|
|
|
|
LEADER |
00000nam a22000003a 4500 |
001 |
ebs901186e |
003 |
EBZ |
006 |
m o d |||||| |
007 |
cr|unu|||||||| |
008 |
110510s2011 ne ob 000 0 eng |
020 |
|
|
|z 9781597496155
|
020 |
|
|
|a 9781283526395 (online)
|
020 |
|
|
|a 9781597496162 (online)
|
035 |
|
|
|a (EBZ)ebs901186e
|
040 |
|
|
|a DLC
|d EBZ
|
042 |
|
|
|a pcc
|
050 |
0 |
0 |
|a TK5105.59
|b .W48 2011
|
100 |
1 |
|
|a Wheeler, Evan.
|
245 |
1 |
0 |
|a Security risk management
|h [electronic resource] :
|b building an information security risk management program from the ground up /
|c Evan Wheeler.
|
246 |
2 |
|
|a Security Risk Management: Building an Information Security Risk Management Program from the Ground Up
|
260 |
|
|
|a Amsterdam
|a Waltham, MA :
|b Syngress,
|c c2011.
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
8 |
|
|a Machine generated contents note: Part I - Introduction to Risk Management : The Security Evolution -- Risky Business -- The Risk Management Lifecycle -- Risk Profiling Part II - Risk Assessment and Analysis Techniques -- Formulating a Risk -- Risk Exposure Factors -- Security Controls & Services -- Risk Evaluation & Mitigation Strategies -- Reports & Consulting Chapter 10: Risk Assessment Techniques Part III - Building and Running a Risk Management Program -- hreat & Vulnerability Management -- Security Risk Reviews -- A Blueprint for Security -- Building a Program from Scratch Appendix A: Security Risk Profile Appendix B: Risk Models and Scales Appendix C: Architectural Risk Analysis Reference Tables.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Risk assessment.
|
650 |
|
0 |
|a Risk management.
|
773 |
0 |
|
|t eBook Business Collection (EBSCOhost) - North America
|d EBSCO
|
773 |
0 |
|
|t ProQuest Ebook Central - Academic Complete
|d ProQuest Info & Learning Co
|
773 |
0 |
|
|t ScienceDirect eBooks Collection
|d Elsevier Science
|
773 |
0 |
|
|t ScienceDirect eBooks - Computer Science 2011
|d Elsevier Science
|
773 |
0 |
|
|t EBSCO eBooks
|d EBSCO
|
773 |
0 |
|
|t eBook Academic Collection (EBSCOhost) – North America
|d EBSCO
|
776 |
1 |
|
|t Security risk management
|w (DLC)2011013125
|
856 |
4 |
0 |
|y Access Content Online(from eBook Business Collection (EBSCOhost) - North America)
|u https://ezproxy.msu.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e020mna&AN=365553
|z eBook Business Collection (EBSCOhost) - North America: 2011
|
856 |
4 |
0 |
|y Access Content Online(from ProQuest Ebook Central - Academic Complete)
|u https://ezproxy.msu.edu/login?url=https://ebookcentral.proquest.com/lib/michstate-ebooks/detail.action?docID=685406
|z ProQuest Ebook Central - Academic Complete: 2011
|
856 |
4 |
0 |
|y Access Content Online(from ScienceDirect eBooks Collection)
|u https://ezproxy.msu.edu/login?url=https://www.sciencedirect.com/science/book/9781597496155
|z ScienceDirect eBooks Collection: 2011
|
856 |
4 |
0 |
|y Access Content Online(from ScienceDirect eBooks - Computer Science 2011)
|u https://ezproxy.msu.edu/login?url=https://www.sciencedirect.com/science/book/9781597496155
|z ScienceDirect eBooks - Computer Science 2011: 2011
|
856 |
4 |
0 |
|y Access Content Online(from EBSCO eBooks)
|u https://ezproxy.msu.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=365553
|z EBSCO eBooks: 2011
|
856 |
4 |
0 |
|y Access Content Online(from eBook Academic Collection (EBSCOhost) – North America)
|u https://ezproxy.msu.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e000xna&AN=365553
|z eBook Academic Collection (EBSCOhost) – North America: 2011
|