Risk Management for Computer Security
Autor Andy Jones, Debi Ashendenen Limba Engleză Paperback – mar 2005
This book is organized into five sections. Section I introduces the reader to the theories of risk management and describes the field's changing environment as well as the art of managing risks. Section II deals with threat assessment and its input to risk assessment; topics covered include the threat assessment method and an example of threat assessment. Section III focuses on operating system vulnerabilities and discusses application vulnerabilities; public domain vs. COTS; and connectivity and dependence. Section IV explains what risk assessment is and Section V explores qualitative vs. quantitative tools and types of risk assessment and concludes with an assessment of the future of risk management.
Corporate security professionals around the world will find this book a highly valuable source of information.
- Presents material in an engaging, easy-to-follow manner that will appeal to both advanced INFOSEC career professionals and network administrators entering the information security profession
- Addresses the needs of both the individuals who are new to the subject as well as of experienced professionals
- Provides insight into the factors that need to be considered and fully explains the numerous methods, processes and procedures of risk management
Preț: 359.87 lei
Preț vechi: 449.84 lei
-20%
Puncte Express: 540
Carte tipărită la comandă
Livrare economică 22 iunie-06 iulie
Specificații
ISBN-13: 9780750677950
ISBN-10: 0750677953
Pagini: 298
Dimensiuni: 152 x 229 x 16 mm
Greutate: 0.4 kg
Editura: Elsevier Inc
ISBN-10: 0750677953
Pagini: 298
Dimensiuni: 152 x 229 x 16 mm
Greutate: 0.4 kg
Editura: Elsevier Inc
Public țintă
Corporate security professionals around the world.Cuprins
Section I: An Introduction to Risk Management: Introduction to the Theories of Risk Management; The Changing Environment; The Art of Managing Risks; Section II: The Threat Assessment Process: Threat Assessment and its Input to Risk Assessment; Threat Assessment Method; Example Threat Assessment; Section III: Vulnerability Issues: Operating System Vulnerabilities; Application Vulnerabilities; Public Domain or COTS?; Connectivity and Dependence; Section IV: The Risk Process: What is Risk Assessment?; Risk Analysis; Who is Responsible?; Section V:/Tools and Types of Risk Assessment: Qualitative versus Quantitative; The Policies, Procedures, Plans and Processes of Risk Management; Tools and Techniques; Integrated Risk Management; The Future of the Risk Management