Risk management for computer security :: Protecting your network and information assets /
Provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program.
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Regierungsdokument Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam, Netherlands ; Boston :
Elsevier Butterworth-Heinemann,
©2005.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program. |
Beschreibung: | 1 online resource (xxi, 274 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780080491554 0080491553 9780750677950 0750677953 1281006831 9781281006837 9786611006839 6611006834 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn159937634 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 070730s2005 ne a ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d OCLCQ |d MERUC |d E7B |d OCLCQ |d IDEBK |d OCLCQ |d OCLCO |d OCLCQ |d OCLCF |d NLGGC |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d AZK |d LOA |d OCLCA |d COCUF |d AGLDB |d STF |d MOR |d PIFAG |d OCLCQ |d OCLCA |d WRM |d VTS |d INT |d VT2 |d OCLCQ |d WYU |d TKN |d M8D |d UHL |d UKCRE |d VLY |d UKEHC |d OCLCQ |d OCLCO |d SFB |d OCLCO |d OCLCQ |d OCL |d OCLCQ |d OCLCO |d OCLCL |d EZC |d OCLCO |d OCLCQ | ||
019 | |a 441785339 |a 648304177 |a 961626977 |a 962628396 |a 966210770 |a 984805716 |a 988511979 |a 992061623 |a 1034908263 |a 1037740578 |a 1038697365 |a 1055398432 |a 1063815728 |a 1113241370 |a 1153556356 |a 1162506705 |a 1228540584 |a 1241747501 |a 1290093145 |a 1300674536 | ||
020 | |a 9780080491554 |q (electronic bk.) | ||
020 | |a 0080491553 |q (electronic bk.) | ||
020 | |a 9780750677950 | ||
020 | |a 0750677953 | ||
020 | |a 1281006831 | ||
020 | |a 9781281006837 | ||
020 | |a 9786611006839 | ||
020 | |a 6611006834 | ||
020 | |z 0750677953 |q (Paper) | ||
035 | |a (OCoLC)159937634 |z (OCoLC)441785339 |z (OCoLC)648304177 |z (OCoLC)961626977 |z (OCoLC)962628396 |z (OCoLC)966210770 |z (OCoLC)984805716 |z (OCoLC)988511979 |z (OCoLC)992061623 |z (OCoLC)1034908263 |z (OCoLC)1037740578 |z (OCoLC)1038697365 |z (OCoLC)1055398432 |z (OCoLC)1063815728 |z (OCoLC)1113241370 |z (OCoLC)1153556356 |z (OCoLC)1162506705 |z (OCoLC)1228540584 |z (OCoLC)1241747501 |z (OCoLC)1290093145 |z (OCoLC)1300674536 | ||
050 | 4 | |a T55 |b .J655 2005eb | |
072 | 7 | |a BUS |x 097000 |2 bisacsh | |
072 | 7 | |a BUS |x 104000 |2 bisacsh | |
072 | 7 | |a BUS |x 071000 |2 bisacsh | |
072 | 7 | |a BUS |x 103000 |2 bisacsh | |
082 | 7 | |a 658.4/78 |2 22 | |
086 | 0 | |a CIS3103 | |
049 | |a MAIN | ||
100 | 1 | |a Jones, Andy, |d 1952- |0 http://id.loc.gov/authorities/names/n2002010569 | |
245 | 1 | 0 | |a Risk management for computer security : |b Protecting your network and information assets / |c by Andy Jones & Debi Ashenden. |
260 | |a Amsterdam, Netherlands ; |a Boston : |b Elsevier Butterworth-Heinemann, |c ©2005. | ||
300 | |a 1 online resource (xxi, 274 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Cover -- Copyright Page -- Contents -- Foreword -- Preface -- Acknowledgments -- About the Authors -- Section I: An Introduction to Risk Management -- Chapter 1. Introduction to the Theories of Risk Management -- Chapter 2. The Changing Environment -- Chapter 3. The Art of Managing Risks -- Section II: The Threat Assessment Process -- Chapter 4. Threat Assessment and Its Input to Risk Assessment -- Chapter 5. Threat Assessment Method -- Chapter 6. Example Threat Assessment -- Section III: Vulnerability Issues -- Chapter 7. Operating System Vulnerabilities -- Chapter 8. Application Vulnerabilities -- Chapter 9. Public Domain or Commercial Off-the-Shelf Software? -- Chapter 10. Connectivity and Dependence -- Section IV: The Risk Process -- Chapter 11. What Is Risk Assessment? -- Chapter 12. Risk Analysis -- Chapter 13. Who Is Responsible? -- Section V: Tools and Types of Risk Assessment -- Chapter 14. Qualitative and Quantitative Risk Assessment -- Chapter 15. Policies, Procedures, Plans, and Processes of Risk Management -- Chapter 16. Tools and Techniques -- Chapter 17. Integrated Risk Management -- Section VI: Future Directions -- Chapter 18. The Future of Risk Management -- Index -- Last Page. | |
588 | 0 | |a Print version record. | |
520 | |a Provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program. | ||
546 | |a English. | ||
650 | 0 | |a Industrial safety |x Management. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Risk management. |0 http://id.loc.gov/authorities/subjects/sh85114200 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 2 | |a Risk Management |0 https://id.nlm.nih.gov/mesh/D012308 | |
650 | 6 | |a Gestion du risque. | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Sécurité du travail |x Gestion. | |
650 | 7 | |a risk management. |2 aat | |
650 | 7 | |a BUSINESS & ECONOMICS |x Workplace Culture. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Corporate Governance. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Leadership. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Organizational Development. |2 bisacsh | |
650 | 7 | |a Risk management |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Industrial safety |x Management |2 fast | |
655 | 7 | |a dissertations. |2 aat | |
655 | 7 | |a Academic theses |2 fast | |
655 | 7 | |a Academic theses. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2014026039 | |
655 | 7 | |a Thèses et écrits académiques. |2 rvmgf | |
700 | 1 | |a Ashenden, Debi. | |
776 | 0 | 8 | |i Print version: |a Jones, Andy, 1952- |t Risk management for computer security. |d Amsterdam, Netherlands ; Boston : Elsevier Butterworth-Heinemann, ©2005 |z 0750677953 |z 9780750677950 |w (DLC) 2004027551 |w (OCoLC)57069683 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=195130 |3 Volltext |
938 | |a ebrary |b EBRY |n ebr10186508 | ||
938 | |a EBSCOhost |b EBSC |n 195130 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 100683 | ||
938 | |a YBP Library Services |b YANK |n 2599509 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn159937634 |
---|---|
_version_ | 1816881649907924992 |
adam_text | |
any_adam_object | |
author | Jones, Andy, 1952- |
author2 | Ashenden, Debi |
author2_role | |
author2_variant | d a da |
author_GND | http://id.loc.gov/authorities/names/n2002010569 |
author_facet | Jones, Andy, 1952- Ashenden, Debi |
author_role | |
author_sort | Jones, Andy, 1952- |
author_variant | a j aj |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | T55 |
callnumber-raw | T55 .J655 2005eb |
callnumber-search | T55 .J655 2005eb |
callnumber-sort | T 255 J655 42005EB |
callnumber-subject | T - General Technology |
collection | ZDB-4-EBA |
contents | Cover -- Copyright Page -- Contents -- Foreword -- Preface -- Acknowledgments -- About the Authors -- Section I: An Introduction to Risk Management -- Chapter 1. Introduction to the Theories of Risk Management -- Chapter 2. The Changing Environment -- Chapter 3. The Art of Managing Risks -- Section II: The Threat Assessment Process -- Chapter 4. Threat Assessment and Its Input to Risk Assessment -- Chapter 5. Threat Assessment Method -- Chapter 6. Example Threat Assessment -- Section III: Vulnerability Issues -- Chapter 7. Operating System Vulnerabilities -- Chapter 8. Application Vulnerabilities -- Chapter 9. Public Domain or Commercial Off-the-Shelf Software? -- Chapter 10. Connectivity and Dependence -- Section IV: The Risk Process -- Chapter 11. What Is Risk Assessment? -- Chapter 12. Risk Analysis -- Chapter 13. Who Is Responsible? -- Section V: Tools and Types of Risk Assessment -- Chapter 14. Qualitative and Quantitative Risk Assessment -- Chapter 15. Policies, Procedures, Plans, and Processes of Risk Management -- Chapter 16. Tools and Techniques -- Chapter 17. Integrated Risk Management -- Section VI: Future Directions -- Chapter 18. The Future of Risk Management -- Index -- Last Page. |
ctrlnum | (OCoLC)159937634 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Government Document Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05461cam a2200817 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn159937634</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">070730s2005 ne a ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">LOA</subfield><subfield code="d">OCLCA</subfield><subfield code="d">COCUF</subfield><subfield code="d">AGLDB</subfield><subfield code="d">STF</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">WRM</subfield><subfield code="d">VTS</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">TKN</subfield><subfield code="d">M8D</subfield><subfield code="d">UHL</subfield><subfield code="d">UKCRE</subfield><subfield code="d">VLY</subfield><subfield code="d">UKEHC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">SFB</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">EZC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">441785339</subfield><subfield code="a">648304177</subfield><subfield code="a">961626977</subfield><subfield code="a">962628396</subfield><subfield code="a">966210770</subfield><subfield code="a">984805716</subfield><subfield code="a">988511979</subfield><subfield code="a">992061623</subfield><subfield code="a">1034908263</subfield><subfield code="a">1037740578</subfield><subfield code="a">1038697365</subfield><subfield code="a">1055398432</subfield><subfield code="a">1063815728</subfield><subfield code="a">1113241370</subfield><subfield code="a">1153556356</subfield><subfield code="a">1162506705</subfield><subfield code="a">1228540584</subfield><subfield code="a">1241747501</subfield><subfield code="a">1290093145</subfield><subfield code="a">1300674536</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080491554</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080491553</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780750677950</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0750677953</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281006831</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281006837</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611006839</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611006834</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0750677953</subfield><subfield code="q">(Paper)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)159937634</subfield><subfield code="z">(OCoLC)441785339</subfield><subfield code="z">(OCoLC)648304177</subfield><subfield code="z">(OCoLC)961626977</subfield><subfield code="z">(OCoLC)962628396</subfield><subfield code="z">(OCoLC)966210770</subfield><subfield code="z">(OCoLC)984805716</subfield><subfield code="z">(OCoLC)988511979</subfield><subfield code="z">(OCoLC)992061623</subfield><subfield code="z">(OCoLC)1034908263</subfield><subfield code="z">(OCoLC)1037740578</subfield><subfield code="z">(OCoLC)1038697365</subfield><subfield code="z">(OCoLC)1055398432</subfield><subfield code="z">(OCoLC)1063815728</subfield><subfield code="z">(OCoLC)1113241370</subfield><subfield code="z">(OCoLC)1153556356</subfield><subfield code="z">(OCoLC)1162506705</subfield><subfield code="z">(OCoLC)1228540584</subfield><subfield code="z">(OCoLC)1241747501</subfield><subfield code="z">(OCoLC)1290093145</subfield><subfield code="z">(OCoLC)1300674536</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">T55</subfield><subfield code="b">.J655 2005eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">097000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">104000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">071000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">103000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">22</subfield></datafield><datafield tag="086" ind1="0" ind2=" "><subfield code="a">CIS3103</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jones, Andy,</subfield><subfield code="d">1952-</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2002010569</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Risk management for computer security :</subfield><subfield code="b">Protecting your network and information assets /</subfield><subfield code="c">by Andy Jones & Debi Ashenden.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam, Netherlands ;</subfield><subfield code="a">Boston :</subfield><subfield code="b">Elsevier Butterworth-Heinemann,</subfield><subfield code="c">©2005.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxi, 274 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover -- Copyright Page -- Contents -- Foreword -- Preface -- Acknowledgments -- About the Authors -- Section I: An Introduction to Risk Management -- Chapter 1. Introduction to the Theories of Risk Management -- Chapter 2. The Changing Environment -- Chapter 3. The Art of Managing Risks -- Section II: The Threat Assessment Process -- Chapter 4. Threat Assessment and Its Input to Risk Assessment -- Chapter 5. Threat Assessment Method -- Chapter 6. Example Threat Assessment -- Section III: Vulnerability Issues -- Chapter 7. Operating System Vulnerabilities -- Chapter 8. Application Vulnerabilities -- Chapter 9. Public Domain or Commercial Off-the-Shelf Software? -- Chapter 10. Connectivity and Dependence -- Section IV: The Risk Process -- Chapter 11. What Is Risk Assessment? -- Chapter 12. Risk Analysis -- Chapter 13. Who Is Responsible? -- Section V: Tools and Types of Risk Assessment -- Chapter 14. Qualitative and Quantitative Risk Assessment -- Chapter 15. Policies, Procedures, Plans, and Processes of Risk Management -- Chapter 16. Tools and Techniques -- Chapter 17. Integrated Risk Management -- Section VI: Future Directions -- Chapter 18. The Future of Risk Management -- Index -- Last Page.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Industrial safety</subfield><subfield code="x">Management.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Risk management.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85114200</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Risk Management</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D012308</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Gestion du risque.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité du travail</subfield><subfield code="x">Gestion.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">risk management.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Workplace Culture.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Corporate Governance.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Leadership.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Organizational Development.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Risk management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Industrial safety</subfield><subfield code="x">Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">dissertations.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Academic theses</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Academic theses.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2014026039</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Thèses et écrits académiques.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ashenden, Debi.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Jones, Andy, 1952-</subfield><subfield code="t">Risk management for computer security.</subfield><subfield code="d">Amsterdam, Netherlands ; Boston : Elsevier Butterworth-Heinemann, ©2005</subfield><subfield code="z">0750677953</subfield><subfield code="z">9780750677950</subfield><subfield code="w">(DLC) 2004027551</subfield><subfield code="w">(OCoLC)57069683</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=195130</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10186508</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">195130</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">100683</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2599509</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | dissertations. aat Academic theses fast Academic theses. lcgft http://id.loc.gov/authorities/genreForms/gf2014026039 Thèses et écrits académiques. rvmgf |
genre_facet | dissertations. Academic theses Academic theses. Thèses et écrits académiques. |
id | ZDB-4-EBA-ocn159937634 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:05Z |
institution | BVB |
isbn | 9780080491554 0080491553 9780750677950 0750677953 1281006831 9781281006837 9786611006839 6611006834 |
language | English |
oclc_num | 159937634 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxi, 274 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Elsevier Butterworth-Heinemann, |
record_format | marc |
spelling | Jones, Andy, 1952- http://id.loc.gov/authorities/names/n2002010569 Risk management for computer security : Protecting your network and information assets / by Andy Jones & Debi Ashenden. Amsterdam, Netherlands ; Boston : Elsevier Butterworth-Heinemann, ©2005. 1 online resource (xxi, 274 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references and index. Cover -- Copyright Page -- Contents -- Foreword -- Preface -- Acknowledgments -- About the Authors -- Section I: An Introduction to Risk Management -- Chapter 1. Introduction to the Theories of Risk Management -- Chapter 2. The Changing Environment -- Chapter 3. The Art of Managing Risks -- Section II: The Threat Assessment Process -- Chapter 4. Threat Assessment and Its Input to Risk Assessment -- Chapter 5. Threat Assessment Method -- Chapter 6. Example Threat Assessment -- Section III: Vulnerability Issues -- Chapter 7. Operating System Vulnerabilities -- Chapter 8. Application Vulnerabilities -- Chapter 9. Public Domain or Commercial Off-the-Shelf Software? -- Chapter 10. Connectivity and Dependence -- Section IV: The Risk Process -- Chapter 11. What Is Risk Assessment? -- Chapter 12. Risk Analysis -- Chapter 13. Who Is Responsible? -- Section V: Tools and Types of Risk Assessment -- Chapter 14. Qualitative and Quantitative Risk Assessment -- Chapter 15. Policies, Procedures, Plans, and Processes of Risk Management -- Chapter 16. Tools and Techniques -- Chapter 17. Integrated Risk Management -- Section VI: Future Directions -- Chapter 18. The Future of Risk Management -- Index -- Last Page. Print version record. Provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program. English. Industrial safety Management. Computer security. Risk management. http://id.loc.gov/authorities/subjects/sh85114200 Computer Security https://id.nlm.nih.gov/mesh/D016494 Risk Management https://id.nlm.nih.gov/mesh/D012308 Gestion du risque. Sécurité informatique. Sécurité du travail Gestion. risk management. aat BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh Risk management fast Computer security fast Industrial safety Management fast dissertations. aat Academic theses fast Academic theses. lcgft http://id.loc.gov/authorities/genreForms/gf2014026039 Thèses et écrits académiques. rvmgf Ashenden, Debi. Print version: Jones, Andy, 1952- Risk management for computer security. Amsterdam, Netherlands ; Boston : Elsevier Butterworth-Heinemann, ©2005 0750677953 9780750677950 (DLC) 2004027551 (OCoLC)57069683 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=195130 Volltext |
spellingShingle | Jones, Andy, 1952- Risk management for computer security : Protecting your network and information assets / Cover -- Copyright Page -- Contents -- Foreword -- Preface -- Acknowledgments -- About the Authors -- Section I: An Introduction to Risk Management -- Chapter 1. Introduction to the Theories of Risk Management -- Chapter 2. The Changing Environment -- Chapter 3. The Art of Managing Risks -- Section II: The Threat Assessment Process -- Chapter 4. Threat Assessment and Its Input to Risk Assessment -- Chapter 5. Threat Assessment Method -- Chapter 6. Example Threat Assessment -- Section III: Vulnerability Issues -- Chapter 7. Operating System Vulnerabilities -- Chapter 8. Application Vulnerabilities -- Chapter 9. Public Domain or Commercial Off-the-Shelf Software? -- Chapter 10. Connectivity and Dependence -- Section IV: The Risk Process -- Chapter 11. What Is Risk Assessment? -- Chapter 12. Risk Analysis -- Chapter 13. Who Is Responsible? -- Section V: Tools and Types of Risk Assessment -- Chapter 14. Qualitative and Quantitative Risk Assessment -- Chapter 15. Policies, Procedures, Plans, and Processes of Risk Management -- Chapter 16. Tools and Techniques -- Chapter 17. Integrated Risk Management -- Section VI: Future Directions -- Chapter 18. The Future of Risk Management -- Index -- Last Page. Industrial safety Management. Computer security. Risk management. http://id.loc.gov/authorities/subjects/sh85114200 Computer Security https://id.nlm.nih.gov/mesh/D016494 Risk Management https://id.nlm.nih.gov/mesh/D012308 Gestion du risque. Sécurité informatique. Sécurité du travail Gestion. risk management. aat BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh Risk management fast Computer security fast Industrial safety Management fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85114200 https://id.nlm.nih.gov/mesh/D016494 https://id.nlm.nih.gov/mesh/D012308 http://id.loc.gov/authorities/genreForms/gf2014026039 |
title | Risk management for computer security : Protecting your network and information assets / |
title_auth | Risk management for computer security : Protecting your network and information assets / |
title_exact_search | Risk management for computer security : Protecting your network and information assets / |
title_full | Risk management for computer security : Protecting your network and information assets / by Andy Jones & Debi Ashenden. |
title_fullStr | Risk management for computer security : Protecting your network and information assets / by Andy Jones & Debi Ashenden. |
title_full_unstemmed | Risk management for computer security : Protecting your network and information assets / by Andy Jones & Debi Ashenden. |
title_short | Risk management for computer security : |
title_sort | risk management for computer security protecting your network and information assets |
title_sub | Protecting your network and information assets / |
topic | Industrial safety Management. Computer security. Risk management. http://id.loc.gov/authorities/subjects/sh85114200 Computer Security https://id.nlm.nih.gov/mesh/D016494 Risk Management https://id.nlm.nih.gov/mesh/D012308 Gestion du risque. Sécurité informatique. Sécurité du travail Gestion. risk management. aat BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh Risk management fast Computer security fast Industrial safety Management fast |
topic_facet | Industrial safety Management. Computer security. Risk management. Computer Security Risk Management Gestion du risque. Sécurité informatique. Sécurité du travail Gestion. risk management. BUSINESS & ECONOMICS Workplace Culture. BUSINESS & ECONOMICS Corporate Governance. BUSINESS & ECONOMICS Leadership. BUSINESS & ECONOMICS Organizational Development. Risk management Computer security Industrial safety Management dissertations. Academic theses Academic theses. Thèses et écrits académiques. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=195130 |
work_keys_str_mv | AT jonesandy riskmanagementforcomputersecurityprotectingyournetworkandinformationassets AT ashendendebi riskmanagementforcomputersecurityprotectingyournetworkandinformationassets |