Cargando…

Assessing and Managing Security Risk in IT Systems

This book begins with an overview of information systems security, offering the basic underpinnings of information security and concluding with an analysis of risk management. Part II describes the McCumber Cube, providing the original paper from 1991 and detailing ways to accurately map information...

Descripción completa

Detalles Bibliográficos
Autor principal: McCumber, John
Formato: Electrónico eBook
Idioma:Indeterminado
Publicado: [S.l.] : Auerbach Publications, 2004.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mu 4500
001 OR_on1202569836
003 OCoLC
005 20231017213018.0
006 m d
007 cr |n|||||||||
008 201010s2004 xx o ||| 0 und d
040 |a VT2  |b eng  |c VT2  |d TOH  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |a 9781135488963 
020 |a 1135488967 
035 |a (OCoLC)1202569836 
082 0 4 |a 005.8  |q OCoLC  |2 22/eng/20230216 
049 |a UAMI 
100 1 |a McCumber, John. 
245 1 0 |a Assessing and Managing Security Risk in IT Systems  |h [electronic resource] /  |c John McCumber. 
260 |a [S.l.] :  |b Auerbach Publications,  |c 2004. 
300 |a 1 online resource 
500 |a Title from content provider. 
520 |a This book begins with an overview of information systems security, offering the basic underpinnings of information security and concluding with an analysis of risk management. Part II describes the McCumber Cube, providing the original paper from 1991 and detailing ways to accurately map information flow in computer and telecom systems. It also explains how to apply the methodology to individual system components and subsystems. Part III serves as a resource for analysts and security practitioners who want access to more detailed information on technical vulnerabilities and risk assessment analytics. McCumber details how information extracted from this resource can be applied to his assessment processes. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Risk assessment. 
650 0 |a Data protection. 
650 2 |a Computer Security 
650 2 |a Risk Assessment 
650 6 |a Sécurité informatique. 
650 6 |a Évaluation du risque. 
650 6 |a Protection de l'information (Informatique) 
650 7 |a risk assessment.  |2 aat 
650 7 |a Risk assessment  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Computer security  |2 fast 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780203490426/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP