Amazon cover image
Image from Amazon.com

Security risk management : building an information security risk management program from the ground up / Evan Wheeler.

By: Material type: TextTextPublication details: Amsterdam Waltham, MA : Syngress, c2011.Description: xx, 340 p. ; 24 cmISBN:
  • 9781597496155 (pbk.)
Subject(s): DDC classification:
  • 005.8/ W561s 23
Contents:
Machine generated contents note: Part I - Introduction to Risk Management : The Security Evolution -- Risky Business -- The Risk Management Lifecycle -- Risk Profiling Part II - Risk Assessment and Analysis Techniques -- Formulating a Risk -- Risk Exposure Factors -- Security Controls & Services -- Risk Evaluation & Mitigation Strategies -- Reports & Consulting Chapter 10: Risk Assessment Techniques Part III - Building and Running a Risk Management Program -- hreat & Vulnerability Management -- Security Risk Reviews -- A Blueprint for Security -- Building a Program from Scratch Appendix A: Security Risk Profile Appendix B: Risk Models and Scales Appendix C: Architectural Risk Analysis Reference Tables.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode Item holds
Book Book Daffodil International University Library General Stacks Non-fiction 005.8/ W561s (Browse shelf(Opens below)) 1 Available 027375
Book Book Daffodil International University Library General Stacks Non-fiction 005.8/ W561s (Browse shelf(Opens below)) 2 Available 027376
Book Book Daffodil International University Library General Stacks Non-fiction 005.8/ W561s (Browse shelf(Opens below)) 3 Available 027377
Book Book Daffodil International University Library General Stacks Non-fiction 005.8/ W561s (Browse shelf(Opens below)) 4 Available 027378
Book Book Daffodil International University Library General Stacks Non-fiction 005.8/ W561s (Browse shelf(Opens below)) 5 Available 027379
Total holds: 0

Includes bibliographical references.

Machine generated contents note: Part I - Introduction to Risk Management : The Security Evolution -- Risky Business -- The Risk Management Lifecycle -- Risk Profiling Part II - Risk Assessment and Analysis Techniques -- Formulating a Risk -- Risk Exposure Factors -- Security Controls & Services -- Risk Evaluation & Mitigation Strategies -- Reports & Consulting Chapter 10: Risk Assessment Techniques Part III - Building and Running a Risk Management Program -- hreat & Vulnerability Management -- Security Risk Reviews -- A Blueprint for Security -- Building a Program from Scratch Appendix A: Security Risk Profile Appendix B: Risk Models and Scales Appendix C: Architectural Risk Analysis Reference Tables.

There are no comments on this title.

to post a comment.