Risk Management for Computer Security: Protecting Your Network and Information Assets
Autor Andy Jones, Debi Ashendenen Limba Engleză Paperback – 27 apr 2005
This book is organized into five sections. Section I introduces the reader to the theories of risk management and describes the field's changing environment as well as the art of managing risks. Section II deals with threat assessment and its input to risk assessment; topics covered include the threat assessment method and an example of threat assessment. Section III focuses on operating system vulnerabilities and discusses application vulnerabilities; public domain vs. COTS; and connectivity and dependence. Section IV explains what risk assessment is and Section V explores qualitative vs. quantitative tools and types of risk assessment and concludes with an assessment of the future of risk management.
Corporate security professionals around the world will find this book a highly valuable source of information.
- Presents material in an engaging, easy-to-follow manner that will appeal to both advanced INFOSEC career professionals and network administrators entering the information security profession
- Addresses the needs of both the individuals who are new to the subject as well as of experienced professionals
- Provides insight into the factors that need to be considered and fully explains the numerous methods, processes and procedures of risk management
Preț: 367.69 lei
Preț vechi: 459.61 lei
-20% Nou
Puncte Express: 552
Preț estimativ în valută:
70.36€ • 74.02$ • 58.26£
70.36€ • 74.02$ • 58.26£
Carte tipărită la comandă
Livrare economică 14-28 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780750677950
ISBN-10: 0750677953
Pagini: 296
Dimensiuni: 152 x 229 x 19 mm
Greutate: 0.47 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 0750677953
Pagini: 296
Dimensiuni: 152 x 229 x 19 mm
Greutate: 0.47 kg
Editura: ELSEVIER SCIENCE
Public țintă
Corporate security professionals around the world.Cuprins
Section
I:
An
Introduction
to
Risk
Management:
Introduction
to
the
Theories
of
Risk
Management;
The
Changing
Environment;
The
Art
of
Managing
Risks;
Section
II:
The
Threat
Assessment
Process:
Threat
Assessment
and
its
Input
to
Risk
Assessment;
Threat
Assessment
Method;
Example
Threat
Assessment;
Section
III:
Vulnerability
Issues:
Operating
System
Vulnerabilities;
Application
Vulnerabilities;
Public
Domain
or
COTS?;
Connectivity
and
Dependence;
Section
IV:
The
Risk
Process:
What
is
Risk
Assessment?;
Risk
Analysis;
Who
is
Responsible?;
Section
V:/Tools
and
Types
of
Risk
Assessment:
Qualitative
versus
Quantitative;
The
Policies,
Procedures,
Plans
and
Processes
of
Risk
Management;
Tools
and
Techniques;
Integrated
Risk
Management;
The
Future
of
the
Risk
Management