Information security risk assessment toolkit practical assessments through data collection and data analysis
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Syngress
c2012
|
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042305243 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781597497350 |9 978-1-59749-735-0 | ||
020 | |a 1597497355 |9 1-59749-735-5 | ||
035 | |a (OCoLC)814380381 | ||
035 | |a (DE-599)BVBBV042305243 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Talabis, Mark |e Verfasser |4 aut | |
245 | 1 | 0 | |a Information security risk assessment toolkit |b practical assessments through data collection and data analysis |c Mark Ryan M. Talabis, Jason L. Martin |
264 | 1 | |a Amsterdam |b Syngress |c c2012 | |
300 | |a 1 Online-Ressource (1 online resource) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessments gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders. Based on authors' experiences of real-world assessments, reports, and presentations Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment. Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment | ||
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Data protection |2 fast | |
650 | 7 | |a Database security |2 fast | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Database security | |
700 | 1 | |a Martin, Jason |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597497350 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027742235 |
Datensatz im Suchindex
_version_ | 1804152888131321856 |
---|---|
any_adam_object | |
author | Talabis, Mark |
author_facet | Talabis, Mark |
author_role | aut |
author_sort | Talabis, Mark |
author_variant | m t mt |
building | Verbundindex |
bvnumber | BV042305243 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (OCoLC)814380381 (DE-599)BVBBV042305243 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02451nmm a2200433zc 4500</leader><controlfield tag="001">BV042305243</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597497350</subfield><subfield code="9">978-1-59749-735-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597497355</subfield><subfield code="9">1-59749-735-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)814380381</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042305243</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Talabis, Mark</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security risk assessment toolkit</subfield><subfield code="b">practical assessments through data collection and data analysis</subfield><subfield code="c">Mark Ryan M. Talabis, Jason L. Martin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Syngress</subfield><subfield code="c">c2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessments gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders. Based on authors' experiences of real-world assessments, reports, and presentations Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment. Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Database security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Martin, Jason</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597497350</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027742235</subfield></datafield></record></collection> |
id | DE-604.BV042305243 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:52Z |
institution | BVB |
isbn | 9781597497350 1597497355 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027742235 |
oclc_num | 814380381 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (1 online resource) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Syngress |
record_format | marc |
spelling | Talabis, Mark Verfasser aut Information security risk assessment toolkit practical assessments through data collection and data analysis Mark Ryan M. Talabis, Jason L. Martin Amsterdam Syngress c2012 1 Online-Ressource (1 online resource) txt rdacontent c rdamedia cr rdacarrier Includes index In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessments gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders. Based on authors' experiences of real-world assessments, reports, and presentations Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment. Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment Computer networks / Security measures fast Data protection fast Database security fast Data protection Computer networks Security measures Database security Martin, Jason Sonstige oth http://www.sciencedirect.com/science/book/9781597497350 Verlag Volltext |
spellingShingle | Talabis, Mark Information security risk assessment toolkit practical assessments through data collection and data analysis Computer networks / Security measures fast Data protection fast Database security fast Data protection Computer networks Security measures Database security |
title | Information security risk assessment toolkit practical assessments through data collection and data analysis |
title_auth | Information security risk assessment toolkit practical assessments through data collection and data analysis |
title_exact_search | Information security risk assessment toolkit practical assessments through data collection and data analysis |
title_full | Information security risk assessment toolkit practical assessments through data collection and data analysis Mark Ryan M. Talabis, Jason L. Martin |
title_fullStr | Information security risk assessment toolkit practical assessments through data collection and data analysis Mark Ryan M. Talabis, Jason L. Martin |
title_full_unstemmed | Information security risk assessment toolkit practical assessments through data collection and data analysis Mark Ryan M. Talabis, Jason L. Martin |
title_short | Information security risk assessment toolkit |
title_sort | information security risk assessment toolkit practical assessments through data collection and data analysis |
title_sub | practical assessments through data collection and data analysis |
topic | Computer networks / Security measures fast Data protection fast Database security fast Data protection Computer networks Security measures Database security |
topic_facet | Computer networks / Security measures Data protection Database security Computer networks Security measures |
url | http://www.sciencedirect.com/science/book/9781597497350 |
work_keys_str_mv | AT talabismark informationsecurityriskassessmenttoolkitpracticalassessmentsthroughdatacollectionanddataanalysis AT martinjason informationsecurityriskassessmenttoolkitpracticalassessmentsthroughdatacollectionanddataanalysis |