Matches in Library of Congress for { <http://lccn.loc.gov/2011013125> ?p ?o. }
Showing items 1 to 21 of
21
with 100 items per page.
- 2011013125 contributor B12115055.
- 2011013125 created "c2011.".
- 2011013125 date "2011".
- 2011013125 date "c2011.".
- 2011013125 dateCopyrighted "c2011.".
- 2011013125 description "Includes bibliographical references.".
- 2011013125 description "Machine generated contents note: Part I - Introduction to Risk Management : The Security Evolution -- Risky Business -- The Risk Management Lifecycle -- Risk Profiling Part II - Risk Assessment and Analysis Techniques -- Formulating a Risk -- Risk Exposure Factors -- Security Controls & Services -- Risk Evaluation & Mitigation Strategies -- Reports & Consulting Chapter 10: Risk Assessment Techniques Part III - Building and Running a Risk Management Program -- hreat & Vulnerability Management -- Security Risk Reviews -- A Blueprint for Security -- Building a Program from Scratch Appendix A: Security Risk Profile Appendix B: Risk Models and Scales Appendix C: Architectural Risk Analysis Reference Tables.".
- 2011013125 extent "xx, 340 p. ;".
- 2011013125 identifier "9781597496155 (pbk.)".
- 2011013125 issued "2011".
- 2011013125 issued "c2011.".
- 2011013125 language "eng".
- 2011013125 publisher "Amsterdam Waltham, MA : Syngress,".
- 2011013125 subject "005.8 23".
- 2011013125 subject "Computer networks Security measures.".
- 2011013125 subject "Risk assessment.".
- 2011013125 subject "Risk management.".
- 2011013125 subject "TK5105.59 .W48 2011".
- 2011013125 tableOfContents "Machine generated contents note: Part I - Introduction to Risk Management : The Security Evolution -- Risky Business -- The Risk Management Lifecycle -- Risk Profiling Part II - Risk Assessment and Analysis Techniques -- Formulating a Risk -- Risk Exposure Factors -- Security Controls & Services -- Risk Evaluation & Mitigation Strategies -- Reports & Consulting Chapter 10: Risk Assessment Techniques Part III - Building and Running a Risk Management Program -- hreat & Vulnerability Management -- Security Risk Reviews -- A Blueprint for Security -- Building a Program from Scratch Appendix A: Security Risk Profile Appendix B: Risk Models and Scales Appendix C: Architectural Risk Analysis Reference Tables.".
- 2011013125 title "Security risk management : building an information security risk management program from the ground up / Evan Wheeler.".
- 2011013125 type "text".