MARC details
000 -LEADER |
fixed length control field |
02835cam a22002414a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
101105s2010 flua g b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781439821480 (hardback) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
AE-FuU |
Transcribing agency |
AE-ShKH |
041 0# - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
HF5548.37 |
Item number |
.L358 2010 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Landoll, Douglas J. |
9 (RLIN) |
2145 |
245 14 - TITLE STATEMENT |
Title |
The security risk assessment handbook : |
Remainder of title |
a complete guide for performing security risk assessments / |
Statement of responsibility, etc. |
Douglas Landoll. |
250 ## - EDITION STATEMENT |
Edition statement |
2nd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Boca Raton, FL : |
Name of publisher, distributor, etc. |
CRC Press, |
Date of publication, distribution, etc. |
2010. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xix, 475 p. : |
Other physical details |
col. ill. ; |
Dimensions |
24 cm. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional development. It also enables security consumers to better negotiate the scope and rigor of a security assessment, effectively interface with a security assessment team, deliver insightful comments on a draft report, and have a greater understanding of final report recommendations.This book can save time and money by eliminating guesswork as to what assessment steps to perform, and how to perform them. In addition, the book offers charts, checklists, examples, and templates that speed up data gathering, analysis, and document development. By improving the efficiency of the assessment process, security consultants can deliver a higher-quality service with a larger profit margin.<BR><BR>The text allows consumers to intelligently solicit and review proposals, positioning them to request affordable security risk assessments from quality vendors that meet the needs of their organizations"-- |
Assigning source |
Provided by publisher. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment from a practical point of view. Designed for security professionals who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional development and experience. It also enables security consumers to better negotiate the scope and rigor of a security assessment, effectively interface with a security assessment team, deliver insightful comments on a draft report, and have a greater understanding of final report recommendations"-- |
Assigning source |
Provided by publisher. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Business |
General subdivision |
Data processing |
-- |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Data protection. |
9 (RLIN) |
43 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Risk assessment. |