| 000 | 01729nam a22002894a 4500 | ||
|---|---|---|---|
| 005 | 20250918153147.0 | ||
| 008 | 120414s2011 ne b 000 0 eng | ||
| 020 |
_a9781597496155 (pbk.) _cRM154.85 |
||
| 039 | 9 |
_a201207041658 _brosli _c201206202146 _dmazarita _y04-14-2012 _zmazarita |
|
| 040 |
_aDLC _cDLC _dDLC _dUKM |
||
| 090 | _aTK5105.59.W484 | ||
| 090 |
_aTK5105.59 _b.W484 |
||
| 100 | 1 | _aWheeler, Evan. | |
| 245 | 1 | 0 |
_aSecurity risk management : _bbuilding an information security risk management program from the ground up / _cEvan Wheeler. |
| 260 |
_aAmsterdam : _bSyngress, _c2011. |
||
| 300 |
_axx, 340 p. ; _c24 cm. |
||
| 504 | _aIncludes bibliographical references. | ||
| 505 | 8 | _aMachine generated contents note: Part I - Introduction to Risk Management : The Security Evolution -- Risky Business -- The Risk Management Lifecycle -- Risk Profiling Part II - Risk Assessment and Analysis Techniques -- Formulating a Risk -- Risk Exposure Factors -- Security Controls & Services -- Risk Evaluation & Mitigation Strategies -- Reports & Consulting Chapter 10: Risk Assessment Techniques Part III - Building and Running a Risk Management Program -- hreat & Vulnerability Management -- Security Risk Reviews -- A Blueprint for Security -- Building a Program from Scratch Appendix A: Security Risk Profile Appendix B: Risk Models and Scales Appendix C: Architectural Risk Analysis Reference Tables. | |
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 907 |
_a.b15326524 _b2021-05-28 _c2019-11-12 |
||
| 942 |
_c01 _n0 _kTK5105.59.W484 |
||
| 914 | _avtls003496772 | ||
| 990 | _ark4 | ||
| 991 | _aFakulti Teknologi dan Sains Maklumat | ||
| 998 |
_al _b2012-01-04 _cm _da _feng _gne _y0 _z.b15326524 |
||
| 999 |
_c516484 _d516484 |
||