|2 Uk
|
019 |
|
|
|a 742513205
|a 761956346
|a 879683557
|a 972120240
|a 972234532
|a 984681519
|a 1000356046
|a 1015212901
|a 1060197718
|a 1080587402
|a 1179693172
|a 1194786880
|
020 |
|
|
|a 9781439821497
|q (electronic bk.)
|
020 |
|
|
|a 1439821496
|q (electronic bk.)
|
020 |
|
|
|z 9781439821480
|
020 |
|
|
|z 1439821488
|
029 |
1 |
|
|a AU@
|b 000048044663
|
029 |
1 |
|
|a AU@
|b 000053282745
|
029 |
1 |
|
|a CHNEW
|b 000606949
|
029 |
1 |
|
|a DEBBG
|b BV042032410
|
029 |
1 |
|
|a DEBSZ
|b 372699235
|
029 |
1 |
|
|a DEBSZ
|b 414178777
|
029 |
1 |
|
|a NZ1
|b 14105497
|
035 |
|
|
|a (OCoLC)738433256
|z (OCoLC)742513205
|z (OCoLC)761956346
|z (OCoLC)879683557
|z (OCoLC)972120240
|z (OCoLC)972234532
|z (OCoLC)984681519
|z (OCoLC)1000356046
|z (OCoLC)1015212901
|z (OCoLC)1060197718
|z (OCoLC)1080587402
|z (OCoLC)1179693172
|z (OCoLC)1194786880
|
037 |
|
|
|a CL0500000426
|b Safari Books Online
|
050 |
|
4 |
|a HF5548.37
|b .L358 2011eb
|
072 |
|
7 |
|a BUS
|x 097000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 104000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 071000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 103000
|2 bisacsh
|
082 |
0 |
4 |
|a 658.4/7
|2 22
|
084 |
|
|
|a COM053000
|a BUS073000
|2 bisacsh
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Landoll, Douglas J.
|
245 |
1 |
4 |
|a The security risk assessment handbook :
|b a complete guide for performing security risk assessments /
|c Douglas Landoll.
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Boca Raton, FL :
|b CRC Press,
|c ©2011.
|
300 |
|
|
|a 1 online resource (xix, 475 pages) :
|b illustrations, maps
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a "The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional development. It also enables security consumers to better negotiate the scope and rigor of a security assessment, effectively interface with a security assessment team, deliver insightful comments on a draft report, and have a greater understanding of final report recommendations. This book can save time and money by eliminating guesswork as to what assessment steps to perform, and how to perform them. In addition, the book offers charts, checklists, examples, and templates that speed up data gathering, analysis, and document development. By improving the efficiency of the assessment process, security consultants can deliver a higher-quality service with a larger profit margin. The text allows consumers to intelligently solicit and review proposals, positioning them to request affordable security risk assessments from quality vendors that meet the needs of their organizations"--
|c Provided by publisher
|
520 |
|
|
|a "The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment from a practical point of view. Designed for security professionals who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional development and experience. It also enables security consumers to better negotiate the scope and rigor of a security assessment, effectively interface with a security assessment team, deliver insightful comments on a draft report, and have a greater understanding of final report recommendations"--
|c Provided by publisher
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a 1. Introduction -- 2. Information security risk assessment basics -- 3. Project definition -- 4. Security risk assessment preparation -- 5. Data gathering -- 6. Administrative data gathering -- 7. Technical data gathering -- 8. Physical data gathering -- 9. Security risk analysis -- 10. Security risk mitigation -- 11. Security risk assessment reporting -- 12. Security risk assessment project management -- 13. Security risk assessment approaches.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Business
|x Data processing
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Risk assessment.
|
650 |
|
6 |
|a Gestion
|x Informatique
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Évaluation du risque.
|
650 |
|
7 |
|a risk assessment.
|2 aat
|
650 |
|
7 |
|a Computers
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Business and ecomonics
|x Commerce.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Workplace Culture.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Corporate Governance.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Leadership.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Organizational Development.
|2 bisacsh
|
650 |
|
7 |
|a Business
|x Data processing
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Risk assessment
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Landoll, Douglas J.
|t Security risk assessment handbook.
|b 2nd ed.
|d Boca Raton, FL : CRC Press, ©2011
|z 9781439821480
|w (DLC) 2010043672
|w (OCoLC)619180196
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781439821497/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00037005
|
938 |
|
|
|a CRC Press
|b CRCP
|n CRC0KE11010PDF
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10473056
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 369042
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 6921734
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15917928
|
994 |
|
|
|a 92
|b IZTAP
|