Information security risk assessment toolkit practical assessments through data collection and data analysis

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Talabis, Mark (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Amsterdam Syngress c2012
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zc 4500
001 BV042305243
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 150129s2012 |||| o||u| ||||||eng d
020 |a 9781597497350  |9 978-1-59749-735-0 
020 |a 1597497355  |9 1-59749-735-5 
035 |a (OCoLC)814380381 
035 |a (DE-599)BVBBV042305243 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-1046 
082 0 |a 005.8  |2 23 
100 1 |a Talabis, Mark  |e Verfasser  |4 aut 
245 1 0 |a Information security risk assessment toolkit  |b practical assessments through data collection and data analysis  |c Mark Ryan M. Talabis, Jason L. Martin 
264 1 |a Amsterdam  |b Syngress  |c c2012 
300 |a 1 Online-Ressource (1 online resource) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Includes index 
500 |a In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessments gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders. Based on authors' experiences of real-world assessments, reports, and presentations Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment. Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment 
650 7 |a Computer networks / Security measures  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Database security  |2 fast 
650 4 |a Data protection 
650 4 |a Computer networks  |x Security measures 
650 4 |a Database security 
700 1 |a Martin, Jason  |e Sonstige  |4 oth 
856 4 0 |u http://www.sciencedirect.com/science/book/9781597497350  |x Verlag  |3 Volltext 
912 |a ZDB-33-ESD  |a ZDB-33-EBS 
940 1 |q FAW_PDA_ESD 
940 1 |q FLA_PDA_ESD 
999 |a oai:aleph.bib-bvb.de:BVB01-027742235 

Datensatz im Suchindex

_version_ 1804152888131321856
any_adam_object
author Talabis, Mark
author_facet Talabis, Mark
author_role aut
author_sort Talabis, Mark
author_variant m t mt
building Verbundindex
bvnumber BV042305243
collection ZDB-33-ESD
ZDB-33-EBS
ctrlnum (OCoLC)814380381
(DE-599)BVBBV042305243
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02451nmm a2200433zc 4500</leader><controlfield tag="001">BV042305243</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597497350</subfield><subfield code="9">978-1-59749-735-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597497355</subfield><subfield code="9">1-59749-735-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)814380381</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042305243</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Talabis, Mark</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security risk assessment toolkit</subfield><subfield code="b">practical assessments through data collection and data analysis</subfield><subfield code="c">Mark Ryan M. Talabis, Jason L. Martin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Syngress</subfield><subfield code="c">c2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessments gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders. Based on authors' experiences of real-world assessments, reports, and presentations Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment. Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Database security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Martin, Jason</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597497350</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027742235</subfield></datafield></record></collection>
id DE-604.BV042305243
illustrated Not Illustrated
indexdate 2024-07-10T01:17:52Z
institution BVB
isbn 9781597497350
1597497355
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-027742235
oclc_num 814380381
open_access_boolean
owner DE-1046
owner_facet DE-1046
physical 1 Online-Ressource (1 online resource)
psigel ZDB-33-ESD
ZDB-33-EBS
FAW_PDA_ESD
FLA_PDA_ESD
publishDate 2012
publishDateSearch 2012
publishDateSort 2012
publisher Syngress
record_format marc
spelling Talabis, Mark Verfasser aut
Information security risk assessment toolkit practical assessments through data collection and data analysis Mark Ryan M. Talabis, Jason L. Martin
Amsterdam Syngress c2012
1 Online-Ressource (1 online resource)
txt rdacontent
c rdamedia
cr rdacarrier
Includes index
In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessments gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders. Based on authors' experiences of real-world assessments, reports, and presentations Focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment. Includes a companion web site with spreadsheets you can utilize to create and maintain the risk assessment
Computer networks / Security measures fast
Data protection fast
Database security fast
Data protection
Computer networks Security measures
Database security
Martin, Jason Sonstige oth
http://www.sciencedirect.com/science/book/9781597497350 Verlag Volltext
spellingShingle Talabis, Mark
Information security risk assessment toolkit practical assessments through data collection and data analysis
Computer networks / Security measures fast
Data protection fast
Database security fast
Data protection
Computer networks Security measures
Database security
title Information security risk assessment toolkit practical assessments through data collection and data analysis
title_auth Information security risk assessment toolkit practical assessments through data collection and data analysis
title_exact_search Information security risk assessment toolkit practical assessments through data collection and data analysis
title_full Information security risk assessment toolkit practical assessments through data collection and data analysis Mark Ryan M. Talabis, Jason L. Martin
title_fullStr Information security risk assessment toolkit practical assessments through data collection and data analysis Mark Ryan M. Talabis, Jason L. Martin
title_full_unstemmed Information security risk assessment toolkit practical assessments through data collection and data analysis Mark Ryan M. Talabis, Jason L. Martin
title_short Information security risk assessment toolkit
title_sort information security risk assessment toolkit practical assessments through data collection and data analysis
title_sub practical assessments through data collection and data analysis
topic Computer networks / Security measures fast
Data protection fast
Database security fast
Data protection
Computer networks Security measures
Database security
topic_facet Computer networks / Security measures
Data protection
Database security
Computer networks Security measures
url http://www.sciencedirect.com/science/book/9781597497350
work_keys_str_mv AT talabismark informationsecurityriskassessmenttoolkitpracticalassessmentsthroughdatacollectionanddataanalysis
AT martinjason informationsecurityriskassessmenttoolkitpracticalassessmentsthroughdatacollectionanddataanalysis