000 01729nam a22002894a 4500
005 20250918153147.0
008 120414s2011 ne b 000 0 eng
020 _a9781597496155 (pbk.)
_cRM154.85
039 9 _a201207041658
_brosli
_c201206202146
_dmazarita
_y04-14-2012
_zmazarita
040 _aDLC
_cDLC
_dDLC
_dUKM
090 _aTK5105.59.W484
090 _aTK5105.59
_b.W484
100 1 _aWheeler, Evan.
245 1 0 _aSecurity risk management :
_bbuilding an information security risk management program from the ground up /
_cEvan Wheeler.
260 _aAmsterdam :
_bSyngress,
_c2011.
300 _axx, 340 p. ;
_c24 cm.
504 _aIncludes bibliographical references.
505 8 _aMachine generated contents note: Part I - Introduction to Risk Management : The Security Evolution -- Risky Business -- The Risk Management Lifecycle -- Risk Profiling Part II - Risk Assessment and Analysis Techniques -- Formulating a Risk -- Risk Exposure Factors -- Security Controls & Services -- Risk Evaluation & Mitigation Strategies -- Reports & Consulting Chapter 10: Risk Assessment Techniques Part III - Building and Running a Risk Management Program -- hreat & Vulnerability Management -- Security Risk Reviews -- A Blueprint for Security -- Building a Program from Scratch Appendix A: Security Risk Profile Appendix B: Risk Models and Scales Appendix C: Architectural Risk Analysis Reference Tables.
650 0 _aComputer networks
_xSecurity measures.
907 _a.b15326524
_b2021-05-28
_c2019-11-12
942 _c01
_n0
_kTK5105.59.W484
914 _avtls003496772
990 _ark4
991 _aFakulti Teknologi dan Sains Maklumat
998 _al
_b2012-01-04
_cm
_da
_feng
_gne
_y0
_z.b15326524
999 _c516484
_d516484