Security risk management : building an information security risk management program from the ground up /

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix s...

Full description

Saved in:
Bibliographic Details
Main Author: Wheeler, Evan
Format: Electronic eBook
Language:English
Published: Waltham, MA : Syngress, ©2011.
Series:ITPro.
Subjects:
Online Access:CONNECT
CONNECT
CONNECT

MARC

LEADER 00000cam a2200000 a 4500
001 mig00005490577
006 m o d
007 cr cn|||||||||
008 110512s2011 mau ob 001 0 eng d
005 20240708165525.3
016 7 |a 015758345  |2 Uk 
019 |a 726845922  |a 768975518  |a 801811803  |a 828498352  |a 980911393 
020 |a 9781597496155  |q (electronic bk.) 
020 |a 1597496154  |q (electronic bk.) 
020 |a 9781597496162  |q (electronic bk.) 
020 |a 1597496162  |q (electronic bk.) 
035 |a 1WRLDSHRocn722800242 
035 |a (OCoLC)722800242  |z (OCoLC)726845922  |z (OCoLC)768975518  |z (OCoLC)801811803  |z (OCoLC)828498352  |z (OCoLC)980911393 
037 |a D3A1E47E-9022-4427-8494-1390CBB56C22  |b OverDrive, Inc.  |n http://www.overdrive.com 
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OCLCQ  |d N$T  |d E7B  |d YDXCP  |d UKMGB  |d OCLCQ  |d DKDLA  |d TEF  |d DEBSZ  |d ALAUL  |d CDX  |d OCLCQ  |d B24X7  |d OCLCQ  |d TEFOD  |d MNU  |d U9X  |d OCLCF  |d TEFOD  |d OCLCQ  |d COO  |d OCLCQ  |d LOA  |d UMI  |d C6I  |d ICA  |d AGLDB  |d CNNOR  |d K6U  |d PIFAG  |d FVL  |d LIV  |d OCLCQ  |d U3W  |d D6H  |d OCL  |d STF  |d WRM  |d VNS  |d VTS  |d INT  |d VT2  |d CEF  |d OCLCQ  |d WYU  |d G3B  |d TKN  |d OCLCQ  |d UAB  |d LEAUB  |d AU@  |d M8D  |d UKAHL  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCL  |d SXB  |d OCLCQ  |d OCLCO 
049 |a TXMM 
050 4 |a HD61  |b .W44 2011eb 
082 0 4 |a 658.15/5  |2 22 
100 1 |a Wheeler, Evan.  |1 https://id.oclc.org/worldcat/entity/E39PCjygQv6FyhKMwHjcHgypxC 
245 1 0 |a Security risk management :  |b building an information security risk management program from the ground up /  |c Evan Wheeler. 
260 |a Waltham, MA :  |b Syngress,  |c ©2011. 
300 |a 1 online resource (xxi, 340 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file  |2 rda 
504 |a Includes bibliographical references and index. 
505 0 |a Introduction to Risk Management -- Risk Assessment and Analysis Techniques -- Building and Running a Risk Management Program. 
520 |a The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain why. This book will help you to break free from the so-called "best practices" argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive guide for managing security risks. Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investment. Explores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate risk. Presents a roadmap for designing and implementing a security risk management program. 
588 0 |a Print version record. 
500 |a ScienceDirect eBook - Computer Science 2011 (Elsevier and Woodhead)  |5 TMurS 
500 |a EBSCO eBook Business Collection  |5 TMurS 
500 |a EBSCO eBook Academic Comprehensive Collection North America  |5 TMurS 
500 |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access)  |5 TMurS 
650 0 |a Risk management. 
650 0 |a Risk management  |x Security measures. 
730 0 |a WORLDSHARE SUB RECORDS 
758 |i has work:  |a Security risk management (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFYrpMq8JkTTBQW6VKXWpd  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |t Security Risk Management.  |d Syngress Media Inc 2011  |z 9781597496155  |w (OCoLC)692291806 
830 0 |a ITPro. 
856 4 0 |u https://ezproxy.mtsu.edu/login?url=https://www.sciencedirect.com/science/book/9781597496155  |z CONNECT  |3 Elsevier  |t 0 
856 4 0 |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=365553&authtype=ip,sso&custid=s4672406  |z CONNECT  |3 eBooks on EBSCOhost  |t 0 
856 4 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781597496155/?ar  |z CONNECT  |3 O'Reilly  |t 0 
949 |a ho0 
994 |a 92  |b TXM 
998 |a wi  |d z 
999 f f |s 0dddebf8-9f6f-4e95-9f98-0c54b54e894d  |i 76613f71-7fa3-46d5-9506-25c51ddf0c0a  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 0  |e HD61 .W44 2011eb  |h Library of Congress classification