Security Risk Management: Building an Information Security Risk Management P

Security Risk Management: Building an Information Security Risk Management P
sku: 2596828
$80.33
Shipping from: United Arab Emirates
   Description
Security Risk Management: Building an Information Security Risk Management P By Wheeler, Evan Published by Syngress Publishing Publication Date: 2011-06-24 Subject: Business & Economics Information Management, Computers Business & Productivity Software Business Intelligence, Computers Business & Productivity Software General, Computers Security General, Computers Business & Productivity Software - Business Intelligence, Computers Information Technology, Computers Security - General, Computer Security, Management Of Specific Areas, Enterprise Software, Knowledge Management, Operational Research, Computer Security, Business & Economics Information Management, Business & Economics, Information Management, Computers Security General, Computers, Security, General, Computers Business & Productivity Software Business Intelligence, Business & Productivity Software, Business Intelligence, Computers Business & Productivity Software General, Enterprise Software, Operational Research, Knowledge Management, Computer Networks - Security Measures, Anf: Computers And It Subject Keywords: 800-30; 800-37; accept; acceptable range; access control; access control model; accountability; action owner; active test; advisory; alert; analysis; application; approval; architectural risk analysis; artifacts; assessment; assessment steps; asset; audit; auditing; authentication; authorization; availability; avoid; baseline; best practices; bits; building; business impact assessment; certification; certification and accreditation; charts; checklist; client; code review; communication; compartmentalization; compensating controls; compliance; compliance to standards; confidentiality; consequences; constraint; consultant; content based; control requirements; controls; cost; criticality; cryptography; custodian; customer; data classification; default configuration; defense in depth; design; development; discretionary; documentation; due diligence; enforcement; engagement; event monitoring; executive; executive summary; facilitated; failure condition; FAIR; filtering; findings; findings summary; fraap; framework; gap analysis; graphs; impact; information flow; information security; inspection; integrity; interview; least privilege; lifecycle; likelihood; logging; management response; mitigate; mitigation plan; mitigation planning; model; models; modularity; monitoring; NIST; nonrepudiation; notification; octave; octave allegro; operations; optimization; owner; passive test; pattern; PCI; peltier; penetration test; perimeter; planning; policy; policy exception; prerequisites; presentation; principles; prioritization; process; processes; profile; profiling; program development; project; purpose; qualification; qualitative; quantitative; questionnaire; rating; regulator; remediation; report; residual risk; resilience; resource; responsibility; risk acceptance; risk activities; risk analysis; risk appetite; risk area; risk assessment; risk decision; risk description; risk domain; risk evaluation; risk exposure; risk management; risk measure; risk model; risk review Genre: Computer Security, Business & Economics, Information Management, Computers, Security, General, Computers, Business & Productivity Software, Business Intelligence, Computers, Business & Productivity Software, General, Computer Security, Enterprise Software, Operational Research, Knowledge Management Target Audience: Professional and scholarly
   Price history chart & currency exchange rate

Customers also viewed