000 02835cam a22002414a 4500
008 101105s2010 flua g b 001 0 eng
020 _a9781439821480 (hardback)
040 _aAE-FuU
_cAE-ShKH
041 0 _aeng
050 0 0 _aHF5548.37
_b.L358 2010
100 1 _aLandoll, Douglas J.
_92145
245 1 4 _aThe security risk assessment handbook :
_ba complete guide for performing security risk assessments /
_cDouglas Landoll.
250 _a2nd ed.
260 _aBoca Raton, FL :
_bCRC Press,
_c2010.
300 _axix, 475 p. :
_bcol. ill. ;
_c24 cm.
520 _a"The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment. Designed for security professionals and their customers who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional development. It also enables security consumers to better negotiate the scope and rigor of a security assessment, effectively interface with a security assessment team, deliver insightful comments on a draft report, and have a greater understanding of final report recommendations.This book can save time and money by eliminating guesswork as to what assessment steps to perform, and how to perform them. In addition, the book offers charts, checklists, examples, and templates that speed up data gathering, analysis, and document development. By improving the efficiency of the assessment process, security consultants can deliver a higher-quality service with a larger profit margin.<BR><BR>The text allows consumers to intelligently solicit and review proposals, positioning them to request affordable security risk assessments from quality vendors that meet the needs of their organizations"--
_cProvided by publisher.
520 _a"The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides detailed insight into precisely how to conduct an information security risk assessment from a practical point of view. Designed for security professionals who want a more in-depth understanding of the risk assessment process, this volume contains real-world advice that promotes professional development and experience. It also enables security consumers to better negotiate the scope and rigor of a security assessment, effectively interface with a security assessment team, deliver insightful comments on a draft report, and have a greater understanding of final report recommendations"--
_cProvided by publisher.
504 _aIncludes bibliographical references and index.
650 0 _aBusiness
_xData processing
_xSecurity measures.
650 0 _aComputer security.
650 0 _aData protection.
_943
650 0 _aRisk assessment.
999 _c1088
_d1088