Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--
Image from Google Jackets

Security risk management : building an information security risk management program from the ground up / Evan Wheeler ; Technical editor, Kenneth Swick.

By: Contributor(s): Material type: TextTextPublisher: Amsterdam ; Waltham, MA : Syngress, [2011]Description: 1 volume : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781597496162
  • 1597496162
Subject(s): DDC classification:
  • 21 005.8 W.E.S
Online resources:
Contents:
Part I: Introduction to risk management -- The security evolution -- Risky business -- The risk management lifecycle -- Part II: Risk assessment and analysis techniques -- Risk profiling -- Formulating a risk -- Risk exposure factors -- Security controls and services -- Risk evaluation and mitigation strategies -- Reports and consulting -- Risk assessment techniques -- Part III: Building and running a risk management program -- Threat and vulnerability management -- Security risk reviews -- A blueprint for security -- Building a program from scratch-- Appendix A: Security risk profile -- Appendix B: Qualitative risk scale reference tables -- Appendix C: Architectural risk analysis reference tables.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Books Books Main library A2 Computers & Information Technology ( Computer Science ) 005.8 W.E.S (Browse shelf(Opens below)) 1 Available 00009281
Books Books Main library A2 Computers & Information Technology ( Computer Science ) 005.8 W.E.S (Browse shelf(Opens below)) 2 Available 00009364

Includes bibliographical references and index.

Part I: Introduction to risk management -- The security evolution -- Risky business -- The risk management lifecycle -- Part II: Risk assessment and analysis techniques -- Risk profiling -- Formulating a risk -- Risk exposure factors -- Security controls and services -- Risk evaluation and mitigation strategies -- Reports and consulting -- Risk assessment techniques -- Part III: Building and running a risk management program -- Threat and vulnerability management -- Security risk reviews -- A blueprint for security -- Building a program from scratch-- Appendix A: Security risk profile -- Appendix B: Qualitative risk scale reference tables -- Appendix C: Architectural risk analysis reference tables.

There are no comments on this title.

to post a comment.