Risk management for computer security : Protecting your network and information assets / by Andy Jones & Debi Ashenden.
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- text
- computer
- online resource
- 9780080491554
- 0080491553
- 9780750677950
- 0750677953
- 1281006831
- 9781281006837
- 9786611006839
- 6611006834
- Industrial safety -- Management
- Computer security
- Risk management
- Computer Security
- Risk Management
- Gestion du risque
- Sécurité informatique
- Sécurité du travail -- Gestion
- risk management
- BUSINESS & ECONOMICS -- Workplace Culture
- BUSINESS & ECONOMICS -- Corporate Governance
- BUSINESS & ECONOMICS -- Leadership
- BUSINESS & ECONOMICS -- Organizational Development
- Computer security
- Industrial safety -- Management
- 658.4/78 22
- T55 .J655 2005eb
Item type | Home library | Collection | Call number | Materials specified | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
![]() |
OPJGU Sonepat- Campus | E-Books EBSCO | Available |
Includes bibliographical references and index.
Cover -- Copyright Page -- Contents -- Foreword -- Preface -- Acknowledgments -- About the Authors -- Section I: An Introduction to Risk Management -- Chapter 1. Introduction to the Theories of Risk Management -- Chapter 2. The Changing Environment -- Chapter 3. The Art of Managing Risks -- Section II: The Threat Assessment Process -- Chapter 4. Threat Assessment and Its Input to Risk Assessment -- Chapter 5. Threat Assessment Method -- Chapter 6. Example Threat Assessment -- Section III: Vulnerability Issues -- Chapter 7. Operating System Vulnerabilities -- Chapter 8. Application Vulnerabilities -- Chapter 9. Public Domain or Commercial Off-the-Shelf Software? -- Chapter 10. Connectivity and Dependence -- Section IV: The Risk Process -- Chapter 11. What Is Risk Assessment? -- Chapter 12. Risk Analysis -- Chapter 13. Who Is Responsible? -- Section V: Tools and Types of Risk Assessment -- Chapter 14. Qualitative and Quantitative Risk Assessment -- Chapter 15. Policies, Procedures, Plans, and Processes of Risk Management -- Chapter 16. Tools and Techniques -- Chapter 17. Integrated Risk Management -- Section VI: Future Directions -- Chapter 18. The Future of Risk Management -- Index -- Last Page.
Print version record.
Provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program.
English.
eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide
There are no comments on this title.