THE SECURITY RISK ASSESSMENT HANDBOOK A Complete Guide for Performing Security Risk Assessments
The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment from a practical point of view.
Saved in:
Main Author: | |
---|---|
Format: | Book |
Language: | English |
Published: |
Boca Raton
CRC Press
2020
|
Edition: | Print Book, English, 2020 |
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000nam a2200000#i 4501 | ||
---|---|---|---|
001 | wils-982590 | ||
005 | 2022619145429 | ||
008 | 221019t20202011-US ag# ##101 #beng#D | ||
020 | # | # | |a 9780367659295 |q paperback |
040 | # | # | |a UiTM |b eng |c UiTM |e rda |
041 | 0 | # | |a eng |
090 | 0 | 0 | |a HF5548.37 |b .L36 2020 |
100 | 1 | # | |a Landoll, Douglas J. |e author |
245 | 0 | 0 | |a THE SECURITY RISK ASSESSMENT HANDBOOK |b A Complete Guide for Performing Security Risk Assessments |c DOUGLAS J. LANDOLL |
250 | # | # | |a Print Book, English, 2020 |b SECOND EDITION |
264 | # | 1 | |a Boca Raton |b CRC Press |c 2020 |
264 | # | 4 | |c ©2011 |
300 | # | # | |a xix, 475 pages |b color illustrations |c 24 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
500 | # | # | |a Previous edition: Boca Raton, Fla.: Auerbach, 2006 |
504 | # | # | |a Includes bibliographical references and index |
505 | 0 | # | |a Introduction. Information Security Risk Assessment Basics. Project Definition. Security Risk Assessment Preparation. Data Gathering. Administrative Data Gathering. Technical Data Gathering. Physical Data Gathering. Security Risk Analysis. Security Risk Mitigation. Security Risk Assessment Reporting. Security Risk Assessment Project Management. Security Risk Assessment Approaches. Index. |
520 | # | # | |a The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment from a practical point of view. |
526 | 0 | # | |a Master of Science In Cybersecurity and Digital Forensics |b Textbook |5 UiTM Shah Alam |
546 | # | # | |a In English |
650 | 1 | 0 | |a Business |v Data processing |x Security measures |
650 | 2 | 0 | |a Computer Security |
650 | 2 | 0 | |a Data protection |
650 | 2 | 0 | |a Risk assessment |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=982590 |
964 | # | # | |c BOK |d 01 |
998 | # | # | |a 00250##a006.11||00250##b006.11||00264#1a006.11||00264#1b006.11||00300##a006.11||00300##b006.11||00300##c006.11||00500##a006.11||00520##a006.11||00520##b006.11||00546##a006.11|| |