000 02146nam a2200361 i 4500
999 _c6946
_d6946
001 801811803
005 20230604140549.0
008 120726s2011 ne a b 001 0 eng d
020 _a9781597496162
020 _a1597496162
040 _aUMI
_cUMI
_erda
082 0 4 _221
_a005.8
_bW.E.S
100 1 _aWheeler, Evan.
_eauthor
245 1 0 _aSecurity risk management :
_bbuilding an information security risk management program from the ground up /
_cEvan Wheeler ; Technical editor, Kenneth Swick.
264 1 _aAmsterdam ;
_aWaltham, MA :
_bSyngress,
_c[2011]
300 _a1 volume :
_billustrations ;
_c24 cm
336 _2rdacontent
_atext
337 _2rdamedia
_aunmediated
338 _2rdacarrier
_avolume
504 _aIncludes bibliographical references and index.
505 0 _aPart I: Introduction to risk management -- The security evolution -- Risky business -- The risk management lifecycle -- Part II: Risk assessment and analysis techniques -- Risk profiling -- Formulating a risk -- Risk exposure factors -- Security controls and services -- Risk evaluation and mitigation strategies -- Reports and consulting -- Risk assessment techniques -- Part III: Building and running a risk management program -- Threat and vulnerability management -- Security risk reviews -- A blueprint for security -- Building a program from scratch-- Appendix A: Security risk profile -- Appendix B: Qualitative risk scale reference tables -- Appendix C: Architectural risk analysis reference tables.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputer security
_xManagement.
650 0 _aRisk management
_xSecurity measures.
650 0 _aRisk management.
700 1 _aSwick, Kenneth.
_eauthor
740 0 _aSafari books online.
856 4 _zConnect to this resource online
_uhttp://proquest.safaribooksonline.com/?uiCode=ohlink&xmlId=9781597496155
856 4 _zConnect to this resource online (off-campus acces)
_uhttp://proxy.ohiolink.edu:9099/login?url=http://proquest.safaribooksonline.com/?uiCode=ohlink&xmlId=9781597496155
942 _cBK
_2ddc