The security risk assessment handbook : a complete guide for performing security risk assessments / Douglas Landoll.
Material type: TextLanguage: English Publication details: Boca Raton, FL : CRC Press, 2010Edition: 2nd edDescription: xix, 475 p. : col. ill. ; 24 cmISBN: 9781439821480 (hardback)Subject(s): Business -- Data processing -- Security measures | Computer security | Data protection | Risk assessmentLOC classification: HF5548.37 | .L358 2010Summary: "The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional development. It also enables security consumers to better negotiate the scope and rigor of a security assessment, effectively interface with a security assessment team, deliver insightful comments on a draft report, and have a greater understanding of final report recommendations.This book can save time and money by eliminating guesswork as to what assessment steps to perform, and how to perform them. In addition, the book offers charts, checklists, examples, and templates that speed up data gathering, analysis, and document development. By improving the efficiency of the assessment process, security consultants can deliver a higher-quality service with a larger profit margin.<BR><BR>The text allows consumers to intelligently solicit and review proposals, positioning them to request affordable security risk assessments from quality vendors that meet the needs of their organizations"-- Provided by publisher.Summary: "The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment from a practical point of view. Designed for security professionals who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional development and experience. It also enables security consumers to better negotiate the scope and rigor of a security assessment, effectively interface with a security assessment team, deliver insightful comments on a draft report, and have a greater understanding of final report recommendations"-- Provided by publisher.Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
Book | University Of Fujairah | Main Library | HF5548.37 .L358 2010 (Browse shelf (Opens below)) | C.1 | Available | 001903 |
Browsing University Of Fujairah shelves, Collection: Main Library Close shelf browser (Hides shelf browser)
HF5548.325.D44 S48 2009 انتشار التجارة الإلكترونية في الاقتصادات النامية : أسلبو قائم على الموارد / | HF5548.325.D44 S48 2009 انتشار التجارة الإلكترونية في الاقتصادات النامية : أسلبو قائم على الموارد / | HF5548.37 .G67 2006 Managing cybersecurity resources : a cost-benefit analysis / | HF5548.37 .L358 2010 The security risk assessment handbook : a complete guide for performing security risk assessments / | HF5548.4.M525 S485 2001 Microsoft Office 2000. Introductory concepts and techniques / | HF5548.4.M525 S485 2001 Microsoft Office 2000. Introductory concepts and techniques / | HF5548.4.M525 W363 2001 Office XP for dummies / |
"The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional development. It also enables security consumers to better negotiate the scope and rigor of a security assessment, effectively interface with a security assessment team, deliver insightful comments on a draft report, and have a greater understanding of final report recommendations.This book can save time and money by eliminating guesswork as to what assessment steps to perform, and how to perform them. In addition, the book offers charts, checklists, examples, and templates that speed up data gathering, analysis, and document development. By improving the efficiency of the assessment process, security consultants can deliver a higher-quality service with a larger profit margin.<BR><BR>The text allows consumers to intelligently solicit and review proposals, positioning them to request affordable security risk assessments from quality vendors that meet the needs of their organizations"-- Provided by publisher.
"The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment from a practical point of view. Designed for security professionals who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional development and experience. It also enables security consumers to better negotiate the scope and rigor of a security assessment, effectively interface with a security assessment team, deliver insightful comments on a draft report, and have a greater understanding of final report recommendations"-- Provided by publisher.
Includes bibliographical references and index.
There are no comments on this title.