Description |
xxi, 274 pages : illustrations ; 23 cm |
Contents |
Foreword / Jerry Kovacich -- 1. Introduction to the theories of risk management -- 2. The changing environment -- 3. The art of managing risks -- 4. Threat assessment and its input to risk assessment -- 5. Threat assessment method -- 6. Example threat assessment -- 7. Operating system vulnerabilities -- 8. Application vulnerabilities -- 9. Public domain or commercial off-the-shelf software? -- 10. Connectivity and dependence -- 11. What is risk assessment? -- 12. Risk analysis -- 13. Who is responsible? -- 14. Qualitative and quantitative risk assessment -- 15. Policies, procedures, plans, and processes of risk management -- 16. Tools and techniques -- 17. Integrated risk management -- 18. The future of risk management |
Summary |
"Risk Management for Computer Security provides an up-to-data, holistic approach to risk assessment. It covers the fundamental elements that make up a superior risk management program and provides an integrated "how to" approach to forming and implementing a corporate IT risk assessment program. Coverage includes tested methods and processes, and checklists that can be used by the reader and immediately implemented in a computer and overall corporate security program. This book explains these methods and helps professionals in their daily work with the hands-on information practitioners need to meet current and impending security challenges."--BOOK JACKET |
Notes |
Formerly CIP. Uk |
Bibliography |
Includes bibliographical references and index |
Notes |
Also available online via the World Wide Web, by subscription to EBL (Ebook Library) |
Subject |
Industrial safety -- Management.
|
|
Computer security.
|
Author |
Ashenden, Debi.
|
|
Ebooks Corporation.
|
LC no. |
2004027551 |
ISBN |
0750677953 alkaline paper |
|