THE SECURITY RISK ASSESSMENT HANDBOOK A Complete Guide for Performing Security Risk Assessments

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment from a practical point of view.

Saved in:
Bibliographic Details
Main Author: Landoll, Douglas J. (Author)
Format: Book
Language:English
Published: Boca Raton CRC Press 2020
Edition:Print Book, English, 2020
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000#i 4501
001 wils-982590
005 2022619145429
008 221019t20202011-US ag# ##101 #beng#D
020 # # |a 9780367659295  |q paperback 
040 # # |a UiTM  |b eng  |c UiTM  |e rda 
041 0 # |a eng 
090 0 0 |a HF5548.37  |b .L36 2020 
100 1 # |a Landoll, Douglas J.  |e author 
245 0 0 |a THE SECURITY RISK ASSESSMENT HANDBOOK  |b A Complete Guide for Performing Security Risk Assessments  |c DOUGLAS J. LANDOLL 
250 # # |a Print Book, English, 2020  |b SECOND EDITION 
264 # 1 |a Boca Raton  |b CRC Press  |c 2020 
264 # 4 |c ©2011 
300 # # |a xix, 475 pages  |b color illustrations  |c 24 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
500 # # |a Previous edition: Boca Raton, Fla.: Auerbach, 2006 
504 # # |a Includes bibliographical references and index 
505 0 # |a Introduction. Information Security Risk Assessment Basics. Project Definition. Security Risk Assessment Preparation. Data Gathering. Administrative Data Gathering. Technical Data Gathering. Physical Data Gathering. Security Risk Analysis. Security Risk Mitigation. Security Risk Assessment Reporting. Security Risk Assessment Project Management. Security Risk Assessment Approaches. Index. 
520 # # |a The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment from a practical point of view. 
526 0 # |a Master of Science In Cybersecurity and Digital Forensics  |b Textbook  |5 UiTM Shah Alam 
546 # # |a In English 
650 1 0 |a Business  |v Data processing  |x Security measures 
650 2 0 |a Computer Security 
650 2 0 |a Data protection 
650 2 0 |a Risk assessment 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=982590 
964 # # |c BOK  |d 01 
998 # # |a 00250##a006.11||00250##b006.11||00264#1a006.11||00264#1b006.11||00300##a006.11||00300##b006.11||00300##c006.11||00500##a006.11||00520##a006.11||00520##b006.11||00546##a006.11||