|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn842430710 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
130510s2012 mau o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d COO
|d DEBSZ
|d UKDOC
|d OCLCQ
|d OCLCF
|d EBLCP
|d YDXCP
|d OCLCQ
|d MERUC
|d OCLCQ
|d OCLCA
|d CEF
|d OCLCQ
|d UAB
|d AU@
|d OCLCQ
|d OCLCA
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 818866966
|
020 |
|
|
|a 9781597499750
|
020 |
|
|
|a 1597499757
|
020 |
|
|
|z 9781597497350
|
020 |
|
|
|z 1597497355
|
029 |
1 |
|
|a AU@
|b 000050634049
|
029 |
1 |
|
|a AU@
|b 000051433082
|
029 |
1 |
|
|a DEBBG
|b BV041121660
|
029 |
1 |
|
|a DEBSZ
|b 396765807
|
029 |
1 |
|
|a DEBSZ
|b 431251908
|
035 |
|
|
|a (OCoLC)842430710
|z (OCoLC)818866966
|
037 |
|
|
|a CL0500000215
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b T336 2012
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Talabis, Mark Ryan M.
|
245 |
1 |
0 |
|a Information security risk assessment toolkit :
|b practical assessments through data collection and data analysis /
|c Mark Ryan M. Talabis, Jason L. Martin ; Evan Wheeler, technical editor.
|
260 |
|
|
|a Waltham, MA :
|b Syngress/Elsevier,
|c ©2012.
|
300 |
|
|
|a 1 online resource (1 volume)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Information security risk assessments -- Information security risk assessment : a practical approach -- Information security risk assessment : data collection -- Information security risk assessment data analysis -- Information security risk assessment : risk assessment -- Information security risk assessment : risk prioritization and treatment -- Information security risk assessment : reporting -- Information security risk assessment : maintenance and wrap up.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Ris.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Risk assessment.
|
650 |
|
0 |
|a Data mining.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
2 |
|a Risk Assessment
|
650 |
|
2 |
|a Data Mining
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Évaluation du risque.
|
650 |
|
6 |
|a Exploration de données (Informatique)
|
650 |
|
7 |
|a risk assessment.
|2 aat
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data mining
|2 fast
|
650 |
|
7 |
|a Risk assessment
|2 fast
|
700 |
1 |
|
|a Martin, Jason.
|
776 |
0 |
8 |
|i Print version:
|a Talabis, Mark.
|t Information security risk assessment toolkit.
|d Amsterdam : Boston : Elsevier, ©2013
|z 9781597497350
|w (DLC) 2012030643
|w (OCoLC)792877600
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781597497350/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a 123Library
|b 123L
|n 57495
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL1047930
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 9890154
|
994 |
|
|
|a 92
|b IZTAP
|