Image from Google Jackets

Security risk management : building an information security risk management program from the ground up / Evan Wheeler.

By: Material type: TextTextPublication details: Amsterdam Waltham, MA : Syngress, c2011.Description: xx, 340 p. : 24 cmISBN:
  • 9781597496155 (pbk.)
Subject(s): DDC classification:
  • 005.8 23
LOC classification:
  • TK5105.59 .W48 2011
Contents:
Machine generated contents note: Part I - Introduction to Risk Management : The Security Evolution -- Risky Business -- The Risk Management Lifecycle -- Risk Profiling Part II - Risk Assessment and Analysis Techniques -- Formulating a Risk -- Risk Exposure Factors -- Security Controls & Services -- Risk Evaluation & Mitigation Strategies -- Reports & Consulting Chapter 10: Risk Assessment Techniques Part III - Building and Running a Risk Management Program -- hreat & Vulnerability Management -- Security Risk Reviews -- A Blueprint for Security -- Building a Program from Scratch Appendix A: Security Risk Profile Appendix B: Risk Models and Scales Appendix C: Architectural Risk Analysis Reference Tables.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Books in General collection Books in General collection Mzuzu University Library and Learning Resources Centre TK5105.59 WHE 2011 (Browse shelf(Opens below)) 009685 Available MzULM-009685
Books in General collection Books in General collection Mzuzu University Library and Learning Resources Centre TK 5105.59 WHE 2011 (Browse shelf(Opens below)) 014959 Available MzULM-014959

Includes bibliographical references.

Machine generated contents note: Part I - Introduction to Risk Management : The Security Evolution -- Risky Business -- The Risk Management Lifecycle -- Risk Profiling Part II - Risk Assessment and Analysis Techniques -- Formulating a Risk -- Risk Exposure Factors -- Security Controls & Services -- Risk Evaluation & Mitigation Strategies -- Reports & Consulting Chapter 10: Risk Assessment Techniques Part III - Building and Running a Risk Management Program -- hreat & Vulnerability Management -- Security Risk Reviews -- A Blueprint for Security -- Building a Program from Scratch Appendix A: Security Risk Profile Appendix B: Risk Models and Scales Appendix C: Architectural Risk Analysis Reference Tables.

There are no comments on this title.

to post a comment.

Powered by Koha