๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Risk management for computer security : Protecting your network and information assets

โœ Scribed by Andy Jones; Debi Ashenden


Publisher
Elsevier Butterworth-Heinemann
Year
2005
Tongue
English
Leaves
297
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program.

โœฆ Table of Contents



Content: Cover --
Copyright Page --
Contents --
Foreword --
Preface --
Acknowledgments --
About the Authors --
Section I: An Introduction to Risk Management --
Chapter 1. Introduction to the Theories of Risk Management --
Chapter 2. The Changing Environment --
Chapter 3. The Art of Managing Risks --
Section II: The Threat Assessment Process --
Chapter 4. Threat Assessment and Its Input to Risk Assessment --
Chapter 5. Threat Assessment Method --
Chapter 6. Example Threat Assessment --
Section III: Vulnerability Issues --
Chapter 7. Operating System Vulnerabilities --
Chapter 8. Application Vulnerabilities --
Chapter 9. Public Domain or Commercial Off-the-Shelf Software? --
Chapter 10. Connectivity and Dependence --
Section IV: The Risk Process --
Chapter 11. What Is Risk Assessment? --
Chapter 12. Risk Analysis --
Chapter 13. Who Is Responsible? --
Section V: Tools and Types of Risk Assessment --
Chapter 14. Qualitative and Quantitative Risk Assessment --
Chapter 15. Policies, Procedures, Plans, and Processes of Risk Management --
Chapter 16. Tools and Techniques --
Chapter 17. Integrated Risk Management --
Section VI: Future Directions --
Chapter 18. The Future of Risk Management --
Index --
Last Page.
Abstract: Provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program


๐Ÿ“œ SIMILAR VOLUMES


Risk Management for Computer Security: P
โœ Andy Jones, Debi Ashenden ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐ŸŒ English

The information systems security (InfoSec) profession remains one of the fastest growing professions in the world today. With the advent of the Internet and its use as a method of conducting business, even more emphasis is being placed on InfoSec. However, there is an expanded field of threats that

Managing Risk and Information Security:
โœ Malcolm Harkins ๐Ÿ“‚ Library ๐Ÿ“… 2012 ๐Ÿ› Apress ๐ŸŒ English

Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from lo

Managing Risk and Information Security:
โœ Malcolm Harkins (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Apress ๐ŸŒ English

<p><em>Managing Risk and Information Security: Protect to Enable</em>, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must s

Managing risk and information security:
โœ Harkins, Malcolm ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Apress ๐ŸŒ English

This ApressOpen book describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing a

Managing risk and information security:
โœ Harkins, Malcolm ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Apress ๐ŸŒ English

This ApressOpen book describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing a