The security risk assessment handbook: a complete guide for performing security risk assessments
Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection. Performed incorrectly, they can provide...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press
2021
|
Ausgabe: | Third edition |
Schlagworte: | |
Zusammenfassung: | Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection. Performed incorrectly, they can provide the false sense of security that allows potential threats to develop into disastrous losses of proprietary information, capital, and corporate value. Picking up where its bestselling predecessors left off, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Third Edition gives you detailed instruction on how to conduct a security risk assessment effectively and efficiently, supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting.The third edition has expanded coverage of essential topics, such as threat analysis, data gathering, risk analysis, and risk assessment methods, and added coverage of new topics essential for current assessment projects (e.g., cloud security, supply chain management, and security risk assessment methods). This handbook walks you through the process of conducting an effective security assessment, and it provides the tools, methods, and up-to-date understanding you need to select the security measures best suited to your organization.Trusted to assess security for small companies, leading organizations, and government agencies, including the CIA, NSA, and NATO, Douglas J. Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals in the field. |
Beschreibung: | xxiii, 490 Seiten Breite 178 mm, Hoehe 254 mm |
ISBN: | 9781032041650 9780367547479 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV047510764 | ||
003 | DE-604 | ||
005 | 20211108 | ||
007 | t | ||
008 | 211013s2021 |||| 00||| eng d | ||
020 | |a 9781032041650 |c Kartoniert, Paperback : EUR 73,09 |9 978-1-032-04165-0 | ||
020 | |a 9780367547479 |c hbk. |9 978-0-367-54747-9 | ||
035 | |a (OCoLC)1286856613 | ||
035 | |a (DE-599)BVBBV047510764 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
100 | 1 | |a Landoll, Douglas J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a The security risk assessment handbook |b a complete guide for performing security risk assessments |c Douglas J. Landoll |
250 | |a Third edition | ||
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press |c 2021 | |
300 | |a xxiii, 490 Seiten |c Breite 178 mm, Hoehe 254 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
520 | |a Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection. Performed incorrectly, they can provide the false sense of security that allows potential threats to develop into disastrous losses of proprietary information, capital, and corporate value. | ||
520 | |a Picking up where its bestselling predecessors left off, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Third Edition gives you detailed instruction on how to conduct a security risk assessment effectively and efficiently, supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting.The third edition has expanded coverage of essential topics, such as threat analysis, data gathering, risk analysis, and risk assessment methods, and added coverage of new topics essential for current assessment projects (e.g., cloud security, supply chain management, and security risk assessment methods). | ||
520 | |a This handbook walks you through the process of conducting an effective security assessment, and it provides the tools, methods, and up-to-date understanding you need to select the security measures best suited to your organization.Trusted to assess security for small companies, leading organizations, and government agencies, including the CIA, NSA, and NATO, Douglas J. Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals in the field. | ||
650 | 0 | 7 | |a Unternehmen |0 (DE-588)4061963-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenverarbeitung |0 (DE-588)4011152-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datenverarbeitung |0 (DE-588)4011152-0 |D s |
689 | 0 | 1 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-003-09044-1 |
999 | |a oai:aleph.bib-bvb.de:BVB01-032911646 |
Datensatz im Suchindex
_version_ | 1804182849687912448 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Landoll, Douglas J. |
author_facet | Landoll, Douglas J. |
author_role | aut |
author_sort | Landoll, Douglas J. |
author_variant | d j l dj djl |
building | Verbundindex |
bvnumber | BV047510764 |
ctrlnum | (OCoLC)1286856613 (DE-599)BVBBV047510764 |
edition | Third edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03078nam a2200409 c 4500</leader><controlfield tag="001">BV047510764</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211108 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">211013s2021 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781032041650</subfield><subfield code="c">Kartoniert, Paperback : EUR 73,09</subfield><subfield code="9">978-1-032-04165-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780367547479</subfield><subfield code="c">hbk.</subfield><subfield code="9">978-0-367-54747-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1286856613</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047510764</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Landoll, Douglas J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The security risk assessment handbook</subfield><subfield code="b">a complete guide for performing security risk assessments</subfield><subfield code="c">Douglas J. Landoll</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Third edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxiii, 490 Seiten</subfield><subfield code="c">Breite 178 mm, Hoehe 254 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection. Performed incorrectly, they can provide the false sense of security that allows potential threats to develop into disastrous losses of proprietary information, capital, and corporate value. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Picking up where its bestselling predecessors left off, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Third Edition gives you detailed instruction on how to conduct a security risk assessment effectively and efficiently, supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting.The third edition has expanded coverage of essential topics, such as threat analysis, data gathering, risk analysis, and risk assessment methods, and added coverage of new topics essential for current assessment projects (e.g., cloud security, supply chain management, and security risk assessment methods). </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This handbook walks you through the process of conducting an effective security assessment, and it provides the tools, methods, and up-to-date understanding you need to select the security measures best suited to your organization.Trusted to assess security for small companies, leading organizations, and government agencies, including the CIA, NSA, and NATO, Douglas J. Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals in the field. </subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-003-09044-1</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032911646</subfield></datafield></record></collection> |
id | DE-604.BV047510764 |
illustrated | Not Illustrated |
index_date | 2024-07-03T18:21:44Z |
indexdate | 2024-07-10T09:14:05Z |
institution | BVB |
isbn | 9781032041650 9780367547479 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032911646 |
oclc_num | 1286856613 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | xxiii, 490 Seiten Breite 178 mm, Hoehe 254 mm |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | CRC Press |
record_format | marc |
spelling | Landoll, Douglas J. Verfasser aut The security risk assessment handbook a complete guide for performing security risk assessments Douglas J. Landoll Third edition Boca Raton ; London ; New York CRC Press 2021 xxiii, 490 Seiten Breite 178 mm, Hoehe 254 mm txt rdacontent n rdamedia nc rdacarrier Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection. Performed incorrectly, they can provide the false sense of security that allows potential threats to develop into disastrous losses of proprietary information, capital, and corporate value. Picking up where its bestselling predecessors left off, The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Third Edition gives you detailed instruction on how to conduct a security risk assessment effectively and efficiently, supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting.The third edition has expanded coverage of essential topics, such as threat analysis, data gathering, risk analysis, and risk assessment methods, and added coverage of new topics essential for current assessment projects (e.g., cloud security, supply chain management, and security risk assessment methods). This handbook walks you through the process of conducting an effective security assessment, and it provides the tools, methods, and up-to-date understanding you need to select the security measures best suited to your organization.Trusted to assess security for small companies, leading organizations, and government agencies, including the CIA, NSA, and NATO, Douglas J. Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals in the field. Unternehmen (DE-588)4061963-1 gnd rswk-swf Datenverarbeitung (DE-588)4011152-0 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datenverarbeitung (DE-588)4011152-0 s Unternehmen (DE-588)4061963-1 s Computersicherheit (DE-588)4274324-2 s DE-604 Erscheint auch als Online-Ausgabe 978-1-003-09044-1 |
spellingShingle | Landoll, Douglas J. The security risk assessment handbook a complete guide for performing security risk assessments Unternehmen (DE-588)4061963-1 gnd Datenverarbeitung (DE-588)4011152-0 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4061963-1 (DE-588)4011152-0 (DE-588)4274324-2 |
title | The security risk assessment handbook a complete guide for performing security risk assessments |
title_auth | The security risk assessment handbook a complete guide for performing security risk assessments |
title_exact_search | The security risk assessment handbook a complete guide for performing security risk assessments |
title_exact_search_txtP | The security risk assessment handbook a complete guide for performing security risk assessments |
title_full | The security risk assessment handbook a complete guide for performing security risk assessments Douglas J. Landoll |
title_fullStr | The security risk assessment handbook a complete guide for performing security risk assessments Douglas J. Landoll |
title_full_unstemmed | The security risk assessment handbook a complete guide for performing security risk assessments Douglas J. Landoll |
title_short | The security risk assessment handbook |
title_sort | the security risk assessment handbook a complete guide for performing security risk assessments |
title_sub | a complete guide for performing security risk assessments |
topic | Unternehmen (DE-588)4061963-1 gnd Datenverarbeitung (DE-588)4011152-0 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Unternehmen Datenverarbeitung Computersicherheit |
work_keys_str_mv | AT landolldouglasj thesecurityriskassessmenthandbookacompleteguideforperformingsecurityriskassessments |