Risk management for computer security : Protecting your network and information assets /
Provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program
Main Author: | |
---|---|
Other Authors: | |
Format: | Government Document Book |
Language: | English |
Published: |
Amsterdam, Netherlands ; Boston :
Elsevier Butterworth-Heinemann,
©2005
Amsterdam, Netherlands ; Boston : ©2005 |
Subjects: |
LEADER | 06284nam a2200805Ia 4500 | ||
---|---|---|---|
001 | 0c39834a-40de-4450-9dc1-47690a532b90 | ||
005 | 20240609000000.0 | ||
008 | 070730s2005 ne a ob 001 0 eng d | ||
010 | |a 2004027551 | ||
019 | |a 441785339 |a 648304177 |a 961626977 |a 962628396 |a 966210770 |a 984805716 |a 988511979 |a 992061623 |a 1037740578 |a 1038697365 |a 1055398432 |a 1063815728 |a 1113241370 |a 1153556356 |a 1162506705 |a 1228540584 |a 1241747501 |a 1290093145 |a 1300674536 | ||
019 | |a 441785339 |a 648304177 |a 961626977 |a 962628396 |a 966210770 |a 984805716 |a 988511979 |a 992061623 |a 1037740578 |a 1038697365 |a 1055398432 |a 1063815728 |a 1113241370 |a 1153556356 |a 1162506705 |a 1228540584 |a 1241747501 | ||
020 | |a 0080491553 |q (electronic bk.) | ||
020 | |a 0750677953 | ||
020 | |a 1281006831 | ||
020 | |a 6611006834 | ||
020 | |a 9780080491554 |q (electronic bk.) | ||
020 | |a 9780750677950 | ||
020 | |a 9781281006837 | ||
020 | |a 9786611006839 | ||
020 | |z 0750677953 |q (Paper) | ||
035 | |a (OCoLC)159937634 |z (OCoLC)441785339 |z (OCoLC)648304177 |z (OCoLC)961626977 |z (OCoLC)962628396 |z (OCoLC)966210770 |z (OCoLC)984805716 |z (OCoLC)988511979 |z (OCoLC)992061623 |z (OCoLC)1037740578 |z (OCoLC)1038697365 |z (OCoLC)1055398432 |z (OCoLC)1063815728 |z (OCoLC)1113241370 |z (OCoLC)1153556356 |z (OCoLC)1162506705 |z (OCoLC)1228540584 |z (OCoLC)1241747501 |z (OCoLC)1290093145 |z (OCoLC)1300674536 | ||
035 | |a (OCoLC)159937634 |z (OCoLC)441785339 |z (OCoLC)648304177 |z (OCoLC)961626977 |z (OCoLC)962628396 |z (OCoLC)966210770 |z (OCoLC)984805716 |z (OCoLC)988511979 |z (OCoLC)992061623 |z (OCoLC)1037740578 |z (OCoLC)1038697365 |z (OCoLC)1055398432 |z (OCoLC)1063815728 |z (OCoLC)1113241370 |z (OCoLC)1153556356 |z (OCoLC)1162506705 |z (OCoLC)1228540584 |z (OCoLC)1241747501 | ||
035 | 9 | |a (OCLCCM-CC)159937634 | |
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d OCLCQ |d MERUC |d E7B |d OCLCQ |d IDEBK |d OCLCQ |d OCLCO |d OCLCQ |d OCLCF |d NLGGC |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d AZK |d LOA |d OCLCA |d COCUF |d AGLDB |d STF |d MOR |d PIFAG |d OCLCQ |d OCLCA |d WRM |d VTS |d INT |d VT2 |d OCLCQ |d WYU |d TKN |d M8D |d UHL |d UKCRE |d VLY |d UKEHC |d OCLCQ |d OCLCO |d SFB |d OCLCO |d OCLCQ | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d OCLCQ |d MERUC |d E7B |d OCLCQ |d IDEBK |d OCLCQ |d OCLCO |d OCLCQ |d OCLCF |d NLGGC |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d AZK |d LOA |d OCLCA |d COCUF |d AGLDB |d STF |d MOR |d PIFAG |d OCLCQ |d OCLCA |d WRM |d VTS |d INT |d VT2 |d OCLCQ |d WYU |d TKN |d M8D |d UHL |d UKCRE |d VLY |d UKEHC | ||
049 | |a MAIN | ||
050 | 4 | |a T55 |b .J655 2005eb | |
072 | 7 | |a BUS |x 071000 |2 bisacsh | |
072 | 7 | |a BUS |x 097000 |2 bisacsh | |
072 | 7 | |a BUS |x 103000 |2 bisacsh | |
072 | 7 | |a BUS |x 104000 |2 bisacsh | |
082 | 0 | 4 | |a 658.4/78 |2 22 |
086 | 0 | |a CIS3103 | |
100 | 1 | |a Jones, Andy, |d 1952- | |
245 | 1 | 0 | |a Risk management for computer security : |b Protecting your network and information assets / |c by Andy Jones & Debi Ashenden |
260 | |a Amsterdam, Netherlands ; |a Boston : |b Elsevier Butterworth-Heinemann, |c ©2005 | ||
260 | |a Amsterdam, Netherlands ; |a Boston : |b Elsevier Butterworth-Heinemann, |c ©2005 | ||
300 | |a 1 online resource (xxi, 274 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index | ||
505 | 0 | |a Cover -- Copyright Page -- Contents -- Foreword -- Preface -- Acknowledgments -- About the Authors -- Section I: An Introduction to Risk Management -- Chapter 1. Introduction to the Theories of Risk Management -- Chapter 2. The Changing Environment -- Chapter 3. The Art of Managing Risks -- Section II: The Threat Assessment Process -- Chapter 4. Threat Assessment and Its Input to Risk Assessment -- Chapter 5. Threat Assessment Method -- Chapter 6. Example Threat Assessment -- Section III: Vulnerability Issues -- Chapter 7. Operating System Vulnerabilities -- Chapter 8. Application Vulnerabilities -- Chapter 9. Public Domain or Commercial Off-the-Shelf Software? -- Chapter 10. Connectivity and Dependence -- Section IV: The Risk Process -- Chapter 11. What Is Risk Assessment? -- Chapter 12. Risk Analysis -- Chapter 13. Who Is Responsible? -- Section V: Tools and Types of Risk Assessment -- Chapter 14. Qualitative and Quantitative Risk Assessment -- Chapter 15. Policies, Procedures, Plans, and Processes of Risk Management -- Chapter 16. Tools and Techniques -- Chapter 17. Integrated Risk Management -- Section VI: Future Directions -- Chapter 18. The Future of Risk Management -- Index -- Last Page | |
520 | |a Provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program | ||
546 | |a English | ||
588 | 0 | |a Print version record | |
596 | |a 22 | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Industrial safety |x Management | |
650 | 0 | |a Risk management | |
650 | 2 | |a Computer Security | |
650 | 2 | |a Risk Management | |
650 | 6 | |a Gestion du risque | |
650 | 6 | |a Sécurité informatique | |
650 | 6 | |a Sécurité du travail |x Gestion | |
650 | 6 | |a Sécurité informatique | |
650 | 7 | |a BUSINESS & ECONOMICS |x Corporate Governance |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Leadership |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Organizational Development |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Workplace Culture |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Industrial safety |x Management |2 fast | |
650 | 7 | |a risk management |2 aat | |
655 | 0 | |a Electronic books | |
655 | 4 | |a Electronic books | |
700 | 1 | |a Ashenden, Debi | |
776 | 0 | 8 | |i Print version: |a Jones, Andy, 1952- |t Risk management for computer security |d Amsterdam, Netherlands ; Boston : Elsevier Butterworth-Heinemann, ©2005 |z 0750677953 |z 9780750677950 |w (DLC) 2004027551 |w (OCoLC)57069683 |
999 | 1 | 0 | |i 0c39834a-40de-4450-9dc1-47690a532b90 |l a12993106 |s US-CST |m risk_management_for_computer_securityprotecting_your_network_and_infor_____2005_______elseva________________________________________jones__andy________________________cis3103e |
999 | 1 | 0 | |i 0c39834a-40de-4450-9dc1-47690a532b90 |l 11153371 |s US-ICU |m risk_management_for_computer_securityprotecting_your_network_and_infor_____2005_______elseva________________________________________jones__andy________________________cis3103e |
999 | 1 | 1 | |l a12993106 |s ISIL:US-CST |t BKS |a SUL INTERNET |b 12993106-1001 |c INTERNET RESOURCE |d ASIS |x SUL |y 12993106-1001 |p UNLOANABLE |